Home

Apps To Save Your Lost or Stolen iPhone

Comments | Boonsri Dickinson, BYTE | May 04, 2012 09:00 AM

Category: Smartphones

Let's face it, we are all obsessed with our mobile phones. I'm here in Times Square, and as I look around, you can't help but notice that people have their phones out to text, chat, and snap photos. However, when these personal devices go missing and are stolen, our data, photos, contacts, and other sensitive information may be compromised.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

A thug punched me in the face and stole my iPhone in San Francisco. I'm not alone, this sort of crime happens a lot. In fact, smartphone thefts are on the rise. For instance, 40% of the robberies in New York City are smartphones thefts. Other urban areas also report high incidences of these crimes. With iPhones they have a special name for it: "Apple picking."

But the good news is there are apps that can help you locate and even snap photos of the suspected thief. Here are five apps that can keep your data safe by using GPS or Wi-Fi networks to locate the suspect and map their approximate location. Some apps use the camera in the phone to snap a photo of the suspected criminal.

The first app is Lookout Mobile Security, which sounds an alarm so you can find you iPhone if it has been stolen nearby or simply misplaced on the couch. Or you can send a message to your iPhone in case a person who finds it wants to return it to you. It is free and available for iOS and Android devices.

BlueSprig's Aircover has a map so you can locate the device. You can send a message out if you've lost the phone, or wipe the device clean. It also addresses threats from malware and phishing and other security breaches on mobile phones. It is free and available on iOS and Android devices.

The third app, Project Prey, is an open source anti-theft app for your smartphone and other gadgets. It can track the device and snap screen shots of the criminal. It runs on iOS, Android, Windows, Mac OS, Linux, and they have a package customized for Ubuntu. It's different than the other apps because it is designed to track your devices at all times, rather than just waiting until they go missing. For a minimal cost, organizations can track hundreds of devices.

Gadget Trak, which costs $3.99 in the Apple App store, tracks your phone using Wi-Fi networks and it even uses the camera to snap a photo of the thieves. Gadget Trak was founded in 2007, and it lists many success stories on its web site — including the world's first recovery of a stolen iPod.

Find My iPhonE is a popular free iOS option, which lets you use another iOS device to locate the lost iOS device. When your phone is lost or stolen, you can activate a loud sound, send a message or remotely wipe the phone. Unfortunately in my case, after my iPhone was stolen, Find My iPhone didn't work. Several cops told me that it doesn't give exact location information, so it makes it hard to track down criminals because they can't tell where they are hiding. The app also doesn't work if the phone is turned off.

Recently, the Federal Communications Commissions announced that four major cell phones carriers have agreed to help prevent stolen smartphones from being resold. If phones are registered on a national registry, it would prevent stolen phones from being reactivated — which would hopefully make stealing a smartphone as useless as stealing an empty wallet.

While losing your phone or having it stolen may be frustrating, knowing there are apps out there that can help you locate and remotely wipe your personal information at the touch of a button, should at least make you feel a bit more secure. After all, it is better to be safe than sorry, right?

Boonsri Dickinson is the Associate Editor of BYTE



Related Reading




Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

BYTE encourages readers to engage in spirited, healthy debate, including taking us to task. However, BYTE moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. BYTE further reserves the right to disable the profile of any commenter participating in said activities.

COMMENTS

Tune In to BYTE
Facebook Twitter LinkedIn Newsletter RSS
Whitepapers
whitepaper
In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work and home, the emergence of new mobile devices, the demand for tech savvy employees and changing expectations of corporate IT will fundamentally change the workplace.
whitepaper
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be “must-have” devices, while tablets, slates, and netbooks were relegated to “nice-to-have” status, according to a commissioned study conducted by Forrester Consulting on behalf of Dell and Intel.
Sponsored by: Dell
Upcoming Events


Oct 20: Becoming a Security Detective - Gathering and Analyzing Security Intelligence in the Enterprise

In this all-day virtual event, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. Register today!

