The popularization of electronic devices has made cyber attacks increasingly common. This is something that A few decades ago this could only happen to our computers.because they were the only devices that we Spaniards had connected to the Internet. But Currently, there may be dozens of them in each household. In fact, it’s not uncommon to see reports of security cameras having privacy issues.
It is not uncommon to hear about attacks on government entities or private companies, but we are also aware of attacks on individuals and attempted scams. Although in IT, the risk is limited to what enters the network, In the case of smartphones, there are other attacks that can enter depending on our location. And this is important in summer because we move a lot more than the rest of the year.
It’s not that GPS serves as a problem activator, but There are attacks that are carried out based on the connections available in a location, whether via Bluetooth, WiFi or both, if systems such as Quick Share are used. Since these are wireless systems, the attacker does not need to be physically next to us, although in the case of Bluetooth, a range of 10 to 15 meters is required, due to the technology itself. To minimize the risks, common sense and certain practices must be implemented.
Wireless
By default, Android phones have enabled a feature that alerts us if public WiFi networks are available. This made sense back when data rates were very expensive, but it is no longer the case today. Maybe on some trips abroad we will want to connect, but we must keep in mind that it is somewhat dangerous depending on the networks.
By default, it is recommended to disable this feature. To do this, you need to go to the section Settings, so you have to come in Networks and Internetclick on Wireless then go to the option Network Preferences. There you have to check that the option “Warn if there are public networks” is disabled.
We can also heal ourselves in good health turn off wifi connection if we know that we are not going to use it, avoiding accidental connections. In addition, it is a good idea to delete public networks to which we have previously connected to avoid the next connection being automatic.
In case we don’t have data and a connection to a public WiFi network is necessary, it is better be careful with the websites you visit and the data to be sent. It is not recommended to use banking applications for example with these networks. You should always use pages that use the HTTPS protocol, because of the increased security that this implies. In addition it is a good idea do not give personal information using these networks, nor accessing sensitive services.
Bluetooth
Bluetooth attacks are less common, but they also pose a danger. They are called bluesnarfing and The strategy is to establish fraudulent wireless connections and access information from any device with this connectivity. In this way, it is possible to steal data from any device, from photographs to passwords.
In crowded areas, such as concerts, festivals or the like, we can take steps to minimize these attacks. If we do not use a wrist-worn device, such as a smart watch or bracelet, one possibility is to turn off bluetooth. If you can’t do it, it is necessary set the device to undiscoverable modethus preventing them from connecting to it without your knowledge.
At the time of the use passwords on mobile don’t use the classics like 1234 or 0000. This can make it easier to access another part of the mobile once they’ve logged in. And as always, keep your mobile up to date and key functions such as Google Play Services are highly recommended.
Quick Share
This protocol, created by Samsung and Google, is based on the two previous ones. Establish a connection via Bluetooth and then send data via WiFi
To begin with, as in the case of Bluetooth, do not accept messages from strangers. There have been problematic cases in other countries with AirDrop, the system similar to the one Apple uses. You always have to know who is sending something before accepting.
Besides, it’s a good idea. limit who can send us somethingwhich can be changed in the Settings of this function. By default, no one can send us anything, so we are safe, but it is possible to change it so that only contacts or anyone can send us files. If the latter option is chosen, it is wise to limit the time allowed to a few minutes.
How to detect an attack
In case our smartphone has been infected in some way, there are some clues that could indicate that this has been the case. If you see yourself phantom impulses On the mobile phone, you must immediately turn it off and then turn it on without data connections or WiFi networks in order to erase the terminal or take it to a specialist.
There emergence of third-party applications that we do not have installed is also a symptom that they might attack us. Especially if they use Chinese, Cyrillic or other characters that we never use. If we notice that the mobile goes much slower Normally, there may be background applications using the CPU for, for example, mining cryptocurrencies. A study of outgoing data connections could unmask this usage.
Table of Contents