close

Be wary of scammers entering your phone through the following methods

Your phone has three main areas of vulnerability: hardware, software, and phone number. Each has risks, and you can take some measures to mitigate the risks.
Public USB charging port: Before plugging into a public USB jack, think twice to quickly charge in a cafe or airport. "Whenever you use a mobile port, if you share it with others plugged into the device, you are vulnerable to viruses or malware. Hackers can modify these ports to install malware (also known as malicious Software). After installation, it can transmit the data of your phone to hackers. The hacked USB port can also directly absorb the information of your phone. To avoid this risk, please use a USB cable and a charging block that can be plugged into a standard power outlet. Or use an external battery pack.

Be wary of public Wi-Fi:Scammers can target your personal information using unsecured wireless networks and software vulnerabilities. Be wary of public Wi-Fi networks. “We advise against using public Wi-Fi, but if you’re going to use it, avoid logging in to sensitive accounts,” says Allen Spence, director of product leadership at IDShield, an identity theft protection company. To protect yourself from inadvertently using insecure Wi-Fi networks, adjust your phone settings to avoid auto-connecting to Wi-Fi.

Software updated:Hackers can exploit vulnerabilities in phone software. Schifferle of the FTC suggests consumers routinely check for and download software updates for their phones, because updates often include security patches.

up arrow