Technology

Fraudsters can attack your phone in an unexpected way: how to protect it

Extend: If you are the Android phone owner, his lock screen provides an additional security level-you will need a PIN, password or biometric authentication to access the device. But the use of the lock screen alone will not protect your accounts. Lock screen is a necessary but insufficient safety measure, writes AndroidPolice. com. After all, there are ways that you can break your account by bypassing such a preventive measure. The publication names several options for the malefactors.

The lock screen does not protect you from malicious programs - they can access your data without unblocking your device. Harmful software can be detected in contaminated applications, compromised networks, as well as "seep" through suspicious references and investments. Even if your phone is updated and the latest version of the OS is installed on it, it does not mean that it is completely invulnerable to dangerous programs.

If you make your device or location trusted, you will give yourself the risk of unwanted access. For example, if someone else in your house takes your tablet and is configured as a trusted location, then this person will potentially be able to access your account without any obstacles. This is due to the Smart Lock/Extend Lock feature that allows you to configure a trusted person, a trusted device or a trusted location.

There may be another situation: if your phone is connected to a trusted device (through Bluetooth), it remains unlocked. The intellectual lock function is convenient because it allows the main user to bypass the lock screen. But it can create serious problems. Even if you are in a reliable place - for example, in a tested hotel - never add publicly accessible networks or devices to the trusted list, experts advise.

If the lock screen protection is not reliable, the hacker or the thief can easily access your device and accounts that do not need verification. Therefore, instead of relying solely on biometric data or access code, consider using other password/PIN (for example, special folders, to hide the confidential content). Starting with Android 10, all new devices use file encryption. On older devices with old OS encryption may be optional, but it is not turned on by default.

The use of a reliable cloud storage is crucial because most proven sources encrypt your data during transmission. Without good encryption, thieves can steal your data with cyberattacks (for example, by installing a spy software). This is a common problem in which attackers use the weakness of two -factor authentication (2FA). Criminals take control of the phone number, convincing the mobile operator to move the number to the new SIM card (controlled by the attackers themselves).

After the scam replace, it is possible to intercept calls and text messages, including 2FA codes on SMS. Because these codes can be seen or stolen, the attacker can access your account without even having physical access to your phone. In addition, it should be noted that there is no universal blocking at all. Earlier, Focus wrote what to do if fraudsters try to steal money from the account.