{"id":30452,"date":"2020-03-02T16:33:31","date_gmt":"2020-03-02T21:33:31","guid":{"rendered":"https:\/\/tcn.tidbits.com\/?p=7633"},"modified":"2020-02-24T08:55:23","modified_gmt":"2020-02-24T13:55:23","slug":"to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account","status":"publish","type":"post","link":"https:\/\/www.computeradvantage.us\/v3\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account\/","title":{"rendered":"To Prevent Spearfishing, Set a PIN or Passcode on Your Cell Phone Account"},"content":{"rendered":"<p>Spearfishing. It\u2019s no longer just a tropical ocean sport that could provide seafood for dinner. In today\u2019s tech world, <i>spearfishing<\/i> is when someone targets you specifically, usually with the goal of taking over your online accounts. Once that\u2019s done, the attacker will try to siphon money from your bank account, impersonate you in an attempt to deceive family or colleagues into sending money, or attempt to ruin your reputation.<\/p>\n<p>You\u2019re probably thinking, \u201cNo one would ever target me. I\u2019m not interesting enough.\u201d It is true that the people who should worry the most about spearfishing attacks are high profile or have a high net worth, but modern online criminals aren\u2019t that fussy. After all have <em>something<\/em> and getting. In particular, they\u2019re more likely to go after older people. Why older people? Older people tend to be relatively well off and less likely to notice the symptoms of a spearfishing attempt. You should also be concerned if you&#8217;ve ever been involved in an ugly divorce or legal battle, or can easily think of people who have it in for you.<\/p>\n<p>As we\u2019ve mentioned in the past, it\u2019s imperative that you use a secure password manager like <a href=\"https:\/\/1password.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">1Password<\/a> or <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass<\/a> to create, store, and enter a strong, unique password for each of your online accounts. Plus, we strongly recommend using two-factor authentication\u2014where you have to enter a one-time code in addition to your password\u2014on all accounts that support it, particularly important ones like your email and banking accounts. But even if you do all that, you may be vulnerable to another tactic favored by spearfishers\u2014the cell phone SIM takeover.<\/p>\n<p>Here\u2019s how it works. Every cell phone, including every iPhone, has inside it a SIM card that gives it a phone number. Swap that SIM into a different phone and it will adopt the SIM card\u2019s number. The problem is that support reps at cellular carriers like AT&amp;T, Sprint, T-Mobile, and Verizon can also move your phone number from one SIM card to another. That makes it possible for you to lose your iPhone, buy a new one, and have your phone number associated with the new one. It also lets you port the phone number to a different carrier, if you wish to switch.<\/p>\n<p>All an attacker has to do is call your cellular provider, pretend to be you, say that they\u2019ve lost their iPhone, and ask to have the number ported to a new device (one they control). It\u2019s likely that the support person will ask a few simple questions to verify your identity, but a clever attacker will likely know your address and be able to learn details like your mother\u2019s maiden name, first-grade teacher\u2019s name, and favorite color, all thanks to Facebook and the social media and online sources. Criminals can acquire even information like your Social Security number through other data breaches.<\/p>\n<p>Once the attacker controls your cell phone number, they can try to reset the password on various accounts, receiving any verification codes that would normally have been texted to your phone. They\u2019ll probably focus on your email account first because, with control over it, they can reset passwords elsewhere even more easily. And once the attacker has access to your accounts, it\u2019s game over, and you\u2019ll be faced with the difficult and complex task of retaking control and mitigating damage.<\/p>\n<p>How can you protect yourself from such an attack? Whenever possible, it\u2019s better to generate authentication codes with an app such as<a href=\"https:\/\/1password.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> 1Password<\/a>,<a href=\"https:\/\/authy.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Authy<\/a>, or<a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> LastPass<\/a>. That removes some of your exposure, but for better or worse, your cell phone number is still the most basic form of identity for many things.<\/p>\n<p>The most important thing to do, then, is to set up an additional PIN or passcode that the carrier will ask for before making any changes to your account. You\u2019ll also have to provide it when logging in to your cellular account online. Such a PIN or passcode is different from a two-factor authentication code that changes continuously\u2014you set your PIN or passcode just like you do for your iPhone or ATM card. And, of course, make sure to store that PIN or passcode in your password manager alongside your other credentials so you don\u2019t forget it.<\/p>\n<p>Learn more about how each of the major carriers supports PINs and passcodes at the links below, and if your carrier isn\u2019t listed, call the company\u2019s support line:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.att.com\/support\/article\/wireless\/KM1049472\/\" target=\"_blank\" rel=\"noopener noreferrer\">AT&amp;T<\/a><\/li>\n<li><a href=\"https:\/\/www.sprint.com\/en\/support\/solutions\/account-and-billing\/update-your-pin-and-security-questions-on-sprint-com.html\" target=\"_blank\" rel=\"noopener noreferrer\">Sprint<\/a><\/li>\n<li><a href=\"https:\/\/www.t-mobile.com\/support\/account\/set-up-your-customer-pinpasscode\" target=\"_blank\" rel=\"noopener noreferrer\">T-Mobile<\/a><\/li>\n<li><a href=\"https:\/\/www.verizonwireless.com\/support\/account-pin-faqs\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<\/a><\/li>\n<\/ul>\n<p>Don\u2019t put this off\u2014if you don\u2019t already have a PIN or passcode on your cellular account, set it up right away.<\/p>\n<p>(Featured image by <a href=\"https:\/\/pixabay.com\/users\/geralt-9301\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4444450\" target=\"_blank\" rel=\"noopener noreferrer\">Gerd Altmann<\/a> from <a href=\"https:\/\/pixabay.com\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4444450\" target=\"_blank\" rel=\"noopener noreferrer\">Pixabay<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s shockingly easy for someone to take over your cell phone number. Once they\u2019ve done that, they can reset passwords on many of your online accounts. Read on to learn how to protect your cell number with a PIN or passcode.