Scroll Top

Can other people get my information by scanning my phone in a public area?

We often get asked: Can other people get my information by scanning my phone in a public area?

Answer: Yes, it is possible for your information to be stolen from your phone.

In the last year, almost 33.8 million attacks have happened on mobile devices according to Kaspersky. This is a 50% increase from the previous year. 64% of hacks on mobile devices were financially motivated, and 5% were for espionage. It is a very scary thought that someone could be trying to steal your money or spy on your life. It is important to keep up with the new hacking methods and have a plan to prepare yourself. At EZ Micro, we do the work to manage your network security and provide the tools to keep your professional information safe.

With the trends moving to cloud-based apps in a professional setting, like Microsoft Office 365 and Google Apps, it’s becoming more important for businesses to be aware of how phones are used and their vulnerabilities as more and more employees access work information from their personal devices.

There are many ways hackers can access phones, and their methods impact our everyday phone functions.

  1. Near Field Communication Eavesdropping
  2. Network Spoofing and Redirection
  3. Phishing
  4. SIM Swap

Near Field Communication Eavesdropping

Let’s begin with Near-field communication, or NFC. This is a system for devices to communicate over short distances. We use this technology every day to use Apple/Google pay, contactless cards, digital sporting events or train tickets, and even building access. NFC is the technology behind these functions. Apple allows iPhones to share contact information between phones this way, so it clearly isn’t going away anytime soon. Your phone has internal antennas searching for NFC signals all the time. This causes risk for a hacking method known as “eavesdropping.” A hacker could have an app on their own device, and if they are within range of an NFC transaction, they could intercept some data. Another common method is “skimming.” If a hacker gets his phone, most likely in pocket, close enough to yours it could trigger a transaction. They could range from transferring money, viruses, or other valuable information. With NFC expanding, the best way to protect yourself is to ensure your phone is updated with the latest patches and security updates. It is possible to turn-off NFC, so if you aren’t using it for door access or as a payment method, you can turn off NFC.

Network Spoofing and Redirection

NFC provides a new threat, but these are not the most common attacks. There are other methods that also impact your daily lives. If you ever connect to a public Wi-Fi network, you are putting yourself at risk. Hackers can create fake networks and redirect you to malicious sites, so beware connecting to any unprotected Wi-Fi. This is known as “spoofing”. To protect yourself from spoofing, always use a VPN when in a public setting and be careful about what links you press. Hackers are purchasing Sponsored Links to be at the top of web searches to fool you into clicking their link. Always check the web address before clicking or use a non-sponsored link. As hackers get more sophisticated, it is critical your employees are trained in spotting these messages. Finally, a company like EZ Micro can set up and monitor alerts for your business so we can act swiftly for any suspicious activity on your network.

Phishing

A common method is through “phishing” emails or text. These messages will come through to your phone and appear very real but include a link to a site where your information will be stolen. To protect yourself, verify that a request is legitimate and do not buy gift cards, do bank transfers, or give anyone virtual access to your phone or computer without verifying. Again, having alerts set up is helpful for more quickly identifying unauthorized activity.

SIM Swap

The final common method is a “SIM swap.” Hackers can attempt to convince a cellular service provider into switching your service into a SIM card they control. This essentially hijacks your phone number and can help a hacker exploit two factor authentication.

How can I know if I am being hacked?

Whether you have an iPhone or an Android, we have some key indicators to help you know if a hack is happening. Some of the most common include unusual data spikes, excessive battery drainage, and slow app launching speed. These do not always indicate a hack though, as it could be because of a device being old, or bad connection slowing it down. Some more obvious ones are weird popups, background noise, apps you don’t recall installing, and strange activity in the account history.

What should I do if my phone has been hacked?

If you find out you have a hacker in your phone, you need to know what steps to take to remove them. The most effective option is to do a factory reset. However, this will delete every file off your device, making it an unappealing route for most. Luckily, it is not the only solution. Other resolutions include getting rid of any suspicious apps, telling important contacts you have been hacked, and, if you have an Android phone, installing an antivirus. (As of July 2024, anti-virus is only available for Android phones and users have reported slowness after installing.) After these steps, we recommend changing passwords on all your accounts and creating new, unique, strong passwords.

How can I prevent my phone from being hacked?

The best thing you can do is have a strong game plan to prevent hackers in the first place. There are basic methods like locking your phone and not connecting to public Wi-Fi networks. To summarize our tips:

  1. Keep your phone updated so it has all the latest security releases.
  2. Use a VPN to encrypt your data and mask your IP address. A VPN is widely regarded as one of the best strategies to protect your devices. We suggest NordVPN and offer it to our clients.
  3. Use Multi-Factor Authentication for all your accounts, including social media.
  4. Do not click on unknown links and be careful what you click on in searches.
  5. Ensure you have alerts set up for suspicious behavior on your network.

These are all actions you can take and will help protect your sensitive information.

Hacking is not going away anytime soon, and in a time where cell phones are ubiquitous in our daily lives, it is crucial we understand this. We encourage you to check out the rest of our site and see all the many ways EZ Micro can help your business tech journey.

For more information on how EZ Micro Solutions can help protect your sensitive information, please contact us.

Note: This post was originally published on September 22, 2020, and has been updated to include the latest information.

Leave a comment