With over 1.2 billion telecom users and nearly 47% internet penetration as of January 2022, is witnessing a rise in mobile phone crimes. These cybercrimes involve unauthorized access to users’ mobile phones, leading to fraud, identity theft, and cheating. Financial gain is the main motive driving these crimes, as perpetrators gain access to personal information, leaving individuals vulnerable to various cyber threats.
Smartphones store a wealth of personal information, including banking details, emails, photos, videos, and apps, making the consequences of data theft profound. Reports show that victims of phone theft have experienced loss of company data, fraudulent charges on their accounts, and even identity theft. The severity of the issue was exposed in a 2018 BBC documentary that shed light on moped crime gangs in Britain, where stolen phones were sold for profit.
Among the prevalent mobile phone crimes is blue bugging, where hackers exploit Bluetooth to gain control over users’ phones without their knowledge. Vishing and smishing involve tricking victims into revealing personal information through voice calls or SMS, respectively. Mobile hacking, cyber defamation, mobile pornography, cloning, cyberstalking, virus dissemination, and credit card fraud are other forms of mobile crimes that pose significant threats to users.
Millions of mobile users across the world are at risk from the constantly expanding potential for cybercrime in the smartphone business. To combat this, people must practice safety measures, such as being watchful when disclosing personal information and corresponding with strangers. Ensure your operating system and installed apps are always up-to-date. Only download from trusted sources. Avoid storing sensitive information on your device and rather invest in a reputable security app for added protection. When accessing the internet, avoid connecting to public Wi-Fi and consider using a VPN. Always remember to keep your Bluetooth service off when not in use and regularly review app permissions, and uninstall unnecessary apps to minimize potential risks. Also, monitor your phone’s performance, as unusual battery drainage or excessive data use could indicate a security breach.
Addressing the issue requires a collective effort from mobile operators, cybersecurity agencies, and users themselves. Mobile operators must strengthen security measures to prevent unauthorized access and fraud. Cybersecurity agencies should be proactive in monitoring and thwarting cyber threats.
