Did your cell phone get stolen? Learn how to protect access to banking applications | technology

Did your cell phone get stolen?  Learn how to protect access to banking applications |  technology

In one month of operation of the “Celular Seguro” application, more than 12 thousand blocking alerts were recorded

Mobile phone robberies and theft to access banking apps installed on devices and take money from victims have become common in Brazil.

In the face of the growing problem, the federal government created the Celular Seguro programme, which aims to prevent criminals from accessing apps blocked by partner banks – learn how to sign up.

G1 listened to the experts for the combine Tips for keeping banking apps and smartphones safeIn addition to instructions on what to do in the event of theft, burglary and incorrect bank transfers. Check it out below.

To protect yourself from this type of fraud, it is necessary Pay close attention to the security settings of your cell phone and apps. This is because the device stores a lot of information that could allow criminals to recover or change passwords using, for example, data stored in emails, social networks or other tools available on the smartphone.

When a device is stolen while it is unlocked, it becomes easier for criminals to violate certain security measures or reset access passwords, explains the president of the Brazilian Data Protection Association (ABPDados), Renato Obis Bloom.

“In theory, if a cell phone is locked with a relatively complex password and with an updated operating system, this in itself would prevent or make improper access very difficult. But if a criminal can access the cell phone, they will also be able to “Access to a person's SMS messages, often to their email and they may be able to change passwords or receive double authentication to access applications.”

  • Always use a Set up a home screen lock From your cell phone and choose the fastest auto-blocking option (30 seconds, for example);
  • Keep Update the cell phone operating system And always check for pending app updates;
  • Never use the “Remember/Save Password” feature. In browsers and websites;
  • Never write down passwords in notebooks and emails WhatsApp messages or other places on your cell phone;
  • Try using Strong passwords Do not duplicate your bank access code for use in other apps, emails or shopping sites;
  • Use additional security tools such as Biometrics, facial recognition and two-factor authentication (second password) In applications and also in email;
  • In device settings, Disable notifications and functions that are displayed independently of the home screen lock;
  • Put The Personal Identification Number (PIN) is also located on the SIM card of the cell phone. This way, in case the device restarts, it will be necessary to enter the personal code to use the line and send and receive SMS.
See also  Biden says COP26 should be starting point in fighting climate

What to do if your cell phone is stolen?

The first step to take in case of theft or lossWhether the device is unlocked or not It is wiping data remotely. This can be done by accessing pages created by Apple (in the case of iPhone) and Google (for Android phones) to locate lost devices.

Google control screen allows cell phone tracking and data deletion – Image: Reproduction

Only after deleting the data, notify the operator The device has been stolen, so your line is blocked. If you do this before deleting the data and the line is disconnected and your smartphone is left offline, the command to erase the device will not arrive..

Consumer protection authorities also recommend contacting the bank to block the application and account, either via Celular Seguro or directly with the company, and a police report should be registered.

In short, the victim must:

  1. Access pages created by Apple (in the case of iPhone) and Google (for Android mobile phones). Wipe all contents of the device remotely.
  2. Notify the bank immediately So that security measures are adopted, such as blocking the bank application, the access password, and the account itself;
  3. Notify your telephone operator For instant blocking of the chip and IMEI (International Mobile Equipment Identity); Once blocked, the device will be prevented from connecting to mobile networks;
  4. Change passwords and authentication settings Accounts and applications installed on the smartphone, including social networks and email;
  5. Access the tool registration For the central bank To verify that your data is not being used to open accounts or loans.
See also  Can a Personalized Advantage Loan Expire? Check the Supreme Court's decision

Idec says the victim can seek compensation from the bank

This was stated by the Institute for Consumer Protection (Idec). It is the responsibility of banks to ensure the security of financial applications and operations He explains that victims whose accounts have been deleted due to this type of fraud have the right to demand compensation for any losses.

“The consumer can and should contact the bank to obtain payment, especially since the bank has all the technological equipment to identify successive movements or movements of large value that fall outside the scope of the person, and is able to prevent this type of transaction,” he says. Idec's lawyer Michele Roberto de Souza.

According to him, It is up to the bank to prove that there has been no security breach and that the consumer is solely responsible.

Consumers who have a problem with the bank in this type of situation can also file a complaint against the financial institution at Central Bank website And in Brocon.

“There is always the possibility of filing a lawsuit in a private small claims court. With a value of up to 20 minimum wages, a person does not need to be accompanied by a lawyer, and can be contacted personally,” recalls Souza.

What to do if your cell phone is stolen

Video: Learn what to do if your cell phone is stolen

Understand what “dumb cell phones” are.

You May Also Like

About the Author: Camelia Kirk

"Friendly zombie guru. Avid pop culture scholar. Freelance travel geek. Wannabe troublemaker. Coffee specialist."

Leave a Reply

Your email address will not be published. Required fields are marked *