AS phone snatching cases in the UK surge, Brits are being urged to make 10 Settings changes to prevent a thief from taking off with more than just your smartphone
More than 200 smartphones are swiped out of the hands of innocent passerbys every day, new figures revealed earlier this week.
Phones hold data that can be valuable to criminals, from banking information to social media accounts[/caption]That’s 78,000 a year, up from 31,000 the year before.
The figures are damning, and have prompted the Home Office to bring phone companies into the discussion on how to tackle thefts and illegal reselling.
The majority of phones are resold, and end up in night markets in Shenzhen, China, according to an investigation by The Times.
But phones hold data that can be valuable to criminals, from banking information to social media accounts.
While the government works with phone companies to make stolen devices permanently unusable if stolen or lost, there are ways to protect yourself and your device in the meantime.
Bogdan Botezatu, director of threat research and reporting at cybersecurity firm Bitdefender, told The Sun that there are 10 features iPhone and Android owners can enable and disable to make their devices more secure in cases of theft.
“Ensure that the Find My feature is activated on your device,” said Botezatu. “Allowing you to track, lock, or erase your phone remotely if it’s lost or stolen.”
For iPhone users, this can be done following these steps:
If you want to be able to find your lost device on a map, make sure that Location Services is turned on.
To do this, go to Settings > Privacy & Security > Location Services, then turn on Location Services.
Thieves will attempt to remove the SIM card from the locked device and use it in an unlocked phone to receive SMS-based one time passwords.
Bogdan Botezatu, director of threat research and reporting at Bitdefender
While Android owners should follow these instructions:
The majority of people know better than to not have a passcode or biometric lock on their device.
But many still rely on easy-to-guess passcodes, like 123456 or 111111.
Botezatu urges consumers to use a “strong” passcode or biometric authentication like Face ID, Touch ID, or fingerprint scan to prevent unauthorised access.
This feature, found on both the iOS Find My iPhone and Android Find My Device, lets users wipe the contents of their handset from afar.
Even if the snatcher has zoomed off on their bike, you can log into your Find My iPhone or Find My Device on a PC to erase your phone’s data remotely.
“Regularly back up your phone’s data to iCloud or Google Drive, ensuring that you can recover important information even if your device is lost or stolen,” added Botezatu.
Both iCloud and Google Drive offer a small amount of storage for free.
But if you want to store more data, be sure to buy more storage for a monthly fee.
Consumers should enable 2FA on all their accounts, but particularly those tied to their phone, such as Apple IDs and Google Accounts.
It adds an extra layer of security by requiring two forms of identification to access an account, such as a one-use security code sent to your phone alongside a traditional password.
eSIMs are more secure than conventional SIM cards because they are embedded in the phone’s hardware, making them harder to remove and tamper with, thus reducing the risk of SIM swapping and unauthorised access to the phone number
While text-based security codes are common, Botezatu suggests you choose an alternative 2FA method so you can still access your accounts if your phone is stolen.
“Do not use SMS-based 2FA when possible as you will likely be briefly losing access to your mobile number as well,” he said.
“[And] make sure you have backup codes printed and stored somewhere safe as you will also lose access to your authenticator app as well.”
Botezatu also recommended switching off lock screen notifications[/caption]Disabling notifications on your lock screen is a privacy measure that can be quite the lifesaver if your phone gets stolen.
It also means that hackers cannot access your accounts if you do opt for SMS-based 2FA.
“Configure your phone to hide sensitive notifications on the lock screen to prevent anyone from seeing private information without unlocking the device,” said Botezatu.
To help protect your mobile number and the information stored on your SIM card, you can set up a SIM pin.
This means that if the SIM is taken out of your phone and put into another one, you’d be required to enter a pin to unlock it.
Many times, thieves snatch the mobile phone while unlocked or after they have memorised your screen unlock pin and will attempt to change your iCloud password to gain control of the account.
“Enable a SIM card PIN to prevent unauthorised users from transferring your phone number to another device,” Botezatu cautioned.
“Thieves will attempt to remove the SIM card from the locked device and use it in an unlocked phone to receive SMS-based one time passwords.”
Botezatu also urged consumers to consider using an eSIM over a traditional, physical, SIM card that slots into the phone[/caption]Botezatu also urged consumers to consider using an eSIM over a traditional, physical, SIM card that slots into the phone.
“eSIMs are more secure than conventional SIM cards because they are embedded in the phone’s hardware, making them harder to remove and tamper with, thus reducing the risk of SIM swapping and unauthorised access to the phone number,” Botezatu explained.
“Many times, accounts can be recovered by an attacker who has access to the mobile number associated with the account.”
“Consider using security apps that offer anti-theft features, such as remote lock, siren activation, or snapshot of the thief, and ensure they’re always up to date,” added Botezatu.
However, its important to make sure the apps your download are legitimate – and not a fake app masquerading as security software.
Find our tips on spotting dodgy apps in the box below.
Location-based iCloud password protection can restrict any password changes if you are not in a familiar location.
“Many times, thieves snatch the mobile phone while unlocked or after they have memorised your screen unlock pin and will attempt to change your iCloud password to gain control of the account,” said Botezatu.
It’s important to note that this feature is currently only available to iPhone owners – however, that might soon change if Google catches wind of how helpful it is.
Detecting a malicious app before you hit the 'Download' button is easy when you know the signs.
Follow this eight-point checklist when you’re downloading an app you’re unsure about:
All of this information will available in both Apple’s App Store and the Google Play Store.