Is your smartphone hacked?How to judge

By : ilikephone / On : 28/08/2022

FreePik - JP.FreePik.Technology photo created by COM

Smartphones are hacked

 Now that the possession of a smartphone has become commonplace.In addition to calls, various functions, such as a wide variety of apps and SNS, are deeply entering our everyday life.Recently, “online”, which is about to go out, has been used for shopping.

 On the other hand, smartphones are likely to be a target of cyber crimes.It is a treasure trove of personal information, but many people do not care about security.

 One of the things I want to be aware of is the hacking of a smartphone.There are ways to physically invade software into smartphones, or install software on his websites, fishing attacks, and fake apps.

 As a result, information may be stolen or used for mining (mining) of cryptocurrency.In particular, in modern times, home appliances are accessed through smartphones.If the terminal is hacked, there is a risk of accessing data recorded in smart home technology.

 What are the specific symptoms of hacking?First of all, be careful if the performance suddenly decreases, such as slow operation or slow reading of web pages and apps.Also, if there is an app that you do not remember downloaded, or if you have an unremable email or call record, it is a dangerous signal.

 In addition, there is a possibility that a pop -up like spam is displayed, the home screen has changed, or a suspicious website bookmark is registered.If there is a setting change that you do not remember, it will be a clue that indicates that it has been hacked.

 I want to be careful about security because it is a smartphone that I use on a daily basis.Hacking may have the image of a PC, but smartphones are no exception.

Basic measures are important

 What should I do to protect my smartphone?First of all, it is important to install reliable security software.On top of that, I want to keep updating smartphone OS and apps frequently.

 Now that cyber crimes are increasing, manufacturers are constantly providing security patches and updates to improved versions.It is important to apply as soon as possible when the update is notified.

 In particular, OS vulnerabilities countermeasures are in place.Apply as soon as possible when an update notification is reached.I want to keep in mind that an immediate update is important.

 There is a VPN method as a service to ensure online safety.The abbreviation of "Virtual Private Network" (virtual private network) is a technology that encrypts data and secures a safe communication route.

 The communication between the device and the access point is encrypted, so even if it is intercepted, it will not be possible to decipher it.If you have more opportunities to go outside, you should increase the need to protect your personal information.

 I also want to not download dangerous apps.Try to use the official app store (refrain from using unofficial app markets).If you have an unnatural app name, an explanation of an unknown app, or a user review, you should refrain from downloading.

 This time, let's introduce "How to judge whether smartphones are hacked" from Mcafee blog.(Sekyu Lab) (Seikyu Lab)

* The following will be reprinted from MCAFEE blog.

How to judge whether a smartphone is hacked: Mcafee Blog

Have you ever used a smartphone and felt something wrong?Charging is cut off immediately, suddenly the power supply is turned on and off repeatedly, the smartphone becomes hotter enough to hold it by hand, there is a call record that does not remember, and the amount of data used.If it increases rapidly, your smartphone may be hacked.

Some of the signs of hacking smartphones seem to be technical issues on the surface.However, these signs may indicate serious problems, such as malware installed on smartphones.Malware may consume a large amount of system resources, or compete with other applications and OSs may cause heavy smartphones or abnormal movements.

However, this phenomenon occurs is not a bad thing in a sense.Malware is inefficient, and you can notice its existence because various obstacles occur with smartphones.Now that you are always carrying your smartphone, you can immediately notice these signs.Pay attention to trivial signs can find an invisible big problem.

Hacking software and its symptoms

あなたのスマホがハッキングされている? 判断する方法とは

Hackers are physically invading hacking software into smartphones, or using fraudulent websites, phishing attacks or fake apps to install users on smartphones.Hacking software may cause the following problems:

・ Kiro Rogging: This is like a stalker.When entering characters with a smartphone, tapping the screen, or talking, steal information from the smartphone.・ Trojan Kima: This is a type of malware.Invasion into smartphones and steal important data such as credit card account information and personal information.・ Cryptocliminer: Like the Trojan horses, it is a software that invades and hides a smartphone.Make a cryptocurrency mining using the calculation ability of the smartphone.Cryptoming itself is not illegal, but doing cryptuming without the consent of the smartphone owner (this is called crypto jacking) is definitely illegal.

If hacking software is invading the smartphone, the following phenomenon occurs.

Performance decreases

You may see the signs described at the beginning.If your smartphone is slowed down, web pages and apps are loaded slow, or the battery is cut off quickly, it is possible that malware operates in the background and a large amount of smartphone resources are consumed.I have.

The smartphone gets hot

Performance decreases場合と同様に、バックグラウンドで稼働するマルウェアやマイニング アプリは、スマートフォンの計算能力やデータを過剰に消費します。そのため、Performance decreasesだけでなく、スマートフォンの温度が上昇する原因にもなります。

There are unknown apps and data

If there is an app you don't remember downloading, or if you have an unremable email or call record, it's a dangerous signal.Hackers may take over smartphones, use high -priced call services and message services, or spread malware to contacts registered on smartphones.Similarly, if the amount of data is rapidly increasing, it may be hacked.

