
Millions of phone owners get anti-theft ‘secret weapon' to stop thieves breaking into your mobile after snatching it
A phone is stolen every seven-and-a-half minutes in London
THAT'S PHONEY Millions of phone owners get anti-theft 'secret weapon' to stop thieves breaking into your mobile after snatching it
MILLIONS of phone owners are to get a new anti-theft "secret weapon" on their mobile to stop thieves accessing the device after snatching it.
The security feature means Android phones will start to reboot automatically if they haven't been used for three days.
Advertisement
3
Phone-related crime is getting worse
Credit: Getty
3
The new system means Android phones will reboot after three days
Credit: Getty
This means they will be more difficult to access if they haven't been used in a while as users have to enter the pin after a reboot.
It comes after a recent survey from the Met Police revealed phones are stolen in London at a rate of one every 7 1⁄2 minutes.
Figures show gangs and crooks took 70,137 mobiles last year — 192 a day.
That is up a third from the 52,000 nicked in 2023, Met Police statistics show.
Advertisement
Another important reason for users and authorities to be aware of the update relates to the two lock states on mobiles – before first lock (BFU) and after first lock (AFU).
In BFU, information and files on a phone are securely encrypted and completely inaccessible, even with complex extraction programmes.
Therefore if cops seize a phone as evidence they will have less time to access the device.
Phone thefts are now a £50million underworld industry, with most flogged or disassembled for parts in China.
Advertisement
People with phones still running Android 12 are advised to consider upgrading to a newer device.
Security patches fix flaws that have been discovered in the software, which stops phones succumbing to hacking.
Home Office figures show 90% of all 'theft from a person' crimes in London go unsolved, with a crook charged in only one per cent of cases.
The unsolved figure is 86 per cent in England and Wales.
Advertisement
Due to the rise in phone thefts, the Met is using tracking tech and putting plain-clothed officers in the West End and Westminster, where 40% of all thefts occur.
The City of London force is deploying bike-mounted police.
Anna McEntee, at Compare the Market, said Londoners and those visiting the capital will be concerned by the substantial rise in phone thefts last year.
She added that criminals are becoming "increasingly brazen, often using mopeds or e-bikes to make a quick getaway'.
Advertisement
The new security feature from Google is part of the April 2025 Google System release notes and is expected to apply to tablets but not wearables such as the Pixel Watch, televisions, or Android Auto Devices.
Google hasn't said if users will be able to toggle this feature or change the time limit for rebooting.
Since this feature is part of Google Play Services, those affected will see it without the phone going through a full system update.
A BFU phone remains connected to Wi-Fi or mobile data, meaning that if you lose your phone and it reboots, you'll still be able to use location-finding services.
Advertisement
3
It's designed to protect Android phones from hackers

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scottish Sun
3 hours ago
- Scottish Sun
Major mobile brand to DELETE accounts in weeks unless users act now
Any accounts that are deemed inactive will be deleted, and it will be impossible to retrieve them WIPE OUT Major mobile brand to DELETE accounts in weeks unless users act now – check yours Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) IF you haven't used your Samsung account in a while, you should probably start now before the phone maker deletes it for good. The Korean phone giant is having a big clear out of its Galaxy user accounts this summer. Sign up for Scottish Sun newsletter Sign up 2 Samsung accounts are used to access apps on Galaxy devices Credit: Samsung 2 If you've logged into your account at least once in the last 24 months, there should be no risk of removal Credit: Getty Samsung accounts are used to access apps on Galaxy devices. The Galaxy Store and all of Samsung's native apps, like Health and Galaxy Wearables, require an account to log in. This can be tied to a Google Account, which will not be affected by the shut down. However, they are often separate. If you haven't signed into your Samsung account in the past two years, the phone maker with deem it inactive. The company will delete inactive accounts on 31 July. For people who use their Samsung devices regularly, this shouldn't be a worry. It is difficult to operate a Samsung device without logging into your account. However, if you switched from Samsung to another mobile brand, you might want still want to keep your account in case you switch back. Alternatively, if you have a secondary account that you don't want to lose, then it's important to act now. Major US Phone Carriers Warn of Imminent Price Hikes Amid Tariff War If you've logged into your account at least once in the last 24 months, there should be no risk of removal. But it is a good idea to check and make sure your account doesn't get culled. Any accounts that are deemed inactive will be deleted, and it will be impossible to retrieve them. Save your Samsung account Simply log into your Samsung account before 31 July. This will mark the account as active to Samsung, and spare it from deletion. Galaxy users who haven't logged in for a while should receive an email from Samsung notifying them of the change. Though, as 9to5Google notes, that may prove ineffective if the email associated with the account is also inactive.


