alfa Official Logo
My Mobile alfa App
Billing Inquiries
App Store
Credit Transfer
alfa Data Card
Unblocking Codes
Prepaid Recharge
Postpaid Payment
Mobile TV
Prepaid Services
Postpaid Services
Pick your line
Communicate SMS
Contact List
Message Box
Press Releases

About us | Packages | Business | Roaming | 3G+| 4G| Rannat| alfaTAB| Pick your line | Mobile TV
Security tips
Keep Your Mobile Device Secured
Ensure that you use the following three core components to keep your mobile device secure. When combined, they provide a significant challenge for hackers.
  • Suspicious WhatsApp links - Avoid clicking on suspicious URLs/links you might receive on your smartphone inviting you to download the WhatsApp voice calling feature, most of these invitations are fake so far and will compromise your privacy and personal data.
  • Device auto-lock - Configure your device to lock automatically after a period of time. Only those with knowledge of the passcode can unlock the device.
  • Device encryption – Protect your mobile device by preventing access from intruders, eavesdropping or interception of data in transit by using encryption technology.
  • Remote wiping - Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on that device.
  • Install anti-virus application to protect your device against malware. Refer to the web for anti-virus applications comparison.
  • Protect mobile handsets and mobile memory cards by activating passwords
Follow these tips to keep your mobile device secure and to protect your data and privacy against the growing mobile malware threats.
  • Do not circumvent or disengage security features such as passcodes and auto-locks.
  • Set the device to lock after a set period of inactivity. A recommended inactive period setting is 10 minutes or less.
  • Ensure that you have GPS device location in the event of theft or loss.
  • Use caution when downloading apps and free software, especially from unsanctioned online stores.
  • Install an on-device personal firewall to protect mobile device interfaces from direct attack.
  • Install anti-spam software to protect against unwanted voice and SMS or MMS communications.
  • Turn off “beaming” (infrared data transmission).
  • Turn off the Wi-Fi when you’re not using it; and avoid using public, unsecured Wi-Fi hotspots.
  • Before discarding any device, make sure it is wiped clean and restored to factory defaults.
  • Threats to mobile devices are pervasive and escalating. Through malware, loss and theft, misconduct, and direct attacks, users are increasingly susceptible to devastating compromises of mobile devices.
  • Don't not let your mobile devices be used by children, who frequently download cool-looking but unknown free apps that might be malicious.
  • Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.
  • Backup and secure your data. You should backup all of the data stored on your phone – such as your contacts, documents, and photos. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased. Doing so will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased.
  • Understand app permissions before accepting them. You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone. Make sure to also check the privacy settings for each app before installing.
  • Accept updates and patches to your smartphone’s software. You should keep your phone’s operating system software up-to-date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.
  • Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or sensitive information. Always be aware when clicking web links and be particularly cautious if you are asked to enter account or log-in information.
What makes a strong password
A strong password should:
  • Be at least 8 characters in length
  • Contain both upper and lowercase alphabetic characters (e.g. A-Z, a-z)
  • Have at least one numerical character (e.g. 0-9)
  • Have at least one special character (e.g. ~ ! @ # $ % ^ & * ( ) - _ + =)
A strong password should not:
  • Spell a word or series of words that can be found in a standard dictionary (e.g. angrybirds, mypassword, daisymae)
  • Spell a word with a number added to the beginning and/or the end (e.g. johnsmith1, password123, daisy8703)
  • Be based on any personal information such as user id, family name, pet, birthday, etc. keyboard pattern (e.g. qwerty) or duplicate characters (e.g. asdfgh, aabbccdd, 456789)
Use a passphrase
A passphrase could be a lyric from a song or a favorite quote. An example of a strong passphrase is “Superman is $uper str0ng!”. A nonsensical word can built using the first letter from each word in a phrase (e.g. C$200wpG., represents "Collect $200 when passing Go."). These typically have additional benefits such as being longer and easier to remember.
Check the strength of your password
It’s a good idea to check the strength of the password you’ve created. Some websites offer a built-in password checker that evaluates the strength of your password when you’re setting up your account. But if you want to check the strength of your other passwords try using
Tips to Ensure Your Bluetooth Isn't Hacked
  • Change the default settings of the Bluetooth device.
  • Choose PIN codes that are sufficiently random and long.
  • Bluetooth devices should be configured to remain undiscoverable except when needed for pairing.
  • Ensure that Bluetooth devices are turned off when they are not in use.
  • Ensure that portable devices with Bluetooth interfaces are configured with a password to prevent unauthorized access if lost or stolen.
  • Install antivirus software on Bluetooth‐enabled hosts that are frequently targeted by malware.
  • Install Bluetooth software patches and upgrades regularly.
  • Do not accept transmissions of any kind from unknown or suspicious devices.
  • Pair your Bluetooth devices as infrequently as possible Unnecessary Bluetooth services, user controls, and applications should be removed from the host device.
  • If a Bluetooth device is lost or stolen, un-pair the missing device from all other Bluetooth devices with which it was previously paired.
  • The user should authorize all initial incoming connection requests.
  • When entering a crowded zone, make sure the Bluetooth is switched off.
I lost my SIM, what shall I do?
1. In case you own an alfa Postpaid or Business line, you have to come in person to one of our alfa stores in order to retrieve a new SIM card.
One of the following documents must be presented:
  • Identity Card
  • Civil Record
  • Valid Passport
  • Lebanese Driver’s License
  • Lebanese Syndicate Card
  • University Card
Moreover, customer can authorize someone on his behalf to replace his stolen SIM card. The authorized person should hold his/her valid Identity Card along with an express delegation duly signed by the person mentioned in the contract. In case of an alfa business line, the delegation must be stamped by the official company LOGO.
2. In case you hold an alfa Prepaid line, you have to come in person to one of our nearest alfa store in order to retrieve a new SIM card.
One of the following documents must be presented:
  • Identity Card
  • Civil Record
  • Valid Passport
  • Lebanese Driver's License
  • Lebanese Syndicate Card
  • University Card
Several questions will be asked to confirm your ownership. Any available proof of ownership (information/ documents) should be presented.
*Our alfa store is available in the following region: Beirut/ Tripoli/ Chtaura/ Saida/ Jounieh/ Nabatieh/ Halba.
- SIM Replacement fee = 5.5$ including VAT.
- SIM Replacement is free of charge in case of Rebranding (old cellis sim)
3. If you lose your alfa line while abroad, you are advised to notify us immediately through any of the below channels
  • Helpline:+961 3 391111
  • Fax: +961 3 391109
  • Email:

Copyright © 2004 - 2015 alfa. All rights reserved.