Your phone may be being hacked
Smartphones help us a lot in our daily lives. For this reason, we often provide our personal and bank information almost instinctively with a simple request. By 2018, however, several events have shown that more care must be taken with data protection.
Hackers wax and violate biometrics
Hacker attack halts US newspaper distribution
Is there any job left in Canada?
Want to produce your electricity?
See why this is a great time
It is on this subject that the technologist Cooper Quintin writes in his column for The New York Times. For him, our cell phones are fragile and invasive machines.
He gave the example of recent telephone interceptions by US President Donald Trump.
The point is that the mobile phone network used in the United States, developed more than 40 years ago, is archaic and outdated.
When it was implemented, still in 1975, it was not designed in such a way as to meet the minimum safety requirements and its updating has taken time.
Meanwhile, hackers take advantage of leaked information and apply the most assorted cyber hits. In addition, the increasingly affordable spy machines have made the process easier.
Despite the advance in mobile internet technology – now reaching even the 5G level – most of the handsets still have 2G technology.
It is thanks to its existence that smartphones are more vulnerable, since this type of network does not differentiate a real telephony tower from a pirate and also does not protect the device from the interference of site simulators, according to the newspaper.
The business has become profitable and companies around the world already illegally market access to the global telephone network as a kind of product.
For Quintin, there are two explanations for the delay in making attitudes to terminate the data breach. One is the complexity of the subject and the hundreds of organisms involved in the process. Another is the intention of government agencies, which may also be taking advantage of the information obtained.
Still, Quintin argues that measures need to be adopted, such as new public policies that refuse agreements with telephone companies that do not meet the minimum security requirements and are not suited to a new security system, as well as a joint international effort to combat problem.