Scottish Sun
3 hours ago
- Scottish Sun
Urgent warning to all mobile users as crooks plant FAKE contacts for banks – they can even pretend to be mum and dad
Find out what to do to protect yourself below BREAK THE BANK Urgent warning to all mobile users as crooks plant FAKE contacts for banks – they can even pretend to be mum and dad Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) CRUEL cyber crooks have found a way to add fake contacts onto people's phones in an attempt to gain trust and empty bank accounts. Cyber security experts have warned that the scam is a "truly global threat". Sign up for Scottish Sun newsletter Sign up 1 Experts believe crooks use it to fake being bank support callers Credit: Getty The latest danger leads victims to believe they're being called by a trusted person such as their bank, when actually it's the scammers behind it. This means a "bank support" contact will appear on screen, leading targets to believe it's safe. In doing so, bad actors can pretend to be your bank and dupe you into giving access to your account. Technically, they could masquerade as anyone, such as loved ones or friends. Read more about Android FAT THUMBS Android owners warned of new Google Play Store apps that could cost you £5,000 It's all part of an evolved Android malware campaign known as Crocodilus. Hackers can only modify contact lists of those infected by it. "We believe the intent is to add a phone number under a convincing name such as 'Bank Support', allowing the attacker to call the victim while appearing legitimate," experts at Threat Fabric warned. "This could also bypass fraud prevention measures that flag unknown numbers." The cyber security firm first uncovered Crocodilus targeting people in Turkey in March. But now the company claims it has spread to other countries across the globe. Three little-known ways 'unknown tracker alerts' on Android can keep you safe "With newly added features, Crocodilus is now more adept at harvesting sensitive information and evading detection," Threat Fabric continues. "Notably, its campaigns are no longer regionally confined; the malware has extended its reach to new geographical areas, underscoring its transition into a truly global threat. "This shift not only broadens the potential impact but also suggests a more organised and adaptive threat actor behind its deployment. "As Crocodilus continues to evolve, organisations and users alike must stay vigilant and adopt proactive security measures to mitigate the risks posed by this increasingly sophisticated malware." How to stay safe As ever, money-grabbing malware of this kind usually comes from apps downloaded outside of the Google Play Store. So it's best to stick to apps from the official platform. It's also important to ensure you have Play Protect switched on as this will help pick up on suspicious activity.


Daily Record
4 hours ago
- Daily Record
Two vital steps to take every time you download an app onto your phone
Lee Elliott, chief product officer at Compare and Recycle, has shared some vital advice for those who use their phones to download new apps Mobile users have been cautioned to exercise vigilance when downloading apps onto their devices, with the number of necessary updates on the rise and services often reliant on apps. Lee Elliott, chief product officer at Compare and Recycle, has come forward with expert advice to keep mobile phones secure from malware threats. Highlighting essential precautions, he advised: "Before installing an app from the App Store or Google Play, always ensure it is a verified app and pay attention to its reviews." But he also stressed the importance of keeping apps up-to-date, saying that regular updates and security patches are crucial for safety. The risks associated with malware infections on your device could compromise personal data and banking apps, potentially leading to identity theft, Elliott warned, reports the Express. There are several warning signs to be aware of which may signal a malware infection: unexpected texts or calls, unwelcome pop ups, an overheating device, or rapid battery depletion. Other red flags include sluggish page loading, disruption during internet browsing, or observing an unusual increase in data consumption. In a situation where you believe your phone may be infected, Elliott instructs: "If you suspect your device has been infected, the first port of call is to turn off your mobile data or Wi-Fi, and uninstall any suspicious apps you can identify. "You could also perform a factory reset. On Android phones you can run a built-in scan to search for malware and resolve the issue, but due to the OS architecture out of the box, iPhones are well protected and are not generally susceptible to security breaches, so if you're experiencing any strange pop-ups as an Apple user try clearing your browsing history and cache first, and it'll likely solve the problem." He also offered some additional advice to avoid becoming a target, such as steering clear of public Wi-Fi connections and rejecting any suspicious Bluetooth pairing requests when out and about. The Met Police recently issued a warning for people to be vigilant following a surge in phone thefts where audacious thieves snatch a phone straight from someone's hand. Mr Elliott provided a tip to limit the impact should your device be nicked. He said: "While staying aware of your surroundings is the least you can do to stop your phone being snatched in the first place, there are simple steps you can take to protect yourself and prevent the worst from happening. "A lesser-known trick for iPhone users is to disable Control Centre access from the lock screen - this prevents thieves from quickly switching off Wi-Fi or turning on Airplane Mode if they grab your phone while it's locked, helping you retain the ability to track the device via Find My iPhone and making them more likely to let go of the device. "Simply navigate to 'Face ID & Passcode' in settings and toggle off the option for accessing your control centre when the phone is locked." He also urged iPhone owners to switch on Stolen Device Protection to toughen it up for crooks trying to mess with your account security settings. For an additional layer of safeguarding, consider using eSIM as physical SIMs can be plucked out from your gadget to take it off the grid, while keeping your device online lets you utilise its tracking capabilities.