Most of us put a premium on our privacy, but as the News Corp/News of the World scandal in the U.K. has shown again, we cannot always assume that our privacy is secure. In fact, this current scandal is not all that exceptional. Paris Hilton was subjected to a similar violation about six years ago, and numerous celebrities (including Sienna Miller and Scarlett Johansson) have had their cellphones hacked - often in an attempt to garner some salacious bit of information or compromising photo that can go straight to newstands and websites. (For some ways to keep your information safe, check out Tips For Keeping Your Financial Data Safe Online.)


Not surprisingly, many people are wondering just how safe their technology is and whether or not someone may be listening to their phone messages. So, what steps can people take to minimize the risks that their own information can be stolen from them?

Use a Little Common Sense and Originality
According to a study by Daniel Amitay, and assuming that Apple (Nasdaq:AAPL) iPhone users are basically as smart and security-savvy as anybody else, I can dial my way into any iPhone user's voice mail and have about a 5% chance of accessing their voice mail simply by assuming that they used "1234" as their PIN number. Add "0000" and "2580" (which is straight down the middle of a keypad) and the odds jump to almost one-in-10.

Using such a predictable PIN makes listening in to your voicemail far too easy for someone inclined to mischief or theft. Likewise, it is unwise to use a PIN that can be easily figured out or guessed by a would-be hacker (including birthdays, Social Security numbers, anniversaries and so on). Said differently, don't ever use a number that could be figured out simply by going through your wallet or employee HR file. At the same time, consider changing the password every once in a while and/or using different passwords for different devices - yes, it is a headache, but if you are worried about someone using your voicemail against you, it is probably worth it.

Protect What Can Be Protected
Another surprisingly common way of accessing someone's voicemail without their permission is Caller ID spoofing. In simple terms, Caller ID spoofing allows someone to make a call under the guise of your number. As apparently many cellphone users have their voicemail set up to automatically recognize and grant access to their own number without a PIN, that gives the spoofer open entry to the voicemail (and sometimes other information as well).

Here too a relatively simple solution can save a lot of headaches - set up your account in such a way that a PIN is required at all times to access the voicemail system. (With a PIN become one of the preferred ways to keep your information secure, check out 5 ATM Scams That Can Break The Bank.)

Going a Step Beyond
There are, of course, more sophisticated ways of gaining access and entry to someone's cellphone and private information. As is the case with computers, malware on a cellphone can open doors to a hacker without the user ever knowing there was a problem. Along similar lines, a process known as "bluesnarfing" takes advantage of wireless connections to intercept data and information.

Once again, common sense prevails. Although it is impossible to prevent any and all bad code from reaching your devices (Adobe Acrobat, for instance, is more vulnerable than many people realize), do not open or download anything from an unrecognized source. Likewise, do not hunt around for free apps with the expectation that you can get a free lunch - the app may indeed not require you to hand over dollars, but the malware it could contain might make it very expensive in the long run.

Good News and Bad News
It is just an unfortunate reality of life that there are plenty of people willing to lie, cheat, steal in the name of money, power, or just malicious pleasure. While most people probably have no reason to fear that a reporter is trying to break into their voicemail, you never know when a jealous former partner, business rival, or garden variety miscreant may look to stir up trouble.

Luckily, there is quite a lot that most people can do for themselves. For starters, it is probably a good idea to keep as little embarrassing or incriminating information as possible. Though it seems quite a few would-be Hollywood starlets have not yet figured out the simple math that they can't be blackmailed with a tape if they don't make one in the first place, you don't have to make the same mistake. Likewise, anybody truly bothered by the sort of shenanigans conducted by News Corp would do well to pay attention to the behavior of the media sources they patronize. If people vote with their wallets and boycott media organizations that routinely violate people's privacy, there will be less incentive to do it.

The Bottom Line
Spending just a few moments setting up a voicemail system properly and using just a bit of imagination with PINs can pretty much squelch the vast majority of easy routes to your private information. While it is probably impossible to ever keep anything digital 100% secure, just these simple steps will likely convince most would-be thieves that accessing your information is more trouble than it's worth. (For some digital protection, check out 6 Security Apps You Should Know About.)

