<img src="https://secure.leadforensics.com/69529.png" style="display:none;"> Apogee IT Services
Blog  |  FAQ
  • Apogee Aim Higher Website header
    What's going on in IT.

Rise in Mobile Scams

Posted on January 28, 2020

How many hours do you think you spend on your phone a day? Besides using our cellphones to communicate through text messages or phone calls, we use our devices to stay connected through the world by using social media, the internet etc. According to Statista.com, the average person spends around five or more hours on their smartphones daily. Now that you have thought about how much time you spend on your phone; think about all the important information we have stored on our devices. For instance, how many of you have access to your online banking or home security apps through your cellphone? If you answered yes, then keep on reading.

Besides the scams we see that effect our computers or cyber criminals that guess our password and hack our social media accounts, there are many other ways in which a hacker can unlock your information. More recently, mobile scams are on the rise. Here are the top three mobile scams:

SIM Swap

A SIM Swap is when someone convinces your carrier to switch your phone number over to a SIM card they own. Someone may try to approach you in person, over the phone or online. It has even been reported that some SIM hijackers are recruiting retail workers at mobile shops in order to gain access to protected accounts. When someone has your number not only are they able to make calls and texts with it, but they may be able to unlock some of your accounts you have on your phone such as your banking.

Phishing Message 

The term phishing is most associated with email. Let’s look at an example of what a phishing message may be. You may receive a message from what looks like your online banking, your carrier, or someone else that contains either a dangerous attachment or link that cons you into giving your personal information. For example, the website may ask you to include your credit card details or your login information. This is the perfect example of a phishing message. By you pressing on that email and clicking on that link, hackers may be able to easily access your information. 


Cloning occurs when a criminal can gain access to your mobile phone and serial number. They use that information to program another phone with the same information. This means that any calls or data used will directly go to your phone bill.

One-ring Scams 

This all starts with those annoying calls from unknow numbers that may only ring once. The scammers hope that you will call back once you see you have a missed call. IF you do call back you may be charged up to a $19 connection fee depending on where the call is connecting you to.


So how can you prevent falling victim to one of these mobile scams?

  • Use Authorized Apps
  • Be Aware of Unfamiliar Calls
  • Always Stay on top of your System Updates
  • Use Pins and Passwords

Tagged Security, technology, Apogee, 2020

11 keys to network security

Clients in the US & Canada


Learn More