Penetrate 4 ways that use hacking smartphones, along with 4 easy ways to deal with

by time news

during January this year The trend of being hacked or espionage data on smartphones has come back to talk about again from the news. Someone claimed to have hacked data through the charging cable. But the price of this type of charging cable is priced as high as 3,900 baht per line to about 660,000 baht per line and is more suitable for specific targets than random hacking, so TNN Tech has compiled 4 mobile hacking methods. that have the opportunity to be close to them, including 4 ways to prevent these problems

1. Tricking third-party applications

One of the most common forms of hacking is sending fraudulent messages through various channels. Both SMS or text messages via LINE (LINE), including telephone channels that pretend to be from various agencies, install applications from a given link or channel. Which these applications, regardless of how they look and use Its real purpose is to extract user data. Whether it’s a password, account number, or credit card number through the Clipboard database, which is a temporary storage area of ​​text or images that we copy (Copy), or even secretly collect data from the numbers that we press. onto the screen

The best solution is not to be fooled. By having to choose to use applications from the store (Store) of the operating system itself, for example, iPhone users (iPhone) must use applications from the App Store and especially smartphone users. The Android system (Android) is often targeted by the system’s ability to install third-party applications via APK installation files. The source will solve the problem of being hacked. along with always updating the application

2. Phishing hacking

Phishing is a term that refers to the sending of messages, emails or LINE (LINE) to trick people into clicking on links that may claim to be bank links. government agency then enter personal information or give consent to something These actions will allow bad actors to gain access to the smartphone and eventually use the information or money from the linked account.

The solution to phishing problems should start by looking at the website’s surname (Domain Name). For example, banks that are often hit with forged phishing links often use unusual domains. For example, banks in Thailand will use domains .co.th or .com, but fake websites may be .net or others. Including the web name (Hostname) that is spelled incorrectly, such as tnnthailand becomes tnnnthailandd to confuse and convince victims

3. Bluetooth and Wi-Fi Hacking

Bluetooth (Bluetooth) is a form of wireless data transmission. Just like a wireless network (Wireless Connection) popularly known as Wi-Fi (Wi-Fi) that is used to send and receive Internet signals. Experts warn that Turning on Bluetooth and Wi-Fi

Leaving it open may allow professionals to connect and access data within 10 meters, although this doesn’t happen very often.

Therefore, to prevent potential problems Turning Bluetooth and Wi-Fi off when not in use Especially when traveling through public areas is very necessary. It also saves a bit more battery life by not having the chip constantly searching for both signals.

4. Hacking by swapping SIM cards

While this method isn’t talked about much these days, in 2019, Twitter’s founder and CEO, Jack Dorsey, at the time was in the spotlight. Hacked his own Twitter account (Twitter), which the subsequent investigation learned that his smartphone was secretly swapped SIM cards with SIM cards prepared by hackers.

Although this won’t happen to everyone because of the high preparation and cost involved. But keeping the smartphone with you all the time In addition to maintaining the property It also helps to turn off the SIM card switching slot.

Data Source: McAfee

image source Getty Images

You may also like

Leave a Comment