Friday, April 20, 2018

Unfollow to cyberattacks on your smartphone

As times passes, smartphones have become an extension of our body. We communicate by them and we show private parts of our life without knowing how many people can actually see our information. Likes, Follows and Hashtags are often used by us, letting some of our information to some companies that might not be transparent. Today, we are going to talk about this week’s main news to share with you the last information in apps and smartphones security.  

Cybercriminals have discovered a great opportunity in apps vulnerability and in the blind trust we have in them. We install applications from third parties without checking the origins and we accept terms and conditions without reading them. We post information online. Technology has become the window to society.

Who doesn’t have a smartphone nowadays? Pew Research Center said that, only in the United States, more than the 77% of the population owns one. But that we focus on the younger generations, that percentage goes up to a 92%. Communication, finances and shopping are the most common use for them. In 2017, citizens from the United States spent $780.000 million in payments via their smartphones, tablets or other portable devices. More than the half of them is managing their finances online. This can lead to information risks like addresses, dates and social security number. The possibilities of being hacked are high and we should be prepared.     

Eleanor Dallaway, Infosecurity Magazine Editor is sure about that the mobile phones will keep being the most important digital platform and will keep rising. New models, new features and loads more of possibilities will make the smartphone the center of our digital ecosystem. At the same time, smartphones will organize user experiences. Technology will anticipate customer’s tastes. 

Apps are the key in this world, but be careful. The Web vulnerability research from Positive Technologies in 2017 shows that 94% of the apps had high-risk vulnerabilities. The most common one was found in between webs scripts creation. This allows attackers to make phising attacks against users or to infect some devices with malware. 
As users, we are not conscious enough about the hundreds of apps that have our personal information: names, ages, incomes and even phone numbers and email addresses. Who is guilty? The app developers that don’t protect the data correctly when a third party has its commercial shown in the apps. Roman Unuchek, the Kaspersky Lab security investigator, explains that cybercriminals can obtain data by sharing the same Wifi net by an ISP or by installed malware in their victim’s router. They can also obtain data that can show evil commercials to the user. This may lead you to download a Trojan app and this can risk your device. 

Cybercriminals can’t only attack by Wi-Fi or fake apps. They can attack you directly from your iPhone or iPad by the chargers in airports. Once the user connects the device to the charger, it’s asked to allow fully trust on the computer. User may say yes thinking is normal, but it isn’t. The criminal starts sync with iTunes and he will be able to see all your data. 

Smartphone: most personal device. We take care of it and we don’t allow anybody in. But what’s happening is that no criminal is asking for your permission when watching your data and personal information.  


Post a Comment