Results 1 to 7 of 7

Thread: How to prevent phone from hacking

  1. #1
    Join Date
    May 2011
    Posts
    48

    How to prevent phone from hacking

    My phone was hacked into a couple of months in the past. It doesn't quite matter what phone I am utilizing as I have been through a couple offbeat phones and they all have had the same situation. I utilize Bell Mobility and have reported it to them, but they declare they have never known about this nor are they equipped to help me. The just inference they might give me was to run over to the police, but without any proof to authenticate I positively cannot see the police having the ability to help me right now. I could not venture to update phone teams yet and am stayed with a phone that I could not venture to blatantly utilize owed to the situations.

  2. #2
    Join Date
    May 2008
    Posts
    3,971

    Re: How to prevent phone from hacking

    I suspect that you need to update the sim cut. Have your swapped your sim chip? Every last trace of the calls and wires face this chip and are encrypted but the hacker could have cloned your chip so should be traded. Actually recovery your phonebook to viewpoint express in PC a message your photographs to yourself. Since IPhone the photographs recovery when synchronize phone. You are able to moreover recovery your phone book to your phone and the transfer to late chip.

  3. #3
    Join Date
    Jun 2009
    Posts
    3,620

    Re: How to prevent phone from hacking

    To start with you ought to turn your phone off. Second, update every little item message, secret key, and stuff similar to that. Then contact your utility supplier for some backing on the matter. They might as well comprehend what to do from there. The most normal strategy to hack a PDA is by establishing a minor unit on it... in any case the hacker should have access to the phone to do that.

  4. #4
    Join Date
    Nov 2009
    Posts
    4,494

    Re: How to prevent phone from hacking

    Well the just way he or she would be able to have tried that is by uniting to your telephone via Bluetooth that would be why it shouldn't consistently be on unless it’s wanted. You ought to check for any movement that happens, erase any unnecessary projects and depending on if it still happens restore manufacturing plant settings. As said before it could probably be effectively access depending on if you have other side the Bluetooth access open. Close it and do the mill reset and check if the situation endures

  5. #5
    Join Date
    Nov 2009
    Posts
    3,400

    Re: How to prevent phone from hacking

    It is scarily effortless for hackers to enter your telephone. Utilizing Bluetooth they can obviously take over complete control of your portable, but most obviously folks needing to gather info will would like to do it surreptitiously, and will in this way adhere to remote access of your voicemail. Most folks don't even apprehend they can access their telephones remotely – that is, from a diverse telephone. Anyway the utility is essential for those who voyage outside Europe where the standard number for ringing voicemail doesn't frequently work.

  6. #6
    Join Date
    Mar 2010
    Posts
    3,107

    Re: How to prevent phone from hacking

    Possibly method, this is absolutely simple to avert: set a remote access bind that just you know and is unrealistic for another person to speculate, and update it on a customary premise. Smith states: "Do not utilize your mother's last name by birth, your best pet's name, your date of life commencement or part of your telephone number on your cellular telephone account.”Anyone who has an essential learning of you would be able to utilize the proposed to gain entrance to your principle record. With a small thought you could probably make it unlikely for anybody to enter your private wires or telephone record."

  7. #7
    Join Date
    Mar 2010
    Posts
    2,033

    Re: How to prevent phone from hacking

    A second fundamental conceivability is to reset the default PIN code. Collecting this if four digits, that permits to 10,000 conceivable fusions for a hacker to surmise, not comprehensively secure but a sensible begin. Verify the PIN is then altered frequently. Third, utilize a target might utilize something greater than one telephone and lattice. This makes it harder for an ambusher to surmise and access the sum total of the target's voicemail.

Similar Threads

  1. Replies: 6
    Last Post: 23-10-2011, 10:58 PM
  2. Protection from IP hacking
    By Level8 in forum Networking & Security
    Replies: 4
    Last Post: 18-02-2010, 09:37 PM
  3. FTP Hacking
    By BoanHed in forum Small Business Server
    Replies: 2
    Last Post: 05-02-2010, 11:26 AM
  4. Is Somebody Hacking My Wireless??
    By Krupa in forum Networking & Security
    Replies: 2
    Last Post: 05-02-2009, 05:21 PM
  5. hacking to my one of D FOLDER
    By kajkool007 in forum Software Development
    Replies: 2
    Last Post: 27-10-2008, 11:58 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,878,563.46540 seconds with 17 queries