How to avoid phishing on your phone.

The mobile we take it everywhere

The technique of cybercrime most used during the summer is that of the "phishing" or impersonation of identity, in which the cybercriminals supplant the identity of third-normally banks or businesses-to deceive their victims with the objective of installing them « Malware» or malicious code, stealing personal information and, in the worst case, accessing your bank accounts or breaking into your homes.

Although in principle the holidays are to disconnect, it is difficult to keep your eyes off the phone during the summer months, and they know very well the cybercriminals. Therefore, organized groups usually get their best scams during this time of the year, because it is when they invent new deceptions and improve their techniques to take advantage of the summer dismissal.

The cybercriminals constantly innovate their "phishing" techniques to adapt them to new technologies. For this reason, the cybersecurity company Panda Security has shared a series of tips to avoid these attacks on smart mobile phones.

Beware of certain users in networks and WHATSAPP

The cybercriminals know, as pointed out from the company in a statement, that during the holidays almost all Internet connections are made from mobile devices, and that the interaction of users with other people is done fundamentally from WHATSAPP, popular messaging application with more than 1.2 billion users around the world.

That's why you have to be attentive to the messages that come to us by WHATSAPP. In particular, they remark the experts, those who come from numbers that are not registered in the contacts agenda and ask for personal information from the user. In such cases, it is best to ' distrust and block contact as soon as possible '. Hervé Lambert, retail Global Consumer operations Manager of Panda Security, recommends using the function of WHATSAPP that allows to report as "spam" the numbers that appear suspicious.

Alert with second-hand services?

Experts warn that identity impersonators can be found in any application in which information is shared, including those of second-hand sales, such as Vibbo or Wallapop. The first defense against these cases is to distrust profiles that do not have ratings from other users or do not offer information about the prospective buyer.

But you also have to be careful with the private messages that are received in these ' apps ', especially those in which the user is asked where he lives or where he is at a precise moment. The company warns that if the user receives an offer too suggestive of someone who says he is near his home and wants to see him urgently, it could be a cybercriminal who wants to know if he is on vacation to break into your home.

Beware of geolocation

In this sense, the geolocation offered by many ' apps ' can also be counterproductive because it reveals where the user is. Applications such as Trip Advisor or Google Local Guides are useful for valuing restaurants and tourist places but they are also "an open book for the Cybercriminals", as Lambert points out.

"The Cybercrime use social engineering to have information about users to have a first contact in such a way that they look like people of trust," adds Panda Security manager. This means that it is best to distrust if you receive a message asking for some personal information after leaving a review of any bar.

Observe the wording of the message well

Although it is the most used and protected channel, the Cibecriminales know that the "phishing" in the email is still very effective, where they impersonate banks, electric or telephone companies to not raise suspicions of the user. One of the most used tactics is to send emails with personal information updates such as passwords, mailing address or phone number. To fight against this fraud is simple, because the companies, as they assure from the security firm, never ask this type of data by email. See our article Ransonware

Therefore, from the company urge to read carefully the texts that are received. If they are not well-written, a standard e-mail translated with a Web application is likely to be used. Also, be careful with the emails with links that say "Delete me of this list of distribution". They are usually links that lead to a server that downloads some type of "malware" on the computers, so in case of doubt it is best to move the mail to the folder "spam" or junk mail.



Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Este sitio usa Akismet para reducir el spam. Aprende cómo se procesan los datos de tus comentarios.

Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies, pinche el enlace para mayor información.plugin cookies

Aviso de cookies
Optimization WordPress Plugins & Solutions by W3 EDGE