Viruses and creativity is the methods of modern business espionage. The most vulnerable are the mobile devices, full of confidential data. Не случайно об опасности напоминает “Лаборатория Касперского” незадолго до Всемирного Экономического Форума в Давосе.
Hacker attack on smartphones and tablets is not just random incidents, which caused no precautions. In the era of mobile devices prevalence, it is also a method of operation of organized cybercrime groups.
Virus overheard live
Аналитики “Лаборатории Касперского” уже много лет следят за действиями преступников и предупреждают о сложных вредоносных программах, that can infect the whole range of smartphones key people. The more important people in one place, the more it is a lure for cybercriminals.
– Вредоносное программное обеспечение может шпионить за всеми сообщениями и запустить невидимым образом камеру, and the microphone. This allows access to the most confidential conversation, including those, которые проводятся лицом к лицу”, – говорит Дмитрий эксперт по ИТ-безопасности “Лаборатории Касперского”..
The most common line of defense is to encrypt data, but for most intentional thieves is not an obstacle.
– Это не решает основной проблемы. You can read the metadata. This information is sufficient, to reconstruct the course of talk time, determine, When people communicate with each other and what they talk about. In this way, attackers can learn a lot about your goals, – объясняет Дмитрий
How to protect against cyber criminals
Cybercriminals are currently developing their own methods. How to provide mobile communications? Эксперты из “Лаборатории Касперского” подготовили рекомендации, that can help.
- Connecting to the Internet via a VPN. It is more difficult to intercept your traffic
- Do not charge the device via USB other people's computers. It is also a way for infection
- use antivirus software.
- Protect access to your smartphone with a password or a fingerprint scanner
- Encrypt data carriers
- Do not remove safety through jailbreak and root-rights
- Do not use the equipment with the other hand
A source: Kaspersky Lab