Cell Phone Spy Extracts Deleted Texts, Data - InformationWeek
IoT
IoT
Infrastructure
News
2/25/2008
12:41 PM
50%
50%

Cell Phone Spy Extracts Deleted Texts, Data

BrickHouse Security sells a small, portable SIM card reader that it says can retrieve deleted messages and data from cell phones.

Think deleting text messages from your cell phone covers your tracks?

Think again.

A company in New York is marketing a product it says allows spouses, parents, employers, and others to recover deleted data from mobile phones and read it on PCs. It works on many, but not all, cell phones.

BrickHouse Security sells a small, portable SIM card reader that it says retrieves deleted messages. Users can remove a SIM card, put it in the $150 Cell Phone Spy, and plug the reader into a USB port. The data transfers to PCs. The company claims its reader is the only one that can access deleted messages.

The data extractor comes with Recovery PRO software and works with any standard removable SIM card, according to BrickHouse Security.

The company also markets the reader for backing up and transferring one's own cell phone data, including contacts, phone numbers, and personal information.

"If you change your mobile phone or service provider and receive a new empty SIM card, this SIM card solution is the best way to load the new saved data onto it," BrickHouse says on its Web site. "Editing your SIM card entries has never been easier when doing it on your PC with the computer's keyboard instead of your mobile phone keypad."

The device doesn't work with phones that lack SIM cards, like those sold to Verizon customers, some Sprint 2-way phones, and prepaid phones.

The new device has one review from a user who claims he found messages his wife had been sending to someone else.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll