Here are the things to know if you want to survive smartphone hacking

0 19
Avatar for Rahim420
4 years ago




We can't imagine a day without our favorite smartphone right now. We do a lot of urgent work with the smartphone, starting from Facebook, Twitter, WhatsApp, money banking through mobile banking can also be done on the smartphone nowadays.

But did you know that your favorite smartphone can be hacked very easily? Your Facebook, mail accounts can be hacked! Personal photos of your smartphone, videos and bank account information can be stolen.

Hackers are stealing smartphone information or personal photos / videos and blackmailing them to get huge amount of money. Although the issue of hacking has been a headache in the developed world for so long, now it has become a major issue in our country as well. So be aware of this in time, know the workings of hackers, so that you do not fall into their trap.


What is hacking?
Hacking is the act of illegally infiltrating someone's device (computer / smartphone) and taking control of it. Once your smartphone is hacked, hackers can do whatever they want with your phone! Hackers can steal all the pictures, videos, audios, voice calls, text messages from your smartphone without your knowledge!

Via Open / Free Wi-Fi
Nowadays, many of us go out and check our smartphone to see if Wi-Fi is open! Free Wi-Fi is very popular in public places including educational institutions, cafes and restaurants. But you will be surprised to know that if you use such open or free Wi-Fi, hackers can easily find out all the necessary information about you if they want to!



How do hackers do it? If the Wi-Fi network you are using is open, hackers can easily intercept the data you exchange. There is a software called 'Packet Sniffer' for this. It can get all the information in the middle of the exchange of information from your phone!

Android apps will make things easier!
If you want to avoid such hacking, in one word, the solution is not to use open / free WiFi. Use mobile data if necessary.

Password theft
Many of us use the same password everywhere like Facebook-Gmail-Yahoo etc. As a result, if a password is stolen, the hackers are going to know all the passwords at the same time! So of course different passwords should be used everywhere.

Another important thing that many of us don't know is that passwords should always use letters (A B C D) etc. as well as numbers (1 2 3 4). It is relatively easy to steal a password using only letters, but using hackers makes the task much more difficult for hackers! But do not forget to change the password in a few days.

Also, secure your Facebook with mail, phone number, etc. Bring the mail account under mobile verification. In this way, even if the hackers steal the password, you will not be able to enter the mail without the verification code on your phone.

Phishing scams
This “fishing” does not mean fishing but! This is Phishing, through which hackers can easily know your information.

Phishing scams are a common practice in Bangladesh. How does it work?

Here are 10 essential information about Gmail
Suppose someone close to you sent a link on Facebook saying that if you enter there you will see any of your favorite songs / pictures / videos etc. You simply click on the link and your account is hacked! If you find out that your friend has already been hacked, his account has already been hacked!

Hackers are currently using phishing scams extensively in Bangladesh, and in most cases they are succeeding due to human ignorance. So from now on, be very careful, think twice before clicking on a link sent by someone.

No need to click if you don't have a trusted link (Facebook / YouTube / Google Drive). Clicking on the Internet can be a victim of phishing scams, so be careful to have time!




Trojan Horse
RAT (Remote Administration Tool) is currently the most popular method for hackers around the world. Hackers can send this software / app to you in various ways. Once you install it, hackers will be able to take control of your smartphone!

The thing is, hackers can't force you to install the app. So how do they use tactics to persuade you? That's basically what they do - by associating the harmful app with another commonly known app. It is often seen that when you enter many sites, many pages open and apps are downloaded, in most cases UC Browser / Vidmate has these familiar apps there.

Trojan Horse means “TroyHorse

When you simply install the app on the phone, the harmful RAT hidden inside it is installed on the phone without your knowledge! The common app with this RAT is collectively called Trojan Horse.

"Trojan Horse" means "Trojan Horse". There is a story in Greek mythology that once the Greek army made a very clever plan to capture the city of Troy. They made a huge wooden horse and left it on the border of Troy. The townspeople were surprised to see the actions of the Greek soldiers!

Meanwhile, the soldiers left the wooden horse and left. The city dwellers, fearing that the Greeks had fled, brought the horse into the city. Ghunaksareo think what a defeat they have brought!

At night, when all the people of the city fell asleep, countless Greek soldiers came down one by one from the huge wooden horse. The whole city of Troy was captured by a surprise attack on the sleeping city dwellers. The city of Troy fell.

The Trojan horse of the smartphone works in the same way as the Troy horse in the story.

What can hackers do by hacking the phone?

  • If you hack the phone, hackers will be able to see and steal all the files, pictures, videos, voice text, etc. from your phone.

  • Read all SMS / Mail on your phone. All your personal information will be known. As a result, your mail, Facebook, etc. account can be hacked very easily.

  • Be able to track phone location. As a result, they can find out when and where you are.

  • You can send calls and messages to other numbers from your phone.

  • You can copy all the phone numbers you have in contact.

  • You will unknowingly see that you have recorded the desired picture / video using the phone's camera!

Stuck in a problem? Can't find anyone to question? Go to the 10 minute school live group to get answers to any questions!

You can open any app on the phone as you wish, install and uninstall everything.

Once the hacker is done, he will be able to remove the harmful RAT from the phone. As a result, there will be no sign that the phone was hacked! It may be that at the moment your phone is being controlled by a hacker without your knowledge! So from now on we have to be very careful about these things but!

1
$ 0.04
$ 0.04 from @TheRandomRewarder
Sponsors of Rahim420
empty
empty
empty
Avatar for Rahim420
4 years ago

Comments