Your Cell Phone Is a Security Threat Hackers Can Use to Steal Your Accounts. Luckily,

If you’re at all savvy about online safety, you understand to be cautious about sharing individually identifiable information. You suppose twice earlier than you publish your birthdate to social media or inform people of your avenue address or your mom’s maiden call. But there is one piece of personal fact you can not keep away from giving out–your cellular cellphone number. Without it, nobody would be able to contact you.

Whenever you buy anything online, subscribe to a brand new provider, meet a new pal, or sign up for any text notification, it’s something you inevitably proportion. It turns out that, inside the incorrect palms, that easy piece of data can be used to steal your identity and take over nearly every online account you have. And it is spotless for hackers to do simply that during a simple-step procedure:

Step 1: A hacker who’s located out your cell telephone wide variety and one or two other bits of facts, inclusive of your address and date of the beginning, contacts your cellular carrier issuer claiming to be you. The hacker tells your service to “port-out” your variety to a distinct cellphone–one in the hacker’s possession if your provider asks questions such as your address and date of birth to affirm that it is you.

The hacker will answer them correctly. Soon the hacker has switched your telephone and can get hold of calls and texts supposed for you. (You will, in all likelihood, maintain receiving calls and texts as well, so that you may don’t have any concept that something has been modified.) Step 2: The hacker next logs into your e-mail account. Whoops! The hacker does not know your password.

But that’s OK. The hacker can inform your e-mail software that they “forgot” the password and feature a reset despatched to “your” cellular smartphone. You’ve probably given your e-mail provider your cellular smartphone wide variety as a backup in case you ever neglect your password, in which case this is quite an easy step. Once the hacker has got admission to your email account, it’s smooth to benefit access to any of your different money owed–click “Forgot Password.

Watch for a password reset hyperlink to reach in what became once your email. If you have got -issue authentication enabled on any of your debts, the name of the game codes might be despatched to the hacker at “your” phone number. They will even benefit from getting entry into your bank accounts, and if the hacker calls the financial institution, their caller ID will make it look like the call is coming from you.


I’m a technophile who loves everything about technology. I enjoy learning new things about new gadgets and technologies. I started Droidific because I wanted to share what I was learning with other people who love gadgets, new technology, and all the different ways they can be useful.