{"id":8770,"date":"2017-03-13T12:00:40","date_gmt":"2017-03-13T17:00:40","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=8770"},"modified":"2017-03-20T15:53:57","modified_gmt":"2017-03-20T20:53:57","slug":"different-reasons-behind-phone-theft","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/different-reasons-behind-phone-theft\/","title":{"rendered":"The Different Reasons Behind Phone Theft"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Smartphones get stolen every day \u2014 they\u2019re a hot item. Whether they\u2019re stolen by pickpocketing, or grabbing it when someone isn\u2019t looking, these phone thefts can cause a lot of stress. At first, the reasoning behind phone theft sounds rather odd: why would someone steal a phone if you\u2019re just going to discontinue the service after it has been taken? Well, there are a few motives behind the theft of a cellular device.<\/span><\/p>\n<p>However, if you enable the anti-theft feature before your phone is stolen, you\u2019ll be able to track, block, locate user device, and even erase all of your data remotely in case of loss or theft. With just the push of a button, all confidential material will be eradicated from your phone, and you will no longer be vulnerable to data infiltration. Click here to enable the anti-theft feature on your device now:<\/p>\n<p><center><a href=\"psafe:\/\/launch\/antitheft\" rel=\"attachment wp-att-8047\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-8047\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Activate-Anti-theft02-300x78.jpg\" alt=\"Activate Anti-theft02\" width=\"300\" height=\"78\" \/><\/a><\/center><b>Stealing Your Data<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Losing your phone can be especially catastrophic if you have confidential material stored in it. As a result, it is imperative that you store all of your precious information in a cloud service, and back up your phone regularly. You should be prepared to erase all data on your phone if you know your phone has been stolen.<\/span><\/p>\n<p><b>The Parts are Valuable<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Thieves love smartphones that don\u2019t have cracks in them. A solid, clear, scratch-less phone screen can go on the black market for a solid amount of money. There are also removable SIM cards that can be sold as well, besides other parts. The phone itself can also be reset to its factory settings and then sold, all for a fraction of the original retail price, while the thief still makes a hefty profit.<\/span><\/p>\n<p><b>The Various Functions of the Phone<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are several applications and functions on a cellular device \u2014 you don\u2019t necessarily need texting or mobile service to perform many of the useful tools that come with the cell phone. For instance, your device can serve as a calendar, alarm clock, and many others. Plus, there are endless games that can be played on a smartphone, so a thief will have no shortage of fun if they get their hands on your device.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out the motives, and the preventative steps you can take to keep your phone in your possession.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[245,249,1082],"class_list":["post-8770","post","type-post","status-publish","format-standard","hentry","category-security","tag-anti-theft","tag-security","tag-stolen-phone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=8770"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8770\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=8770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=8770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=8770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}