MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Phone Hacking

Published on 08 November 13
Phone Hacking - Image 1

Everyone became familiar with the term phone hacking after the British media scandal in 2011. It was revealed that in 2002, that when MillyDowler went missing her voicemail was hacked into and messages were subsequently deleted. This gave the police and her family that she was still alive. Milly’s murdered body was discovered 6 months after she vanished, a post-mortem revealed that she died on the day she went missing. When it was discovered that it was actually the British tabloid newspaper that hacked into her phone, a public outcry began and lead to the paper shutting down. Since then it has been discovered that many celebrities have had their voicemails hacked into by the same British newspaper. One of the most well-known victims of phone hacking are the Royal Family. You are considered to be a victim of phone hacking if without your prior permission; someone has listened to your voicemails. However, telephone hacking is not just something that happens to the rich and famous.

If you have witnessed your phone bill increasing in some cases by -£1,000 then you might have been the phone hacking victim. Your phone system gets hacked into via a procedure known as phreaking. It is less likely to be detected during holiday periods and evenings’, meaning that is when it is most likely to occur.

Hacking into phone systems can be lucrative business for criminals. They are learning how to complete this via websites. So it’s not just nerdy internet kids that know how to do it. Unfortunately, when it’s too late when most people realise what’s happened. To be safe just like computer, you need to protect your phone in the same way.

Just exactly howdoes It Occur?

An internal employee in the organisation is usually involved in the phone hacking process. They will leak any confidential information such as PIN numbers and pass them onto fraudsters who will carry out the hacking. Once the hacking is completed the can reprogram the PAB, making it look as if nothing ever happened. When they get into your system every phone number you can think of will be dialled and you phone bill will rocket. Most people select PINs that are easy to remember and therefore easy for hackers to guess. So every few months you should change your PIN. To stop your company from being hacked into, being secure with your information is the best thing you can do.


Telephone hacking comes with many hazards. Victims of phone hacking are most likely to be wealthy, famous people with a lot of power. But anyone can be a victim of telephone hacking.

How Can It Be Stopped?

Your telephone system can be protected by a firewall. Having that incorporated into your phone system will keep you ahead of the hackers. After working hours the number of calls that are made and received can be controlled via the firewall. Any calls to unrecognised numbers will be disconnected immediately. You can activate so only staff and emergency services can be called outside office hours.

This article was written by Brian Madden; VirtualAdvertisingAssociate at Strata Communications.
This blog is listed under IT Security & Architecture Community

Related Posts:
Post a Comment

Please notify me the replies via email.

  • We hope the conversations that take place on will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url