Feeds

This phone is stolen

Meet Simwatcher

  • alert
  • submit to reddit

Boost IT visibility and business value

A Dutch company has introduced a small downloadable program for mobile phones, called SimWatcher, which sends out an SMS message when someone steals a mobile phone and replaces the SIM card.

The software reveals the number of the person who stole the phone and will also display a message on the stolen phone, saying tha it belongs to someone else.

The software - a demo is available here (instructions in Dutch) - costs €10 and is available for almost every type of GSM phone. The software can be installed by sending a message with an attachment or by WAP.

Some phone companies, including Vodafone, are already able to block a stolen cell phone by determining the mobile's International Mobile Equipment Identity, or IMEI number, a 15 digit unqiue code which is entered into the network's central database. Once reported stolen, the handset will be immobilised and deactivated across every network. ®

Related stories

Police offer stolen mobe insurance fraud amnesty
Muggers refuse to nick crap mobile phone
GSMA declares war on mobile phone theft
Calling time on mobile crime
Punters will pay for mobile phone anti-theft devices
Mobile phone theft is far worse than we thought

The essential guide to IT transformation

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.