What We Do When We Find Someone Else’s Cell Phone


“he researchers deliberately put fake data on each phone with tempting document names such as “HR Salaries” and 80% of the finders took a look to see what was in these files. Half of the finders tried to run what looked like a remote access app to see if they could connect to the corporate network. (That was just another head fake and didn’t lead to any actual connection.)

While a depressing account of the trust in our fellow man, there are some good things to come from what Symantec calls its “Honey Stick” experiment. (The name is in reference to honeypots, a tried and tested security process that leaves an open server someone out on the Internet for hackers to abuse and take control over.) Obviously one lesson learned from this experiment is to make sure you password-protect your phone. This isn’t that hard to do.”

Leave a Reply