This is not kid pranks. It is organized crime.
Both individuals and companies feel they are being subjected to digital crime of threat actors who are more advanced.
Are you
Tablets and smartphones used today for everything that was previously reserved for computers. We surf, update social media, store documents and pay for goods and services. The amount of information we store in mobiles and tablets, can be coveted target for intruders.
– The threats on the Internet has become much more complex, and some players are more sophisticated than they were a few years ago, says Bjørn Ivar Moen, head of mobile operations in Telenor Norway.
– What before was a boy dashes has evolved into a cyber-arena where criminals including chasing money and driver ID and information theft. Organised criminals pretending to be your bank or other you normally trust to get you to disclose sensitive information, he adds.
Animal messages
Many also uses mobile phone or tablet at work, without using antivirus. It makes mobile phones and tablet to a potential change.
– Getting mobile phone taken over by criminals, can inter alia lead to loss of personal and corporate sensitive information. One danger we have so far been spared in Norway. But as we see in other countries, someone could be able to send out expensive SMS messages to payment services they earn money, says Moen.
Telenor is launching a security service running in the background of your phone at any time. It will give you better protection against both viruses and infected websites. Currently launched the service for private customers with smartphones that have Android operating system, such as Samsung, Sony and HTC.
– No security solutions provide one hundred percent protection. The best protection you have is to think carefully about and have an awareness of common security. We especially recommend that you are very careful to download files and applications from unknown sources, says Moen.
Six Tips
1. Use screen lock: It is important that you use some sort of screen lock to unlock the phone. Pin-code you must enter to use the SIM card when you turn on your phone, no one stops from getting access to everything you have stored on the phone when the phone is turned on. Use a screen lock password, fingerprint or other phone locking devices as well. The main thing is that no one can access directly on your phone if you lose it or have it stolen.
2. Be critical of what you install: It’s smart to be a bit wary of what apps you download, especially if you use an Android phone. In contrast to Apple’s App Store, where everything is controlled manually before putting it out, checked apps posted on Google Play only via electronic tests. This allows the infected apps easier slip through security checkpoints. About downloading apps that have good reviews and many users there may be an indication that the application is safe, but you’ll still need to think through both privacy and security.
3. Keep everything updated: Always download new updates for your phone, both the operating system and the applications you have installed. This can provide new and nice features, but first and foremost it is important as such updates gladly seal any security holes.
4. Make copies: A growing number of stores his life on a phone, including pictures, contacts, documents and more personal and great value. Therefore, it is smart to synchronize this to a safe cloud, such as My Sky, which provides safe and easy storage of images, and My Contacts, which provides safe and easy storage of your contacts.
5. Use good, strong passwords: Use a strong password with some length. It should include at least ten characters, but you must be happy to put together some arbitrary word after another. It is easier to remember than you think. Also be sure to use different passwords for different online services – and two-step verification which it supported.
6. Stop: Please note if you are asked to perform or install anything you have not even asked for. Where physical browsing, can also offer a potential risk. About browsing on an open network and sends such bank info over an unencrypted connection, this could in theory be intercepted by unknown. Do you use an encrypted service on websites, there is less risk of unauthorized see what you are doing. (ANB)
No comments:
Post a Comment