About the Post

Author Information

How phone hacking worked and how to make sure you’re not a victim | Naked Security

 

Over on the post “How phone hacking worked and how to make sure you’re not a victim | Naked Security” contains this text:

“How phone hacking worked and how to make sure you’re not a victim Hi there! If you’re new here, you might want to subscribe to the RSS feed for updates. X

by David Rogers on July 8, 2011 | Comments (1) FILED UNDER: Featured, Law & order, Mobile, Privacy Mobile phone security expert David Rogers of blog.mobilephonesecurity.org explains how “phone hacking” is done, and how you can better protect your mobile phone’s voicemail.

 

A lot of mobile customers are bewildered by the events going on in the world press at the moment with all this talk of ‘phone hacking’. Many of my friends have asked me what they can do to protect their phones and what the whole thing is about. The truth is, there is no actual phone hacking involved and it is also wrong to call what went on hacking.

What’s really being discussed is illicit access to voicemail messages.”

 

No comments yet.

Leave a Reply