Criminals Can Steal Your Phone Number. Here’s How to Stop Them
With most of your bank details, credit card information and
other vital data being linked to your mobile number, it is very important that
you safeguard the same.
Your phone is used as a source of authentication. It is the easiest target for criminals thanks to the “port out scam” which is one of the biggest threats to the cellular industry today.
Understanding
the port out scam
Also known as SIM hijacking, this scam allows the attacker
to move your current number to a different carrier. Known as “porting”, this is
a service that lets you switch to a new carrier without changing your phone
number. With this scam, criminals receive all authentication messages to their
phone and gain access to your personal information.
The attacker who has access to your personal information
will call your current carrier pretending to be you. Once they have fooled the
service provider into believing that it is you who is calling, all the messages
and calls will be diverted to the new SIM. Since most mobile phone carriers try
to make all services easy for customers, breaching security is quite easy for
an attacker.
Stopping
these port out scams
Each cellular service carrier provides certain avenues to
ensure that you do not fall prey to this scam:
•
AT&T: You
can set an additional wireless 4-8 digit passcode online. You also have an
extra security option online that will require you to use this code in more
authentication processes.
•
Sprint: You
can add an online PIN that will be required when you need to port your phone
number.
•
T-mobile: Calling
the customer service allows you to add a port validation service which is a new
6-15 digit passcode. This should be provided at the time of porting the phone
number.
•
Verizon: You
can set a 4 digit account PIN online. You must also set a password for your My
Verizon account online to use as additional security when porting your phone
number.
•
Choose other authentication methods
•
One
of the best options available is to avoid using the two step SMS authentication
process that requires your phone number. Although it does seem like you have
complete control on your number, portability has changed this completely.
•
You
do have other options such as the Authy App. These apps can generate codes for
your online transactions. This is done on your cellular device itself. So, you
are not relying on your cellular network carrier for the code. So unless the
attacker has your device, he will not have any access to your security codes.
•
However,
you cannot completely avoid using your phone as your security option. Most
online services require you to use your phone to provide an SMS verification.
In addition to the other security measures, most of these services will use
your phone as a secondary security measure or a backup.
•
So,
it is best that you call your network provider and compare mobile phones to understand the different measures
to secure number porting to avoid any issues.
•
Furthermore,
you can get the complete information about contract phones deals and avail
the offers on top brands.