Despite attempts by manufacturers of phone systems to protect users, “internet thieves” continue to devise ways that make the task of “preventing penetration” almost impossible.
From extortion to bank accounts
Technology expert, Mazen Daccache, said in an interview with “Sky News Arabia” that “internet thieves of all kinds are doing the impossible to hack the phone to access information related to bank accounts, or any video, photo, personal message or password, which they can use to transfer its owner.” to a financially profitable goal.
He points out that “Internet thieves cannot be limited to one type, as they belong to various groups that meet at a single goal, which is to achieve financial profit, through methods that start from extortion and reach the point of controlling data that allows them to access individual bank accounts.”
According to Daccache, “the process of thieves hacking a smartphone can take place through countless ways, including infecting the phone with viruses through certain applications, or through phishing via text messages, voice messages, and even phone calls.”
He adds, “Thieves can also resort to the trick of providing free (Wi-Fi) service in a public place, which gives them access to information that they can exploit.”
For his part, the head of the Cybersecurity Committee at the Kuwaiti Electronic Media Union, Muhammad Al-Rashidi, told Sky News Arabia, “Internet thieves are always looking for the most used devices, and therefore it is logical for them to turn to smart phones, which contain valuable information.” Make it a valuable catch.”
And he points out that “the most dangerous types of breaches that are taking place now are (social engineering) breaches that take place by following a specific person, searching for the people closest to him and the places he frequents, based on the information available on the Web, after which the process of entrapping the victim begins by making him believe that The person he’s talking to knows him well.”
The first line of defense
Al-Rashidi stresses that “the hacking industry is constantly evolving, so the first line of defense for phone hacks is the user himself, and the extent to which he has sufficient awareness allows him to analyze what is happening with him and prevents him from responding to links and thieves’ requests.”
And he points out that “when the user is aware, he can reduce penetration by 90 to 95 percent, while fully securing protection is almost impossible.”
Al-Rashidi confirms that there are several signs showing that the phone was hacked, including:
Constant overheating of the phone Frequently dropping the charge level without any use The phone suddenly exits applications and enters chats Constantly suspending the device
In this regard, he explains, “Viruses make the phone work 24 hours a day, so its temperature rises and the battery level decreases.”
Leave a Reply