Think your smart phone is safe because you use a passcode to prevent others from logging onto its home screen? You better think again. A newly released story by the Lifehacker technology Web site takes a close look at the new wave of passcode exploits that have allowed hackers to get into consumers’ smart phones. As it turns out, not even a hard-to-guess passcode can stop the most skilled and patient of hackers from compromising your smart phone.

Passcode exploits

The Lifehacker story examines recent passcode exploits targeting the Samsung Galaxy and iPhone smart phones. According to the story, the attack against the iPhone enabled hackers to, utilizing the phone app, make phone calls, view photos and alter the contact lists of users. Hackers couldn’t gain full access to the phone, but they gained enough capability to cause plenty of problems for owners. The Samsung exploit worked differently. Hackers were able to flash the phone’s home screen for approximately a second. This gave hackers ample time to either launch apps on the phone or start downloading an even more dangerous app that enables hackers to gain full control over a smart phone.

Not foolproof

As the Lifehacker story says, none of these problems should surprise smart phone owners. Passcodes do offer protection, but they have never been failproof. According to Lifehacker, passcodes do no better a job safeguarding your phone than passwords or PINs do protecting your bank accounts or membership Web sites. Hackers can crack your phone’s lock-screen passcode or, in the case of skilled cyber thieves, break into your phone’s hard drive to access your data.

The protection you need

Lifehacker offers tips for protecting your phone. First, make a passcode for your phone’s lock screen that is made up of symbols, letters and numbers. These passcodes are far harder for thieves to crack. Next, encrypt your phone’s data. Lastly, sign up for services like Find My iPhone from Apple or the third-party app Prey. These nifty apps enable you track your phone if it’s stolen or you’ve lost it. You can then remotely erase the data stored on it, protecting yourself from hackers.

Leave a Reply

Your email address will not be published.

*

IT Guys is proud to announce the recent merger with ImageNet Consulting.

Read the Press Release