This transcript is automatically generated
And these billion bucks.
Well apple beats up its security as hackers using new technology to rip you off it's true more cyber thieves.
Are cracking -- -- Smartphones and stealing personal information.
Even setting Texan making calls from victims' -- Security expert Robert -- says.
It's only gonna get worse and Robert this does appear to be a whole new way of -- one day when they -- something off the at a restaurant or something but now they're -- -- an opponent that's that we keep.
Whole -- information all of -- contacts a -- -- passwords.
-- -- take a body you have.
A mobile phone today that has -- much hard drive space if not more are much storage then.
AL laptop by no I do and they just they are just that they're they're small computers that does store.
All of our personal information are passwords credit card information and had I don't -- -- candidate accesses.
So you're devices have wireless technology via Bluetooth they have.
You're you're you're Y five and they also have -- -- -- an FC which is near field communication.
Which is another form of wireless technology used a mobile wallets.
And to connect to from peripherals and so forth.
And ultimately hackers.
Good hackers actually -- a controlled that tested environments -- able to crack the code.
They were able to access the device by bumping it or getting within a few inches of -- And essentially.
Telling the voted download something -- -- of spyware.
That infected device allowing a hacker remote control of it.
So what can we do to defend ourselves.
Well you have to do first and foremost make sure that your device has a mobile security product so just like your computer has if -- -- should be spyware into fishing.
-- mobile has to have mobile security as well.
That's where it's going hackers are focusing and targeting on our mobile device is you have to beat them not just like your computers all right.
Now a lot of people people that information readily -- in the device down -- They're numbers and passwords today does not do that for safety's sake -- Well first and foremost make sure I think you're device also has a out passwords so it's locked so if you lose interpret stolen that it is can't get -- it.
And as far as you know your wireless technology Bluetooth -- near field communication.
Shut those off when not used any in generally should be in pretty good shape and what about when -- anyways these people don't select Starbucks whatever winner's wife.
And there on the computer on their their Smartphone to do all sorts of -- that's open season right.
Yes the I don't like out Wi-Fi in like got -- Internet cafe or -- shop I I generally viewed in the Internet cafes.
Who -- their hours doing this stuff.
Yeah I -- all around votes are not -- don't about the folks who just sit there's have been a lot day.
What have you for hours but but that's -- -- but could continue its -- Self.
Make sure you're using your carriers Internet connection because that is more secure more encrypted.
-- the free Wi-Fi public connection where Patterson yeah that a lot of data don't like -- does not expense.
Well that is true but I think about a like that some you know it might take a look at longer but I'd rather spent a couple more seconds and so forth.
That having my identity stolen that's a very good point where do you think this is -- going -- Well we are relying more and more on wireless technologies mobile phones and again hackers are focusing more more on them.
I and Dick you're gonna see in the next five years is much focus and attention on.
You are a portable devices.
IPhone iPad down.
Android devices Samsung.
-- -- as you are on your laptops and desktops.
-- -- -- Robert who is good stuff through -- learn what Roberts Alito in Boston.