Cyber security for phone users

In today’s digitally interconnected world, the internet and technological advancements have transformed our daily lives, making tasks easier and communication more efficient. However, this increased reliance on digital platforms has also introduced significant vulnerabilities, primarily due to insecure cyber security measures. From identity theft and financial fraud to privacy invasion and unauthorized access to sensitive information, the consequences of inadequate cyber security are far-reaching and increasingly sophisticated. The pressing need to bolster cyber security is more evident than ever, as the repercussions of failing to do so affect everything from personal finances to our overall sense of safety in the digital realm.

We face various problems in our daily lives such as hacking, phishing, duplicating data, data leaks, spam, fraud calls, fraud emails and messages.

Cyber insecurity for phone users often arises from gaps in digital defenses that protect personal and organizational information. These vulnerabilities emerge in situations like forgetting to log out of personal or professional email accounts, Whatsappweb and most importantly from hacker activities from unidentified or forged IPs(Internet protocol) .

Outdated software, weak passwords, lack of encryption, or poor cyber security practices also creates these vulnerabilities. For example, not updating systems can expose them to known exploits, while weak or reused passwords facilitate unauthorized access. Additionally, phishing attacks, which trick users mostly senior citizens who are technologically weak into revealing sensitive information and malware infections that steal or lock data, are common threats thriving on lax security measures. Cases of serial unknown unwanted (non DND) calls were also reported claiming themselves as Job seeker / Loan provider / Digital marketing assistant  were secretly hacking your phone through unethical crawling and misuse of your phone data and passwords.

Problems like Spoofing Services: Caller ID spoofing takes anonymity a step further by allowing callers to alter the phone number that appears on the recipient’s caller ID. This technique can be used for call screening and nuisance call prevention, but scammers use it to execute social engineering attacks. These kind of unethical hacking with the help of dark web is most often used in many discreet illegal call centers in India and outside.

Voice over Internet Protocol (VoIP): VoIP technology allows users to make calls over the Internet instead of traditional phone lines. People and hackers often use VoIP services to make calls from a wide range of numbers that don’t lead back to their real identity or location. Since VoIP calls are made over the Internet, callers can mask or completely fabricate the originating number. This makes it challenging for recipients to identify or trace calls back to their source.

Virtual Private Numbers: Scammers use these numbers to make their calls appear as if they come from a different phone number, often in a different geographic location. This tactic makes it nearly impossible to trace the call back to the scammer’s real number or use online services that allow you to look up numbers, such as “Find out who called me” or “Reverse Lookup. “They stand at the forefront of combating phone spoofing and other phone-related cybercrimes.

Some measures to combat scam or fraud are :-   

Third-Party Apps in India like Truecaller is a popular choice for those seeking to make calls without revealing their identity, especially scammers and fraudsters. However, these apps are not free. Users must purchase app credit with real money to use them. Information on unwanted calls and SMS can be found by clicking on their link.

Do not Disturb – DND. Consumers can also block all Unsolicited Commercial Communications  (calls and SMSs both) or can selectively block UCCs from specified seven categories [1) Banking/insurance/ financial products/credit cards; 2) Real Estate; 3) Education; 4) Health; 5) Consumer goods and automobiles; 6) Communication/ Broadcasting / Entertainment/IT and 7 Tourism and leisure] by registering his/her preference in National customer Preference Register (NCPR) also known as DND Registry.

You can also install Antivirus for example like “Kaspersky” on Android/Iphone, to monitor fraudulent cyber activity and prevent data loss in your phone.

Its always better to prevent your phone with OTP and password locking facilities. Never share your online Bank balance or OTP with any unknown person. Always have a secret code while using online phone payment system.

Don’t lend your phone to unknown people for calls and don’t register your mobile number to unwanted external malicious sites. If you experience any unwanted disturbing calls from any unknown person , its better to block them within your phone instantly.

It is also advisable to buy new phones with improved security features and check IMEI number status of 2nd hand phones if purchased for use.

There are some modes to register complaint or report to :-

Sending sms to short code 1909, or Calling on 1909, or Interactive Voice Response System (IVRS), or Mobile app developed in this regard either by the Authority or by any other person or entity and approved by the Authority, or Web portal with authentication through One Time Password (OTP), or Any other means as may be notified by the Authority from time to time when you report UCC or spam, TSP does not register this as a complaint. It is a quick way to give TSPs information about UCC or spam activity so they can identify spam trends and potential compliance issues.

TRAI DND App:-Do Not Disturb (DND 3.0) App enables smart phone users to register their mobile number under DND to avoid Unsolicited Commercial Communication (UCC)/ Telemarketing Calls / SMS. This is based on TRAI, “Telecom Commercial Communication Customer Preference Regulations, 2018”.

You can also Lodge a UCC complaint with your phone network service provider. Check the status of complaints filed with your phone network service provider’s customer care contact.

You can also login to https://www.sancharsaathi.gov.in/ to report Suspected Fraud Communication (Chakshu), via online Cyber crime reporting portal of India govt. Chakshu enables citizens to report suspected or unsolicited communications received through calls, SMS, or WhatsApp. These communications may be intended for cybercrime, financial fraud, impersonation, fake customer services, lottery offers, loan offers, job offers, mobile tower installation, service disconnection, KYC updates, or any other misuse. This proactive reporting of suspected fraudulent communication helps the Department of Telecommunications prevent the misuse of telecom resources for cybercrime, financial fraud, and other malicious activities. helpline number1930 or website https://www.cybercrime.gov.in. https://www.cybercrime.gov.in/.

Wish everyone a hack free world. Thank you.