{"id":7979,"date":"2017-11-18T17:52:42","date_gmt":"2017-11-18T17:52:42","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=7979"},"modified":"2023-11-17T05:06:23","modified_gmt":"2023-11-17T05:06:23","slug":"protect-your-phone-cyber-attacks","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks","title":{"rendered":"Protect Your Phone From Cyber Attacks"},"content":{"rendered":"<h2>&#8220;60 Minutes&#8221; shows how easily your phone can be hacked [Video]<\/h2>\n<div class=\"ytb\">\n<p style=\"text-align: center;\"><iframe title=\"&quot;60 Minutes&quot; shows how easily your phone can be hacked\" width=\"620\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/zGUR6kao9ys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" href=\"https:\/\/www.youtube.com\/@CBSMornings\" target=\"_blank\" rel=\"noopener\">CBS Morning<\/a> on <strong>April 15, 2016<\/strong><\/p>\n<h2>Protect Your Phone From Cyber Attacks<\/h2>\n<p>A fascinating, if frightening, <a href=\"http:\/\/www.pewinternet.org\/2017\/01\/26\/americans-and-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">poll<\/a> from the Pew Research Center indicates that most Americans have experienced some form of data theft.<\/p>\n<p>Surveys also show that more of us are using smartphones for banking and other sensitive transactions, which makes us more vulnerable to cyber attack.<\/p>\n<p>And yet most of us don\u2019t take <a href=\"https:\/\/igotoffer.com\/blog\/trust-kaspersky-antivirus\" target=\"_blank\" rel=\"noopener\">simple cyber-security precautions<\/a> that could help keep our personal information, like account password, social security numbers and GPS location, more secure.<\/p>\n<p>So, what measures can smartphone users take to keep their data safe? Fortunately, there\u2019s plenty you can do, and most of these strategies do not require technical know-how.<\/p>\n<h3>1. Activate remote wipe.<\/h3>\n<p>If you lose your smartphone or think it could be stolen, use your remote wipe feature to remove all data from your device.<\/p>\n<p>How to set up remote wipe for <a href=\"https:\/\/www.lifewire.com\/how-to-remotely-wipe-your-stolen-or-lost-iphones-data-2487331\" target=\"_blank\" rel=\"noopener\">iPhone<\/a> and <a href=\"https:\/\/support.google.com\/accounts\/answer\/3265955?hl=en\" target=\"_blank\" rel=\"noopener\">Android<\/a>.<\/p>\n<div id=\"attachment_8049\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-8049\" loading=\"lazy\" class=\"wp-image-8049 size-full\" title=\"Remote Wipe for iPhone\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/iphone-remote-wipe.jpg\" alt=\"Remote Wipe for iPhone\" width=\"600\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/iphone-remote-wipe.jpg 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/iphone-remote-wipe-300x200.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/iphone-remote-wipe-225x150.jpg 225w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-8049\" class=\"wp-caption-text\">Remote Wipe for iPhone. Image Source: <a href=\"https:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener\">Apple.com<\/a>.<\/p><\/div>\n<h3>2. Don\u2019t use third-party apps.<\/h3>\n<p>With the iTunes store, Apple has created a closed ecosystem and they are very strict about not letting you install third-party apps. Android users who insist on using third-party apps should research them first to make sure they\u2019re not malicious.<\/p>\n<h3>3. Always update your operating system.<\/h3>\n<p>When developers identify bugs or other vulnerabilities in the operating system, they send out an updated version that will be more likely to protect your device. However, if you avoid operating system updates, then your data will be less secure and could easily be compromised.<\/p>\n<p>If you want to switch to a newer, safer model <a href=\"https:\/\/igotoffer.com\/sell-cell-phone\" target=\"_blank\" rel=\"noopener\">sell your used phone online<\/a> with iGotOffer.<\/p>\n<h3>4. Don\u2019t open suspicious emails and links, and if you, first confirm that they are authentic.<\/h3>\n<p>Cybercriminals are known for sending out fake texts and emails designed to fool you into giving them your personal data. Be sure not to open attachments unless you can confirm the source. If it seems suspicious, it probably is.<\/p>\n<div id=\"attachment_8051\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-8051\" loading=\"lazy\" class=\"size-full wp-image-8051\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/dont-open-that-email.jpg\" alt=\"&quot;Don't open that email! Oh... too late.\" width=\"600\" height=\"450\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/dont-open-that-email.jpg 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/dont-open-that-email-300x225.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/dont-open-that-email-200x150.jpg 200w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-8051\" class=\"wp-caption-text\">&#8220;Don&#8217;t open that email! Oh&#8230; too late. Image Source: <a href=\"https:\/\/www.cartoonstock.com\/directory\/s\/suspicious_email.asp\" target=\"_blank\" rel=\"noopener\">CartoonStock.com<\/a>.