Internet Threats to Cell Phones

Who, how, and where are attackers attacking us?

– Many attackers are moving from computers to mobile devices, taking advantage of user ignorance and inattention. [This is a logical step on the part of hackers. People are increasingly replacing their computers with smartphones and tablets for online work, but with little or no virus protection.
– Most at risk are users of Android devices.
označený kyberprostor
– Attacks are directed at the weakest link in the system: the cell phone.
– Attackers most often attack via emails or messages that contain infected attachments and pretend to be messages from a bank.
– The most common type of attack is to coerce access to payment card details and banks via fake SMS verification.
– Mobile phone users these days do not use security or antivirus software. They don\’t even protect their phones with passwords or PINs; they don\’t update their operating systems, applications, or antivirus software; they don\’t even use their mobile phones to access their bank accounts.
– People do not pay enough attention when opening emails or SMSs purporting to be from customer banks, even though the messages may be fraudulent.
– We recommend using legitimate software, updating your Internet browser and PDF reader regularly, and using an antivirus program.
– If in doubt, contact the bank\’s dedicated website.
– Most attacks today are so sophisticated that customers cannot detect them themselves. Therefore, customers should install antivirus tools on their Internet banking phones and use and update them regularly.
– Another recommendation is to at least protect the cell phone with a simple password, an encrypted gesture, or a fingerprint.
In conclusion, the above knowledge will make you safer, but the best protection is still to use common sense and be cautious.