Most of us put a premium on our privacy, but as the News Corp/News of the World scandal in the U.K. has shown again, we cannot always assume that our privacy is secure. In fact, this current scandal is not all that exceptional. Paris Hilton was subjected to a similar violation about six years ago, and numerous celebrities (including Sienna Miller and Scarlett Johansson) have had their cellphones hacked - often in an attempt to garner some salacious bit of information or compromising photo that can go straight to newstands and websites. (For some ways to keep your information safe, check out Tips For Keeping Your Financial Data Safe Online.)

TUTORIAL: Banking

Not surprisingly, many people are wondering just how safe their technology is and whether or not someone may be listening to their phone messages. So, what steps can people take to minimize the risks that their own information can be stolen from them?

Use a Little Common Sense and Originality
According to a study by Daniel Amitay, and assuming that Apple (Nasdaq:AAPL) iPhone users are basically as smart and security-savvy as anybody else, I can dial my way into any iPhone user's voice mail and have about a 5% chance of accessing their voice mail simply by assuming that they used "1234" as their PIN number. Add "0000" and "2580" (which is straight down the middle of a keypad) and the odds jump to almost one-in-10.

Using such a predictable PIN makes listening in to your voicemail far too easy for someone inclined to mischief or theft. Likewise, it is unwise to use a PIN that can be easily figured out or guessed by a would-be hacker (including birthdays, Social Security numbers, anniversaries and so on). Said differently, don't ever use a number that could be figured out simply by going through your wallet or employee HR file. At the same time, consider changing the password every once in a while and/or using different passwords for different devices - yes, it is a headache, but if you are worried about someone using your voicemail against you, it is probably worth it.

Protect What Can Be Protected
Another surprisingly common way of accessing someone's voicemail without their permission is Caller ID spoofing. In simple terms, Caller ID spoofing allows someone to make a call under the guise of your number. As apparently many cellphone users have their voicemail set up to automatically recognize and grant access to their own number without a PIN, that gives the spoofer open entry to the voicemail (and sometimes other information as well).

Here too a relatively simple solution can save a lot of headaches - set up your account in such a way that a PIN is required at all times to access the voicemail system. (With a PIN become one of the preferred ways to keep your information secure, check out 5 ATM Scams That Can Break The Bank.)

Going a Step Beyond
There are, of course, more sophisticated ways of gaining access and entry to someone's cellphone and private information. As is the case with computers, malware on a cellphone can open doors to a hacker without the user ever knowing there was a problem. Along similar lines, a process known as "bluesnarfing" takes advantage of wireless connections to intercept data and information.

Once again, common sense prevails. Although it is impossible to prevent any and all bad code from reaching your devices (Adobe Acrobat, for instance, is more vulnerable than many people realize), do not open or download anything from an unrecognized source. Likewise, do not hunt around for free apps with the expectation that you can get a free lunch - the app may indeed not require you to hand over dollars, but the malware it could contain might make it very expensive in the long run.

Good News and Bad News
It is just an unfortunate reality of life that there are plenty of people willing to lie, cheat, steal in the name of money, power, or just malicious pleasure. While most people probably have no reason to fear that a reporter is trying to break into their voicemail, you never know when a jealous former partner, business rival, or garden variety miscreant may look to stir up trouble.

Luckily, there is quite a lot that most people can do for themselves. For starters, it is probably a good idea to keep as little embarrassing or incriminating information as possible. Though it seems quite a few would-be Hollywood starlets have not yet figured out the simple math that they can't be blackmailed with a tape if they don't make one in the first place, you don't have to make the same mistake. Likewise, anybody truly bothered by the sort of shenanigans conducted by News Corp would do well to pay attention to the behavior of the media sources they patronize. If people vote with their wallets and boycott media organizations that routinely violate people's privacy, there will be less incentive to do it.

The Bottom Line
Spending just a few moments setting up a voicemail system properly and using just a bit of imagination with PINs can pretty much squelch the vast majority of easy routes to your private information. While it is probably impossible to ever keep anything digital 100% secure, just these simple steps will likely convince most would-be thieves that accessing your information is more trouble than it's worth. (For some digital protection, check out 6 Security Apps You Should Know About.)

