The tricks most used by the cybercriminals to enter a phone

in #technology7 years ago

cel.jpg

The techniques they use to increase the effectiveness of their attacks are in two categories: on the one hand, Social engineering strategies (consist of psychological manipulation and persuasion so that the victim voluntarily provides personal information or performs Some act that puts their own system at risk) and, on the other, technical mechanisms to hinder the detection and analysis of malware. Eset Latin America summarizes the most frequent behaviors in relation to malicious codes for Android in recent years, based on Social engineering:

  1. Use of fraudulent accounts in the Play Store for malware distribution.

  2. Commemorative dates and launching of expected applications.

  3. Tapjacking and overlay of Windows.

  4. Camouflage among the applications of the system.

  5. Simulate being system apps and security to request Administrator permissions

Image Source

Sort:  

Congratulations! This post has been upvoted from the communal account, @minnowsupport, by oneleader from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, theprophet0, someguy123, neoxian, followbtcnews, and netuoso. The goal is to help Steemit grow by supporting Minnows. Please find us at the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.

If you would like to delegate to the Minnow Support Project you can do so by clicking on the following links: 50SP, 100SP, 250SP, 500SP, 1000SP, 5000SP.
Be sure to leave at least 50SP undelegated on your account.

Coin Marketplace

STEEM 0.26
TRX 0.20
JST 0.038
BTC 97904.67
ETH 3602.66
USDT 1.00
SBD 3.90