How to Make Your Cell phone Conversation Secure
With the development of science，hackers，eavesdroppers and thieves are all out there-however，you can prevent them from accessing your secrets. So，how to make your cell phone conversation secure is very important.
I came into my favorite coffee shop and found myself about 12th in line for some much-needed caffeine last August. The man in the front of me answered his Blackberry Cell phone which is from China Wholesale，his voice booming all over the crowded café as he ordered last-minute gift. Suddenly, he reached the counter and clearly recited his name, the card’s security verification code, credit card number and full address -- twice. He launched into a third call, sharing the same details after paying for his order.
It’s hard to say whether his credit-card account was in more jeopardy from the laptop-equipped customers at the next table who might well have been quietly typing down the information as he repeated it-- or from some distant wireless eavesdropper.
In a word, it illustrates a hard fact that how to make your Cell Phones secure: Your safest strategy is to assume that you have unwanted listeners. Chances are that you don’t. But when it comes to confidential information that’s transmitted across radio frequencies, as cell phone calls are, your best bet is to conduct yourself as if you do.
It is very important caution whether you find yourself using an analog signal; someone uses a scanner when you can pick up your call. Then digital signals are scrambled, but security experts say it’s still possible that hackers armed could intercept and decode them with sophisticated equipment. Of course, someone who can overhear your half of the conversation before it enters the Wifi Cell Phone -- as in the coffee-shop case -- doesn’t need any special devices to capture some highly valuable information.
Manufacturers shipped more than 1 billion handsets worldwide in 2006, up from 833 million in 2005 with HiPhone use at an all-time high especially from Chinese Wholesaler, according to Framingham, Mass.-based IDC Research -- related crime is likely to keep growing as well. Following are three other cell phone security threats, along with advice for preventing them:
Cell phone upgrades
When you buy new Touch Screen Cell phone, remember that you can’t be too careful about wiping the data off your old ones. Consider the results of a recent experiment by a McLean, Trust Digital, Va.-based maker of security software for mobile devices. In mid-2006, the company purchased 10 used cell phones in eBay auctions. When the cell phones’ previous owners apparently believed they’d deleted all their information, technicians recovered plenty of potentially damaging data from all but one device. The information retrieved -- 27,000 pages of it -- ranged from passwords to confidential customer records to emails about pending business deals to text messages chronicling a love affair.
The problem: On many cell phones including Camera Cell Phone, slide phone, Dual SIM Card Cell Phone and so on, permanently purging data requires a series of complicated steps so that customers don’t erase information accidentally. So even if you’ve deleted those your records and the cell phone’s memory seems empty, someone with the right software may be able to resurrect data once stored there. The solution: If you’ve got telecom specialists on staff, ask them to thoroughly clean all cell phones before you sell, donate or toss them. If not, call or visit your carrier so that their technicians can do the job for you. Or you may want to follow Trust Digital CEO Nick Magliato’s half-serious advice for making sure an old cell phone doesn’t give up your secrets: “Run over it in a car.”
Many people save sensitive information -- passwords, customer billing information, account numbers, emails on confidential matters -- on their Multi Function Cell phones. Having those details at your fingertips is certainly convenient, but the device is swiped or misplaced, whoever winds up with it might know far more about you than you’d like.
You should set the cell phone to automatically lock the cell phone after a certain period of inactivity. If you must keep such data on the cell phone -- if, for example, it doubles as your electronic address book -- at least protect it by using the password feature available on most contemporary models. Those measures won’t foil professional hackers, but they may keep the casually curious from accessing the details of your life. As an alternative, you might consider keeping especially sensitive information on a removable memory card, f you can train yourself to remove the card and store it in a safe place when you’re not actively using it and if your cell cell phone is equipped to hold one.
A serious thief doesn’t need the actual TV Function Cell Phone to swipe confidential information as socialite Paris Hilton learned in a particularly high-profile case. In early 2005, a hacker broke into a major cell- phone carrier’s systems, accessed Hilton’s account, stole racy photos and private celebrity cell phone numbers and posted them on the Internet.?
While most of us won’t individually attract our own personal hackers, it’s worth checking with your carrier to find out what, if any, data it’s capturing from your cell phone. If you find that everything you’ve keyed into the cell phone is also sitting in the company’s computer systems, you may want to rethink what you’re storing on the device.
In a word, you need to determine acceptable-risk levels not only for your staff f, but or yourself as well. Establish and enforce policies, especially about what information people store on their cell phones. After all, your security is only as good as the practices of your most careless employee as with any other scenario involving corporate secrets.
Tools | | | | | | | | | | More »