تهدیدها و روش‌های محافظت از امنیت موبایل‌های هوشمند-01.jpg

In the current era, one of the most essential technological devices is the smartphone, which is also used by the Afghan people the most. Smartphone users communicate with different people and communities through various applications and exchange, check, and control their information officially and privately. Also, they perform hundreds of other uses, including managing bank accounts, taking pictures, recording sounds, and recording various videos. Therefore, all the private information of users is registered and stored in their smartphones and can be easily accessed.

The use of smartphones is always accompanied by serious online and offline threats, and sometimes users face security challenges. Since smartphones contain personal and vital information of people, protecting it in a way is considered to protect the privacy or security of users. So, these smartphones should be treated with caution and protected from any online (hacking) and offline (theft) threats.

For this reason, in this article, we will discuss the most common methods of hacking smartphones through the Internet and the essential points of staying safe in cyberspace, which are worth reading for users.

The connection between smartphones and the Internet

  Smartphones and the Internet are more effective together in the world, or it can be said that these two complement each other. In the age of people's widespread access to smartphones and their connection to the Internet in the world, the issue of mobile security has recently received serious attention from smartphone users. Although many smartphones have built-in security, you cannot rely on their security alone.

If you're not careful, losing or hacking your smartphone can mean more than just a few pictures and contact numbers. We are talking about your social media accounts, your private and official communications, important documents, emails, photos, and messages. If a user loses his smartphone or hackers penetrate it, all his information can be traced and accessed.

By accessing information, your private information may be shared by people knowingly or unknowingly throughout the World Wide Web. In this virtual world, thieves and hackers hide behind an anonymous identity, and it is difficult or impossible to find them in most cases. Therefore, no one can do a better job of protecting your information than you.

How does the threat of the Internet arise?

In general, activities that take place online and, on the Internet, including web browsing, email management, and presence in the media and social networks, pose a serious threat to the security of smartphones or users' private information. On the Internet, there are many programs and resources that intend to destroy the operating system, infect the mobile phone, and hack the information in it.

In today's era, many things are done with the internet, and not using it can cause people to face serious challenges. Smartphone security threats are attacks by hackers that aim to compromise or steal information from smartphones and tablets. These threats are often in the form of malware or spyware that allow malicious individuals to gain unauthorized access to these devices. In many cases, users are not even aware of the occurrence of these attacks.

Therefore, you should be careful about all activities related to personal information on the Internet. For safe use of the Internet on smartphones, there are various methods that can be considered to prevent the disclosure of personal information.

Types of security threats and methods of combating them

Mobile security threats come in all shapes and sizes, but this article focuses on four general categories of threats and how to combat them. These four categories are the most common methods of leaking or revealing private information that can expose people's personal information and identity to mobile security threats. Read the orders and important tips to protect against threats carefully below:

1 - Web-based mobile threats

Mobile web attacks are usually done through phishing or scams. Hackers send an email, text, or message to the victim that appears to be from a legitimate source, but the message contains a malicious link or attachment infected with various viruses, trojans, worms, and botnets. When users click on this link or provide their personal information, the hacker can gain unauthorized access to the private information on the smart mobile device and use it from the other side. On the other hand, many people use weak passwords, use the same passwords on different user accounts, and share information with harmful colleagues and friends.

How to avoid these dangers?

• To avoid being hacked, users should avoid clicking on suspicious and unknown e-mails and attached files.

  • Don't pay attention to the messages and e-mails of contacts you don't know.
  • Do not visit websites that you think are infected with worms, trojans, and viruses.
  • Be careful in the media and social networks and do not open all kinds of links because unsafe activities and how to use social media incorrectly on smartphones can make the way easier for hackers.
  • Even if your contact seems to be a valid sender, still be careful about suspicious things; Instead, enter the URL into the address bar of your web browser so you can confirm the link is legitimate.
  • Adjust your mobile settings so that you can log out automatically after you finish using programs and websites.
  • Use strong passwords that contain numbers, symbols, and lowercase and uppercase letters.

2- Threats based on applications

Smartphones often have serious security vulnerabilities with installed applications or programs.

Applications that are downloaded and installed from sources other than the official application stores, can lead to intrusion into smartphones because smartphones do not have proper protection programs. In addition, hackers may install malicious programs on mobile devices that aim to use the information of the victim's users. Also, hackers can install malicious codes in the operating system of smartphones through programs infected with malware and spread in the device without being detected, thus transmitting information continuously and secretly.

This type of attack occurs when smartphone users download and install malicious apps or allow apps to access information and mobile options regardless of its security level.

