Tag Archives: Mobile

Tip #14 First It Was Phishing, Now It’s Smishing

Example of a phishing text and how the consumer handled it using Twitter.

Example of a phishing text and how the consumer handled it using Twitter.

On another (very important) note, another phishing technique lures consumers by using text messages containing URLs and phone numbers. Such a message  usually asks for one’s immediate attention, and requires one to respond or click on the URL.

Oftentimes, the message will come from a “5000” number instead of an actual phone number. This indicates the text message was sent via email to one’s cell phone, rather than from another cell phone.

So don’t turn into another stolen cell phone statistic. Or a consumer who’s been tricked. Regardless of what you’re doing, make sure your cell phone is secure and keep an eye out for odd, seemingly “phishy” text messages.

If you think you’ve received a phishing message, contact IT Customer Care immediately: 718-817-3999 or HelpIT@fordham.edu.

Read more about cell phone safety in Tip #11.


Tip #11 Cell Phone Theft

Cell Phone Theft

Image: “Numbers of stolen cell phones growing fast around the country,” The Droid Guy



Thousands of cell phones are stolen and infiltrated every month. Even some Fordham students have been victims of this crime. Once a cell phone is hacked, the thief has access to a huge amount of personal information. So take heed! Follow these practical measures to avoid becoming a target.

  • Use your phone’s security lock code to create a unique pass code.
  • Disable bluetooth on your phone if not in use.
  • Make sure to only unlock the phone when you need to use it.
  • Do not lend your mobile phone to strangers on the pretext of an emergency situation. They may slip away with it before you know it.
  • Immediately report a lost or stolen phone to your service provider and to the police, and insist on an acknowledgment.
  • If you are a member of the Fordham community, report your theft to IT Customer Care at 718-817-3999 or HelpIT@fordham.edu
  • When not in use, keep your phone out of sight—in your pocket, backpack, or handbag.
  • Do not, by any means, leave your cell phone unattended.
  • Avoid disclosing the relationship between you and the people in your contact list. Avoid using names like “Home,” “Honey,”Hubby,” “Mom,” or “Dad.” Criminals might attempt to contact these individuals to extract more of your personal information.

Make sure your phone is secure. And if you get some weird-sounding texts from a friend or family member, get in touch with them in some other way before you respond.

For more information about cell phone theft, read “How to Deter Smartphone Thefts and Protect Your Data” from CTIA, the Wireless Association.


Don’t have a passcode on your phone? You really, really should?

“We have so much information on our devices that we want to protect…  We have to protect them… The most common way of course is to setup a passcode. Simple 4 digit passcode or a more complex one if you want…  Unfortunately, some people find that’s too cumbersome and they don’t set it up.  In fact in our research, about half of smartphone customers do not set up a passcode on the device, and they really, really should.”
-Phil Schiller

Apple Special Event. September 10, 2013