‘Professional Cyberhacker’ Reveals 5 Ways to Take Control of Your Phone in Seconds

2023-12-17 03:37:55

Smartphone users are not always aware of the risks they face due to their careless use of their device.

• Read also: Government sites victims of Russian cyberattack

• Read also: Here are 4 tips from a former cybercriminal to better protect yourself online

• Read also: Cyberattacks: Banks, ports and government assailed by hackers

As part of his job as a security consultant at Prism Infosec, Keiran Burge must regularly test the cybersecurity of companies using the same techniques as a real hacker.

Its objective is to find flaws in the companies’ system before malicious people do so and exploit these flaws.

In interview at Daily MailMr. Burge presented some common user errors that make the task of cyberhackers much easier.

Here are five ways a hacker can quickly take control of your phone:

Software out of date

According to Keiran Burge, one of the first things hackers look at when planning an attack is software that is out of date.

“Outdated software represents a major problem, because if an update was designed by the manufacturer, it is probably to correct a security flaw,” says the expert.

Reuse the same password

Many cyberhackers take advantage of the fact that you reuse the same password on several platforms.

“No matter what site you use, you don’t know what they do with the information you give them and how they protect that data,” says Burge.

If one of the platforms you use falls victim to a cyberattack, hackers can get their hands on your password and try it on other sites you use.

Giving too much information online

In general, it’s important to be more aware of how much information regarding yourself you reveal online, says the expert.

Moreover, cyberhackers will often consult your social networks in order to collect various information regarding you which might then be useful to them in hacking you.

This includes your date of birth, your address and answers to common security questions such as your mother’s maiden name.

“Once you have all this information, you can contact your mobile provider and convince them to transfer your phone number to another SIM card,” explains Keiran Burge.

Subsequently, if someone texts or calls you, it is automatically redirected to the hacker.

“Once we have achieved this, we can have access to sites using multi-factor authentication to which a person is registered,” says Mr. Burge.

The hacker suddenly finds himself with access to your emails, your online business accounts and even your bank accounts.

Connect to unsecured networks

Public places or businesses that offer free access to a wireless internet network expose you to attacks by cyberhackers.

These public networks ensure that the data you send across the network is not encrypted and can therefore be easily captured by anyone connected to the same network.

To avoid having your information stolen, Keiran Burge recommends always using a VPN when connecting to an unsecured Wi-Fi network.

Click on a questionable link

Sending questionable links remains one of the favorite weapons of cyberhackers, indicates the expert.

These will send emails or text messages containing links to malicious sites or even leading users to download software.

Once you click on such a link, cybercriminals then have time to install malware that can steal your data and even take control of your device.

“You need to be vigilant regarding any person, company or institution that sends you something you didn’t expect,” says Keiran Burge.

1702785819
#Professional #Cyberhacker #Reveals #Ways #Control #Phone #Seconds

Share:

Facebook
Twitter
Pinterest
LinkedIn

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.