Share:

Share via email - The low-tech way people are breaking into phones Share on Facebook - The low-tech way people are breaking into phones Share on LinkedIn - The low-tech way people are breaking into phones Share on X - The low-tech way people are breaking into phones

The low-tech way people are breaking into phones

phone theft
© Andrey Popov | Dreamstime.com

Picture this: You’re out at a local brewery with pals enjoying a cold pint when a friendly stranger starts making conversation. He seems nice enough and asks about fantasy football. You excitedly pull out your phone and unlock it to show him your draft strategies, and voilà, he sees you enter your PIN.

The next thing you know, he snatches your phone and rushes out the door. Don’t scoff. This scenario is more common than you think and it can happen anywhere. It’s one low-tech way thieves can infiltrate your digital life and cause havoc. One victim recently said a situation like this happened and he woke up the next day to find out $10,000 was stolen from his bank account. Yikes!

In today’s technologically advanced world, we focus on sophisticated cyber threats, overlooking the dangers of low-tech phone thefts. These crimes involve the physical stealing of iPhones and Androids, which can result in significant financial loss and privacy violations. Let’s dive into the risks associated with low-tech phone thefts and explore practical solutions to safeguard our devices and personal information.

Risks that come with old-school theft

While high-profile cyberattacks often make headlines, low-tech phone thefts have been quietly rising, targeting individuals who are less cautious with their smartphones’ physical security.

The consequences of these thefts extend beyond the loss of the expensive device. It includes compromising sensitive data, personal information and the potential for identity theft. The thieves can easily access stored passwords, contact lists, emails and even banking applications, leading to devastating impacts.

Vulnerability of iPhones and Androids

Android and iPhone devices are goldmines for thieves due to the vast amount of personal data they contain. Shockingly, many people leave their smartphones unattended or carelessly placed in public spaces, making them easy targets for opportunistic thieves.

Despite the built-in security features of smartphones, determined thieves can bypass basic lock screens and gain access to the data stored on the device. Using the method mentioned earlier, criminals can get a victim’s PIN by watching them enter it. But the risks don’t end with data stored on the phone.

More danger is in store for iPhone users. Armed with the victim’s PIN, thieves can change the password associated with their Apple ID, effectively locking them out of their accounts. To make matters worse, some crafty phone thieves have discovered how to exploit Apple’s Recovery Key feature. Tap or click here to see how Apple’s Recovery Key works.

According to Apple, using a recovery key means guarding access to your devices and the recovery key is critical. You could be permanently locked out of your account if you lose both items.

Android users are not safe either, as they can fall victim to a similar scheme. With Android devices, the crook only needs to know the victim’s PIN to change their Google account password. This loophole exists due to an option in Google account settings that allows users to use their lock screen PIN to change their account password.

With these methods, criminals gain complete control over the victims’ Apple or Google accounts, potentially leading to privacy breaches, data theft and significant financial loss.

Common techniques used by phone thieves

Low-tech phone thieves employ several techniques to gain access to stolen devices. Here are some examples:

Shoulder surfing: Opportunistic thieves observe users as they enter their PINs or passwords, memorizing the codes for later use.

Snatch and run: Thieves quickly grab unattended smartphones and make a speedy escape before the owner can react.

Social engineering: Some thieves use social engineering tactics to trick individuals into revealing their PINs or passwords willingly.

SIM swapping: Once the thief has access to the phone, they may attempt to swap the SIM card to take over the victim’s mobile number and gain access to their accounts. Tap or click here for more details on SIM swapping.

Protecting against low-tech phone thefts

To protect your iPhone or Android device, implement these effective solutions:

  • Protect your passcode: Never unlock your phone in front of a stranger with a passcode. If you must, make sure to type it in while shielding it without strangers able to see it. You’re better off using Face ID.
  • Increase awareness: Be mindful of your surroundings and avoid leaving your smartphone unattended in public places. Always keep it within sight and reach.
  • Utilize biometric authentication: Enable biometric authentication methods, such as fingerprint or Face ID, to add an extra layer of security to your device.
  • Implement strong PINs and passwords: Use strong, unique PINs and passwords that are difficult to guess. Avoid using easily accessible information like birthdays or common sequences. Tap or click here for ways to create stronger passwords.
  • Install Find My iPhone/Find My Device: iOS and Android offer built-in tracking services. Activate them to remotely lock, erase, or locate your stolen device in case of theft.
  • Encrypt data: Encrypt your smartphone’s data to protect sensitive information from unauthorized access. This will make it difficult for thieves to extract valuable data from your device. Tap or click here to learn how to encrypt emails and text messages.

In an era dominated by digital threats, low-tech phone thefts are a persistent danger that can have far-reaching effects. The loss of personal data, sensitive information and the potential for identity theft make it crucial to take necessary precautions. Stay vigilant, friends.

Tags: Apple, Apple Find My, Apple iPhone, biometric authentication, cyberattacks, Find My Device, identity theft, personal information, social engineering