Thursday, October 22, 2015

How to avoid the theft of information from smartphones – Revista Capital

During the second quarter of this year, almost 300,000 new malicious programs for mobile devices were detected, 2.8 times more than in the first three months of the year.

 Photo Flickr_smartphone

Currently, sales of smartphones reached 80% of total sales world of technological devices which directly influences our do daily, either personal or business environment.

in Chile is estimated that by 2017 almost 40% of Internet access is made via smartphones , in some cases accesses are made to personal issues, but other issues will be made to work.

This is why cybercriminals They are working hard to create malicious code that allow them to infect mobile devices and fulfill its objectives, which in over 50% of cases is stealing money. That is why they are concentrating on developing financial malware and banking Trojans that allow particularly attack the operating system Android to be the most prevalent.

The figures are truly alarming, studies antivirus company Kaspersky, NovaRed partner, shows that daily about 325 thousand new virus are discovered and the first quarter of 2015 over 100 thousand new malicious programs for mobile phones and more than 1500 new banking Trojans were detected also for these devices.

You in the second quarter nearly 300 thousand new mobile malware is detected, 2.8 times more than in the first three months of the year. While a study by consultancy G Data says that every 18 seconds a new virus or malicious program trying to break into our smartphones.

From NovaRed recommend always be alert and use all existing technological tools to protect devices mobile and personal and professional information contained in them.

  • Download Apps from official shops although not 100% free of malware, security mechanisms help to keep away the Trojans.
  • Download applications from reliable developers and read the permissions that apply before installing.
  • Verify user comments regarding the application.
  • Install the anti-malware device to help detect malicious applications.
  • Segment information stored on a mobile device and protect the entrances.
LikeTweet

No comments:

Post a Comment