IPhone 5: How to keep it secure
Your new phone is not immune from hacking attempts to steal your identity. Here are steps to protect yourself.
Updated Sept. 12, 2012, at 2:29 ET.
This post comes from Christopher Maag at partner site Credit.com.
With Apple's announcement today that it is rolling out the fifth edition of its wildly popular iPhone, we can expect to see more lines of avid Appleheads queuing up outside Apple stores around the country, waiting to become the first ones to get their hands on the shiny new device.
But could there also be another line after that -- a line of hackers waiting to steal iPhone users' identities? Apple products, once considered safe from hackers, now have become targets for sophisticated attacks.
This month, a group of hackers named AntiSec claimed that they stole more than 12 million Apple device identification numbers from the computer of an FBI agent. That claim later appeared to be debunked by Paul DeHart, the CEO of a Florida company named Blue Toad, who told NBC News his company was the source of the leaked information.
Whatever the source of the leak, the device ID numbers could cause problems for iPhone users, since the numbers are linked to owners' names, cellphone numbers and home addresses. (Post continues below.)
"Cellphones, especially smartphones, are a key to anyone's identity these days," says Ondrej Krehel, an information security officer at IdentityTheft911.com.
The iPhone 5 will have plenty of security upgrades over former versions, Krehel says. It also will have a new operating system, new apps and loads of new features, all of which could make it vulnerable to attack.
"You'll see more complexity, more applications that haven't been in production very long," says Krehel. "So there's definitely more room for error."
All that complexity makes it even more important that Apple users secure their new phones. Here are some tips for how to do it. (Hint: All of these tips apply even if you have older versions of the iPhone, or other types of phones, including Androids.)
No, really. Use passwords. You've heard it many times before: Lock up your phone with a password. It's an easy thing to do, and it can save you from many potential problems. Think of all the data sitting on your phone -- your email accounts, bank accounts, social media, all your texts and your address lists, not to mention all your apps.
You don't want all that information falling into the hands of a hacker or a petty thief.
"Your phone is the key to unlocking a large trove of information about you," Krehel says. "A password is the first step in securing all of it."
Not only should your phone be locked, but all the applications should be, too. If you have an iPhone, you should also put a password on the SIM card to help prevent a thief from using your cellphone account, Krehel says.
Phone financials. All iPhone 5s will come preloaded with iWallet, Apple's new suite of programs to help users manage their banking and financial needs. Many other smartphones have similar capabilities.
It's critically important to set up these applications correctly from the start, Krehel says. Your phone password may be only four digits long, but make sure that each of your bank and financial passwords is long and includes both numbers and letters. Never click the "Remember Me" button on your bank's site. This may add convenience, but it also opens the door for any hacker or thief to access your bank account with the click of a button. Having trouble remembering all of these passwords? Download a program that creates an encrypted lockbox on your phone specifically to store all your different passwords.
"The encryption on those programs is really strong," Krehel says.
If you take pictures of checks you're depositing, be sure to delete those pictures once the deposit has gone through. Also, set up automatic notifications -- by both text and email -- of any unusual transactions, such as money moving between accounts, or large amounts being withdrawn at a time.
"That way, if they steal your phone you'll still get an email, and if they hack your email you'll still get a text," says Krehel.
Manage your connections. Wi-Fi, Bluetooth, USB cords -- anything that can connect to your phone is also a potential vector of attack, says Krehel. If you connect the phone to another device using the USB port, make sure you enter a password before completing the connection.
Bluetooth devices, especially older ones, are notoriously vulnerable to hackers, Krehel says. The best defense: Anytime you're not using it, turn it off. And the age-old advice for laptops in coffee shops applies here too: Only use Wi-Fi networks that require you to enter a password.
Use a remote. Many apps enable you to locate your device, lock it up and wipe all the data off it, all from remote. Apple has iCloud, and Android users can use Android Lost, among others. You can also do the same thing in the cloud. For a quick rundown of what's available, check out this story by Jamie Lendino in PC Magazine.
More on Credit.com and MSN Money:
- 4 ways to spot an Internet scam
- How often does your credit report change?
- 5 simple things you should do to protect your identity
- 5 tips to sell a used phone for more
- Picking the right iPhone plan
- Freak cases of ID theft
Copyright © 2013 Microsoft. All rights reserved.
Quotes are real-time for NASDAQ, NYSE and AMEX. See delay times for other exchanges.
Fundamental company data and historical chart data provided by Thomson Reuters (click for restrictions). Real-time quotes provided by BATS Exchange. Real-time index quotes and delayed quotes supplied by Interactive Data Real-Time Services. Fund summary, fund performance and dividend data provided by Morningstar Inc. Analyst recommendations provided by Zacks Investment Research. StockScouter data provided by Verus Analytics. IPO data provided by Hoover's Inc. Index membership data provided by SIX Financial Information.
ABOUT SMART SPENDING
LATEST BLOG POSTS
A new federal safety report shows toddlers and minority children make up a disproportionate number of drowning victims.