{"id":1243,"date":"2013-03-07T10:02:46","date_gmt":"2013-03-07T15:02:46","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=1243"},"modified":"2020-02-26T18:28:17","modified_gmt":"2020-02-26T16:28:17","slug":"kaspersky-mobile-security-stolen-smartphone","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/","title":{"rendered":"Kaspersky Mobile Security: New Technology to Access Your Stolen Smartphone"},"content":{"rendered":"<p>Mobile threats are the new kids on the malware block \u2013 with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this problem has grown quickly \u2013 and it\u2019s now clear that personal data stored on mobile devices excites cybercriminals more than data on desktops or laptops.<\/p>\n<p>According to Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/about\/news\/press\/2012\/Android_Under_Attack__Malware_Levels_for_Googles_OS_Rise_Threefold_in_Q2_2012\" target=\"_blank\" rel=\"noopener nofollow\">statistics<\/a>, nearly 15,000 new malicious programs for Android emerged in Q2 of 2012. As of today, <a href=\"https:\/\/www.kaspersky.com\/images\/Kaspersky_Lab_Infographics_Android_Malware_Growth_2012-10-156085.png\">over 90%<\/a> of all existing mobile malware operate on this platform. As a result, owners of smartphones and tablets running Android now in some way resemble users of Windows, a long-standing leader in terms of the number of viruses. \u00a0To make matters worse, sensitive information is often lost when a device goes missing. In May 2012, in collaboration with O+K Research, we conducted a <a href=\"https:\/\/www.kaspersky.com\/downloads\/pdf\/kaspersky-lab_ok-consumer-survey-report_eng_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">survey <\/a>of 11,000 users globally and found that 14% of users had been deprived of their smartphone at least once, due to loss or theft.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/kaspersky_mobile_security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Mobile Security<\/a> has offered <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2012\/KMS_Named_One_of_the_Best_in_Highly_Competitive_Independent_Testing\" target=\"_blank\" rel=\"noopener nofollow\">effective<\/a> protection against malware for Android smartphones since 2011. However, not even total protection against mobile viruses can guarantee the total security of your data. It is also vital to protect against unauthorized access if your device is ever lost or stolen. As a result we\u2019ve greatly expanded our anti-theft features in the latest version of Kaspersky Mobile Security. These new features enable you to manage your lost mobile phone remotely by blocking it, deleting all private information and even by helping track it down using GPS. We\u2019ve since developed two new features \u2013 Mugshot and Web Management \u2013 which add further protection to your data and increase your chances of getting your device back.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/02\/06051636\/YiVlPG_TaEVVcHucfhP8kExdpvT_PNdNYCDc0R-TRhk.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1244\" alt=\"YiVlPG_TaEVVcHucfhP8kExdpvT_PNdNYCDc0R-TRhk\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/02\/06051636\/YiVlPG_TaEVVcHucfhP8kExdpvT_PNdNYCDc0R-TRhk.jpeg\" width=\"307\" height=\"512\"><\/a><\/p>\n<p>The dedicated Web Management portal will help to track the lost device and performs commands remotely: users can block their smartphone, delete information, perform a roll-back of the device to factory settings and search for the missing gadget by using information from the GPS module, nearby mobile phone towers or Wi-Fi networks. As before, this can still be done by sending a text message to the missing phone, but Web Management is a far more convenient way of doing this, with the text option offering a fall-back if the phone is disconnected from the Internet.<\/p>\n<p>If you are certain that your smartphone has been stolen, the Mugshot feature can help collect more information about the thief. Best of all, using the phone\u2019s own camera, it can try to take a photo of the new \u201cowner\u201d, caught red-handed with the stolen device. Just enter the Web Management portal and<\/p>\n<p>give the appropriate command, then wait for the photo to be uploaded. However, we do not advise pursuing the criminal on your own: hand the photo to the relevant authorities and explain what has happened.<\/p>\n<p>The combination of the latest Anti-Theft technology and highly effective antivirus tools ensures comprehensive protection for the data stored on your Android smartphone. It doesn\u2019t matter whether the threat comes from modern malware or an opportunist grabbing your phone, Kaspersky Mobile Security makes every effort to ensure that confidential information does not fall into the wrong hands.<\/p>\n<p>You can download the new Kaspersky Mobile Security from <a href=\"https:\/\/www.kaspersky.com\/kaspersky_mobile_security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky<\/a> Lab\u2019s website or the Google Play applications store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile threats are the new kids on the malware block \u2013 with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this<\/p>\n","protected":false},"author":32,"featured_media":1245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[192,97,310],"class_list":{"0":"post-1243","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"tag-protection","9":"tag-security-2","10":"tag-stolen-smartphone"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-mobile-security-stolen-smartphone\/1243\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/protection\/","name":"protection"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"predecessor-version":[{"id":25722,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1243\/revisions\/25722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}