Related Articles
  1. Stock Analysis

    How Expensive Is Whole Foods, Really?

    Learn about Whole Foods Market, Inc., and discover how Whole Foods pricing actually compares to that of other grocery store operations.
  2. Stock Analysis

    4 Quick Service Restaurants for Your Portfolio

    Learn about the four quick service restaurants with attractive investment theses and growth prospects that can be valuable additions to your portfolio.
  3. Stock Analysis

    What Makes the 'Share a Coke' Campaign So Successful?

    Understand how Coca-Cola implemented the successful "Share a Coke" campaign. Learn about the top three reasons why the campaign was successful.
  4. Stock Analysis

    The 6 Best Dividend Stocks in the Consumer Staples Sector

    Learn about the top six companies that make an attractive investment for investors looking for stocks for dividend income investing.
  5. Mutual Funds & ETFs

    Top 3 Consumer Cyclical Mutual Funds

    Obtain information on, and analysis of, some of the best performing mutual funds that offer exposure to the consumer cyclicals sector.
  6. Investing

    Procter & Gamble Restructures, Sheds 100 Brands

    All businesses face adversity, and Procter & Gamble is no exception. We take a look at recent developments affecting this global giant.
  7. Professionals

    4 Ways Companies Can Relieve Workplace Stress

    Workplace stress can cost companies tons of money in lost productivity and absenteeism. Some of that is out of their control, but often they are the cause.
  8. Retirement

    Why Some Celebs Say 'No Inheritance for My Kids'

    To some of the super rich, inherited wealth is not the ultimate gift, it's a burden. Here's how their children—as well as charities—stand to benefit.
  9. Economics

    Explaining Manufacturer’s Suggested Retail Price

    The manufacturer’s suggested retail price (MSRP) is just what it describes – the price manufacturers recommend that retailers charge for their goods.
  10. Economics

    Calculating Cross Elasticity of Demand

    Cross elasticity of demand measures the quantity demanded of one good in response to a change in price of another.
  1. What does marginal utility tell us about consumer choice?

    In microeconomics, utility represents a way to relate the amount of goods consumed to the amount of happiness or satisfaction ... Read Full Answer >>
  2. What are some common ways product differentiation is achieved?

    There are many ways to achieve product differentiation, some more common than others. Horizontal Differentiation Horizontal ... Read Full Answer >>
  3. What role does the OEM (original equipment manufacturer) play in the finished product?

    Original equipment manufacturers (OEMs) do not typically play much of direct role in determining the finished product. However, ... Read Full Answer >>
  4. What is the difference between an OEM (original equipment manufacturer) and a VAR ...

    An original equipment manufacturer (OEM) is a company that manufactures a basic product or a component product, such as a ... Read Full Answer >>
  5. Is the retail sector also affected by seasonal factors?

    Generally speaking, the retail sector is highly seasonal. Almost invariably, sales in the retail sector are highest in the ... Read Full Answer >>
  6. What has the retail sector evolved to its current structure?

    Retail is the catch-all phrase for the sale of final goods to consumers; a retail transaction is considered an "end" and ... Read Full Answer >>

You May Also Like

Hot Definitions
  1. Section 1231 Property

    A tax term relating to depreciable business property that has been held for over a year. Section 1231 property includes buildings, ...
  2. Term Deposit

    A deposit held at a financial institution that has a fixed term, and guarantees return of principal.
  3. Zero-Sum Game

    A situation in which one person’s gain is equivalent to another’s loss, so that the net change in wealth or benefit is zero. ...
  4. Capitalization Rate

    The rate of return on a real estate investment property based on the income that the property is expected to generate.
  5. Gross Profit

    A company's total revenue (equivalent to total sales) minus the cost of goods sold. Gross profit is the profit a company ...
  6. Revenue

    The amount of money that a company actually receives during a specific period, including discounts and deductions for returned ...
Trading Center
You are using adblocking software

Want access to all of Investopedia? Add us to your “whitelist”
so you'll never miss a feature!