Hartford Courant (Sunday)

How you can outsmart smartphone scammers

- By Sean Pyles NerdWallet

Your smartphone is your confidante, your hand-held connection to the world — and one of your biggest vulnerabil­ities.

Scammers can take advantage of day-to-day tasks that seem innocuous, like checking a bank balance or charging a phone at a public USB port, to exploit personal informatio­n for their profit.

To keep that data safe, start by understand­ing the threats you face. Your phone has three main areas of vulnerabil­ity: its hardware, its software and your phone number. Each carries a risk, and there are steps you can take to mitigate them.

Hardware vulnerabil­ity

A four-digit passcode alone isn’t enough to secure your phone’s hardware from intruders.

One weakness comes from the charging port. Think twice before plugging into a public USB jack for a quick charge at a cafe or airport.

“Any time you’re using a mobile port, you can be vulnerable to viruses or malware if you’re sharing it with other people who are plugging in their devices,” says Lisa Schifferle, ID theft program manager at the Federal Trade Commission.

Hackers can modify these ports to install malevolent software, aka malware, on your phone. Once installed, it can transfer your phone’s data to hackers. The hacked USB ports can also directly suck up your phone’s informatio­n. To avoid the risk, use your USB cord with your own charging block that can plug into a standard electrical outlet, or use an external battery pack.

For daily security, go beyond the four-digit passcode if possible, says Gary Davis, chief consumer security evangelist at the cybersecur­ity company McAfee. “Passcodes aren’t as effective as biometrics, like fingerprin­t readers or facial recognitio­n software, because people can do shoulder surfing to see your passcode and get into your

phone” if they steal it.

Software and network risks

Scammers can target your personal informatio­n using unsecured wireless networks and software vulnerabil­ities.

“We advise against using public Wi-Fi, but if you’re going to use it, avoid logging in to sensitive accounts,” says Allen Spence, director of product leadership at IDShield, an identity theft protection company.

To protect yourself from inadverten­tly using insecure Wi-Fi networks, adjust your phone settings to avoid auto-connecting to Wi-Fi.

Schifferle of the FTC suggests consumers routinely check for and download software updates for their phones, because updates often include security patches.

Phone number vulnerabil­ities

There are two common ways that scammers target your phone number: robocall scams and phone number theft.

A common scam comes from supposed representa­tives of the Social Security Administra­tion requesting you give your personal informatio­n or your benefits will be cut. If you get a call from a number you don’t recognize, don’t answer. And know that government agencies like Social Security and the IRS won’t call you out of the blue seeking your personal informatio­n.

If you suspect your personal informatio­n was stolen by scammers, file a report with the FTC at identityth­eft.gov.

Scammers are also stealing phone numbers, which can leave you vulnerable to other forms of identity theft.

The scam is clever: A malevolent actor calls your cellphone carrier pretending to be you, and after confirming some key informatio­n such as your mother’s maiden name, transfers your phone number to their device. You may not find out this has happened until you go to make a call and find that your SIM card has been deactivate­d.

Because phone numbers are often used as security keys, hackers may be able to get into many other accounts once they have access to your phone account. Make it harder to penetrate by avoiding common security questions, Davis says. “When you set up your security questions and answers, make sure you’re using really challengin­g questions that are going to be hard to figure out.”

 ?? MARK LENNIHAN/AP ?? You carry your smartphone everywhere. But the way you use it could leave you vulnerable to forms of identity theft.
MARK LENNIHAN/AP You carry your smartphone everywhere. But the way you use it could leave you vulnerable to forms of identity theft.

Newspapers in English

Newspapers from United States