The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
If you’re one of those people who tend to lose their phone shortly after putting it down, then you’ll want to read this. According to a new study, if you lose your smartphone, you have a 50/50 chance of getting it back. But chances are much higher – nearly 100 percent – that whoever retrieves it will try to access your private information and apps.
According to a study by Symantec, 96 percent of people who picked up the lost phones tried to access personal or business data on the device. In 45 percent of cases, people tried to access the corporate email client on the device.
[Free Resource: Check your credit for free before applying for a credit card.]
“This finding demonstrates the high risks posed by an unmanaged, lost smartphone to sensitive corporate information,” according to the report. “It demonstrates the need for proper security policies and device/data management.”
Symantec called the study the “Honey Stick Project.” In this case the honey on a stick consisted of 50 smartphones that were intentionally left in New York, Los Angeles, Washington, D.C., San Francisco and Ottowa, Canada. The phones were deposited in spots that were easy to see, and where it would be plausible for someone to forget them, including food courts and public restrooms.
None of the phones had security features, like passwords, to block access. Each was loaded with dummy apps and files that contained no real information, but which had names like “Social Networking” and “Corporate Email” that made it easy for the person who found it to understand what each app did.
Each phone also was loaded with programs to track what finders did with the devices, and to send that information to the researchers. Among people who found the phones, 72 percent tried to access photos, 57 percent tried to open a file called “Saved Passwords,” and 43 percent tried to open an app called “Online Banking.”
Most of the apps on the phones were protected by passwords, but the username and password fields were already filled out, so that users could simply press a button to access them. Well over half of the people who discovered the phones, 66 percent, clicked those buttons to try and start the programs.
The fact that the finders had to click a button to access the apps indicates that their attempts were likely intentional.
“This might be considered to be an unethical access attempt,” according to the study.
Also disturbing, only half the people who found the phones ever tried to contact the rightful owner, even though the owner’s phone number and email address were prominently listed in the phones’ contact lists.
“This finding highlights the fact that in many cases, regaining possession of lost device may be a losing battle,” according to the study.
If this study sends shivers down your spine, here are some tips for how to protect yourself:
Image: PhilCampbell, via Flickr
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams