Have you ever worried about your personal information being stolen from your cellphone? If not, you probably should.
A while ago I wrote about the dangers of using public wifi. But even if you’re like FBI Special Agent Kim Otto who has layers upon layers of security surrounding her wireless devices, your privacy still might be at risk.
Stalkerware can be downloaded off the internet, sometimes for free, allowing people to discover where you are and track your movements through your cellphone. They may even be able to track your web activity and text messages without you knowing. Scary, right?
Fortunately, there are some telltale signs that your phone may have been hacked.
Here’s what you should to watch for according to USA TODAY:
- An unexplained rise in data usage or phone charges. These may be signs that cybercriminals have infected your phone with adware and are using it to generate profit without you even knowing it!
- Unwanted pop-ups and Apps. If you notice new apps on your phone that you didn’t download, or begin finding bookmarks or websites shortcutted that you did not save, it’s a sure sign that your phone has been targeted.
- Performance trouble. If your device suddenly begins overheating or the battery life is dying quickly, this may be a clue that a third-party app is using your device.
Since most spyware is downloaded by direct access to your phone, the best way to protect yourself is to set up a six-digit passcode.
You may also want to limit the amount of information that pops up on your screen from notifications. Adjusting your notification settings ensures that others cannot see any text messages, missed calls or other private information on your home screen.
Of course, always use caution when allowing others to use your cellphone. If you do, you may want to adjust the settings to temporarily provide restricted access so that you can control what information borrowers have access to.
This kind of “invisible danger” fascinates me, and you’ll find references along these lines in my mystery and thriller books.
In my Hunt for Jack Reacher series, Jack Reacher himself is the invisible danger. Kim knows he’s there. She sees the bodies he’s left in his wake … but where is the guy?
How can she fight a man she can’t see? FBI Special Agent Kim Otto struggles to track him down. Along the way, she’s very aware of the complex and developing surveillance systems that exist in the real world.
Enemies are able to use various devices to watch and listen to even the most cautious victims.
Think about it — if hackers can use our cellphones without our consent, what else can they do??
To keep up with my books that follow the Hunt for Jack Reacher and the technological dangers that accompany that search, CLICK HERE.