The Most/Recent Articles

Showing posts with label smart phones. Show all posts
Showing posts with label smart phones. Show all posts

Hackers Want Into Your Phone - How To Keep Them Out...

Phone hackers
Smartphones became a kind of disaster drawer into which absolutely fits all the lifetime of the user. From your emails to your contact numbers or bank codes.

So it's not surprising that cybercriminals are currently taking a interest in ' hacking ' them ; especially in cases where it's known that the user handles sensitive information . To avoid a drag , and make it difficult for a malicious third party to access the device, there are a series of measures that, along side the utilization of a top quality security solution, must be implemented.

Beware of "phishing"
The " phishing ", or spoofing so as to trick users and steal personal data, is one among the favourite cybercriminals mechanisms in their campaigns. It are often produced through different channels: email , SMS or WhatsApp message . To be effective, criminals often impersonate well-known companies or banks and send messages using social engineering to draw in the eye of the victim and make it easier for them to fall under the trap.

Recently, the National Cybersecurity Institute drew attention to a case during which hackers were posing as Amazon and other companies via email . within the message, they affirmed that the platform had a special offer for all those that fill out a form during which a good sort of personal information was requested, also because the mastercard .

It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't inherit contact with the customer

To avoid falling into the trap, experts recommend paying close attention to emails and messages received from third parties. Especially people who are sent, theoretically, by companies and public institutions. just in case the message is strange, and if it doesn't add up that it's sent via " mail ", SMS or WhatsApp, it should be contacted by means of a call with, supposedly, signed. Likewise, it's advisable to verify that the domain that sends the message is that the official one among the sender.

«It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't contact the customer through emails or via SMS to invite their credentials. it's very rare. i might say that it doesn't happen with any entity. just in case we've a doubt, it's advisable to call our bank and consult it ", tells ABC José De la Cruz , technical director of the cybersecurity firm Trend Micro Iberia.

Take an honest look before downloading an app
The " apps " have helped to significantly facilitate the user's life. However, cybersecurity experts recommend being very careful before downloading them, as they will host computer viruses and steal control or information that's stored on the device.

One of the foremost common techniques employed by criminals who work with "apps" is forging popular platforms to urge more downloads. The study "A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps", prepared by the University of Sydney and published last year, maintains that, during two years, the presence of quite 2,000 applications for Android present within the official Google Play store posing as other well-known "apps" and containing "malware", that is, computer viruses.

That is why it's crucial to pay close attention to the very fact that the appliance we would like to download is that the original one . "This are often seen by checking the amount of downloads, the reviews of other users or the syntax within the description," Eusebio Nieva , technical director of the cybersecurity company Check Point , told this newspaper . Likewise, the expert highlights that it's essential to always download the applications from the official stores of the devices, be it the Google Play Store, on Android, or the App Store, on iOS.

WiFi isn't good for everything
Open WiFi networks are widespread for years, but there's certain information that ought to not be consulted when connected to at least one of them, since it's going to are "hacked". «In general, people have the incorrect perception that using an open Wi-Fi network doesn't have any quite danger for his or her security of the info stored on the device that's connected, in order that they don't take the required measures to ensure protection of your information, "they say during a statement from the cybersecurity company Check Point.

To avoid risks, it's important to not consult sensitive information when connected, like the checking account . Likewise, the browsing history and cookies, also because the browser's temporary files, must be deleted after using them.

Keep the device up so far (and inaccessible)
The application updates and operating systems are crucial to strengthening the safety of the terminal. And it's that, normally, the new versions are amid solutions of open gaps which will be exploited by cybercriminals.

For this reason, cybersecurity experts recommend not letting time pass and completing the corresponding update as soon because it is out there . Likewise, it's advisable to stay the services that we've installed on the "smartphone" duly protected by using strong passwords .

"A good password must be of considerable length and intelligible"
The password of a social network, for instance , is that the key that provides access to its interior; so it's not something to be chosen randomly . Thus, when creating one, it's important to use ingenuity in order that they're especially difficult to decipher. That happens, of course, by not using personal information, like birthday dates, or dozing off and typing the classic and dangerous 12345 on the keyboard.

'A good password must be of considerable length and intelligible. The user must not use in any case a word that has got to do with him, like his month of birth or his name. It must even have numbers, letters and special signs, like asterisks or dollar symbols, "ethical hacker Deepak Daswani told ABC .

In addition to always employing a strong password, it's important that the user change it frequently. in theory , having it done once every three months would be enough. Likewise, it's not advisable to use an equivalent altogether social networks. within the event that a platform suffers a knowledge leak, or the user falls victim to a cyber scam, the utilization of various passwords can help limit the risks of losing control of several sites at an equivalent time.


____
Author: Lan Jing
Asia News Team