Smart Phones
A Criminal's Dream!

Smart phones safety and security is being threatened big time. The days of the user feeling safe using these are over.

Smart phones and cell phone texting can lead to identity theft.

The scammer has now found a new way to exploit these smart phones to commit identity theft and steal all your personal information.

Unfortunately, 2011 has certainly turned out to be a huge threat to all mobile devices due to their exploding popularity.

  • The biggest threat will come from phishing attacks.
  • These entice people to websites that are fake and trick you into giving your bank account numbers, credit card information, names and passwords.
  • Security threats will become more and more common to mobile devices because more people are using them.

Also, mobile phones have increased the number of channels that are available for phishing attacks.

  • We now have 370 million smart phones, which include Androids, iPhones, BlackBerrys and all others that accept apps and have processing power that is ample.
  • Millions of these are probably infected already with spyware.

The risk for this type of phone is much higher that just the “basic” one.

  • In the United States mobile phone spyware is illegal, but is sold by websites that operates overseas.
  • There are more than 6oo app variations and all it takes is a credit card to make an instant wiretap.

Jealous people and spouses that are suspicious can certainly use this to their advantage but, more importantly, this allows identity theft to make you a victim.

The spy program has to be installed in your phone and this can happen in many types of ways.

Software can be used to get you to click on link messages that are very enticing (these are sent by the spy to your phone).

In many instances a spy has to physically get their hands on your phone for only 10 minutes and entering a code to the phone “downloads the spyware with no indications.”

Websites out there even have spyware already installed on phones they sell.

A text message alerts a spy when you receive and make a call if your phone becomes affected, with no unusual signs on your end.

Also see cell phone texting to learn why this a another way for a criminal to steal your identity.

How do you know if your
phone is infected?

  • Your battery becomes warm when the phone is not in use.

Many times the phone has to be sent to a lab for professionals to look at some lines of identifying programming code.

This is a phenomenal task as many smart phones have 300,000 lines.

  • It can cost thousands to have a professional do this for you and take days to figure this out.
  • Using a handset pass code to lock your phone will prevent someone else using it.

Never, ever open links in emails sent by unknown parties.

  • Texts to unknown phone numbers may show up on your bill. The numbers will often occur at the same time appearing as legitimate calls.

Someone is monitoring these numbers, secretly dialed by spyware,

  • When your phone is not in use, it flickers.

If you must have sensitive conversations, please consider buying a $20 phone that has prepaid minutes.

There are already a huge amount of new devices for the smart phone and over twenty new tablets coming out, and the number of applications being developed for them is in the thousands.

It’s expected there will be even more consumer research and warnings into these kinds of threats starting next year.

Go to identity theft scams for information to be aware of so you don’t become a victim.

Already there is a community of application developers building applications with the single minded intent of downloading to an environment that is strictly mobile.

This makes it very viral and allows the scammer to steal from you!

Great for them, bad for us!

It is extremely hard to keep up with the scammer that is trying to exploit you, steal your personal information and commit identity theft.

For every new item that is updated or invented, there isa network of criminals that figure out a way to bypass the security of these devices, steal you blind and drain your bank accounts.

One of my cousins received a text message on her smart phone trying to make her a target of a smart phone scam and compromising her security.

The text message said there was an alert on one of her credit cards that may expose her to fraud. They needed more information so they could stop the fraud.

They wanted her to call a phone number they gave, and then required her to enter her credit card number.

  • Don’t click any links, call any phone numbers and Never give any personal information.
  • It’s important You make the call to your own bank, tell them what you received and have your bank tell you if there is a problem or not.

I’ve also had this same scam run on me, receiving an email from my “bank”.

I was asked to click on a link and enter my personal information so the fraud could be stopped.

  • My bank, and no bank I know of, would email this type of message asking for your personal information.

Knowing this, I still called my bank just to make sure things were alright with my account.

  • Everything was fine and my bank stressed again they would never send something like that in an email and ask for my personal information online.
  • The scary part of this whole thing is that the email had the ‘exact’ logo of my bank and it Looked Real!!

For more knowledge go to email scams and learn how these email scams work.

Sadly, smart phones make you an easy target, don’t have the same safety because of how accessible they are, and criminals are now sending huge amounts of text messages on smart phones for the very purpose of identity theft.

This phone scam has also been creeping into lottery and games of chance. This is what one of my friends received on her Blackberry.

She received a text telling her that her email address had been entered and selected for a promo draw for smart phones, (Blackberry, etc).

She was informed she was a winner and entitled to a very large amount of Five Hundred Thousand Great British Pounds and a mobile phone, Black Berry Torch.

She was asked for further personal information and to confirm receipt of this email by forwarding the information to their claims department.

Their Payment Processing Form asks for name, address, age, state, country, mobile number and occupation. Wow! Don't Fall For These!

They are all scams and all a scammer needs is your personal information to make you a victim of identity theft.

Smart phones are becoming a magnet for criminals and show no sign of letting up.

  • The UK and many other countries in the world have been very concerned for a few years concerning online scams.

Many criminals use technology for their own advantage by scamming in various ways the online users.

  • Did you know a survey taken recently shows that one in 1 hundred recipients is taken in a smart phones scam.
  • The above fact has prompted criminals to use to their advantage the advanced technology that is at their disposal.
  • More and more people use mobile internet via their smart phones and this fact has only sparked criminals to target more and more phone users.
  • People have also become more trusting of communicating via the handset than using their email inboxes.

Users need to take their part in staying safe in this huge and increasing mobile world as the mobile operators also fight criminals at a network level.

Especially vulnerable to malware are games. Games are the most social network oriented mobile applications, shared, and players enter on these sites much of their personal information.

  • It’s up to a website or app store to make sure their software applications aren’t hiding some form of malware.
  • Just because it has a signed certificate that states an application has been tested, reviewed and approved, does not always make it so.

More than 300 vulnerabilities were reported on the iPhone by Apple by the middle of 2010. Note this is the same software that iPad tablet uses.

The Android platform also saw vulnerabilities. Did you know that 88% of all email is spam?

Also see phone scams to learn more.

Be aware of the vulnerability of smart phones and protect yourself with knowledge about hi-tech applications.

Return from Smart Phones to Identity Theft Facts Home Page

From Smart Phones to Identity Theft Scams