Related Articles
  1. Investing News

    Super Savings for Your Super Bowl Party? Bet on It

    Prices for wings, avocados and TVs are all coming down, which will make your Super Bowl 50 festivities less costly.
  2. Retirement

    Ipsy Review: Is It Worth It?

    Discover the history of ipsy, how much packages cost, options available for membership, major competition and what the future looks like for the company.
  3. Stock Analysis

    The Biggest Risks of Investing in Johnson & Johnson Stock (JNJ)

    Learn the largest risks to investing in Johnson & Johnson through fundamental analysis and other potential risks. Also discover how JNJ compares to its peers.
  4. Budgeting

    Craft Coffee Review: Is It Worth It?

    Learn more about one of the first and most flexible specialty-grade coffee subscription services on the market, a perfect fit for any coffee lover.
  5. Budgeting

    Plated Review, Is It Worth It?

    Take a closer look at the ready-to-cook meal service, Plated, and learn how the company can help you take the hassle out of home cooking.
  6. Investing

    Barbie's Body Wasn't the Problem (opinion)

    Barbie's body type wasn't what killed sales, argues Angela Travillian. Other factors were at play.
  7. Stock Analysis

    Financing iPhones: The Next Apple Move (AAPL)

    Look at how Apple's plan to finance the purchase of new unlocked iPhones will impact choices of carriers as well as profits for both Apple and the carriers.
  8. Stock Analysis

    From Shampoo to Soup, Unilever Has it Covered (UL)

    Open your fridge, your pantry, your bathroom cabinet and you'll find the Unilever logo. Here's how the company got so enormous.
  9. Stock Analysis

    Fitbit Inc: How It's Fared Since Its 2015 IPO (FIT)

    Read about Fitbit and its position in the wearable fitness device market, and learn more about how it has performed since its June 2015 IPO.
  10. Stock Analysis

    JNJ vs. PG: Which is the Better Bet Right Now?

    These two stocks are long-term powerhouses, but one has the edge over the other right now.
RELATED FAQS
  1. How does a cost-of-living adjustment (COLA) affect my salary?

    Some companies build salary adjustments into their compensation structures to offset the effects of inflation on their employees. ... Read Full Answer >>
  2. Where can you buy NetSpend reload packs?

    You can only purchase NetSpend reload packs at Giant Eagle, Albertsons, Roundy's and Pathmark supermarkets. NetSpend cards ... Read Full Answer >>
  3. What does marginal utility tell us about consumer choice?

    In microeconomics, utility represents a way to relate the amount of goods consumed to the amount of happiness or satisfaction ... Read Full Answer >>
  4. What are some common ways product differentiation is achieved?

    There are many ways to achieve product differentiation, some more common than others. Horizontal Differentiation Horizontal ... Read Full Answer >>
  5. What role does the OEM (original equipment manufacturer) play in the finished product?

    Original equipment manufacturers (OEMs) do not typically play much of direct role in determining the finished product. However, ... Read Full Answer >>
  6. What is the difference between an OEM (original equipment manufacturer) and a VAR ...

    An original equipment manufacturer (OEM) is a company that manufactures a basic product or a component product, such as a ... Read Full Answer >>
Hot Definitions
  1. Discouraged Worker

    A person who is eligible for employment and is able to work, but is currently unemployed and has not attempted to find employment ...
  2. Ponzimonium

    After Bernard Madoff's $65 billion Ponzi scheme was revealed, many new (smaller-scale) Ponzi schemers became exposed. Ponzimonium ...
  3. Quarterly Earnings Report

    A quarterly filing made by public companies to report their performance. Included in earnings reports are items such as net ...
  4. Dark Pool Liquidity

    The trading volume created by institutional orders that are unavailable to the public. The bulk of dark pool liquidity is ...
  5. Godfather Offer

    An irrefutable takeover offer made to a target company by an acquiring company. Typically, the acquisition price's premium ...
Trading Center