Connect with us

Technology

Cellphone nightmare leads to ported numbers, identity theft and fight for recovery

Published

on

Cellphone nightmare leads to ported numbers, identity theft and fight for recovery

Imagine this scenario: You’re going about your day, and suddenly you can’t make calls or send texts. Little did you know, but you’ve become the latest victim of a ported phone number scam, a devious tactic in which hackers hijack your phone number to take over your identity.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

A woman talking on her cellphone (Kurt “CyberGuy” Knutsson)

What is the ported phone number scam?

A CyberGuy Report subscriber contacted us to share that they’ve been a victim of a ported phone number scam. Also known as a SIM swapping or port-out scam, this is when a hacker steals a victim’s phone number to gain control over it. Once they have control, they use that number to commit identity theft by gaining access to their other accounts.

Cellphone nightmare leads to ported numbers, identity theft, and fight for recovery

A man typing on his cellphone (Kurt “CyberGuy” Knutsson)

MORE: TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF

Advertisement

How hackers hijack your identity via ported phone number scam

Though there are several ways they may go about porting a victim’s phone number, one of the most common ways is to use your stolen personal information in order to call your mobile provider, pass their security checks, and once they are through, they request that the number be ported to a new carrier or transferred to a new SIM card that they have sent to them.

Once the scammer successfully ports the phone number, they receive all the calls and messages intended for the victim. This access allows them to bypass security measures like two-factor authentication (2FA) that sends a code via text message to the phone number associated with an account.

With this power, the scammer can use this method to reset passwords and gain unauthorized access to your personal accounts, whether it be a social media account, online bank account or another account. Once they continue to gain access to your other various accounts, there’s no telling what else they can do.

Cellphone nightmare leads to ported numbers, identity theft, and fight for recovery

Image of bank cards (Kurt “CyberGuy” Knutsson)

MORE: WHAT TO DO WHEN YOUR OWN NUMBER APPEARS TO RING YOUR HOME PHONE

How to protect yourself from ported number scams in the future

If you manage to pull yourself out of identity theft once, chances are you’ll do whatever it takes to ensure you don’t end up in that position again. All this being said, it’s important not to blame yourself. Scammers are very sophisticated, and they are always looking for ways to stay one step ahead of their victims. So, do what you can to stay one step ahead of them:

Advertisement

1) Secure your phone number: If you can take any extra measures to keep your phone number safe, don’t think twice. For instance, add a secondary security code or PIN on your Android or iPhone.

2) Enable two-factor authentication (2FA): This adds an extra layer of security to all of your accounts.

3) Secure your email account: Just as you would for your phone, add extra verification methods when possible and notifications if someone logs into your account from another device.

4) Secure your other accounts: Take the same measures for your other accounts, like your bank or social media accounts. For instance, ask to receive notifications every time there is activity on the account, so you can monitor it and quickly determine if that activity was made by you or someone else.

5) Limit who you give your number to: Be cautious about who you share your phone number with.

Advertisement

6) Consider using a secondary or burner number for online use: This can help protect your primary phone number.

7) Change your password: Use a strong password that’s more than 12 characters (if applicable) and a mix of numbers and upper and lowercase letters. Consider using a password manager to generate and store complex passwords.

8) Be cautious with emails: Don’t open attachments or click links in emails unless you are positive that they are safe. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

How do you know if your identity has been stolen?

You might become aware of a ported phone number scam when your mobile service is unexpectedly interrupted because your number has been ported to a different carrier’s SIM card. Such incidents could escalate into full-blown identity theft.

A scammer might exploit one-time passwords (OTPs) – unique codes sent to your phone for security verification – to unlawfully access all the data on your device, including credit card details. This breach could result in you being barred from your own accounts.

Advertisement

When a scammer successfully ports your phone number to a different carrier’s SIM card, they can receive these OTPs intended for you. This allows them to bypass security measures and gain unauthorized access to your accounts, such as email, banking and social media, potentially leading to identity theft.

Regaining control of your phone number and securing any accounts that were compromised is often a difficult and lengthy process. This underscores the need for you to be proactive, protect your personal information and stay alert for any unusual activities on your accounts.

