|
Android: more freedom, more risks
|
|
Mobile phones with the Android system are the most targeted by this type of threat, mainly because they allow the installation of applications outside the official store (Google Play).
Here are some examples of malware on Android:
- Fake banking or service apps: they look legitimate, but they only serve to steal data.
- Spyware: can read messages, listen to conversations, access the camera or track your location.
- Abusive advertising (adware): fills the screen with adverts and makes the use of the phone difficult or impossible.
|
|
|
|
|
And iPhones, are they safe?
|
|
Although iOS (Apple’s system) is often considered a closed operating system, it can also be the target of attacks, mainly in situations such as:
- Messages with malicious links that exploit security flaws.
- Sophisticated malware such as the famous Pegasus, capable of accessing the camera, microphone and messages without the user knowing.
- Jailbreak: when the iPhone is unlocked through this process, it loses much of its native security.
|
|
|
|
|
Simple tips to protect yourself
|
|
Whether you use Android or iPhone, follow these good practices to protect your mobile phone:
- Install applications only through the official stores (Google Play or App Store).
- Keep the system and applications updated.
- Be suspicious of apps that ask for access to the microphone, location or camera without a clear reason.
- Avoid clicking on suspicious links sent by SMS, e-mail or instant messages.
|
|
|
|
|
|
If employees use their own mobile phones to access company e-mails or files, it is essential to ensure that these devices are protected. A single infected smartphone can put the entire internal network at risk, which is why the Zero Trust model is fundamental to ensure that infected devices have limited access to resources, due to the application of this functionality.
In summary, as mobile phones become increasingly central to our daily lives, the risks associated with their use also increase. Being informed and adopting simple preventive measures can make all the difference in protecting your personal data and your company’s information. Most attacks require only one thing: that you click on a link. That is why the human factor continues to be the first line of defence. Security begins with small gestures – and staying alert is the first of them.
|
|
|
|
|