Chicago Cell Phone Repair Offers Advice on How to Protect Wireless Devices from Spyware and Viruses

Cell phones are subjected to the same awful tragedies as home computers – contracting viruses, spyware or malware. Because users can also access the Internet with cell phones, and because cell phones are great at keeping track of ultra-intensive data such as call logs, e-mails and text messages, some malicious forces are beginning to target them.

In the ever-evolving wireless industry, cell phones are becoming more and more intelligent and jam-packed with cool features. There are more and more apps that hold sensitive information – such as online banking account numbers – and hackers are lurking in the wireless world’s water, seeking their prey.

What is more disconcerting is the fact that the wireless industry is currently faced with even more security challenges, especially now that organizations are demanding more open networks on their devices, applications and content. With that in mind, wireless network carriers are still working hard to protect their consumers. When and if wireless security breaks wide open, it will be totally up to the consumer to protect his/her own data from spam, viruses and other threats.

What spyware does is what the name says; it “spies”. Data can be collected and extracted from text or instant messages, e-mails or contact lists. Software physically embedded on cell phones can be used to eavesdrop and can even be utilized as a GPS tracking tool that can remotely monitor the cell phone owner’s location.

“Although the wireless industry does try hard to protect consumer’s confidential information, it can only go so far,” said Jeff Gasner, owner of CPR – Chicago Cell Phone Repair. “To protect your phone from spyware, make sure you know where your phone is at all times, meaning don’t lend your phone to anyone or leave it unmonitored. This gives someone a chance to tamper with it. Also think about password protecting your phone.”

Other types of malware, on the other hand, are data extraction tools that collect data for unscrupulous companies or persons that use it for identity theft purposes. Viruses can be also be distributed through websites and e-mail attachments.

“If you think your cell phone has a virus, take it to your wireless network service provider or to an independent cell phone repair shop like CPR,” Gasner said.

To learn more visit:

Tagged with: , ,