Most of us put a premium on our privacy, but as the News Corp/News of the World scandal in the U.K. has shown again, we cannot always assume that our privacy is secure. In fact, this current scandal is not all that exceptional. Paris Hilton was subjected to a similar violation about six years ago, and numerous celebrities (including Sienna Miller and Scarlett Johansson) have had their cellphones hacked - often in an attempt to garner some salacious bit of information or compromising photo that can go straight to newstands and websites. (For some ways to keep your information safe, check out Tips For Keeping Your Financial Data Safe Online.)

TUTORIAL: Banking

Not surprisingly, many people are wondering just how safe their technology is and whether or not someone may be listening to their phone messages. So, what steps can people take to minimize the risks that their own information can be stolen from them?

Use a Little Common Sense and Originality
According to a study by Daniel Amitay, and assuming that Apple (Nasdaq:AAPL) iPhone users are basically as smart and security-savvy as anybody else, I can dial my way into any iPhone user's voice mail and have about a 5% chance of accessing their voice mail simply by assuming that they used "1234" as their PIN number. Add "0000" and "2580" (which is straight down the middle of a keypad) and the odds jump to almost one-in-10.

Using such a predictable PIN makes listening in to your voicemail far too easy for someone inclined to mischief or theft. Likewise, it is unwise to use a PIN that can be easily figured out or guessed by a would-be hacker (including birthdays, Social Security numbers, anniversaries and so on). Said differently, don't ever use a number that could be figured out simply by going through your wallet or employee HR file. At the same time, consider changing the password every once in a while and/or using different passwords for different devices - yes, it is a headache, but if you are worried about someone using your voicemail against you, it is probably worth it.

Protect What Can Be Protected
Another surprisingly common way of accessing someone's voicemail without their permission is Caller ID spoofing. In simple terms, Caller ID spoofing allows someone to make a call under the guise of your number. As apparently many cellphone users have their voicemail set up to automatically recognize and grant access to their own number without a PIN, that gives the spoofer open entry to the voicemail (and sometimes other information as well).

Here too a relatively simple solution can save a lot of headaches - set up your account in such a way that a PIN is required at all times to access the voicemail system. (With a PIN become one of the preferred ways to keep your information secure, check out 5 ATM Scams That Can Break The Bank.)

Going a Step Beyond
There are, of course, more sophisticated ways of gaining access and entry to someone's cellphone and private information. As is the case with computers, malware on a cellphone can open doors to a hacker without the user ever knowing there was a problem. Along similar lines, a process known as "bluesnarfing" takes advantage of wireless connections to intercept data and information.

Once again, common sense prevails. Although it is impossible to prevent any and all bad code from reaching your devices (Adobe Acrobat, for instance, is more vulnerable than many people realize), do not open or download anything from an unrecognized source. Likewise, do not hunt around for free apps with the expectation that you can get a free lunch - the app may indeed not require you to hand over dollars, but the malware it could contain might make it very expensive in the long run.

Good News and Bad News
It is just an unfortunate reality of life that there are plenty of people willing to lie, cheat, steal in the name of money, power, or just malicious pleasure. While most people probably have no reason to fear that a reporter is trying to break into their voicemail, you never know when a jealous former partner, business rival, or garden variety miscreant may look to stir up trouble.

Luckily, there is quite a lot that most people can do for themselves. For starters, it is probably a good idea to keep as little embarrassing or incriminating information as possible. Though it seems quite a few would-be Hollywood starlets have not yet figured out the simple math that they can't be blackmailed with a tape if they don't make one in the first place, you don't have to make the same mistake. Likewise, anybody truly bothered by the sort of shenanigans conducted by News Corp would do well to pay attention to the behavior of the media sources they patronize. If people vote with their wallets and boycott media organizations that routinely violate people's privacy, there will be less incentive to do it.

