{"id":134579,"date":"2025-05-27T00:35:12","date_gmt":"2025-05-27T00:35:12","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/134579\/"},"modified":"2025-05-27T00:35:12","modified_gmt":"2025-05-27T00:35:12","slug":"this-code-can-stop-iphone-and-android-ai-hack-attacks-act-now","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/134579\/","title":{"rendered":"This Code Can Stop iPhone And Android AI Hack Attacks \u2014 Act Now"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">Hang up and use this secret code to stop hack attacks.<\/p>\n<p>getty<\/p>\n<p>Your smartphone is likely at the very center of your life. It\u2019s the technological, corporate, leisure, educational, financial and social hub that brings everything together in one device we take everywhere, even to the loo for many users. It\u2019s also a primary target for those who would take it all away. Fortunately, there are several ways to secure your iPhone or Android device from attackers, whether they are opportunistic or sophisticated in nature. I have recently warned readers of the most <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-password-now-if-its-on-this-list\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-password-now-if-its-on-this-list\/\" target=\"_self\" aria-label=\"dangerous passwords\" rel=\"noopener\">dangerous passwords<\/a> that should never be used, as well as an article explaining why a <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-pin-code-now-if-its-on-this-list\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-pin-code-now-if-its-on-this-list\/\" target=\"_self\" aria-label=\"list of PIN codes\" rel=\"noopener\">list of PIN codes<\/a> need to be avoided at all costs. The advice today concerns another code, but this time it\u2019s not on any list, it\u2019s not something that <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/17\/19-billion-stolen-passwords-for-sale-online---new-warnings-issued\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/17\/19-billion-stolen-passwords-for-sale-online---new-warnings-issued\/\" target=\"_self\" aria-label=\"you can find for sale\" rel=\"noopener\">you can find for sale<\/a> on the <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/23\/dark-web-down---hundreds-arrested-as-fbi-strikes\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/23\/dark-web-down---hundreds-arrested-as-fbi-strikes\/\" target=\"_self\" aria-label=\"dark web\" rel=\"noopener\">dark web<\/a>, but it could just save you from the most advanced of smartphone attackers. Here\u2019s what you need to know, and why you need to act upon that knowledge immediately.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-pin-code-now-if-its-on-this-list\/\" target=\"_blank\" aria-label=\"Change Your PIN Code Now If It\u2019s On This List\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/25\/change-your-pin-code-now-if-its-on-this-list\/\">ForbesChange Your PIN Code Now If It\u2019s On This ListBy Davey Winder<\/a><br \/>\nFBI And Cybersecurity Experts Say Use This Code To Stop Attacks<\/p>\n<p>Most of the warnings that you read online, and the security advice that is distributed to mitigate them, tend to concern email attacks of the phishing variety. This is hardly surprising, given that such social engineering is the preferred method for getting victims to install password-stealing malware or take over their devices and accounts immediately. Yet email isn\u2019t the only hacking fruit. When it comes to perilous and extremely costly threats, it\u2019s hard to think of any more insidious than that of the AI-powered deepfake. These attacks are becoming increasingly sophisticated and increasingly more complicated to detect. Especially when delivered to your iPhone or Android smartphone, be that by way of a video or voice call from a loved one or work colleague. Don\u2019t believe me? Go take the \u201c<a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/03\/as-face-swap-attacks-surge-300-take-this-spot-a-deepfake-test-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/03\/as-face-swap-attacks-surge-300-take-this-spot-a-deepfake-test-now\/\" target=\"_self\" aria-label=\"can you spot a deepfake?\" rel=\"noopener\">can you spot a deepfake?<\/a>\u201d test and find out for yourself.<\/p>\n<p>A former U.S. government advisor, and current CEO of EclecticIQ, has <a class=\"color-link\" href=\"https:\/\/uk.news.yahoo.com\/secret-passwords-family-friends-ai-scams-230146075.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/uk.news.yahoo.com\/secret-passwords-family-friends-ai-scams-230146075.html\" aria-label=\"told\">told<\/a> the Press Association that with AI lowering the barrier for such sophisticated impersonation scams, \u201ceveryone should have a secret password.\u201d What Cody Barrow is referring to is a secret code, which is only known to you and your family, close friends or work colleagues. Or, instead, a different secret code for each of those groups if you want to keep that secrecy level as high as possible. The <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/22\/fbi-warns-iphone-and-android-users-hang-up-now-use-this-code\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/22\/fbi-warns-iphone-and-android-users-hang-up-now-use-this-code\/\" target=\"_self\" aria-label=\"FBI has previously advised\" rel=\"noopener\">FBI has previously advised<\/a> the public to adopt the same mitigation strategy.<\/p>\n<p>If you get a call, be it voice or video, from someone you think you know, asking for help in the form of a money transfer or something else out of the blue and out of character, then the FBI has advised you should ask them to quote the secret code that you have created in order to validate their identity. Even the most powerful AI won\u2019t be able to do this. Stupid robots. So, you know what to do: create a code with your family and friends, and stay alert in the moments of greatest stress when attackers will try to get you to make a knee-jerk emotional reaction that could cost you dearly.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/23\/184162718-passwords-and-logins-leaked---apple-facebook-snapchat\/\" target=\"_blank\" aria-label=\"184,162,718 Passwords And Logins Leaked \u2014 Apple, Facebook, Snapchat\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/23\/184162718-passwords-and-logins-leaked---apple-facebook-snapchat\/\">Forbes184,162,718 Passwords And Logins Leaked \u2014 Apple, Facebook, SnapchatBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Hang up and use this secret code to stop hack attacks. getty Your smartphone is likely at the&hellip;\n","protected":false},"author":2,"featured_media":134580,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3163],"tags":[323,2061,1942,53828,8724,59109,1666,23792,49978,59107,3809,53,16,15,59108],"class_list":{"0":"post-134579","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-android","10":"tag-artificial-intelligence","11":"tag-deepfakes","12":"tag-fbi","13":"tag-hack-attack","14":"tag-iphone","15":"tag-phishing","16":"tag-secret","17":"tag-secret-code","18":"tag-smartphone","19":"tag-technology","20":"tag-uk","21":"tag-united-kingdom","22":"tag-vishing"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114576996638226492","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/134579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=134579"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/134579\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/134580"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=134579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=134579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=134579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}