Help - I think we have a Virus  or a Spy
  Important Security Measures for your Home, Family, and Business - 4

playing safe kid's games online

Personal Security Threats to Young Cell Phone Users
 Cell Phone Security Threats

      Cell phones are extremely popular among the younger generation. There aren't many teenagers around who do not have their own cell phone in order to help them to keep in touch with their friends and family.

     As new cell phones are brought out, technology has improved them dramatically in order to provide advanced mobile features to the user.

     While these features have made life easier for many people, they have also caused a few potential problems.

     The new advanced features have increased the potential risks associated with using the phones -  in terms of both privacy and security.
                     How Young People Are at Risk

      Advanced features on cell phones tend to include:

       • E-mail
       • Internet
       • Instant Messenger
       • Downloading
     Now when surfing the internet anywhere, you are at risk of security threats. If you order something online your details can be stolen. The main problem with teenagers and internet on their cell phones, however, is that they are not being supervised.

     The dangers which come with surfing and talking online can usually be supervised at home. However, if you are the parent of a young teenager,  it's almost impossible to monitor what they are doing while they are out with their friends.

     If you yourself are a teenager and you use the internet on your cell phone, you need to be aware of the potential cell phone security risks involved if you are to stay safe.

     Cell phone security is not all that it is cracked up to be. People can still get into your phone and steal your details. If you use the wrong internet websites you could end up with information being stolen from you and you could even be a victim of account cloning.

     Another problem which can occur is your cell phone will be transmitting data to other mobile users. This is especially the case in cell phones which are equipped with Bluetooth as they share a connection with other Bluetooth users nearby.

     Your cell phone could actually
be turned into a microphone to monitor conversations in the vicinity of your phone while it is inactive.

     So, all your information on your phone could potentially be accessed by other Bluetooth users. It also makes it easier for cell phone users to send you information.

    This means that if somebody wanted to harass you, they could through your Bluetooth connection.

     It's even possible for
your cell phone number to be used by others to make calls that are charged to your account - called "cloning".

     Overall, there are many potential cell phone security threats which young cell phone users face. So it's important to be extra careful with the information you share and download while using these advanced cell phone features.

                                                                         ... Richard Rossbauer

Richard started his "Firewalls and Virus Protection" website and "Security Alert News Reporter" to help everyday Internet users navigate safely through the Cyber Space that has become a 'Cyber Jungle', loaded with ambushes and booby traps. He promotes his "Computer Security Awareness Campaign" thru his website at
Help us educate and protect the unwary by sharing this article. Reprint it if you have a newsletter, website or ezine. Copy or print it to give to your friends. It may be used at will so long as no edits or changes are made to the content and links, and the full attribute box is included. We'd appreciate a short note telling when and where you have posted it. Thank you....Richard (

           Register to receive the “
News Reporter” and get your free copy of the eReports:

        23 Critical Alerts You Should Consider when Maintaining Your Computer Security and Protecting Your Personal Safety and "PC SECURITY in 15 Easy Steps"

Visit where many of today's security issues are addressed in greater detail.  A few minutes browsing there now might save you many hours of agony and grief later.

                              << Return to Articles and Reports

Thank you and Safe Surfing.


 Take part in our Computer Security Awareness Campaign by Sharing this with a friend 
                                          Bookmark this Page

  Close Window  

 | Contact | Privacy Policy  Playing Kids Games Copyright © by All rights reserved