Home > Forum > General > How to protect your cell phone number and why you should care
General
Titles: How to protect your cell phone number and why you should care Update time: Aug 17, 2019
1#

How to protect your cell phone number and why you should care

Assuming you have your strong passwords in place and your two-factor authentication set up you think your accounts are now safe? Think again. There’s much more to be done.

You might think your Social Security or bank account numbers are the most sensitive digits in your life. Nowadays hackers can do far more damage with little effort using just your cell phone number. But unlike your Social Security number you’re far less likely to keep your cell phone number a secret — otherwise nobody can contact you!

Whether you’re an AT&T Verizon Sprint or T-Mobile customer every cell phone number can be a target for hackers. And it takes remarkably little effort to wreak havoc to your online life.Think about it. You use your cell phone number all the time. You use it when you sign up to sites and services and sometimes you’ll use it to log into an app or a game on your phone. Your phone number can be used to reset your account if you forget your password. And you use it for two-factor authentication to securely login to your accounts.

If someone steals your phone number they become you — for all intents and purposes. With your phone number a hacker can start hijacking your accounts one by one by having a password reset sent to your phone. They can trick automated systems — like your bank — into thinking they’re you when you call customer service. And worse they can use your hijacked number to break into your work email and documents — potentially exposing your employer up to data theft.

It’s easier than you might think. Phone numbers can be found anywhere – thanks in part to so many data breaches.

Often hackers will find the cell phone number of their target floating around the internet (or from a phone bill in the garbage) and call up their carrier impersonating the customer. With a few simple questions answered — often little more than where a person lives or their date of birth they ask the customer service representative to “port out” the phone number to a different carrier or a SIM card.

That’s it. As soon as the “port out” completes the phone number activates on an attacker’s SIM card and the hacker can send and receive messages and make calls as if they were the person they just hacked.https://www.ttspy.com/how-to-hack-into-someones-android-cell-phone.html>https://www.ttspy.com/how-to-hack-into-someones-android-cell-phone.html


    Total 1 Page/1Record number
reply

Titles:

Content: