Cell phone dating warnings compare dating software
They can listen to your phone calls, download copies of text messages and numbers dialed, or even just silently activate the phone and use its microphone to monitor any nearby sounds or conversations.
And people who use Bluetooth short-range radio to connect a hands-free headset to their cell phone can be targeted by nearby scammers using Bluetooth to eavesdrop.
But it provides a lucrative channel for scammers and snoopers, who use the technology to steal our money or our identity, and even to track our movements and listen to our conversations.
Cell phones have changed our lives, but so have cell phone scams…
Alternatively, they can be mined for any personal and contact details stored on them.
Cell phone scam merchants may find it more difficult to scan for your phone ID but they can do potentially much more dangerous things — like listening in to your calls and downloading your phone usage records.
Then they program another phone with the same details and make calls at your expense.
Action: This is one area where the crime fighters have made progress, with new technology that makes it more difficult to scan for the number.
In this Scambusters issue, we identify 10 of the most common cell phone scams and the action you can take to avoid or reduce the risk of them.
Subscriber fraud is simply an offshoot of identity theft.