Hacker attacks on smartphones are increasing. According to the study Cyber ​​Attack Trends: 2019 Mid-Year Report*, cyber attacks on smartphones and mobile devices increased by 50 percent in the first half of 2019 compared to the previous year.

According to the study, Android devices are particularly affected. However, recent incidents show that the iOS operating system is also being targeted by hackers. A prominent and current example is the brazen hacker attack on the Amazon boss's iPhone X. In addition to this individual hack, mass attacks on iPhones have also recently made a name for themselves. Security experts from Google uncovered the mass hack of thousands of iPhones that originated from malicious websites. One visit to the websites was enough to infect the iPhone. The attack on the Amazon boss's smartphone followed a different pattern: he caught Pegasus malware through a video message via WhatsApp. He had no reason to be suspicious because the message ostensibly came from a person he knew, the Saudi Crown Prince Mohammed bin Salman.

Common types of attacks and gateways – WhatsApp

The popular messaging service WhatsApp has often been abused for hacker attacks. It was only in May 2019 that a security gap in WhatsApp caused a stir. iOS and Android users were affected: hackers were able to manipulate the smartphone via WhatsApp video calls.

[mk_ad]

Now there could be another security risk lurking for numerous WhatsApp users from February 1, 2020: From this date, the messenger service will stop supporting Android cell phones with the operating system 2.3.7 and iPhones with iOS 8. Possible security gaps can then no longer be closed via an update. (We reported about it here )

Other apps can also pose a potential source of danger for hacks. “Free apps are actually generally a risk because they often send data to remote servers. These can then be accessed by advertisers and unfortunately also criminals,” explains Michel Anders, Mobile Device Manager at everphone, a rental service for mobile devices.

According to the expert, the most common types of attacks include malware ( malicious programs such as Tojaner or spyware ), hacking passwords by automatically trying out common character combinations, phishing (spying on login data through fake emails or websites) and spoofing (pretending a false identity, e.g. email sender).

Private individuals and companies affected

It's not just private individuals who are affected by smartphone hacks. According to Security Report 2020*, around 27 percent of organizations were affected by cyber attacks on mobile devices last year.

IT specialist Michel Anders sees two main reasons for the vulnerability of mobile devices: “Firstly, mobile devices are more difficult to protect. Secondly, mixed professional and private use poses a significant risk.”

For example, mobile devices are at risk when logging into untrustworthy Wi-Fi networks. In public places such as airports, for example, hackers use free 'airport WiFi' to entice users to log into insecure networks. In addition, mobile devices that are always on are at the forefront of phishing emails. “Phishing emails are often opened on mobile devices. Because the devices are constantly on, recipients usually receive them first and are quicker to take the bait of legitimate-looking emails on their smartphones,” explains Anders.

In order to be able to use a smartphone professionally and privately without any security risk, a mobile device management system (MDM) and a container solution are indispensable today. Manufacturers and the manufacturer-independent rental service everphone offer such solutions. At everphone they are included in the monthly rental price.

[mk_ad]

“For example, an MDM is important for enforcing operating system updates. These so-called forced updates serve to close security gaps. The use of a container solution is also essential. So the separation of workspace and private area on the device. Not only does it protect privacy and ensure compliance with the GDPR. In the event of a hack, the damage can at least be limited,” explains Anders.

6 safety tips

  1. WLAN
    If in doubt, avoid free WLAN networks in public places.
  2. Bluetooth and NFC
    When not in use, deactivate these open interfaces. Hackers often take advantage of this.
  3. Updates
    Software updates close security gaps and should be carried out regularly.
  4. Private and business use
    Using a professional mobile device management system and a container solution.
  5. Passwords
    The longer the better. A mix of numbers, letters and special characters is ideal. Absolute taboo: One master password for everything.
  6. Be careful when downloading free apps.
    Check permissions before downloading and revoke them in the settings if necessary.
*Source: Check Point Software Technologies Ltd. / everphone
article image: everphone


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )