How smartphone users can keep cybercriminals at bay as hackers rise

How smartphone users can keep cybercriminals at bay as hackers rise

As more and more people are using mobile phones to shop online, it is essential to understand the security threats on the Internet to ensure a safe shopping experience. Pune-based cybersecurity firm Quick Heal says cafe attack It usually rises during the holiday season.

Sanjay Katkar, Joint Managing Director (MD) and Chief Technology Officer (CTO) of Quick Heal Technologies Limited, said Quick Heal experts have noticed a periodic rise in cyber incidents, especially on festive occasions. These attacks include phishing, he said, adding that people become vulnerable to attacks when they fall in love with the bait.

In a recent report titled ‘Festive e-commerce season 2022’, business consultancy Redseer said that of the 75-80 million Indians who shopped on e-commerce platforms in the first week of October, mobile phones accounted for about 41 per cent of sales.

It appears that more people are rushing to buy mobile phones to take advantage of the huge festive deals, indicating the increasing demand for these multifunctional devices.

According to Nathan Wenzler, chief security strategist at Tenable, a US-based cybersecurity company, “With so much of our personal, medical and financial information flowing through these smart devices, they are also prime targets for cybercriminals who can monetize that data or take advantage of access for nefarious purposes.”

Here are three cybersecurity tips for staying safe from cyberattacks.

Watch over your mobile network: While 5G is now the talk of the town, news of cybersecurity incidents, including cell phone hacks, is flooding social media posts. A senior official said, “We have noticed that many people in Hyderabad have fallen prey to cyber scammers who have been deceived under the pretext of upgrading their SIMs. The number of such incidents has risen since the news of 5G launch in Hyderabad came out.” A city police officer in an interview with TimesNow on October 7.

One of the latest scams is SIM swapping, said Pinakin Dave, country director for India and SAARC, OneSpan, a Chicago-based cybersecurity firm. It’s so ominous because he said the incident may have already happened by the time the person learned about the attack.

As part of the conspiracy, the hackers send a request to replace the SIM card on your behalf but activate it on their phones. Since your phone number is associated with many services, they can access them as well.

“To avoid becoming a victim of this scam, contact your service provider when your network stops working. Additionally, make sure that dual OTP is activated for your phone and email. Installing phishing and malware protection will also help avoid this type of incident,” advised Dave.

Check the authenticity of the app developer: The user can download applications in several ways. Google play store is the most used, but other APK download sites allow users to download apps.

Wenzler said that users should check the app’s copyrights, read the developer’s policy terms, honesty, etc., before downloading any app from any platform.

The Policy and Privacy Terms are generally displayed on the download page for the Google Play Store and iOS App Store. Wenzler advised people to only download apps from popular app stores.

Check smartphone stats frequently: Wenzler advised people to keep track of their smartphone behavior statistics. It’s tricky, but there is a built-in app tracking functionality on both Android and iOS platforms.

For example: In the Battery Information section of your Android/iOS phone settings, you can check how much battery each app consumes. You can notice this and observe any unusual battery usage behavior with any app. Similarly, in the Android phone network section, you can check the amount of data each app consumes and monitor any unusual data consumption.

Dave says that people often fail to notice if a bad actor has replaced the original app of their phone with a malicious app that looks similar.

There are also some behavioral statistics that you can monitor and determine if the app is real or malicious. For example, a malicious app will consume more battery and processing power and sometimes slow down the phone.

Wenzler also suggests that people check if they’ve been suddenly logged out of their social media accounts or received multiple login attempts emails.

Wenzler added: “While there may be technical issues, these behaviors may also indicate that a malicious app has been installed, and attempts are underway to put your data and other services at risk.”

#smartphone #users #cybercriminals #bay #hackers #rise

Leave a Comment

Your email address will not be published. Required fields are marked *