How to avoid hacking your smartphone: tips

UNITED STATES (OBSERVATORY NEWS) — A specialist from Kaspersky France told BFM TV how to detect the presence of malicious software on your smartphone and what to do to guard against any malware.

Smartphones, both iPhone and Android smartphones, offer criminals ample opportunity to come in and try to recover data. Thierry Gourdin, Pre-Sales Manager at Kaspersky France told BFM TV how to better spot the presence of malware.

Automatic installation of applications

On both Android and iOS, multiple signals may imply an intrusion. In the first place, you have to pay attention to the automatic and spontaneous installation of applications, without having specifically asked for it, says the specialist. These can begin to recover sensitive data, including usernames, passwords or bank details. To neutralize them, you have to delete them quickly and reset the smartphone.

A battery too quickly exhausted

Another sign to detect the presence of malicious software in the device is a battery that discharges very quickly, at 50% battery in two hours on a relatively new device, says Mr. Gourdin. A malicious program comes to tap the resources of the phone to undermine cryptocurrency and pay money to hackers.

Mobile data consumed too quickly

The data consumption of the applications installed on the phone is another indication of piracy . It is to be consulted in the application list of the device. Applications that have too much mobile data consumed may be suspected of harvesting and transmitting personal information , according to the expert. However, photo and video sharing applications, especially Snapchat, can be very consuming without being harmful.

Avoid the pitfalls!

Above all, avoid downloading applications from unofficial sources, other than the App Store or the Google Play Store, warns Thierry Gourdin.

“You should also be wary of free applications that offer miracle recipes to improve the capabilities of your smartphone: they are a very effective trap.”

Also pay attention to all access requests for downloaded applications. Because it is not legitimate for a text processing application to request access to the directory, text messages or the camera, warns the specialist.
Be careful not to click on an unwanted link. Ransomware, which encrypt the data of a device and claim a few hundred euros to recover, can pass through this on an iPhone just as on a computer.

Online:

This article is written and prepared by our foreign editors writing for OBSERVATORY NEWS from different countries around the world – material edited and published by OBSERVATORY staff in our newsroom.

Our Standards, Terms of Use: Standard Terms And Conditions.

OBSERVATORY — Breaking news source, real-time coverage of the world’s events, life, politics, money, business, finance, economy, markets, war and conflict zones.

Contact us: contact@newsobservatory.com

Stay connected with Observatory and Observatory Newsroom, also with our online services and never lost the breaking news stories happening around the world.

Support The OBSERVATORY from as little as $1 – it only takes a minute. Thank you.

We are OBSERVATORY — the only funding and support we get from people – we are categorically not funded by any political party, any government somewhere or from any grouping that supports certain interests – the only support that makes OBSERVATORY possible came from you.

Related Articles