MOBILE

Find Your Lost Smartphone

5/7/2013 11:22:56 AM

New anti-loss tools available

Because you regularly use your smartphones when you’re out and about, there’s bound to be a time or two when you accidently leave it behind or lose it. Fortunately, the combination of an always-available Internet connection and built-in GPS provides the necessary communication technologies you’ll need to track down a lost (or stolen) smartphone. We’ll examine some of the different types of apps and services available to help you find a lost smartphone.

Apps

The app can help you find a lost iPhone

The app can help you find a lost iPhone

Many smartphones now come with a built-in (or freely downloadable) manufacturers’ apps that can help you find a phone when it’s lost. There are also third-party tools, such as Norton Mobile Security, that offer advanced phone-locating services. Once you’ve installed a smartphone-finding app, you’ll go to a computer and log into the app’s online management website. From here, you’ll be able to see the current location of your phone on an onscreen map.

Of course, just knowing the phone’s location doesn’t always mean that it’ll be in plain sight; for all you know, it’s stuck under a couch cushion. For this reason, most phone-finding apps provide a ringing feature that will force the smartphone to briefly ring at the loudest volume – even if the ringer is supposedly turned off. Norton Mobile Security, for example, sets off a “scream” alarm. It also lets you display an onscreen message, such as your address and contact information, so that a good Samaritan will be able to return the device to you.

Dealing with thieves

The obvious problem with most phone-finding apps is that your phone must be turned on and have an active data connection for you to be able find it. Thieves know this, so one of the first things they’ll do is turn off the phone. To combat this, many apps have a feature that will send an email with the location noted when the service detects that your smartphone has once again been turned on.

You can log in to your Norton account and find your lost smartphone using a PC

You can log in to your Norton account and find your lost smartphone using a PC

The other thing a thief will likely do is remove the SIM (subscriber identity module) that’s used to identify your phone on the cellular network, which would knock out the smartphone’s data communications. This is where advanced apps, such as the tools included with Norton Mobile Security, come into play. For instance, the Norton app will instantly lock your phone if the SIM card is removed. This way, your smartphone can’t be used with another SIM card; that makes the phone essentially worthless to a thief. Some security apps can also remotely lock your phone and use the built-in camera to take a photo of the user in order to help identify the smartphone thief. In a worst-case scenario, most will allow you to remotely erase all of the information on your smartphone so that the thief won’t have access to any of the private files, images, and emails stored on the phone or on the memory card.

Benefits of a mobile security suite

In addition to helping locate your lost phone, many mobile security apps also include antivirus and anti-spyware protection. Some include a tool that will back up your phone’s contacts, which is handy if you can’t recover the phone and need to move your contacts to a new one.

In addition to helping locate your lost phone, many mobile security apps also include antivirus and anti-spyware protection.

In addition to helping locate your lost phone, many mobile security apps also include antivirus and anti-spyware protection.

Some smartphone security suites include a scanner that can prevent infected apps from installing themselves and stealing your personal information. Norton’s utility can also back up your contacts and calendar and, to help you manage calls and texts, it can block specific phone numbers (such as those belonging to a pesky telemarketer) from getting through.

Other  
 
Most View
Spring Is Here (Part 2)
Is 802.11ac Worth Adopting?
BlackBerry Z10 - A Touchscreen-Based Smartphone (Part 1)
LG Intuition Review - Skirts The Line Between Smartphone And Tablet (Part 5)
Fujifilm X-E1 - A Retro Camera That Inspires (Part 4)
My SQL : Replication for High Availability - Procedures (part 6) - Slave Promotion - A revised method for promoting a slave
10 Contenders For The 'Ultimate Protector' Crown (Part 3) : Eset Smart Security 6, Kaspersky Internet Security 2013, Zonealarm Internet Security 2013
HTC Desire C - Does It Have Anything Good?
Windows Phone 7 : Understanding Matrix Transformations (part 2) - Applying Multiple Transformations
How To Lock Windows By Image Password
REVIEW
- First look: Apple Watch

- 10 Amazing Tools You Should Be Using with Dropbox
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Top 10
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
Java Tutorials : Nested For Loop (part 1)
C# Tutorial: Reading and Writing XML Files (part 2) - Reading XML Files
C# Tutorial: Reading and Writing XML Files (part 1) - Writing XML Files