So you wake up early in the morning, pick up your android cell phone and starring you in the face is a flash message about the cost of your last SMS sent.
But you’ve been asleep all the while, and you never sent any SMS.
Tapping more into your new found entranced and creepy experience, you look at your other phone and see a SIM change notification alert for the phone that’s right next to you. And to scare you more, the IMEI number is included and you know it’s the IMEI number for your phone that’s right next to you.
You never changed your SIM, at least physically. So what could have happened?
For the casual mobile phone owner, this event might go unnoticed and probably would be waved off as just a glitch in the device.
But to the technically savvy here’s what might be running through your mind.
- Has someone installed a phone monitoring app (spy software) on your phone.
- Could some app on your phone have the ability to clone your SIM remotely?
- Was there a breach in your Google cloud account?
- Could it be Big Brother is now watching you?
But wait, it could just be a device glitch and there’s no need troubling your busy and active mind on such a distant possibility.
In spite of all these you know you have to use your phone for the things that have become a part of your daily life. You need to make and receive calls, look up the internet quickly, read articles, receive and respond to messages, check your email,… you get the picture already.
You cannot be bothered by this one-off event that’s almost impossible to fathom, so you continue to live your simple life and let none of this bother you.
But alas, it gets you. That cold chill you feel running down your spine when something you don’t want to believe is happening right in front of you - you’ve been locked out of your phone and all the accounts that encompass your entire online presence.
All of this is real but for the previous paragraph which is probably the worst of several likely conclusions to this.
But why am I bringing this up right now? Our lives are now almost fully replicated on our mobile devices. It only makes sense that you know as much about this device yourself or get a highly trusted entity to manage it’s security.
I know a few things we all can easily do to stay secure, like using difficult passwords, and changing passwords often.
But I would like to know what someone here would do if you were caught in the events above well before a lock-out even happens.