The NESACS Blog
From the Northeastern Section of the ACS, focusing on career management and development
Categories:

Archives:
Meta:
September 2019
S M T W T F S
« Aug    
1234567
891011121314
15161718192021
22232425262728
2930  
08/21/19
Hot buttons. 7. Cell phone hacking/identity theft
Filed under: Recent Posts, Mature professionals, Legal matters, Observ. Trends
Posted by: site admin @ 7:50 am

 Reader, whether on cell phone, laptop, tablet or
desk top, you may have a general preference, or not.  Yet,
most will use your cell phones for many communication
and data managing.  In fact you may even control
experiments via cell phones.

.
This post is not offering a recommendation for your choice.
It is aimed at alerting you to the real problem of losing
control of your identity by making public your cell phone
number.  
.
This is something you should carefully limit, like giving
out your id or password.
.
Online hackers are targeting cell phone numbers increasingly
as their use for many things increases.  An article by M.
Stokes highlights a half dozen items that may signal your
cell phone number has been hacked– shorter battery life,
interrupted performance, increased data use, uninitiated
calls or texts from your phone, and mysterious pop-ups and
activity.
-
The Stokes article outlines very nicely how you can be 
trapped into a cell phone hacking situation.  It is worth
reading.

Leave a Reply