Cellphone nightmare leads to ported numbers, identity theft, and fight for recovery

Woman holding bank card (Kurt “CyberGuy” Knutsson)

MORE: WHY YOU NEED AN IDENTITY PROTECTION PIN THIS TAX SEASON

What to do if a scammer takes your identity

If you discover that your identity has been stolen – whether through this phone port scam or another type of identity theft – there are a few steps you should take.

Report the theft to your local police department: Some businesses may require a police report to remove fraudulent debts from your account.

Advertisement

Visit IdentityTheft.gov: This website helps you recover from identity theft. You can answer questions about what happened to you, get your Identity Theft Report and create a recovery plan just for you.

Contact your credit card companies: Inform them about the situation and follow their procedures for securing your accounts. You may need to close your current accounts and open new ones.

Check your credit reports: Look for any accounts or charges you did not make and report them.

Place a fraud alert on your credit reports: This makes it hard for someone else to open new accounts in your name.

Use an identity theft protection service: Identity Theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Advertisement
Cellphone nightmare leads to ported numbers, identity theft, and fight for recovery

Smartphone with sim card (Kurt “CyberGuy” Knutsson)

MORE: HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMERS

Kurt’s key takeaways

Unfortunately, once a scammer steals your identity, it can be very arduous to get it back. That being said, there are steps you can take to reclaim your identity while ensuring that your number doesn’t get ported again in the future.

What measures do you think mobile carriers should implement to prevent ported phone number scams? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Elon Musk is being sued by the feds over the way he bought Twitter

Published

on

Elon Musk is being sued by the feds over the way he bought Twitter

Elon Musk’s acquisition of Twitter has resulted in a federal lawsuit by the Securities and Exchange Commission alleging that he broke securities laws with a late disclosure, and saved $150 million in the process.

Before Musk agreed to buy Twitter for $44 billion, before he tried to back out of that deal, before he was forced to go through with it, and before he changed its name to X, he started by acquiring a substantial stake in the company but didn’t reveal that fact until weeks later.

The only problem, as the SEC pointed out then, is that by the time he disclosed that stake, it was outside the agency’s required 10-day window. They claim that he should’ve filed his paperwork by March 24th, 2022, instead of when he actually did, on April 4th (and then again on April 5th). During that period, they say he purchased more than $500 million in shares of the company.

However, with only a few days left before the Trump administration takes over and installs a new head of the SEC (along with Elon Musk reportedly snagging an office in the White House complex), it’s unclear how far the lawsuit will go.

The SEC claims Musk cost investors at least $150 million due to the late disclosure and that he harmed any investors who sold stock between March 25th, 2022, and April 1st, 2022. Its lawsuit is seeking the money Elon made as a result of holding off on the disclosure, as well as a civil penalty and other punishments.

Advertisement
Continue Reading

Technology

First 15 things to do or try first when you get a new iPhone

Published

on

First 15 things to do or try first when you get a new iPhone

Apple announces new iPhones every year, and I often wonder if that’s truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12. 

However, in 2024, Apple introduced a range of interesting features with the iPhone 16. While these features don’t necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make the iPhone 16 a worthy purchase if you’re using an older model or an Android phone.

If you’ve already made the purchase, or if you’ve bought another iPhone, here are the first things you should do and try when you fire up your new phone. (First things to do if you got a new Android)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Advertisement

iPhone packaging (Kurt “CyberGuy” Knutsson)

1) How to update your software to iOS 18.2 or later

First things first, let’s update your software to iOS 18.2 or later:

  • Open Settings
  • Tap General
  • Select Software Update
  • Tap Update Now
  • Enter your passcode and agree to terms
  • Wait for the installation to complete
First 15 things to do or try first when you get a new iPhone

Steps to update your iPhone’s software (Kurt “CyberGuy” Knutsson)

HOW TO PROTECT YOUR IPHONE, IPAD FROM MALWARE

2) How to add a passcode or biometric authentication

To add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:

Setting up a passcode

  • Open Settings on your iPhone
  • Tap on Face ID & Passcode (for iPhone X and later) or Touch ID & Passcode (for earlier models)
  • Tap Turn Passcode On
  • Enter a six-digit passcode. If you prefer, tap Passcode Options to choose a four-digit numeric code, a custom numeric code or a custom alphanumeric code.
  • Re-enter your passcode to confirm it and activate it

Setting up biometric authentication

For Face ID:

  • Go to Settings
  • Tap on Face ID & Passcode
  • Enter your passcode, if prompted
  • Tap on Set Up Face ID
  • Hold your device in portrait orientation and position your face in front of the device, then tap Get Started.
  • Follow the on-screen instructions to complete the setup
First 15 things to do or try first when you get a new iPhone

Face ID & Passcode on iPhone (Kurt “CyberGuy” Knutsson)

IS IT TIME FOR ME TO UPGRADE TO NEW IPHONE?