The Bottom Line
Spending just a few moments setting up a voicemail system properly and using just a bit of imagination with PINs can pretty much squelch the vast majority of easy routes to your private information. While it is probably impossible to ever keep anything digital 100% secure, just these simple steps will likely convince most would-be thieves that accessing your information is more trouble than it's worth. (For some digital protection, check out 6 Security Apps You Should Know About.)

Related Articles
  1. Stock Analysis

    JCPenney's Path To Profitability (JCP)

    Learn about what J.C. Penney's management team has been doing to profitably grow its business as the company recovers from years of revenue declines.
  2. Stock Analysis

    3 Chip Makers Betting on the Drone Industry in 2016 (INTC, QCOM)

    Find out which of the big chip makers are betting heavily on a burgeoning consumer drone market that could be the next big wave in consumer electronics.
  3. Home & Auto

    The Latest Airbag Recalls: What to Do

    The latest warnings are from Honda/Acura and Dodge. How to look up your car – and what to do if you find it on the recall list.
  4. Economics

    What is a Complement?

    A good or service that’s used in conjunction with another good or service is a complement.
  5. Investing News

    Super Savings for Your Super Bowl Party? Bet on It

    Prices for wings, avocados and TVs are all coming down, which will make your Super Bowl 50 festivities less costly.
  6. Retirement

    Ipsy Review: Is It Worth It?

    Discover the history of ipsy, how much packages cost, options available for membership, major competition and what the future looks like for the company.
  7. Stock Analysis

    The Biggest Risks of Investing in Johnson & Johnson Stock (JNJ)

    Learn the largest risks to investing in Johnson & Johnson through fundamental analysis and other potential risks. Also discover how JNJ compares to its peers.
  8. Budgeting

    Craft Coffee Review: Is It Worth It?

    Learn more about one of the first and most flexible specialty-grade coffee subscription services on the market, a perfect fit for any coffee lover.
  9. Budgeting

    Plated Review, Is It Worth It?

    Take a closer look at the ready-to-cook meal service, Plated, and learn how the company can help you take the hassle out of home cooking.
  10. Investing

    Barbie's Body Wasn't the Problem (opinion)

    Barbie's body type wasn't what killed sales, argues Angela Travillian. Other factors were at play.
RELATED FAQS
  1. How does a cost-of-living adjustment (COLA) affect my salary?

    Some companies build salary adjustments into their compensation structures to offset the effects of inflation on their employees. ... Read Full Answer >>
  2. Where can you buy NetSpend reload packs?

    You can only purchase NetSpend reload packs at Giant Eagle, Albertsons, Roundy's and Pathmark supermarkets. NetSpend cards ... Read Full Answer >>
  3. What does marginal utility tell us about consumer choice?

    In microeconomics, utility represents a way to relate the amount of goods consumed to the amount of happiness or satisfaction ... Read Full Answer >>
  4. What are some common ways product differentiation is achieved?

    There are many ways to achieve product differentiation, some more common than others. Horizontal Differentiation Horizontal ... Read Full Answer >>
  5. What role does the OEM (original equipment manufacturer) play in the finished product?

    Original equipment manufacturers (OEMs) do not typically play much of direct role in determining the finished product. However, ... Read Full Answer >>
  6. What is the difference between an OEM (original equipment manufacturer) and a VAR ...

    An original equipment manufacturer (OEM) is a company that manufactures a basic product or a component product, such as a ... Read Full Answer >>
Hot Definitions
  1. Inverted Yield Curve

    An interest rate environment in which long-term debt instruments have a lower yield than short-term debt instruments of the ...
  2. Socially Responsible Investment - SRI

    An investment that is considered socially responsible because of the nature of the business the company conducts. Common ...
  3. Presidential Election Cycle (Theory)

    A theory developed by Yale Hirsch that states that U.S. stock markets are weakest in the year following the election of a ...
  4. Super Bowl Indicator

    An indicator based on the belief that a Super Bowl win for a team from the old AFL (AFC division) foretells a decline in ...
  5. Flight To Quality

    The action of investors moving their capital away from riskier investments to the safest possible investment vehicles. This ...
Trading Center