logo
Do Not Use These Networks On Your Smartphone, Warns Google

Do Not Use These Networks On Your Smartphone, Warns Google

Forbes5 hours ago

Doi not make these dangerous connections.
Republished on June 26 with new advice for smartphone users on these threats.
A timely caution for smartphone users this week, with the police warning criminals can push malicious SMS texts directly onto their phones, bypassing mobile networks. This is why Google warns all smartphone users to change their networks settings.
The threat comes from so-called SMS blasters, which trick phones into making a direct connection with an attacker's radio device, thinking it's a real network access point.
The texts themselves are no different to the ones coming via normal networks — but for an attacker there's no need to have a list of target numbers, they can select a target location instead. This means they can prioritize areas with richer pickings.
Police in the U.K, when one SMS-blasting cyber criminal was jailed this week, warn that criminals will try "to bypass fraud prevention measures designed to protect consumers [to]
Google warns that 'this method to inject messages entirely bypasses the carrier network, thus bypassing all the sophisticated network-based anti-spam and anti-fraud filters.' The company has now seen this 'SMS Blaster fraud' in multiple countries.
Google also says that increasing evidence 'of the exploitation of weaknesses in cellular communication standards leveraging cell-site simulators' means users need to act.
The solution is to disable 2G networks on your phone. This is still dependent on manufacturer and model, but you can search for 2G or phone or cellular settings to check if it's available. 2G is woefully insecure compared to more recent networks, particularly 5G but also 4G (LTE) and even 3G.
This is why Google and Samsung are upgrading devices to prevent Android phones connecting to these less secure networks. 2G is also disabled by default if Android 16's new Advanced Protection Mode is enabled. The police advice is to disable 2G.
Disable 2G on your phone
Remember, even in locations where 2G has been sunsetted, the phone will still connect to a fake cell access point if it has 2G enabled. This is a device level problem.
As a rarity, this is one security area where Androids beat iPhones. You cannot currently disable 2G on an Apple device unless you use Apple's Lockdown Mode sledgehammer. But you can filter texts from unknown numbers and treat them all with suspicion. And the advice not to click links is the same however a text was sent to your phone.
And on that note, while SMS blasters might be a risk to users unlucky enough to find themselves in the vicinity of one, the real dangers remain network based. According to Trend Micro's latest report, the primary threat last month was 'cybercriminals using their regular tactics in trying to scam consumers, with scammers impersonating well known brands such as PayPal, Netflix, Mater Lotteries, Toyota and Google.'
The security firm says 'the golden rule of any scam, online or otherwise, is that if something sounds too good to be true, it probably is.' And that holds true however a text is sent to your phone, and whatever lure is used to trick you into engaging.
Trend Micro advises users to watch for these danger signs:

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Shares of China's Xiaomi surge after launch of electric vehicle YU7
Shares of China's Xiaomi surge after launch of electric vehicle YU7

Yahoo

time36 minutes ago

  • Yahoo

Shares of China's Xiaomi surge after launch of electric vehicle YU7

SHANGHAI (Reuters) -Hong Kong-listed shares of Xiaomi opened up 8% on Friday, after the launch of a new electric car model. The shares were up roughly 5% in early trading, after the Chinese EV and smartphone maker on Thursday priced its new electric YU7 SUV from 253,500 yuan ($35,364), almost 4% below Tesla's Model Y. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Your Phone Is Stolen. Your Laptop Gets Lost. Here's What to Do.
Your Phone Is Stolen. Your Laptop Gets Lost. Here's What to Do.

New York Times

time41 minutes ago

  • New York Times

Your Phone Is Stolen. Your Laptop Gets Lost. Here's What to Do.