Platinum Sponsors: ArcSight, NetIQ, Proofpoint, Thawte
Gold Sponsor: Q1 Labs



October 6: InformationWeek 500 Virtual Event: The Need for Speed

At the 2011 InformationWeek 500 Virtual Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth.

Platinum Sponsor: ArcSight, Workday
Gold Sponsor: IBM


Aug 25: InformationWeek & Dark Reading present: How Security Breaches Happen and What Your Organization Can Do About Them

Attendees will get insights on how to prevent breaches from happening, how to research and identify the source of a breach, and how to remediate a compromise as quickly and efficiently as possible.

Platinum Sponsor: ArcSight, NetIQ, Thawte
Gold Sponsors: Lumension, NetGear, GFI
Silver Sponsor: Motorola


July 28: InformationWeek & Symantec present: Infrastructure at Risk -- Taking Decisive Action to Secure Your Critical Data Assets

Join the editors of InformationWeek and leading security experts from Symantec for an in-depth look at the current threats faced by large and small organizations, and the implications for your business, your customers, and even your country. You'll hear how today's threat landscape is changing drastically, and learn the latest countermeasures and best practices to keep your company's precious data assets out of the hands of determined cybercriminals.


July 27: Electronic Health Records -- Moving from Concept to Reality

At this InformationWeek Healthcare Virtual Event, we will talk with healthcare practitioners, IT professionals and other industry experts about issues surrounding EHR selection, deployment and use.

Platinum Sponsor: HP, Intel, GBS, Geotrust, NextGen
Silver Sponsor: Proofpoint


On-Demand: InformationWeek & Interop present: Business Mobility Unleashed

In this virtual event, the leaders behind InformationWeek Business Technology Network and Interop zero in on the top mobile technologies and techniques you'll need to understand and master to ensure your organization thrives in the wireless world.
Platinum Sponsors: Alcatel-Lucent, APC
Gold Sponsor: HP
Silver Sponsor: Emerson Network Power
Bronze Sponsor: Skybot


On-Demand: Cybersecurity Best Practices

In this half-day virtual event, experts assess the state of cybersecurity in government and present the latest strategies for creating a more secure, attack-proof IT infrastructure. This event will help CISOs and other information assurance professionals in federal, state, and local government stay on top of the latest developments in the field.
Platinum Sponsor: GeoTrust
Gold Sponsor: Bit9


On-Demand: Data Center Transformation

Data centers are undergoing incredible transformations that create both opportunities and challenges for IT professionals. Server virtualization enables rapid provisioning, more efficient use of resources, and improved disaster recovery. That trend will continue with storage and network virtualization, allowing IT pros to further abstract -- and optimize -- data center resources.In this virtual event, you will learn how prepare your organization for a data center transformation.
Platinum Sponsors: AMD, APC, Cisco, Eaton, SunGard
Gold Sponsor: Emerson Network Power


On-Demand: Cloud Computing Roadmap: Controlling the Cloud - Managing, Optimizing and Integrating Cloud Services with Your Existing IT Infrastructure

In this virtual event, you'll learn how to craft your own strategy for successfully embracing and integrating new cloud computing capabilities without derailing or destroying your current IT roadmap.
Platinum Sponsors: ArcSight, GoToAssist, SunGard, thawte
Gold Sponsor: Symform
Silver Sponsor: Skybot


On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise

In this virtual event presented by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.
Platinum Sponsors: NetIQ, Novell, thawte, Webroot
Gold Sponsors: ArcSight, Bit9, OpenText
Silver Sponsor: Application Security, Core Security, Lumension

 



The 2011 Informationweek 500 Conference will be held at the beautiful St. Regis Monarch Beach Resort, Dana Point, CA. Mark your calendars for September 11-13, 2011.



InformationWeek Healthcare IT Leadership Forum




Bank Systems & Technology Executive Summit 2011