Page 32 - CyberSecurityEssentialsEnglish
P. 32

✓  Connect using a Virtual Private Network (VPN).
               VPNs  encrypt  connections  at  the  sending  and  receiving  ends  and  keep  out  traffic  that  is  not
               adequately encrypted.


       Mobile Phone-related threats
       Cybercriminals design fake applications to damage users and their gadgets. They are made to seem like
       legitimate programs, but they do harmful actions. These actions could involve checking your online behavior,
       installing malware, displaying intrusive advertisements, or stealing your data.

       Fake Applications
       There are several ways to spread fake software. They could be housed on phony or unofficial app shops.
       Despite  the  security  safeguards,  cybercriminals  may  still  distribute  bogus  programs  through  official  app
       stores.

       Cybercriminals may download a legal program, register themselves as developers on any app store, and then
       replace it with a harmful code. They may then submit their phony software to the app store.

       The Google Play Store may still contain harmful programs. Google often pulls phony Android applications
       from the Play Store, including phony games, browsers, and antivirus software. Yet, Apple's App Store only
       accepts tested applications.

       Fake Applications Threats
       Fake applications are always risky apps. Examples of fake apps include:

           ✓  Ad  bots  repack  applications  frequently  containing  advertisements  absent  from  the  free  genuine
               versions, thus your phone may also start displaying unforeseen advertisements.
           ✓  Billing fraud apps are fraudulent applications automatically charging items to your phone bill without
               your permission. They can even make collect phone calls (i.e. a phone call in which the party receiving
               the call pays the charges, rather than the party who makes the call), send premium SMS messages, or
               purchase items through an app store.
           ✓  Botnet secretly utilizes the phone to deliver spam, mine cryptocurrencies, or participate in distributed
               denial of service (DDoS) attacks.
           ✓  Phishing-based apps are bogus apps that can direct you to enter your login information or visit a
               website to achieve that (or infect you via that website). Then, hackers take your login information to
               utilize it maliciously.
           ✓  Rooting apps root the smartphone, often known as jailbreak. Legitimate programs may root, and not
               all rooting apps are bad; real apps ask for user permission before doing hazardous operations on your
               device.
           ✓  Spam apps contain a code that can use your smartphone to participate in an email spam campaign or
               send unwanted messages to your contacts.
           ✓  Spyware is an application that transfers personal information and activities (like text messages, phone
               logs, contact lists, emails, photographs, browsing histories, GPS position information) to hackers.
           ✓  Trojan programs covertly carry out dangerous tasks in the foreground. They consist of a valuable
               component that enables the app to work as a destructive component. Thus, the device is enabled to
               send private information without your awareness.






          30
   27   28   29   30   31   32   33   34   35   36   37