Security

Kim Kardashian Losing 2 Phones May Be Worse Than Stolen Jewels

Following Paris Fashion Week, Kim told officials that she was held at gunpoint around 2:30am Paris local time at a ‘private residence’ Monday morning. In addition to millions of dollars in jewelry stolen, the gunmen got away with 2 phones, sparking fear that her private information could be leaked. PSafe’s Antitheft offers an app for this very situation to erase data remotely stopping thieves in their tracks.


In a meeting with the Emilio Simoni, Senior Security Researcher at PSafe, he addressed that many things could occur when a phone is stolen, particularly when it comes to a celebrity breach. One motive may be to capitalize on the fear of leaked photos, numbers, and other sensitive information the celebrity stored on their device. Another motive may be to sell the celebrity’s personal information altogether.

The gunmen are still at large and with no leads, the reality star could face public humiliation if personal photos and information is leaked to the public.

In 2014, over 100 celebrity phones were hacked where hackers leaked nude photos for public consumption. It included A-listers, notably Oscar-winning actress Jennifer Lawrence. Many of the celebs only knew about the leak when there were reports in the media. Others took to social networks where they learned the news.

What to do now:
Stay protected. This could happen to anyone.
Download an Anti-theft to keep your Android device protected from hackers in the event of loss or theft by clearing data remotely. You may also track your phone’s location, block your phone with an access code and disable the power off menu so other people can’t turn off the device unless they know the password.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago