While technology is usually designed to make life easier, we cannot ignore that it has its dangers too. we have to do it right.
Let’s take the example of WhatsApp, a very useful tool for communicating with our friends and relatives, which is completely harmless at first. We can fall victim to fraud and phishing both on WhatsApp and on other social networks So we have to keep our eyes wide open.
And even with SMS or text messages, we can be at risk. Because, Did you know that a hacker can access all of our messages for as little as $ 16? We didn’t believe them at first either.
A hacker and $ 16 are no longer needed to access our text messages
If you are one of those who think you are using the SMS app instead of WhatsApp and Telegram You are completely safe from cyber attacksyou should read this motherboard review.
No evidence that the device was hacked, no SIM card changed, no trace of hacking … Hacker Lucky225 had been quick and clean. He had only used one service from a company called Sakari (whose goal is SMS marketing) to redirect all SMS to your own number.
Once all text messages have been redirected to the hacker’s phone number, access the rest of the accounts as WhatsApp, Facebook, Instagram or any other app that requests the phone number to access the account it’s really easy.
Fortunately, Lucky225 hacked a journalist’s text message with his consent, but, What if this hacker had bad intentions? And all for only $ 16.
After doing this experiment, the company that owns this program solved this exploit, but the internet is big and there are hundreds or thousands of such programs or similar. The experts assure that by hacking the SMS a hacker can access any other user account, which is why they recommend this Do not use text messages for security related issues. In this context, they realize that with two-factor authentication, it is much better to use apps like Google Authenticator than SMS.
It is clear that no matter how careful we are, the internet is fraught with danger. We recommend following this Android Security Guide at a minimum, Don’t make it easy for criminals.
Related topics: Mobile technology