Worried about your cellphone being hacked. You’re not alone
Hackers and hackers have been around for a long time.
Cybernews, a research-based online publication that investigates and tracks hacking, said the term “was first used in connection with the use of technical knowledge in 1955 at a meeting of the Technical “Model Railroad Club. It was used in the minutes of the meeting to describe how members modified the functions of their high-tech trains.”
More than 60 years later, there are many more items that can be hacked than just high-tech trains. So the people at Bespoke Software Development (www.bespokesoftwaredevelopment.com) commissioned a study to find out which household items could be targeted by hackers.
Using an online analytics tool, the company’s study found that article number 1, by far, was the cell phone. Worldwide, the study found that the phrase “How to tell if your phone is hacked” or similar phrases was used 716,400 times during the study period, which took place earlier this month.
There were nine more items that made up the list. Altogether, the number of searches for these nine items was about 151,680, less than a quarter of the number of cell phone searches.
MORE GADGET DADDY:
In a distant second, there was “computer hacking” (31,920 searches), followed by “iPad hacking” (29,160) and “wifi hacking” (23,760).
The lowest interest was “pirated TV” (12,960) and “pirated baby monitor” (9,840).
“As phones have become an integral part of modern life, it’s no wonder we care about them being hacked, with important passwords, financial and personal information at risk,” said a spokesman for Bespoke. “Increases in data usage, performance issues, pop-ups, or screen changes are all indications that your phone has been hacked.”
The spokesman continued to offer some simple tips to make electronics more difficult to hack:
• Change the default passwords; use a password manager. Use different passwords for different accounts. The password manager can generate strong passwords and store them in encrypted form. Some password managers can be placed on a flash drive and used on different computers.
• Keep operating systems and applications up to date. Companies are constantly updating the security of their products and eliminating bugs.
• Beware of phishing. Many users have seen the text message saying that their account will be closed unless the information is updated; or this money is waiting but they need an itinerary number; or an important purchase has been made: click on this link if it is an error. Clicking on the link will probably be a mistake. Please check your email address before doing anything.
• Enable two-factor authentication. Yeah Al that sounds pretty crap to me, Looks like BT aint for me either. It means using a password and then a second step to verify that you are who you say you are. This is usually a number that is sent to your mobile phone and then returned to the website.
Lonnie Brown can be contacted at LedgerDatabase@aol.com.