Our mobile devices contain a lot of personal information, much more than we think, and this makes them a perfect target of cyber criminals. Are we able to recognize a possible violation of our smarphone or tablet? And what can we do to prevent being a victim of a cyber attack?
2. www.spheresoc.com
Sudden slowdown
A sudden slowdown of
the device in the
opening of the App,
the use of the camera
or any other usual
action SHOULD BE
SUSPECTED.
Usually a MALWARE
uses considerable
resources of the
device, causing a
slowdown.
3. www.spheresoc.com
Battery life
As the previous point,
even a sudden shorter
battery life should
arouse suspicion and
deserve FURTHER
INVESTIGATION.
The MALWARE
activities cause a higher
energy consumption of
the device, and
consequently the
battery is discharged
with greater frequency.
4. www.spheresoc.com
Unknown icons
Be aware of App-
related icons that have
never been installed
voluntarily.They may
indicate a BREACH IN
PROGRESS.
Attention also to
AUTOMATIC
REDIRECTS while
browsing. It could be
just a malware to take
us on dangerous or
FAKE sites.
5. www.spheresoc.com
Phone costs
Check phone costs: an
ABNORMAL
INCREASE, which is
not justified by normal
device usage, may
indicate malicious
software.
Various malware
charges telephone
costs, both for sending
information outside and
for visiting internet
pages for a fee.
6. www.spheresoc.com
Internet traffic
Keeping track of
Internet device traffic
may reveal non-
voluntary connections.
Be careful if data traffic
thresholds drop FOR
NO REASON.
A MALWARE sends the
information collected
on the infected device
to external servers. So
it uses a lot of data
traffic.
7. www.spheresoc.com
These are some important signs of a potential
breach in progress.
People often underestimate the SECURITY OF MOBILE DEVICES,
making them very vulnerable and attractive to
CYBERCRIMINALS.
8. www.spheresoc.com
What information could a cybercriminal be able to
access through our device?
Email addresses Phone numbers
Banking data Account social
Company information Corporate Accounts
Business Documents
So, how to protect yourself?
9. www.spheresoc.com
Some tips
§ Beware of the links in
emails that are read and
open on the mobile device
§ Beware of messages
received with suspicious
links or short links
§ Beware of attached files,
videos, and images that are
downloaded from both
unknown websites and
received SMS
§ Attention to messages and
e-mails received from
known phone numbers or
email addresses: if a
friend’s device has suffered
a violation, cybercriminal
could use his number or his
e-mail address to send
unexpected messages,
infecting other victims
10. www.spheresoc.com
Install a good antivirus and protect your
device with a password but above all ...
Never lose sight of your mobile device
because most infections require a
PHYSICAL ACCESS!