Events,News,Gist,Fashion,Education,Sports and ssshhhhhhhh Gossip as in AMEBO

Featured post

Advice Me! I Was A Prostitute Before, I Am Afraid My Boyfriend Will Find Out And Dump Me

She's scared that her new man won't marry her if he gets to find out the truth about her dirty past… Read what she sent to us:- I ...

25 Jun 2015

Phone hacking: How to detect if phone is compromised

The capabilities of Nigerians are growing in terms of technology and skills and along with these is the ability to wreak havoc, experts have said.
According to the President, Information Technology Systems and Security, Mr. Rogba Adeoye, despite the good that comes with any e-process, it comes with a cost.
"Everything is transferred through the airspace, whether it is phone or email. All of us are in danger because we use this technology. If you know how to code, you can break into anybody's phone. It is like locking your room and keeping the phone in your pocket, a burglar who wants to steal something can find a way in. It means anybody is prone to hacking," Adeoye said.

He explained that the technology of the phone is such that it is routed through a server with the service provider. Each of the telecommunication companies in Nigeria controls these servers.
"For anyone to be able to hack into your phone, they must be able to obtain your root number with your service provider," he said.
Head of Operations, GMT Nigeria, Mr. Lawore Olorunfemi, who is an ethical hacker, said to confirm if one's phone has been hacked or not, the first point of call should be one's outgoing email.
He said, "Check your outgoing mails to see if any mail has been sent, which you knew nothing about. That would show that probably a spy ware has been installed and is sending everything you do on your phone to a particular email address. There is also the need to check the settings of your mail server to see if anything is different.
"Another thing to do is to check if there is any application that has been installed on your phone that you did not put there. Uninstall such application immediately.
"If your phone is suddenly using huge internet bandwidth that you cannot explain, then know that there is an unsolicited activity going on in the phone. If your data finishes on time and your network provider says it is from your phone, then it may have been hacked. The first thing to do is to go to your application managers and start uninstalling applications that you did not put there."
Other experts have also suggested that when one's phone battery drains inexplicably or one's device starts acting strangely, these may be symptoms that it may have been hacked.
Suggesting more ways of avoiding susceptibility to hacking, Olorunfemi said phone users need to install a remote wipe application on their mobile phones.
He said there are more dangerous hackers that one should be more wary of than jealous lovers.
The hacker said, "For those who use the BlackBerry, you can simply log on to your BlackBerry user account online and wipe your phone as an emergency strategy if it is stolen.
"Do not download applications from websites that are not on the official BlackBerry or android stores. Some of them are meant to hack into one's phone.
"Blogspots and pornographic websites have a high tendency of putting spy ware on user's phones. Sometimes you open a page and it would want to install something on your device or system. What you do in such a case is to stop such thing from download immediately. Most of them are spy ware."
"Then, think twice before opening links online because it might be a link to spy ware that would automatically be installed on your device. All the links that are sent to you via email have the potential of compromising the security of your device. Hackers prey on the inquisitiveness of people. Most of the things advertised on social media are also very risky sources of spy ware."
He also suggested that one could also encrypt one's phone and also download a genuine file locker application.
"On the BlackBerry for instance, there is the encryption option. Use the file locker application to import applications like your mail, photographs, chat application and banking software, so that they can't be accessed remotely. Most of these things are easy to do. Also lock your file explorer. Always lock your screen lock to minimal time," Olorunfemi said.
In case one's phone is confirmed to have been hacked, experts say the solution is to download a mobile security application that is genuine from big brand names such as Google, Play Store, Apple App Store, and the Amazon App Store, which will identify a malicious application and delete it.
Share:

1 Comments:

  1. Very useful article, thanks to the author. Protecting privacy is very important to me, so I mainly try to protect myself in all aspects of this issue. I recently found a useful software https://hackaphone.net/, it helps you keep track of your friends and family. This is convenient, because you will never be deceived.

    ReplyDelete

DON'T JUST READ DROP YOUR COMMENT.
Kindly help Share this information with all your friends and family on Facebook or Twitter, they will appreciate it. Click on any of the Share buttons Below to share now Thanks

BEST OFFER

">

Categories