Miguel Porlan for NYT Wirecutter By Dave Gershgorn Dave Gershgorn is a writer covering monitors, laptops, and tablets. He is a certified display calibrator through the Imaging Science Foundation. Updated June 26, 2025 On a humid August night in Ferguson, Missouri, about 10 years ago, my phone was stolen. I was working as a photojournalist covering the protests against Michael Brown's killing, and amidst the bustle of the packed street, my phone was snatched out of my lap. I chased after the thief, but as we made a turn off the boulevard, and the streetlights grew sparse, I gave up. My phone was gone. That had never happened to me before, and I felt completely lost. I was far from my home in New York, I had no way to communicate with my family and friends and no way to get up-to-date information about what was happening around me, and I didn't have my saved travel plans or airline ticket home — or even any music. And suddenly all of that information was in someone else's hands. After I returned home, I bought a new phone and set it up from scratch. I still had my photos and contact data saved in Apple's iCloud, but to this day, I don't know everything I might have lost. A decade later, it's much easier to recover a phone — and all the personal information on it. Apple, Google, and Microsoft have each built location-tracking services, which allow you to track your device's last known location on a map in real time. Google added an AI-powered feature to Android phones that is designed to detect when your device has been snatched and locks the phone screen to make it harder for a thief to access your data. Although these tools give you options if your device is stolen, they don't ensure that your data is completely protected. Dave Lewis, global chief information security officer at identity security company 1Password, told Wirecutter that the average criminal might not be able to circumvent facial recognition or a fingerprint reader and will most likely flip the device to someone else for parts. 'But for an attacker with any sort of technical savvy, if they have physical access to the device, it's game over,' Lewis said. Today, I would do things differently, taking a few steps before my device is stolen as well as after. This is what I'd do. Explore all articles 1. Enable your device's Find My device-tracking tool. Finding your phone is easier if you have its Find My location-tracking feature enabled. Apple, Google, and Microsoft all have versions of this tool, which allows you to locate your device on a map, display a message on its lock screen, or play a sound on it remotely so that you can try to find it if it's nearby. We also recommend turning on a feature in iOS called Stolen Device Protection, which requires the person unlocking your phone to verify their identity with Face ID or Touch ID, wait an hour, and then verify again before being able to change sensitive information such as account passwords. Google has made a similar feature, called Identity Check, available for some Android phones. 2. Set your device to automatically create backups. Unless the phone's data is backed up, security experts told us that it's nearly impossible for the average person to retrieve information from their phone once it's already lost or stolen. If your phone is lost or stolen, you'll still be able to access data on Instagram or even your to-do list app, since most apps store information in the cloud and send it to your phone when you need it. But all the little things that make your phone yours, such as your settings and backgrounds, the way you arrange your apps, and anything you might have saved locally in your Files app, can be saved only if you've backed them up beforehand. Both iOS and Android let you schedule regular automatic backups of all your apps and settings, which is absolutely essential. If you have a recent copy of your backup and don't need any of the information on the phone, you can remotely wipe all the data off it without losing too much. Otherwise, you're stuck trying to find and recover your phone. 3. Encrypt and back up your laptop. It can be particularly challenging to recover data from a stolen or lost laptop, since you're far more likely to have saved files to its hard drive rather than storing them in the cloud. By encrypting your hard drive, which is an option in both macOS and Windows, you can prevent attackers from extracting that data with their own tools if they don't have your password. We also recommend backing up your important files to an external hard drive that you store in a safe location, so you can recover your photos and documents even if your laptop is gone for good. 4. Use a password manager. A password manager is an essential service that we recommend to improve your online security. (We recommend 1Password or Bitwarden.) It works by creating and autofilling unique passwords for all of your accounts, and in turn you need to remember and safeguard only the master password to the password manager. Your data stays encrypted until the master password is entered, and you can deauthorize the device if it's stolen or lost to remove the potential of your passwords being accessed altogether. 5. Turn off message previews and lock Control Center access. If anyone looking at your phone can see messages as they pop up, that means thieves can also see two-factor authentication codes. That gives the thief an opportunity to crack into any accounts that send you a code when you log in. iOS and Android both give you the ability to hide message previews until your phone recognizes your face. (If you mark your phone as lost in the Find My feature, that automatically turns off message previews remotely.) You can also turn off certain features of the lock screen, such as the Control Center, which gives quick access to Wi-Fi and other settings, until the phone has been unlocked by facial recognition. Share this article with a friend. Prevention, as they say, is the best cure, but life doesn't always unfold so neatly. If your phone, tablet, or laptop gets lost or stolen right this moment, don't panic. Here are the things you should do. 1. If your device was stolen, report the theft. Immediately after your device is taken, report it stolen to the police. If the missing device is a phone, report it to your cell carrier. Many carriers require you to give a previously established PIN to verify your identity and will then freeze your number (for more details, see information from AT&T, T-Mobile, and Verizon) until you add a new phone. The carrier will then block the old phone's unique serial number from connecting to its network. 2. Remotely lock down the device. If you enabled the Find My feature prior to the loss or theft, both Apple and Google give you options to remotely lock down your device. For an iPhone, you can visit Find Devices and mark the item as lost. For an Android phone, navigate to the Secure device setting in Google's location-tracking tool. Locking down the device makes it harder for thieves to access your Google account, pay using saved cards, or see alerts. 3. Revoke access to apps and remove multi-factor authentication. If a thief has your phone and is able to unlock it somehow, you should limit their ability to receive one-time passwords for your bank, for instance, or use applications that are permanently logged in. We recommend removing your phone as a multi-factor authentication device if you haven't turned off message previews as recommended above, if you have an easy-to-guess password, or if your cell phone line isn't frozen yet. Ronnie Manning, chief brand advocate for security key maker Yubico, separately recommends making a list of your most sensitive accounts, such as Google or Facebook accounts that you use to log in to other accounts, and then revoke your device from those accounts if it's stolen. You can usually find these settings under names like 'Account Access' or 'Security.' 4. Erase the device. With the Find My feature enabled before loss or theft, both Apple and Google will allow you to wipe data such as apps and photos from your stolen or lost phone while still being able to track it. Note that you should only wipe the device's data using the Find My feature, not fully remove the device from your Apple or Google account — that would allow the thief to set it up as new. Now, it's time to get a new phone or laptop. Luckily, we have some recommendations. This article was edited by Caitlin McGarry and Jason Chen.

Shares of China's Xiaomi surge after launch of electric vehicle YU7
Shares of China's Xiaomi surge after launch of electric vehicle YU7

Yahoo

timean hour ago

  • Yahoo

Shares of China's Xiaomi surge after launch of electric vehicle YU7

SHANGHAI (Reuters) -Hong Kong-listed shares of Xiaomi opened up 8% on Friday, after the launch of a new electric car model. The shares were up roughly 5% in early trading, after the Chinese EV and smartphone maker on Thursday priced its new electric YU7 SUV from 253,500 yuan ($35,364), almost 4% below Tesla's Model Y. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store