Contents:
Make sure you have updated security software including anti-malware and firewall functionality.
Update your software including your operating system, Internet browsers and plugins. Change your passwords: choose ones that are strong, memorable and unique for each device and account.
Do not re-use passwords for different accounts or devices. Going forward, once you have determined that your devices are clean, you may decide to encrypt data stored on your devices and communications sent over the network, such as via email or instant messaging. Keep in mind that SMS text messages are not encrypted. Most of us use our phones to access a variety of online resources; this may include online banking, social media, online review sites, etc.
Many sites will allow you to de-authorize devices: if that option is available, remove the compromised devices. Now is a good time to improve security for every account you have accessed on your phone and any other affected devices. Delete accounts you no longer use. Once again, change your passwords, and make sure your choices are strong, memorable and unique. You should also set up login notification, so that you will be alerted if unauthorized devices try to get into your accounts. As it can be hard to know at what point tracking began, it is safer to assume that backups are compromised, especially if the backup was accessible to a device you suspect has been tracked.
Learn how and when to remove these template messages. This article needs additional citations for verification.
Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. You may improve this article , discuss the issue on the talk page , or create a new article , as appropriate. October Learn how and when to remove this template message. This section does not cite any sources.
Please help improve this section by adding citations to reliable sources. Main article: Stingray use in United States law enforcement. United States portal Politics portal. Retrieved 23 January Retrieved CBC News. American Civil Liberties Union. Retrieved 29 September New York Times. The Bristol Cable.
Ars Technica UK. Ars Technica. Retrieved August 22, The Wall Street Journal.
Retrieved Aug 22, Archived from the original PDF on August 29, Retrieved August 29, Archived from the original on August 29, James L. Thomas, No.
FamiSafe Location. Where's My Droid.
Albany Law School: 11— For a cell-site simulator operator to induce a cell phone to camp on his or her cell-site simulator CSS , all he or she needs to do is become the strongest cell in the target cellphones preferred network. We compare that with the information provided from Verizon to ensure that we are looking at the correct handset. One Man Sues to Find Out".
Mother Jones. Archived from the original on Retrieved Aug 24, Martinez, who works in the software industry, first wondered about police surveilling his phone in while he was attending the NATO protests. Sagacious News Network. Electronic Frontier Foundation. A Few Thoughts on Cryptographic Engineering. Retrieved Aug 29, Schneier on Security. Associated Press.
LA Weekly. Archived from the original on 9 April Retrieved 4 April Retrieved 25 March Palm Bay Police Department simply borrowed a stingray directly from its manufacturer, the Harris Corporation—located down the road in Melbourne, Florida—to respond to a bomb threat at a school, absent any judicial oversight.
Retrieved 24 March Florida Center for Investigative Reporting. American Civil Liberties Union, n. Public Intelligence. Retrieved February 18, The Intercept. Washington Post. Edmonton Journal. That way if someone finds or has your device, all they have to do is press the Call Me button on the screen to call the specified phone number.
You can also choose to play a sound or erase the phone remotely if you have no other choice.
Remember that if you track your phone using a browser, you will have to log in to your Google account. If you leave your account logged in, anyone with access to that computer will be able to track your smartphone. Google Play. You will need a Samsung account to use this.
With Remote unlock Samsung stores your PIN, password, or pattern, so you can unlock it even if you forget, but it can also be used to control your phone remotely.