Find a location near you!
Image 01 Image 01 Image 01 Image 01 Image 01 Image 01

iHospital talks to Fox 5 News Atlanta about Protecting your SmartPhone

Written by iHospital. Posted in Media Coverage

Deidra Dukes: Smartphones have taken communication to a whole new level. Once simply a mobile phone used to makes calls on the go. Cell phones on the market today do much more.

Jon Giffin: Today, we have smart phones that are a computer in your pocket. It’s a handheld computer.

Deidra Dukes: We can text. Talk. Or, surf the web at all hours. But experts say we pay a high price for convenience.

Jon Giffin: Hackers can access smartphones just as they can attack your desktop system.

Deidra Dukes: An assistant professor in the school of computer science, Jon Giffin, says hackers are constantly coming up with new techniques to break into your phone. Often using MALWARE, Malicious Software, disguised as a common application like a media player.

Jon Giffin: Malicious functionality might do things like steal your credentials. We call that spyware. It’s like a spy in your password that you’re typing in to a browser. It might do things in a cell phone like turn on your microphone so your cell phone becomes a bug that’s transmitting the audio signal to the hacker. It might do things like read your location information or maybe it accesses your contact list to learn your friend.

Deidra Dukes: We learn that breaking into someone’s phone is easier than you might think. We found several videos posted on You Tube that detailed ways to secretly access the information on someone else’s phone. And hackers aren’t just using mobile apps to gain entry.

You may be making a phone call or checking your bank account information. We’re told by experts that hackers could be anywhere. It could be driving by or a nearby restaurant on a laptop trying to access your information. Everything that’s contained in here.

The iHospital Sam Schlam, says Bluetooth technology and navigation systems built into cars are making it easier for hackers.

Sam Schlam: You could simply easily have, you know, equipment setup in a van, and drive next to someone who have Bluetooth in their car, and hack into their system, you know, have their navigation record as well as their telephone record.

Deidra Dukes: So, what are the signs you may have been hacked? Your phone’s overheating and you haven’t been using it. Your screen pops out of sleep mode when you aren’t using it. You hear clicks or echos while you are having a conversation. Or, your battery is draining unusually quickly. So, how do you protect yourself? Experts say do not use common passwords like your mother’s maiden name. Be sure to install any spyware on your phone to detect viruses and do not open email, text messages, and video clips. Sam Schlam says there’s one sure way to stop a hacker when extracts once he’s accessed your phone. Pull the plug.

Sam Schlam: Taking your battery out disconnects all allsoftware until you restart it.

0 comments

Need a speedy repair or upgrade? Send us an email or dial 1 (888) 407-5767

Want to become an iHospital Franchisee! Request Franchise Info Here