{"id":1067,"date":"2014-06-03T08:00:57","date_gmt":"2014-06-03T13:00:57","guid":{"rendered":"http:\/\/stratospherenetworks.com\/blog\/?p=1067"},"modified":"2018-06-26T12:04:30","modified_gmt":"2018-06-26T17:04:30","slug":"smartphones-now-a-target-for-hackers","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/","title":{"rendered":"Smartphones Now a Target for Hackers"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Cloud-Computing-Smartphone.jpg\"><img decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1537\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/06\/Cloud-Computing-Smartphone-150x150.jpg\" alt=\"smartphone safety\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<p>Many smartphone users around the world have fallen <a href=\"http:\/\/newyork.cbslocal.com\/2014\/05\/28\/thieves-hack-iphones-demand-ransom-to-get-them-unlocked\/\" class=\"external external_icon\" rel=\"nofollow\">victim<\/a>\u00a0to a new form of hacking. The hackers have been infiltrating smartphones and freezing them, only to demand a ransom be paid by the owner in order to get \u00a0his\/her phone working again.<\/p>\n<p>Through the \u201cFind My iPhone\u201d feature on iCloud, hackers have been able to disable iPhones, iPads, and Macs until the ransom is paid. \u00a0The phones\u2019 owners receive a text message that says something along the lines of, \u201cfor unlock device YOU NEED send voucher code by 100 $\/eur one of this (Moneypack\/Ukash\/PaySafeCard) to helplock@gmx.com I sent code 2431402312.\u201d The hackers have also gained access to Apple accounts, although the iCloud hasn\u2019t been compromised.<\/p>\n<p>Ivan Drucker, an iPhone security expert, cautioned that this scam can happen to anyone, no matter their location. \u201cIt could be you, and it really could be anybody \u2014 no one is really immune,\u201d Drucker said.<\/p>\n<p>For smartphone owners who are worried that this could happen to them, there are precautionary steps you can take to better protect your phone and information. The first is setting a passcode on your phone. The second is implementing two-step verification on your Apple account, so every time you sign in you have to enter a code along with your password. The code is sent directly to your phone, and will make it nearly impossible for anyone to log into your account unless they have your phone with them.<\/p>\n<p>The first report of the phone hacking came from Australia, and was reported in the US this week. Smartphone users are encouraged to back up their devices now, because once hacked the phone can only be restored to its original state.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Many smartphone users around the world have fallen victim\u00a0to a new form of hacking. The hackers have been infiltrating smartphones and freezing them, only to demand a ransom be paid by the owner in order to get \u00a0his\/her phone &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"yoast_head":"<title>Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Many smartphone users around the world have fallen victim\u00a0to a new form of hacking. The hackers have been infiltrating smartphones and freezing them, only to demand a ransom be paid by the owner in order to get \u00a0his\/her phone &hellip; Read more &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-03T13:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\"},\"author\":{\"name\":\"Administrator\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55\"},\"headline\":\"Smartphones Now a Target for Hackers\",\"datePublished\":\"2014-06-03T13:00:57+00:00\",\"dateModified\":\"2018-06-26T17:04:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\"},\"wordCount\":291,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\",\"name\":\"Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2014-06-03T13:00:57+00:00\",\"dateModified\":\"2018-06-26T17:04:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smartphones Now a Target for Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55\",\"name\":\"Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f58d7bc9d561bec266019f1e67f82f33137f1d9bcca4369a9b631970498429a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f58d7bc9d561bec266019f1e67f82f33137f1d9bcca4369a9b631970498429a?s=96&d=mm&r=g\",\"caption\":\"Administrator\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/administrator\/\"}]}<\/script>","yoast_head_json":{"title":"Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","og_description":"&nbsp; Many smartphone users around the world have fallen victim\u00a0to a new form of hacking. The hackers have been infiltrating smartphones and freezing them, only to demand a ransom be paid by the owner in order to get \u00a0his\/her phone &hellip; Read more >","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2014-06-03T13:00:57+00:00","article_modified_time":"2018-06-26T17:04:30+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"Administrator","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Administrator","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/"},"author":{"name":"Administrator","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55"},"headline":"Smartphones Now a Target for Hackers","datePublished":"2014-06-03T13:00:57+00:00","dateModified":"2018-06-26T17:04:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/"},"wordCount":291,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Knowledge Base"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/","name":"Smartphones Now a Target for Hackers - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2014-06-03T13:00:57+00:00","dateModified":"2018-06-26T17:04:30+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55"},"breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/smartphones-now-a-target-for-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Smartphones Now a Target for Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/fb8c53a593691a2c48e346df78c3af55","name":"Administrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f58d7bc9d561bec266019f1e67f82f33137f1d9bcca4369a9b631970498429a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f58d7bc9d561bec266019f1e67f82f33137f1d9bcca4369a9b631970498429a?s=96&d=mm&r=g","caption":"Administrator"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/administrator\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1067"}],"version-history":[{"count":9,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1067\/revisions"}],"predecessor-version":[{"id":1538,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1067\/revisions\/1538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}