meta_pixel
Tapesearch Logo
Log in
Kim Komando Today

Is your phone safe? Hackers can easily hijack it and steal your information

Kim Komando Today

WestStar Multimedia Entertainment, Inc

News, Tech News, Technology

4.8770 Ratings

🗓️ 14 September 2018

⏱️ 28 minutes

🧾️ Download transcript

Summary

Your phone is your most prized possession, making it the most vulnerable security risk you own. Did you know that hackers are able to access nearly all your accounts with just your phone number? In this episode of Komando on Demand, Kim explores the serious threat of hijacking smartphones and how cybercriminals can ruin your life. Founder and CEO of InForceCyber.com Asen Kehayov, who is a Certified Ethical Hacker from Bulgaria, advises on what people can do to safeguard their data.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

I keep saying it to everybody, if you don't have hackers on your team, then you're lost.

0:06.0

If I'm designing a bank vault, wouldn't I want to hire the greatest safe cracker in the world?

0:13.0

Someone who can break into bank faults? I want to hire that man, because if I don't, then he's going to break into my safe.

0:19.0

That's cybersecurity mogul John McAfee.

0:22.5

But first, let me ask you a question.

0:25.1

What's the most vulnerable security risk you own?

0:27.9

What is it?

0:29.0

It used to be your social security number, but it's not anymore.

0:33.2

Actually, it's your phone.

0:34.6

It's the key to your kingdom.

0:36.6

Hackers are able to access nearly all your

0:38.6

accounts with just your phone number. They hijack your number, convince all your contacts that

0:44.0

they are actually you, and proceed to destroy your life. I'm not just talking about professional

0:49.8

cyber criminals here. I'm talking about kids who hobby hack just for kicks. In today's culture,

0:55.9

hacking is the new rebellion. If you can't hack into something, well, you're just not cool.

1:01.5

It's hard to believe that your little child sitting quietly at his desk could actually be a

1:06.3

covert, master, hacker in his second life. Yes, he could be.

1:11.2

You betcha.

1:12.5

Once your phone number is hijacked, a lot of people don't realize.

1:16.5

Any call or text the hackers make will appear to be coming from you.

1:20.3

So you'll need to move quickly.

1:22.7

And if you're not on top of it, hackers can grab your Instagram, your Snapchat, Amazon account, eBay, PayPal,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from WestStar Multimedia Entertainment, Inc, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of WestStar Multimedia Entertainment, Inc and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.