The cell
phone or smartphone has a big place in our lives. The main reason for the
invention of the mobile phone was the simplification of communication. But
today's 21st-century cell phones aren't just for communication; Mobile phones
have now become an important part of our daily lives.
Today, we
use mobile phones instead of our personal assistants, starting with the mobile
store. With this mobile phone we can communicate directly with friends and
relatives from home and abroad by video call. We process money through this
mobile phone and store many personal items on this mobile phone.
But what if
you know that the cell phone you've been using for a long time is under the
control of hackers? If you know that your mobile phone belongs to you, is all
your personal data stored on your mobile phone? Even all the information in
your bank went to hackers. If you know that all the social network accounts you
use on your mobile phone are in the hands of hackers, they will enter your
account with a password!
Craft
President Jennifer Alam told Jugantar that it's important for Internet users to
be vigilant in today's world of the Internet. The more vigilant we are online,
the safer we can be. We often share personal information, which is not
possible, so you need to be very careful when installing the application on
your smartphone. By installing the application, hackers can monitor the entire
device of the victim. So we have to be careful in this case. If someone is a
victim of such a thing, then you have to turn to law enforcement.
"Usually
we know that what people like is what an unscrupulous person or group
sees," he said. Smartphones are also included in the list. They didn't
rule out things like breaking or selling user data with convenient pages in
different places. Although they use a lot of things as a trap, the strategy
they use to do the most benefit or harm to users is a "smartphone
app".
Regarding
the security of smartphones, CRAF IT analyst Ryan Malik said: "Almost all
Internet users in our country are smartphone users, but very few people are
interested in cyberspace, which takes advantage of hackers." In most
individual-level attacks, hackers are primarily social engineering weapons;
They make attractive traps like lotteries or attractive ads or say that some of
your bad photos were viral by clicking on this link.
When
installing the app on a smartphone, we need to be careful about what
permissions the app installs and ask for unreasonable permissions. In case of
doubt, the permit must be revoked. Don't click on unnecessary links and ads.
Use a good antivirus.
Let's
not know the signs of smartphone hacking-
1.
Regularly used applications can be closed or opened from time to time
2. Mobile
payments will be exhausted soon
3. There
are some unknown processes in the background that do not suit you or any
application you use
4. The
phone is slower and slower than before
5. There
will be more data transfer (download)
. The phone
is hotter than usual
. The phone
restarts/reboots automatically
. The
number is called automatically
9.
Automatic applications are launched
10. Find an
unknown number on the last call and get money for it
11. Find
picture text messages on your phone that you didn't send or receive
12.
Sometimes you want to turn off the phone, but you do not want to turn it off
13. Strange
sounds and echoes during phone calls
14. In the
history of the browser I found strange sites
15.
Smartphones use more data than regular phones
16. New
pop-up windows
16. A
letter from a sender sent to an infected mobile phone and identified as spam
16. Sudden
drop in call (sometimes network).
0 Comments