Suspicious pop -ups are displayed or the home screen changes

If a pop -up like spam is displayed, the home screen of the smartphone has changed, or a suspicious website bookmark is registered, malware may be invaded.Even if there is a setting change that you do not remember, it will be a great clue that indicates that your smartphone has been hacked.

Correspondence when smartphones are considered hacked

・ Install the mobile security software on the smartphone and start it (if it has not been installed yet). Next, delete the apps you don't have downloaded or suspicious emails and restart mobile security software.・ If the problem is still not solved, there is a method of erasing the data stored on the smartphone and restoring it. This is a relatively easy way if important data such as photos and contacts is backed up in the cloud. If you search on the Internet, you can easily find out how to erase and restore the data on the model you are using.・ Finally, check the account and credit card transaction statement to see if there is no memorable purchase history. If you find an unknown purchase history, stop your account and credit card and proceed with new cards and authentication information. Also, change your account password to a strong password.

10 hints to prevent hacking smartphones

Here are some hints to prevent hackers from entering smartphones and stealing important information such as personal information.

1.Use comprehensive online protection software: For desktop PCs and laptops, it has been a long time to use comprehensive online protection software.But what about smartphones?Isn't there so many people who use comprehensive protective software?By installing online protection software on your smartphone, you can not only block various attacks, but also use the following security features.

2.Updating smartphones and apps: Installing security software, updating smartphones and apps and keeping them up to date is the most effective way to ensure safety.Updates can fix the target vulnerabilities for cyber criminals who perform malware attacks.In addition, the update not only makes the smartphone and the app operation smoothly, but also installs useful new features.

3.Use VPN to ensure safety while going out: Hackers try to invade smartphones using public Wi-Fi in airports, hotels, libraries, etc.Since this public Wi-Fi can be accessed by anyone, your account information and password will be released for everyone who uses the same network.As a way to make public networks private, there is a method of using VPN.VPN can protect your personal information from users who use the same Wi-Fi hot spot.

4.Use a password manager: Another way to prevent hacking is to use a strong password. Since we use many accounts on a daily basis, it is difficult to use different powerful passwords for each account. Therefore, I want to use simple passwords repeatedly on every site. But then it's the hacker I want. This is because one password can enter multiple accounts. If it is difficult to manage multiple passwords, we recommend using a password manager that can create and store passwords in a safe way. Comprehensive security software such as macafi Total Protection incorporates a password manager.

5.Public charging stations are not used: Using public charging stations seems to be easy and safe, but some hackers use malware to public charging stations and set up "juice jacking attacks".。If you use such a charging station, passwords and personal information may be stolen during charging (see this article for details).So what should I do if I want to charge while going out?In that case, we recommend that you use a rechargeable portable charger or a charger operating in AA batteries.It can be purchased at an affordable price and easy to carry.

6.Pay attention to smartphones: It is also important to prevent smartphones from theft.When a smartphone reaches the hand of a criminal, the smartphone can be a means of hacking.Lock your smartphone with a password or PIN in case your smartphone is stolen.Also, if you turn on the device tracking function, you can check the position of the smartphone or erase the data by remotely as needed.For detailed procedures for erasing data by remote control, see the step -by -step guide for iOS users created by Apple and the guide for Android users created by Google.

7.Cryptence of smartphones: When you encrypt your smartphone, you can protect the contents of the call, email, message, and important information from hacking.To confirm that the iPhone is encrypted, tap [Touch ID and Passcode] to scroll to the bottom to see if the data protection function is enabled (usually the passcode).If is enabled, the data protection function will be automatically enabled).In the case of Android, there are models that come with the automatic encryption function and some do not.

8.Lock the SIM card: Use the SIM card to identify the owner of the smartphone and connect it to the network, but can also lock the SIM card as if locking a smartphone.If you lock the SIM card, you will not be able to use a smartphone for networks other than the current network.See this article for the procedure for locking the iPhone SIM card.You can lock with simple steps.See the manufacturer's website for smartphones other than iPhone.

9.Other than use, turn off Wi-Fi or Bluetooth: Think of it as closing the open door.If Wi-Fi or Bluetooth is turned on, it may be a target of a hacker with sufficient equipment.Similarly, although it is not a hacking act, there are also retail stores that use Bluetooth technology to track customer location information in the store.Therefore, if you turn off Wi-Fi or Bluetooth, you may be able to protect your privacy.Both Wi-Fi and Bluetooth can be easily turned off on the setting screen.In many models, you can turn it off using the pull -down menu on the home screen.

10.Do not use third -party app stores: Google Play and Apple App Store have carefully examined the safety of the apps on the site, but the third party site may not have such a process.I have.In fact, there are sites that intend to publish malicious apps as part of a large -scale fraud.Cyber criminals know how to avoid Google and Apple's judging process, but downloading from Google Play or Apple App Store is much safer than downloading apps on third -party sites.Also, Google and Apple will be deleted as soon as a malicious app is found, so this is safer than a third -party app store.

* This article is an article that edits and introduces the popular entry of the past MCAFEE BLOG for publishing ASCII and McAfee collaboration sites "Sekyu Lab".

■ Related site