<\/p><\/div>\n<h3>5. Don\u2019t pay your bills at Starbucks.<\/h3>\n<p>It might be your second office, your home away from home, but whatever you do, avoid making transactions when using public wifi, as you are putting your personal and financial data at great risk. Anyone in the vicinity can snoop on what you\u2019re doing!<\/p>\n<p>If you are concerned it could happen to you, protect your data by using a VPN tool such as CyberGhost or TunnelBear.<\/p>\n<p>**<\/p>\n<p>No doubt wireless technology has made our lives more productive and connected. We don\u2019t even need to go into a bank anymore, which is incredible when you stop to consider it. But the price of convenience is that we are at greater risk than ever before of having our personal and financial data stolen and used against us.<\/p>\n<p>The answer is not to stop using our wireless phones \u2013 like that\u2019s going to happen! Just use common sense and always be vigilant in guarding your data.<\/p>\n<h2>Links<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/mar\/26\/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves\" target=\"_blank\" rel=\"noopener\">12 ways to hack-proof your smartphone<\/a> &#8211; The Guardian<\/li>\n<li><a href=\"https:\/\/igotoffer.com\/microsoft\/\" target=\"_blank\" rel=\"noopener\">Everything About Microsoft\u2019s Products<\/a> &#8211; The complete guide to all Microsoft consumer products, including technical specifications, identifiers and other valuable information.<\/li>\n<li><a href=\"https:\/\/igotoffer.com\/apple\/\" target=\"_blank\" rel=\"noopener\">Everything About Apple\u2019s Products<\/a> &#8211; The complete guide to all Apple consumer electronic products, including technical specifications, identifiers and other valuable information.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;60 Minutes&#8221; shows how easily your phone can be hacked [Video] Video uploaded by CBS Morning on April 15, 2016 Protect Your Phone From Cyber Attacks A fascinating, if frightening, poll from the Pew Research Center indicates that most Americans have experienced some form of data theft. Surveys also show that more of us are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8047,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[460],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect Your Phone From Cyber Attacks | iGotOffer<\/title>\n<meta name=\"description\" content=\"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Phone From Cyber Attacks | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-18T17:52:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-17T05:06:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg\",\"width\":600,\"height\":400,\"caption\":\"Protect Your Phone From Cyber Attacks\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks\",\"name\":\"Protect Your Phone From Cyber Attacks | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#primaryimage\"},\"datePublished\":\"2017-11-18T17:52:42+00:00\",\"dateModified\":\"2023-11-17T05:06:23+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Phone From Cyber Attacks\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Phone From Cyber Attacks | iGotOffer","description":"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks","og_locale":"en_US","og_type":"article","og_title":"Protect Your Phone From Cyber Attacks | iGotOffer","og_description":"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...","og_url":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2017-11-18T17:52:42+00:00","article_modified_time":"2023-11-17T05:06:23+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2017\/11\/protect-your-phone-from-cyber-attacks.jpg","width":600,"height":400,"caption":"Protect Your Phone From Cyber Attacks"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#webpage","url":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks","name":"Protect Your Phone From Cyber Attacks | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#primaryimage"},"datePublished":"2017-11-18T17:52:42+00:00","dateModified":"2023-11-17T05:06:23+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"Protect your phone: what measures can smartphone users take to keep data safe? There\u2019s plenty you can do...","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Phone From Cyber Attacks"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7979"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=7979"}],"version-history":[{"count":2,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7979\/revisions"}],"predecessor-version":[{"id":14936,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/7979\/revisions\/14936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/8047"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=7979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=7979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=7979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}