Edward Snowden’s leaks have rocked the international community for the past two weeks and fired up a debate about U.S. government surveillance of citizens’ phone calls and internet browsing data. Cell phones have long been the subject of hacking, and in recent weeks with the NSA accusations coming to light, methods of protecting your privacy have been much discussed. Your privacy is easily penetrated. One tactic used by hackers called repackaging, in which a malware writer takes a legitimate application, modifies it to include malicious code, then republishes it to an app market is a danger to cell phone users. The repackaging technique is highly effective because it is often difficult for users to tell the difference between a legitimate app and its malicious, repackaged counterpart. Even the novice techie could turn your cell phone into a mobile spy station in as little as 5 minutes. With the help of easily obtained Mobile Spy Software applications like StealthGenie, MobileSpy, and Flexispy, hackers can access cell phone call logs, text messages, emails, GPS location data, and even remotely activate a cell phone’s video camera and microphone.
How can you protect yourself? Stick it in the fridge? This technique was used by Edward Snowden. While it is not perfect, it does offer limited protection from RF. However, fridges are not perfect faraday cages and do not block all audio. Therefore, they are not recommended for extremely critical situations. A stylish alternative is to use a stainless steel cocktail shaker. Another alternative would be to use the OFF Pocket™. You simply place your phone inside the case, close it, and your phone is now OFF. Untrackable. Unreachable. Unbreachable.
The OFF Pocket has been extensively tested on all major networks, including Verizon, AT&T, T-Mobile, and Sprint. It is compatible with all mobile phone hardware including but not limited to iPhones, Android, Blackberrys, Nokia as well as all modern phone operating systems.
The OFF Pocket™ uses the principle of a faraday cage to block all radio signals from entering and exiting the case. Your phone contains an antennae that communicates with cell towers and GPS systems. Both of these signals, radio waves in the 2.4GHz spectrum, are blocked by the metallized fabric in the case.
Signs Your Infected
- Shorter-than-normal battery life could signal a problem
- Sudden increases in data usage
- Programs take longer to load or the apps don’t seem as responsive
- Rogue Apps – They start up on their own.
Tips to Stay Safe
As the frequency of mobile threats increase, people can take measures to stay safe while using their smartphones
- Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.
- After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.
- Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.
- Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.
- Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.
- Make sure to download firmware updates as soon as they are available for your device.