<\/p>\n","protected":false},"author":1,"featured_media":30453,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[66,39,71,52,124],"tags":[],"class_list":["post-30452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","category-blog","category-explainer","category-iphone","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6YLEm-7Va","jetpack-related-posts":[{"id":29189,"url":"https:\/\/www.computeradvantage.us\/v3\/use-macoss-guest-account-to-protect-your-privacy-from-temporary-users\/","url_meta":{"origin":30452,"position":0},"title":"Use macOS\u2019s Guest Account to Protect Your Privacy from Temporary Users","author":"computeradv","date":"July 11, 2019","format":false,"excerpt":"We\u2019ve all had it happen. \u201cCan I use your Mac for a minute to check my email?\u201d The answer can be \u201cYes,\u201d but to keep people from poking around on your Mac, have your visitor log in as Guest. To enable the Guest account, go to System Preferences > Users\u2026","rel":"","context":"In &quot;Apple Pros&quot;","block_context":{"text":"Apple Pros","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pros\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/07\/Guest-user-logout.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/07\/Guest-user-logout.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/07\/Guest-user-logout.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/07\/Guest-user-logout.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27464,"url":"http:\/\/www.computeradvantage.us\/v3\/how-to-split-restaurant-checks-with-apple-pay-cash\/","url_meta":{"origin":30452,"position":1},"title":"How to Split Restaurant Checks with Apple Pay Cash","author":"computeradv","date":"January 9, 2018","format":false,"excerpt":"You\u2019re out to lunch with tech-savvy friends, one of whom picks up the check and says, \u201cJust send me your share via Apple Pay Cash.\u201d Say what? Apple Pay Cash is Apple\u2019s new person-to-person payment service, designed to make it easy for individuals to send and receive money. It\u2019s perfect\u2026","rel":"","context":"In &quot;Apple Pay&quot;","block_context":{"text":"Apple Pay","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pay\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/01\/Apple-Pay-Cash-card.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/01\/Apple-Pay-Cash-card.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/01\/Apple-Pay-Cash-card.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/01\/Apple-Pay-Cash-card.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27709,"url":"http:\/\/www.computeradvantage.us\/v3\/heres-how-to-lock-down-your-facebook-privacy-settings-to-the-extent-possible\/","url_meta":{"origin":30452,"position":2},"title":"Here\u2019s How to Lock Down Your Facebook Privacy Settings\u2014to the Extent Possible","author":"computeradv","date":"April 6, 2018","format":false,"excerpt":"Facebook has dominated the news headlines of late, but not for good reasons. There were the 50 million Facebook profiles gathered for Cambridge Analytica and used in the 2016 presidential election. Facebook has long been scraping call and text message data from Android phones. And within the Facebook iOS app,\u2026","rel":"","context":"In &quot;Apple Pros&quot;","block_context":{"text":"Apple Pros","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pros\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Facebook-iOS-Privacy-Checkup.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26166,"url":"http:\/\/www.computeradvantage.us\/v3\/understanding-two-step-verification\/","url_meta":{"origin":30452,"position":3},"title":"Understanding Two-Step Verification","author":"computeradv","date":"December 28, 2016","format":false,"excerpt":"For your most important accounts, things like email, social media, cloud services, and banking, you should go beyond a password and protect them with two-step verification. Learn more on our blog.","rel":"","context":"In &quot;Article&quot;","block_context":{"text":"Article","link":"http:\/\/www.computeradvantage.us\/v3\/category\/article\/"},"img":{"alt_text":"What is Two-Step Verification?","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":26047,"url":"http:\/\/www.computeradvantage.us\/v3\/filter-mailboxes-in-mail-in-sierra-and-ios-10\/","url_meta":{"origin":30452,"position":4},"title":"Filter Mailboxes in Mail in Sierra and iOS 10","author":"computeradv","date":"November 15, 2016","format":false,"excerpt":"If you\u2019re overwhelmed by email, check out the new filter feature in the Mail app in both macOS 10.12 Sierra and iOS 10. It gives you preset filters that show matching messages and hide everything else so you can focus on a subset of messages. Read more on our blog.","rel":"","context":"In &quot;Article&quot;","block_context":{"text":"Article","link":"http:\/\/www.computeradvantage.us\/v3\/category\/article\/"},"img":{"alt_text":"Mail Filters","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/11\/Mail-filters-photo-1080x675.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/11\/Mail-filters-photo-1080x675.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/11\/Mail-filters-photo-1080x675.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/11\/Mail-filters-photo-1080x675.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/11\/Mail-filters-photo-1080x675.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":27704,"url":"http:\/\/www.computeradvantage.us\/v3\/apple-pay-is-faster-easier-more-secure-and-more-private-than-using-credit-cards\/","url_meta":{"origin":30452,"position":5},"title":"Apple Pay Is Faster, Easier, More Secure, and More Private Than Using Credit Cards","author":"computeradv","date":"April 24, 2018","format":false,"excerpt":"You\u2019ve probably heard of Apple Pay, but have you set it up so you can use it to pay for purchases at checkout? If not, give it a try, since it\u2019s one of those living-in-the future Apple technologies that feels like science fiction every time you use it. Simply put\u2026","rel":"","context":"In &quot;Apple Pay&quot;","block_context":{"text":"Apple Pay","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pay\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/04\/Apple-Pay-transactions.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/30452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/comments?post=30452"}],"version-history":[{"count":0,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/30452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media\/30453"}],"wp:attachment":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media?parent=30452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/categories?post=30452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/tags?post=30452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}