Hackers Are Looking at Your Phone Number

Download PDF
Hackers Are Looking at Your Phone Number

We are more accustomed to access all our digital accounts on the cell phone now.

Not only email, Twitter or Facebook, but also our bank account and those that allow access to the files we store in the cloud and use many other online services. This makes our smartphones an attractive booty for hackers, who seek access to those accounts to steal sensitive information, such as passport details, confidential documents, and money.


And just with your telephone number and some ingenuity and "social engineering" (manipulation techniques used by computer criminals) hackers can easily convince the customer service of our operator that the number belongs to them (and not you).

The Way You Pick up the Phone Can Make You Vulnerable to Hackers

Here are the latest trends in hacking, although cyber criminals have been doing it for quite a while.

2-Step Verification

Hackers usually start by obtaining information that we make available on the internet: your name, address, birthday. Then when they obtain your number, they can convince the operator of the telephone company that the number is theirs.

Many only need to click on the option "I forgot the password" to sneak into your account, without you being able to do anything about it. If the hackers succeed at this stage, and have managed to circumvent the measures of the teleoperator, they can access your accounts without a problem.

For this they take advantage of the so-called "two-step verification systems" that work through SMS and send codes to clients to - paradoxically - secure more accounts against fraudsters.

  • The fact that your phone number is used as a guarantee system to protect it can become a great opportunity for hackers.
  • Crypto technology specialists reported that in recent months many hackers have used this technique to steal virtual money (Bitcoin, Ether and other cryptones).

But this crime can be perpetrated by anyone who uses the most common web services: Gmail, iCloud, Facebook, Internet banking, PayPal, Dropbox and many others. And a recent investigation by the New York Times confirms it: more and more reports of hackers calling telephone signatures, pretending to be the users of the number or cell in question.

How to Detect If Your Computer Was Hacked and What to Do About It?
Telecom companies are lagging behind when it comes to preventing phone number takeovers.

It is important that you, as a user, look for ways to protect your numbers and keep them safe from the clutches of scammers.

  1. Set an access key
  2. It is the most basic precautionary form, although it could also be hacked, so take extra precaution.

  3. Use a specific email address
  4. Most likely, you'll use the same email address and phone number to access all your accounts. The best thing to be protected is to use different accounts. You need at least three: the main, the phone, and sensitive accounts (bank, Facebook or Dropbox, for example). This way you will give less options to hackers.

  5. Strengthen security requirements
  6. For example, you can tell your telephone operator that you just want to make changes to your account in person or by submitting a photocopy of your identity document.

  7. Disable online access with your carrier
  8. This option is somewhat more radical and can be annoying in some cases, but it is most effective to prevent hackers from taking advantage of potential vulnerabilities.

  9. Try Google Voice
  10. When you sign up for a Google Voice account you can block the number and manage and process your call history, in addition to text messages and conversations, among other things.

  11. Use strong passwords
  12. This is the universal advice for everything that has to do with digital technology: the more complicated your password, the better.

  13. Do not connect your phone number to sensitive accounts
  14. Avoid linking your number with Facebook, your bank account and other online services. It is the safest option to avoid fraud.

  15. Keep your computer updated
  16. By regularly updating your computer, you block attackers from being able to take advantage of software vulnerabilities that they could otherwise use to break into your system.

  17. Make sure your computer is configured securely
  18. A new computer these days should have security controls in place, often promoting you with questions, such as “This may not be safe, you sure you want to download?” You are downloading from a third party source...etc”

    However it is recommended to make sure that you pay attention to security settings.

  19. Be careful of linking accounts
  20. Although convenient, sometimes signing in using Twitter or Facebook, might make you more vulnerable, by exposing data to cyber-criminals.  

Our expert team advice: keep to these 10 simple, but useful rules and your will be protected from the hacker, better than 75% of the world smartphone users.

  

Chief Product Officer
With a passion for innovation and a keen understanding of market trends, Alexander plays a pivotal role in shaping Magora's product development strategy and ensuring the delivery of cutting-edge solutions to clients.
open
related
Summarising the Development Results What is Icon Font? Web Design Trends of 2014 Facebook Creates New Opportunities for Startups
recent
The Downsides of Using LLMs for AI Development and How to Overcome Them The UK Software Development Market in 2024: Trends and Opportunities Top Legal AI Models and How to Build One for Your Business Leading the Charge: Top UK SaaS Startups of 2024
recommended
Everything You Want to Know About Mobile App Development App Development Calculator Infographics: Magora development process Dictionary
categories
News Technologies Design Business Development HealthTech IoT AI/ML PropTech FinTech EdTech Mobile Apps Discovery Transport&Logistics AR/VR Big Data Sustainability Startup Enterprise Security
Logo Magora LTD
close
Thank you very much.
Magora team

Grab your e-book: Design to attract more buyers

Logo Magora LTD
close
Get in touch
Open list
Open list
Logo Magora LTD
close
Thank you very much.

Your registration to the webinar on the 27th of September at 2 p.m. BST was successfuly completed.
We will send you a reminder on the day before the event.
Magora team
Registration for a webinar

"Let Smart Bots Speed up your Business"
Date: 27.09.2018 Time: 2 p.m. BST
Do you agree to the personal data processing?


Logo Magora LTD
close
Download our curated selection of resources for accelerating your software development journey.