27 October 2016
Robert Siciliano

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

731Posts 1,841,455Views 62Comments

What is on Your Phone

25 January 2013  |  2448 views  |  0

It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer.

Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers are announcing that they’ll be upping the speed of the latest version of their networks, doubling download speeds. And new smartphones will have as much as 64 gigabytes of capacity. That’s more hard drive than my three-year old laptop.

For the next generation of users, the smartphone is replacing the PC as their primary device. Nielsen reports, “We are just at the beginning of a new wireless era where smartphones will become the standard device consumers will use to connect to friends, the internet and the world at large. The share of smartphones as a proportion of overall device sales has increased 29% for phone purchasers in the last six months; and 45% of respondents indicated that their next device will be a smartphone.”

For many of us, your mobile device has already become like your right hand (in my case, my left hand). Not only is it your phone, but it’s used to store some of your most private conversations and confidential information—it’s now your address/phone book, email, digital camera, news source, online banking system and even your wallet—all rolled into one device.

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC.

So if you have a smartphone or tablet, make sure you take steps to protect yourself.

Never leave your phone unattended in a public place

Put a password on your mobile and set your phone to auto-lock after a certain period of time

When doing online banking and shopping, always log out and don’t select the “remember me” function

Use mobile device protection that provides anti-theft, anti-malware/antivirus, app protection and web protection. 


Comments: (0)

Comment on this story (membership required)

Latest posts from Robert

Fake Realtor scams Children and their Parents

30 August 2016  |  1083 views  |  0 comments | recomends Recommends 0 TagsSecurity

32 Million Twitter Pass for sale Add two-factor NOW

21 July 2016  |  2703 views  |  0 comments | recomends Recommends 0 TagsSecurity

Phone Account of FTC Chief Technologist hijacked

14 July 2016  |  2484 views  |  0 comments | recomends Recommends 0 TagsSecurity

Viruses as Cyberweapons for sale

12 July 2016  |  3302 views  |  0 comments | recomends Recommends 0 TagsSecurity

TeamViewer Clients Victims of other Hack Attacks

08 July 2016  |  4617 views  |  0 comments | recomends Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Roland West
Ketharaman Swaminathan
Lee Mughal
Balasubramaniam Gd