Beware of Threats Lurking for Smartphone Users


KIPRAHKITA.NET
-- In the past, cellular telephones (cell phones) were only devices intended for making calls and sending short messages. But now, since the birth of smart phones (smartphones), their functions have become extraordinary.


Behind that, there are many risks faced by mobile device users. And, using both Android and iOS devices carries the risk of security threats. It's just that iOS devices have a better protection system than Android.


For that reason, Android users have to work harder to protect their devices because they pose more real threats.


The following are several security threats that lurk Android users so they need to be alert.


Application from an unofficial store


One of the advantages of Android is that it allows users to download applications from outside the official store. Unfortunately, this capability comes with major security issues.


For example, unofficial applications are one of the ways cybercriminals use to install malware and other dangers. Unfortunately, the best course of action for users to avoid this malware is to avoid installing apps from outside the official store.


Phishing


Phishing occurs when criminals send you fake messages with the aim of defrauding you. Cybercriminals attempt to direct potential victims to share personal information, click on malicious links, download and unwittingly run malware on devices, or hand over bank account details.


Phishing can also be used to install malware or spy software on your device. Phishing is usually carried out via email and short messages. However, phishing can be done in all ways.


Vishing


Vishing is short for voice phishing, which is another increasingly popular attack vector. Attackers using this method will use voice services to try to defraud their victims.


This can include leaving voice messages, using automated robocalls, voice changing systems, and more to trick individuals into providing sensitive information.


Surveillanceware, spyware, and stalkerware


Surveillanceware, spyware, and stalkerware are security threats that exist in various forms. Spyware is used to steal personal identity information and financial details.


However, surveillanceware and stalkerware devices are usually more personal and targeted. For example, a husband or wife might install spy software on their partner's cell phone to track contacts, phone calls, and GPS location. Sometimes, these apps are marketed as parental or employee control tools.


Ransomware


Ransomware can affect both mobile devices and PCs. Ransomware will encrypt files and directories, lock you out of your device, and will demand payment in cryptocurrency in exchange for unlocking.


Compared to iOS, Android devices are more vulnerable to ransomware because the Android operating system software is open source, meaning anyone can modify it. If a developer makes a mistake, it will be easier for hackers to find and exploit the security hole.


Trojans


There are countless variants of mobile malware. However, of all the malware families, trojans are at the top.


Trojans are a form of malware specifically developed with data theft and financial gain in mind. Often, malware is packaged as an application. When an unwary user downloads the application, the trojan will land on your device and steal important data there.


It is important for Android users to be wiser and more careful when using their mobile devices. For example, by setting passwords and PINs on important applications, not carelessly downloading applications and clicking links, and not leaving the device anywhere. (various sources)

Post a Comment

0 Comments