Targets of numerous attacks, our mobile phones are increasingly exposed. How to protect your data? A good reflex can help limit the damage from cyberattacks.
Like computers, cell phones are increasingly the subject of cyberattacks. According to the latest report from the National Information Systems Security Agency (Anssi), they experienced a sharp increase in 2023, particularly targeting smartphones. Several threats concern cell phones. First danger, malicious software, also called malware which is installed on the phone without the consent of its user and which aims to steal information, cause damage to the mobile or use it.
Smishing, the equivalent of phishing but via SMS, consists of deceiving the user and extorting sensitive information, such as passwords or credit card numbers. The danger can also be linked to connecting to unsecured Wi-Fi networks in public places: hackers can intercept communications on these networks and access users’ personal data.
So, how can we protect the data on our cell phones? In a mobile device best practices report, the NSA (National Security Agency), the American national security agency, offers simple tips to prevent attacks on your mobile device. The NSA therefore advises to start by turning off your phone at least once a week to protect it from so-called “zero-click” attacks (attacks without user interaction) but also from spear phishing, a hacking method which consists of spoofing the identity of one of your contacts to trap you. The NSA points out, however, that turning off your phone won’t protect you from all threats and provides other helpful tips.
Therefore, remember to regularly update your applications so that security patches are installed and only download new applications from official platforms such as the Apple App Store or the Google Play Store. Also, don’t click on links or attachments in emails and text messages, be wary of public Wi-Fi networks or only do so using a VPN (a virtual private network), and turn off the Bluetooth when not in use. Finally, the NSA also advises deactivating geolocation services when you don’t need them and installing security applications if necessary.