Friday , November 27 2020

Your comprehensive guide to protecting the privacy of your smartphone



"By 2020, smartphone users tend to reach more than six billion users worldwide," Shahrom Ghilani said in a report at Tak NewsWorld. .

The author says that we might overlook the fact that smartphones are pocket-sized computers, and just like any device that can connect to the Internet, these smart phones are at risk of cyber attacks.

According to McAfee, the number of malware increased at an alarming rate, up 27% in the last quarter of 2017. The security of your cellphone must be a top priority, both for personal use and for business purposes.

Types of malware:

Spy software for your cellphone
The author says that this malicious program can penetrate your cellphone under a good program cover. These programs can secretly monitor your activities, register your site, and steal your sensitive passwords. This application may accidentally provide access to this information by downloading it.

Malicious program uses root privileges (Rout)
This type of malware is the worst, because this virus gets the ability to access root users from hackers and gives hackers genuine user privileges and access to user files.

Trojan horse targets banking transactions
With the increasing popularity of banking services and telephone transactions, viruses that penetrate these processes have become serious problems facing cybersecurity. In 2017, Trojans or Trojans, which targeted telephone banking operations, attacked nearly 260,000 users in 164 countries. The attackers disguised themselves as official banking applications to attract users to download, allowing them to steal their data.

Malicious software targeted to text messages
This type of software controls smartphones by sending text messages at a certain cost. This process is usually done without the user's knowledge until he receives a surprising bill at the end of the month.

c195e8489a.jpg
Downloading malware is one of the most common ways to hack your cellphone (Getty Images)

How to hack your cellphone
Downloading malware is one of the most common ways to hack your cellphone. Internet criminals can hack applications and classify them into third-party applications and attach them to hidden malicious software, making users who install the application install malicious software on their computers. Hackers also exploit known vulnerabilities in the operating system, so it's important to update your device.

Your cellphone can also be hacked by connecting to public Wi-Fi networks, which are usually not encrypted, allowing hackers to cut data flow between users and access points. This attack is known as a "moderator attack", where a hacker can spy on any conversation on a hacked network.

Android vs iOS
Google's Android system is the main target for malicious software, with 19 million malicious software developed specifically for Android systems. This is due to the dominance of the Android operating system in the smartphone market in the world, inconsistency in updates to this system, and the use of several types of application distribution systems that are relatively open.

1. A large number of cellphones were attacked
Despite the global popularity of Apple products, 85% of smart phone users in the world use Android phones. Many large companies, such as Samsung, Huawei and HTC, operate Android.

2. Sharp updates to the operating system
Updates in the Android system are usually unorganized. When Google launches an update on its operating system, it takes time to reach users, unless they have Google devices such as pixel phones.

3. Open the platform
The Android system has an open and adaptable platform that makes it more vulnerable to cyber attacks than Apple's AOS system. Users can download applications from third-party sources that are not regulated by Google Play, which has made 10 million Android devices hacked by the dangerous HummingBad program in 2016.

IOS operating system vulnerability
The iOS operating system is not completely secure, a massive attack on XCodeGhost, which occurred in China in 2015, has caused more than 39 applications to be hacked, including the old version of the Wii Chat application. Hackers sneak into the App Store by offering fake copies of Apple's XCode program to developers. They then managed to steal data and send fake notifications to hackers to trick users into disclosing their information.

bba407c002.jpg
Factory Restore is the most successful way to accelerate the pace of old smartphones (German)

Signs that your cellphone has been attacked by malicious software
Detecting your device is difficult, because your mobile might contain some malicious and hidden software that damages your cellphone without realizing it. To check if your cellphone has been hacked, you should look for key signs, such as a slow device, or use up the battery faster than normal. A striking decrease in performance is more than a sign that you need to change your cellphone, but a sign that your cellphone is infiltrated.

How to remove malicious software from your mobile
If your phone is compromised, you must activate Safe Mode on your device. You can do this by pressing the Shut Down button until you are asked to reactivate safe mode on your device. Safe Mode will deactivate all third party applications. So if you find that your computer is running smoothly, believe that the virus is behind the problem. Next, access your mobile settings and enter the application file. Find the application that you think is behind any problem or application that you don't remember downloading. You can delete it manually by clicking the Uninstall button.

He also showed how to get rid of viruses in the OS operating system, showing that malicious software targeting this system is less than the Android system, but that does not make the attack impossible.

The IOS security mechanism, which limits virus access to applications, helps prevent the spread of this virus to other underlying applications or operating systems and damages it. This means that it is very easy to find out which hacked application caused a bug on your cellphone. You will only experience problems if the hacked application is opened and run.

ac5dbef868.jpg
Malware that targets the iOS system is less than the Android system (Getty Images)

Tips for protecting your cellphone:

1. Beware of public Wi-Fi networks
The author says that you may not access sensitive information when using public Wi-Fi networks, such as logging into a bank or checking sensitive e-mail messages, because hackers can attack your calls through proxy attacks.

2. Don't damage protection or switch to the routine (root)
Downloading expensive apps for free by breaking the protection of iPhone and Android phones looks good, but this step removes protection from Apple and Google.

3. Download the application from the official app store only
Smart hackers teach you how to sneak into walled gardens in app stores and security measures for Google Play Protection. But your chances of downloading malicious applications are very low if you commit to uploading them from the official app store.

4. Update your operating system
The author emphasizes that internet criminals exploit vulnerabilities in the operating system to access smart phones that have not been updated. To minimize this risk, make sure that updates to your software are installed as soon as they are released.

5. Encrypt your device
You must enter your PIN or password to decrypt your cellphone every time you want to use it.

6. Review the entry declaration
Often, when users download new applications, they don't take the time to read the terms and conditions or see what data they allow to access the application.

Thank you for following up on the "comprehensive guide to protecting the privacy of your smartphone" in the Monitor newspaper, noting that the content of this news has been written or written down by the editor of "Al Jazeera Net" and does not reflect the newspaper's point of view, but is transferred or transferred in part, Read the news from the main source of the following link (Al Jazeera Net), the authentication sign next to the news (if any) means that the news is documented by the source but in case of complaints or doubts the credibility of the news can delete the news "And the news will be deleted in 24 hours , God willing … with the best greetings


Source link