When our phone may be hacked.

in hive-175254 •  4 years ago 

Source

Greetings to all my dear readers and followers, today I will share with you a very common topic and that we can all be victims without realizing it, it is about knowing when our phone may be hacked or not.

The different technological advances that arise daily undoubtedly come to improve our quality of life, one of the main technological tools that allow us to be communicated with other people are smartphones, these technological equipment have undergone in recent years a series of technological improvements that makes them one of the most important means of communication in the world.

Through smartphones, besides communicating, which is one of their main functions, we can also manage our company, obtain information about it in real time, we can also consult our bank accounts in a quick and easy way, among many others. That is why maintaining the security of our smartphones is of great importance, because we can prevent third parties from obtaining our personal or financial information illegally.

Source

How can we know if our phone has been the victim of a hacker, recently two major computer security companies such as Norton and Karspesky have made public some considerations that will allow us to know if our smartphones have been hacked. The first thing we should know is how much use we give as users to our phone, for example when our team consumes very quickly our data service is an alarm that tells us that we may be a victim of a hacker, another way is when our team is downloaded very quickly, this is another alarm.

Normally as users we download applications without knowing if it is reliable or not, when we download an unknown application this can be a tool that a hacker can use to enter our phone and thus steal our relevant information. If as a user you rarely use your phone and you notice that suddenly it is downloading very quickly and your data is consumed in the same way you are being a victim of a hacker. Although there are other indicators according to these security companies these are the most common and that is why they suggest not to download applications from unknown places because we could be scammed, Norton and Karpesky recommend downloading applications from Google and Apple stores.

Reference Consulted

Article prepared by:

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

People shall be informed on how to deal with suspicious things that happen in the background, downloading or running, also I would like if there is a way to distribute awareness about unsafe websites that some people might go in accidentally. Your post is so helpful since it has some famous indicators of being hacked so thanks for sharing it!

Greetings @lennyblogs, so is people should be informed about websites that can cause damage to our computers, thanks for your comment.

This is really a good information and I hope everyone see this too, thanks for helping.

Greetings @benie111, thanks for your comment my friend, hopefully and this post will reach many users.

interesting friend @carlir, computer security applies to any of the devices that can connect to the Internet and more if they handle personal data and passwords.

Greetings @rubenp, certainly every device that connects to the internet must have its security because if it does not, it may suffer attacks.

Great information and i think better anti virus solutions for smartphone can help us in this matter. And also there are other methods to prevent hacking but anti-virus is automated solution. Great advice.

Greetings @luckyali, smartphone antivirus would be of great help as it would prevent suspicious applications from being installed.

Thanks for your comment.

Sure thanks for sharing phone hacking and phishing has become very rampant today it important as users we should be very careful of link we download and webpages we view or visit.

Greetings @carlir, no doubt smartphones have become a great need in these changing times and as you rightly say we must be vigilant against possible threats that threaten the security of our equipment. Thanks for the contribution