Grand opening, up to 15% off all items. Only 3 days left

Yes, yes, your smartphone can be hacked: 10 "tips" to protect yourself

Share

High Tech Challenges

High-Tech Theme followedNo longer follow

ByChallenges.fr on 07.03.2014 at 7:12 p.m., updated on 07.04.2014 at 12:44 p.m.Reading 6 min.

Mobiles today are real "mini PCs"... and can therefore be hacked. 10 simple rules to follow to prevent any intrusion. react smartphoneDRComment

Hacking mobiles? Since mobile phones have become smartphones, and therefore real computers, this possibility is more than ever on the agenda - especially since with their connectivity, their Bluetooth or Wifi connection, and their Internet access. , the possibilities of hacking multiply. Charles d'Aumale, marketing and sales director of Ercom, a company specializing in the optimization of mobile networks and the security of communications, delivers 10 simple rules to follow to prevent your smartphone from being hacked.

1) PROTECT YOUR MOBILE WITH AN ORIGINAL CODE

The code or password is a means of authentication for using a resource or service to which access is limited and protected. For a mobile, the use of a code reinforces the protection and thus avoids the theft of data in the event of loss or theft of its mobile. Forget too simple passwords, like 1234, or default passwords defined by the manufacturer, like 0000.

2) BE CAREFUL OF THE PASSWORDS... OF YOUR MOBILE APPLICATIONS TOO

Nowadays, mobile applications exist to manage the various aspects of your daily life: consultation of your bank details, payment of their invoices, online claim. It is often necessary to authenticate via a username and password. To prevent these accounts from being accessible in the event of theft of your mobile, it is important to remember not to use passwords that can be easily guessed (date of birth for example), not to pre-register them and to change frequently.

3) DEACTIVATE THE BLUETOOTH FUNCTION

Bluetooth technology, very commonly used in mobile phones, allows you to be connected with computers, personal assistants or even hands-free devices, such as Bluetooth headsets. It is also a real gateway for any malicious individual wishing to steal data. In order to avoid any intrusion, it is imperative to ensure that the Bluetooth function is locked when it is no longer necessary.

4)FREE ACCESS TO PUBLIC WI-FI TERMINALS: MEFIANCE...

Yes, yes, your smartphone can be hacked: 10

These Wi-Fi hotspots are generally marked and available in more and more public places, such as hotels, restaurants, fast food outlets, bars, etc. Some of these establishments offer free access, and for s to connect to it, nothing could be simpler for the user, but also for the pirate. These accesses are often little or not at all protected, which leaves the field open for easy access to the data available on the network.

5) DOWNLOADING APPLICATIONS "OFF THE BEATEN TRACK": DANGER

According to a study carried out by the Gartner Institute, in 2013, a total of 102 billion applications were downloaded against 64 billion in 2012. And this figure is likely to increase in the years to come, to reach nearly 269 billion downloads in 2017. In addition, analysts observe that nearly 91% of downloads represent free applications.

With this constantly growing number of downloads, it is important to remember the importance of reading all the information about an application. Most users are content with ratings and reviews, without paying attention to the functionality of the app, if the app provides access to contacts, phone data and location. It is advised, in case of doubt, not to download this application.

6) DOWNLOAD ON REGULATED PORTALS: OK

In order to avoid any unpleasant surprises, it is best to rely on classic download portals, such as the App Store, Google Play or the Windows Phone Store. Indeed, the applications on these portals are checked before being put online to ensure maximum security for users.

7) RECEIPT OF MMS, SMS OR UNKNOWN CALLS... IGNORE!

The MMS and SMS market is increasingly important, especially thanks to the unlimited offers offered by the various operators . These two means of communication allow both rapid and instantaneous exchange. They are also increasingly used by companies for their news, promotion… After email addresses, it is the turn of mobile numbers to serve as a database.

It happens to receive MMS, SMS from unknown recipient. In this case, it is recommended not to open them and delete them directly. Indeed, it may be an attempt to "break into" the mobile or to encourage the owner to call back a premium rate number. Regarding incoming calls, in 08 for example, it is preferable not to pick up, because it can be either a premium rate number or an intrusion attempt.

8) COMMUNICATION FROM ABROAD: SPLIT NEWS

While traveling abroad, whether for professional or private reasons, it is recommended to pay attention to telephone communications, speech held and the information transmitted, particularly in less democratic countries. For professionals, for example, it is advisable to send their so-called sensitive communications discreetly, to send, if necessary, information several times and in different ways (by email, by SMS, by call). This is to prevent any malicious person from accessing data that may be confidential.

9) FRYING ON THE LINE: NETWORK PROBLEM OR TELEPHONE BETWEEN?

When traveling abroad, especially in some countries, it may happen that the communication is poor. There are two possibilities: either the network is of poor quality (in 98% of cases), or the line has been tapped... In both situations, especially for a professional, it is best not to linger and limit themselves to irrelevant information.

10) SOLUTIONS IN CASE OF LOSS OR THEFT...

The fundamental advice to remember to protect your mobile from any intrusion attempt is that a smartphone is personal property. In summary, we must remember the obvious: it is strongly recommended to always keep your mobile near or on you, and to avoid leaving it unattended. In the event of loss, applications or functionalities make it possible to erase all data remotely and render the smartphone inoperative. Others make it possible to geolocate the phone, and some victims take themselves for Sherlock Holmes and thus go back to the thief... Be careful, let the police do it!

Comment

Growth

Comment
Comment React To react, please log in by clicking hereNewsletter Challenges

By clicking on "I subscribe", you agree that Challenges uses your email address for the purpose of sending you its newsletters. You confirm that you have read our General Conditions of Use, and our Privacy Policy which informs you of the methods of processing your data, as well as the means of exercising your rights over this data. You can unsubscribe at any time using the unsubscribe links or by contacting us at dpo@challenges.fr

Your subscription has been taken into account on the front page of this weekReadSubscribe High-TechAll High-Tech articles Our High-Tech sub-sections

Related Articles

10 Ways to Stay Safe When You Live Alone

10 Ways to Stay Safe When You Live Alone

How to draw a rose: our methods

How to draw a rose: our methods

Hotels, restaurants: tips paid by credit card will soon be tax-exempt

Hotels, restaurants: tips paid by credit card will soon be tax-exempt

"I was a rot in the evening and a good cop in the morning": meeting with "Haurus", the thug policeman of the DGSI

"I was a rot in the evening and a good cop in the morning": meeting with "Haurus", the thug policeman of the DGSI