• Home
  • Politics
  • Opinion
  • Culture
  • Sports
  • Economy
  • Interview
  • Reporting
  • Community
  • Vatra

Dielli | The Sun

Albanian American Newspaper Devoted to the Intellectual and Cultural Advancement of the Albanians in America | Since 1909

WHAT COULD EXPOSE YOU TO PHONE HACKING

February 4, 2020 by dgreca

Protect your privacy and data from phone hackers Start by knowing what could expose you to an attack, like vacation clues, hotel Wi-Fi and inadequate verification procedures 

In the last two years, security experts have seen a steady increase in simple schemes to get into accounts, like phishing, as well as more complicated campaigns to gain control over a victim’s financial life, like taking over a phone or a computer. The scariest threats yet may be the plots in which criminals impersonate an adviser, an employee or even a family member to get approval for a transaction. The ease with which hackers can gain access to someone’s phone and life is worth-noting. Hackers are using more surreptitious ways to gain access to people’s financial lives and threaten their wealth. Given the randomness of phishing, anyone can be a target. The big prey are going to be attacked in a more focused and persistent way. Experts say that social media not only presents an opportunity for criminals, it provides them with more personal details about you, which allows them to create the mosaic they can use to impersonate you. Protecting yourself starts with knowing how you are open to attack. Here are some common vulnerabilities and solutions for each.

On-line Posts

In this share-all age, those instant posts do more than alert bad guys that you’re not home. They tell criminals about your likes and dislikes and help them create a fuller portrait of who you are and what might be lurking in your email should they hack it. Vacations in general are fraught with risk. The hotel Wi-Fi network should never be used, because it exposes your devices to hacking. Use the hot spot on your phone instead, and never log into your financial accounts on a public network. Some Wi-Fi hotel networks are outright fakes. Syncing your phone with a rental car is a risk. It’s not just that your contacts will be stored in the car. Thieves can plant malware in the car to gain access to more than your most-called list. Similarly, never charge your phone with a charging station in a hotel room. That also can allow access to your data.

Limit Screen Time for Children

Children post too much, they can also be distracted and impulsive, two characteristics of adolescence that hackers can exploit to get them to swipe on all kinds of things. Like a phishing email that appears to leave a hair on the screen of a mobile phone — except it’s not a hair but a link that opens to a malware program that takes over the phone.  Put time limits for children and stronger encryption of their data. 

Work Relationships and Human Protocol 

Much has been made of “deepfake” videos and their ability to trick viewers into thinking they are real. These doctored videos can be created using clips of public figures who have been filmed extensively and have words, mannerisms and verbal tics that are easy to appropriate. It can be used in a work or office environment. There is no simple way to counteract it. One possible defense is to set up a system when you call back to that individual, who ‘asked’ you to do a wire- transfer.  A proliferation of deepfake videos is less worrisome because of the level of technology required to create one. There is more concern about simpler tricks that trap employees. 

Simpler still is a scheme in which a hacker calls and asks for the corporate Wi-Fi password. Another scheme, particularly in family offices or places where various people have authority to move money, conveys a sense of urgency to try to rush a wire transfer. Take time to train people who work for you, as well as friends and relatives, to understand there needs to be a stronger verification process.

Verify the Middleman

Sometimes the people hired to help you, like accountants and lawyers, can innocently provide a way into your financial life. In the “man-in-the-middle fraud,” a hacker intercepts emails to you, gaining access to your financial information. There is no fixed protocol on how to handle such thefts. The best that people can do is verify everything through basic human interaction that will slow and eventually thwart hackers.

Filed Under: Sociale Tagged With: Rafaela Prifti-Phone Hackin

Artikujt e fundit

  • NDJESHMËRIA SI STRUKTURË – NGA PËRKORËSIA TE THELLËSIA
  • Si Fan Noli i takoi presidentët Wilson the T. Roosevelt për çështjen shqiptare
  • TRIDIMENSIONALJA NË KRIJIMTARINË E PREҪ ZOGAJT
  • Kosova dhe NATO: Një hap strategjik për stabilitet, siguri dhe legjitimitet ndërkombëtar
  • MEGASPEKTAKLI MË I MADH ARTISTIK PAS LUFTËS GJENOCIDIALE NË KOSOVË!
  • Veprimtaria atdhetare e Isa Boletinit në shërbim të çështjes kombëtare
  • FLAMURI I SKËNDERBEUT
  • Këngët e dasmës dhe rituali i tyre te “Bleta shqiptare” e Thimi Mitkos
  • Trashëgimia shqiptare meriton më shumë se sa emërtimet simbolike të rrugëve në New York
  • “Unbreakable and other short stories”
  • ÇËSHTJA SHQIPTARE NË MAQEDONINË E VERIUT NUK TRAJTOHET SI PARTNERITET KONSTITUIV, POR SI PROBLEM PËR T’U ADMINISTRUAR
  • Dr. Evia Nano hosts Albanian American author, Dearta Logu Fusaro
  • DR IBRAHIM RUGOVA – PRESIDENTI I PARË HISTORIK I DARDANISË
  • Krijohet Albanian American Gastrointestinal Association (AAGA)
  • Prof. Rifat Latifi zgjidhet drejtor i Qendrës për Kërkime, Simulime dhe Trajnime të Avancuara Kirurgjike dhe Mjekësore të Kosovës (QKSTK) në Universitetin e Prishtinës

Kategoritë

Arkiv

Tags

albano kolonjari alfons Grishaj Anton Cefa arben llalla asllan Bushati Astrit Lulushi Aurenc Bebja Behlul Jashari Beqir Sina dalip greca Elida Buçpapaj Elmi Berisha Enver Bytyci Ermira Babamusta Eugjen Merlika Fahri Xharra Frank shkreli Fritz radovani Gezim Llojdia Ilir Levonja Interviste Keze Kozeta Zylo Kolec Traboini kosova Kosove Marjana Bulku Murat Gecaj nderroi jete ne Kosove Nene Tereza presidenti Nishani Rafaela Prifti Rafael Floqi Raimonda Moisiu Ramiz Lushaj reshat kripa Sadik Elshani SHBA Shefqet Kercelli shqiperia shqiptaret Sokol Paja Thaci Vatra Visar Zhiti

Log in

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT