Jump to content

Here are the top phone security threats in 2022 and how to avoid them


RV_

Recommended Posts

This is a comprehensive and accurate article about keeping your phone malware free, and most of then are user interface malfunctions. Worth a close read for folks who depend on their phones.

Excerpt:

"Your handset is always at risk of being exploited. Here's what to look out for.

Our mobile devices are now the keys to our communication, finances, and social lives -- and because of this, they are lucrative targets for cybercriminals. 

Whether or not you use a Google Android or Apple iOS smartphone, threat actors are constantly evolving their tactics to break into them. 

This includes everything from basic spam and malicious links sent over social media to malware capable of spying on you, compromising your banking apps, or deploying ransomware on your device. 

The top threats to Android and iOS smartphone security in 2022 

(these topics are covered in the article)

Phishing and smishing

Physical security 

SIM hijacking 

Nuisanceware, premium service dialers, cryptocurrency miners

Open Wi-Fi 

Surveillance, spying, and stalkerware

Ransomware 

Trojans, financial malware

Mobile device management exploits

How can I physically protect my device?

What should I look out for as symptoms of a malware infection?

What about Pegasus and government-grade malware?

What should I do if I think my Android or iOS phone is compromised?

Source: https://www.zdnet.com/article/here-are-the-top-phone-security-threats-in-2022-and-how-to-avoid-them/

 

 

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

Don't want your phone hacked? Just do this one thing

Excerpt:

"If you follow one phone security best practice, make it this one.

And yet, no matter how many times they are warned, end users continue to tap those strange links and respond to those messages sent by unknown users. The end results could be catastrophic to your data, your privacy, and your identity.

According to Avast, global ransomware attacks are up 32% on businesses and 38% on individuals. Those attacks come in the form of fake package delivery information, tech support scams, sexploitation scams, and phishing scams (when an attacker attempts to trick you into divulging personal information to gain leverage over a victim).

You've seen these emails and SMS messages come into your phones. I get them all the time. While I was writing this article, I received no less than five such scams and my wife forwarded me an email phishing attack that posed as an order for Geek Squad Gold Plus Tech Support at $499.19. Within that email were phone numbers to tap which I guarantee would lead to no end of trouble. I immediately responded to her to say it was a scam and delete it. This type of attack is so common that I've reached the point where I automatically block (or mark as Junk) any email that includes certain phrases or companies that are frequently used in Phishing scams."

https://www.zdnet.com/article/if-you-want-to-keep-your-phone-from-getting-hacked-you-better-do-this-one-thing/?ftag=TRE-03-10aaa6b&bhid={%24external_id}&mid={%24MESSAGE_ID}&cid={%24contact_id}

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

How to find and remove spyware from your phone

Surveillance apps are becoming more advanced. Here's what to do if you think you're being tracked.

"Our digital selves are now an established part of our identity. The emails we send, the conversations we have over social media -- both private and public -- as well as the photos we share, the videos we watch, the apps we download, and the websites we visit all contribute to our digital personas.

There are ways to prevent a government agency, country, or cybercriminal from peeking into our digital lives, for example, by using virtual private networks (VPNs), end-to-end encryption, and browsers that do not track user activity.

However, governments and law enforcement agencies are now taking advantage of sophisticated spyware developed and offered commercially by companies, including NSO groups. It can be extremely difficult to detect or remove when implanted on a device.

This guide will run through different forms of malicious software on your iOS or Android handset, what the warning signs of infection are, and how to remove such pestilence from your mobile devices if it is possible to do so.

How to find and remove advanced spyware from your iOS, Android phone

Source:

https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/?ftag=TRE-03-10aaa6b&bhid={%24external_id}&mid={%24MESSAGE_ID}&cid={%24contact_id}

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

These ransomware hackers gave up when they hit multi-factor authentication

A ransomware attack was prevented just because the intended victim was using multi-factor authentication (MFA) and the attackers decided it wasn't worth the effort to attempt to bypass it. 

It's often said that using MFA, also known as two-factor authentication (2FA), is one of the best things you can do to help protect your accounts and computer networks from cyberattacks because it creates an effective barrier – and now Europol has seen this in action while investigating ransomware gangs.  

https://www.zdnet.com/article/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it/?ftag=TRE-03-10aaa6b&bhid={%24external_id}&mid={%24MESSAGE_ID}&cid={%24contact_id}

 

 

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

Thanks glad you found the second one useful Darryl! 👍Glad I did not stop at the first. ;)

 

 

Edited by RV_

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

From too much time spent rooting out malware from clicking instead of deleting. Finally got most of the older family members on board with just deleting things.

I have been wrong before, I'll probably be wrong again. 

2000 Kenworth T 2000 w/N-14 and 10 speed Gen1 Autoshift, deck built by Star Fabrication
2006 smart fourtwo cdi cabriolet
2007 32.5' Fleetwood Quantum


Please e-mail us here.

Link to comment
Share on other sites

3 hours ago, Darryl&Rita said:

From too much time spent rooting out malware from clicking instead of deleting. Finally got most of the older family members on board with just deleting things.

I know that feeling Darryl! I used to do malware removal without a factory reset and wipe as doing an image was just not safe while infected. It cost a lot and only my wealthy clients could afford it. Despite that they refused to take my advice and do security updates on their anti-virus (back in the day). They told me that is why we have you.  For them I started doing images once cleaned and keeping them myself. Now I would not even attempt to do anything and that is why I retired from tech work back around 2005. Malware got too complicated and my patience with self inflicted injury is gone.

But some folks here appreciate the posts with tips. I solved the crashing problem with my new All in one and will post that fix later. I am surprised at how easy it was once I found the right YouTube video for registry edits and then the best is the Intel update automatic scan page!

RV/Derek
http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998


When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius

 

“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...