Advertisement

3) Setting up Apple ID and iCloud

Create or sign in to Apple ID:

  • Open the Settings app
  • Tap on Sign in to your iPhone at the top
  • If you don’t have an Apple ID, select Don’t have an Apple ID or forgot it? and follow the prompts to create one.
  • If you have an Apple ID, enter your credentials and sign in.

Enable iCloud:

  • After signing in, go back to Settings
  • Tap on your name at the top, then select iCloud
  • Choose which services you want to enable (e.g., Photos, Contacts, Calendars)
  • Tap iCloud Backup and toggle it on to automatically back up your data.
First 15 things to do or try first when you get a new iPhone

Create a Free Apple Account on iPhone (Kurt “CyberGuy” Knutsson)

MUST TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE

4) Personalizing settings on iPhone

Customize Display:

  • Open Settings
  • Then go to Display & Brightness
  • Tap Light or Dark for the background you’d like
  • You can tap on Text Size to adjust text size
  • Then use the slider to adjust the brightness you prefer.
First 15 things to do or try first when you get a new iPhone

How to personalize your iPhone’s display and brightness (Kurt “CyberGuy” Knutsson)

Customize sound preferences:

  • Tap on Sounds & Haptics
  • Adjust the slider where it says Ringtone and alerts to customize from quieter to louder.
  • Scroll down and tap the following to adjust the sounds for each: Ringtone, Text Tone, New Voicemail, New Mail, Sent Mail, Calendar Alerts and Reminder Alerts.
First 15 things to do or try first when you get a new iPhone

Steps to change your iPhone’s sounds and haptics (Kurt “CyberGuy” Knutsson)

5) Configuring privacy settings

Manage Privacy Settings:

Advertisement
  • Go to Settings 
  • Scroll down and click apps
  • Select the app you want to review the privacy settings for
  • Adjust the permissions as needed for location services, camera, microphone, allow tracking and other settings. Adjust as necessary for individual apps.

6) Pick your own lock screen shortcuts

By default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them. 

  • Long-press on the Lock Screen
  • Tap Customize
  • Then choose Lock Screen
  • You can tap on the existing shortcuts to change them to your preferred apps or features by selecting the desired app or feature from the list that appears.
  • If you prefer, you can remove them entirely to keep your lock screen clean and simple by tapping the delete or remove option next to the shortcut.
First 15 things to do or try first when you get a new iPhone

Steps to customize your iPhone’s lock screen (Kurt “CyberGuy” Knutsson)

7) Setting up Family Sharing

Here’s how to enable Family Sharing on your iPhone:

  • Open your Settings app
  • Tap your name
  • Go to Family Sharing 
  • Set Up Your Family
  • Press Continue
  • Select family members that you want to invite
  • To create an account for a child, select Create Child Account at the bottom and provide their name and birthday.

8) Download some useful apps

There are millions of apps available, such as Apple MapsGoogle Maps and even apps to plan a party in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:

  • Locate the App Store icon on your home screen and tap to open it.
  • You can explore various categories by tapping on Apps at the bottom of the screen or using the Search tab to find specific apps.
  • Once you find an app you want, tap on it to view more details, including descriptions, ratings and screenshots.
  • Tap the Get button (or the price if it’s a paid app) next to the app you wish to download.
  • If prompted, authenticate your download using Face ID, Touch ID or your Apple ID password.
  • The app will begin downloading and installing automatically. You can monitor its progress on your home screen.
  • Once installed, the app will appear on your home screen.
  • Tap its icon to open and start using it.
  • You can press and hold any app icon until they start wiggling, allowing you to drag them into folders or rearrange their positions.
First 15 things to do or try first when you get a new iPhone

Image of the App Store icon on iPhone (Kurt “CyberGuy” Knutsson)

9) Activate spam filters for text messages

Having a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams. But beware that this may also filter out some legitimate messages from people who are not in your contacts list.

  • Open Settings 
  • Scroll down and tap on Apps
  • Then, scroll down and tap on Messages 
  • Toggle on Filter Unknown Senders to filter text messages from unknown contacts into a separate list
First 15 things to do or try first when you get a new iPhone

Steps to activate filters for text messages (Kurt “CyberGuy” Knutsson)

10) Use visual intelligence

On all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.

You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.

To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:

Advertisement
  • View the hours of operation by tapping Schedule
  • Place a delivery order by tapping Order
  • Browse the menu or available services by tapping Menu
  • Make a reservation by tapping Reserve
  • To call the business, visit its website or access other options, tap the More button.
First 15 things to do or try first when you get a new iPhone

iPhone using visual intelligence (Kurt “CyberGuy” Knutsson)

HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT

11) Log how you’re feeling

Apple made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You don’t need the latest iPhone 16 to try the app’s mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a tiny tree, and you’ll be able to log your mood for each day and see how it changes over time.

First 15 things to do or try first when you get a new iPhone

Journal app on iPhone (Kurt “CyberGuy” Knutsson)

12) Give Action Button a try

The Action Button is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:

  • Go to Settings
  • Tap Action Button
  • An image of the side of the iPhone will appear showing icons representing actions you can assign to the Action button.
  • Swipe left or right to choose an action. The name of the action will appear below the dots.
  • If additional options are available for the selected action, a button will appear below the action.
  • Tap it to see the list of options.
  • For Controls, Shortcut and Accessibility actions, you need to tap the button below the action and select a specific option. Otherwise, the Action button won’t do anything.
First 15 things to do or try first when you get a new iPhone

Action button on iPhone (Kurt “CyberGuy” Knutsson)

13) Try out the new Passwords app

I always stress the importance of using a password manager to store your passwords. Let’s be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But it’s also impossible to come up with a unique password for every app and remember them all. 

Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. That’s where Apple’s Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and it’ll keep your login details encrypted and synced across all your devices.

Advertisement

While Apple’s new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it’s important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out my best expert-reviewed password managers of 2025 here.

14) Use ChatGPT and writing tools

Apple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.

You can use Apple’s enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here’s how to get started; you’ll need to enable ChatGPT integration. 

  • Head to Settings
  • Click Apple Intelligence & Siri
  • Tap ChatGPT and toggle on next to where it says Use ChatGPT.
  • From there, you can scroll down and Sign In to your own ChatGPT account or even upgrade to ChatGPT Plus.
First 15 things to do or try first when you get a new iPhone

ChatGPT and writing tools on iPhone (Kurt “CyberGuy” Knutsson)

15) Install strong antivirus protection

Antivirus software can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked. Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices.

Pro tip: Prioritize regular backups to safeguard your data

Making data backups a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it’s a hardware malfunction or a security breach, having a recent backup will let you recover quickly.

Advertisement

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

When you get your new iPhone, there are several essential steps to take to ensure you’re getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and don’t forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you’ll be well on your way to maximizing your new iPhone’s capabilities.

How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

North Korea linked to crypto heists of over $650 million in 2024 alone

Published

on

North Korea linked to crypto heists of over 0 million in 2024 alone

Hackers in North Korea stole a total of $659 million in crypto across several heists in 2024, according to a joint statement issued today by the US, Japan, and South Korea. The report specified five such incidents, like the $235 million theft from the Indian crypto exchange WazirX that is being newly attributed to the Lazarus Group. That organization is estimated to have stolen billions across previous attacks over the last decade, including $625 million stolen from Axie Infinity in 2022.

As recently as September 2024, the United States government observed aggressive targeting of the cryptocurrency industry by the DPRK with well-disguised social engineering attacks that ultimately deploy malware, such as TraderTraitor, AppleJeus and others. The Republic of Korea and Japan have observed similar trends and tactics used by the DPRK.

A warning issued by the FBI last September noted that their methods to gain access for delivering these payloads include “individualized fake scenarios,” such as enticing victims with prospective jobs and business opportunities. All three countries advised businesses in the industry to check out the latest warning to reduce their risk of “inadvertently hiring DPRK IT workers,” as described in this recent report by CoinDesk.

They’ve also used long-time common phishing tactics against employees of crypto firms, such as convincing impersonations of trusted contacts or prominent people of interest in related industries, with realistic photos and information likely lifted from public social media accounts of known connections.

Continue Reading
Advertisement

Trending