So, what to do for immunity?

  • Pay attention to the methods that you think will minimize the threats, for example, instead of installing an application that you do not need, it is good that it is not installed at all on your mobile phone.
  • Download apps from Google Play, App Store, and other reliable providers of smart mobile apps.
  • Deny permissions, such as access to location, camera, and microphone information, unless you use an app that you really need.
  • Use fewer and more reliable programs as much as possible and avoid downloading and installing unsafe programs.
  • Continuously update the programs installed on your mobile phones.

3 - Network threats

This type of attack occurs when hackers target users connected to unsecured or free public Wi-Fi. In some cases, hackers may even set up a fake Wi-Fi network, which is also known as Network Spoofing, in order to deceive users. Fake networks ask users to create an account using their username and password, which gives hackers the opportunity to compromise smart mobile devices.

Most likely, you are interested in using Wi-Fi networks that are accessible in public places such as airports, internet clubs, coffee shops, libraries, and other public places where Wi-Fi is free. Because it allows you not to use your personal internet. But unaware that many of these networks are insecure. In other words, hackers can easily gain access to users' smart mobile devices and compromise the security of their private information.

How to get away from this threat?

• Think carefully before connecting to free Wi-Fi, and never use networks that force you to create user accounts or enter passwords for your accounts.

  • Never connect your mobile to these networks.
  • If you need to use these types of networks, do only low-risk activities and disconnect early.
  • Never use these networks to access emails, bank account applications, media and social networks or online shopping.

4- Physical threats

Smartphones that are lost or stolen by thieves expose users to serious security challenges. If the stolen mobile user has not used a strong password, strong PIN, or biometric authentication, or if you have not used encryption programs and services, your private information on the mobile phone will be easily accessible and usable. Especially considering that nowadays security threats have become very complicated, the possibility of mobile phone theft has also increased.

How to minimize the threat?

  • When your mobile phone is stolen, you can track your mobile phone and delete your personal information from it using a dedicated service called Find My Phone or Find My Mobile. Of course, this service or convenience is available in most Android and iPhone mobile phones, and you can use it to erase data and track your mobile if you have already activated this feature.
  • Do not put private information that exposes you to threats or use in your smart phone.
  • After the mobile phone is stolen, through another mobile phone or computer, immediately enter your e-mails and important programs and change the passwords, security items and restrict access to the programs installed on the mobile phone and, if possible, get out of it (Signed) out).
  • Apply a strong password or a special input method to your mobile phones, such as activating the option to log in using your face.
  • Try not to use your mobile phone in vehicles, roads, alleys, and other places where mobile phones can be stolen.
  • If you carry your mobile phone with you, put it in your pocket or in a place where you are sure that it will not be lost or stolen.

Some important tips to deal with smartphone hacking

Since the Internet is an insecure platform for transferring information, Internet users should be well acquainted with the Internet and be safe from any possible threats with security methods such as installing antivirus software, not providing information to suspicious and unknown sites, and other methods. to be Some important points for the safety of smart mobile users are presented below:

  • Avoid installing software from unreliable sources.
  • Do not click on suspicious links.
  • Have an antivirus on your mobile phone and constantly scan your mobile phones.
  • Use the two-factor authentication option in applications.
  • Constantly update and take care of your mobile operating system.
  • Use strong passwords or passwords.
  • Do not use the same password for multiple accounts, on the contrary, use a separate password for each account.
  • Do not share your personal information.
  • Do not connect to free and public Wi-Fi.
  • Do not respond to anonymous emails.
  • Use private information encryption.
  • Back up your data.
  • Use reputable VPN programs if necessary.

To ensure the safety of mobile phones when using the Internet, it is necessary for users to learn about the methods that hackers use to trap their victims. The "Beporsed" team recommends you share this article with your friends and other family members to protect them, prevent a family disaster, and protect their privacy.

Ask for help from "Beporsed" 

For those Afghans seeking specific information, "Beporsed" is here to help. You can reach our information center through WhatsApp (+93729807235), Facebook Messenger, or our website's Messenger to ask our online information desk officer for assistance. 

For more information 

For more information on immigration, resettlement, education and scholarship programs, and other opportunities available to Afghans worldwide, as well as details on the humanitarian services provided by international organizations in Afghanistan and procedures for obtaining civil documents from governmental institutions, please visit Beporsed's website and social media pages. 

Beporsed website (www.beporsed.org) 

Facebook (@beporsed) 

X or Twitter (@beporsed) 

Instagram (@beporsed) 

YouTube