Be careful how we use ours smartphones: more often than not, for simple convenience, forgetfulness or because you set the alarm in the morning, the devices remain on perpetually. Days, weeks or even months in which mobile phones are operational with enormous problems on the safety according to a notice issued by the National Security Agency.
What are the risks
In recent days a document has been published explaining that “Threats to mobile devices are more widespread and increasing in scope and complexity”. Although every user, Android or iOS, wants to make the most of the features available on these devices, security should not be lost sight of. In fact, it seems that hackers and cyber criminals are at an advantage if mobile phones are always switched on because they are able to exploit some flaws in the systems, often unknown by the producers themselves but who know perfectly well the criminals capable of exploiting them at will with enormous risks for the our privacy and more. As often happens with fraudulent links, sensitive email, password and bank details are at risk.
What needs to be done
The simplest method to avoid very unpleasant cases is to turn off the device at least every seven days, once every week. The NSA explains that each smartphone should not remain operational for more than 168 hours consecutive. Shutting down and then restarting may seem like a trivial operation but it is essential to repel any cyber attacks. In technical jargon they are called “zero day exploit“, generic term “which describes recently discovered security vulnerabilities used by hackers to attack systems”, the experts explain IBM. The term refers to the fact “that the vendor or developer has just become aware of the flaw and therefore has 'zero days' to fix the problem. A zero-day attack occurs when hackers exploit the flaw before developers have a chance to fix it.”.
Tips to put into practice
The American experts have made an illustrated map with generic advice that is not only valid in this specific case just discussed but in general to increase the defenses of each user: in addition to turning the device off and on again weekly, they recommend paying maximum attention to conversations that are too reserve that they must be done verbally on the devices “even if the content is believed to be generic“. Attachments that derive from unknown email links should not be opened.”Even legitimate senders can transmit malicious content accidentally or after being compromised or impersonated by an attacker: unexpected op-ups like this are usually malicious.”.
To charge smartphones, only original charging cables or charging accessories purchased from a reliable manufacturer should be used.
“Do not use public USB charging stations”, they explain, because it is another tempting opportunity for hackers to enter systems. Where possible, biometric authentication (fingerprints, face) should be used to best protect data.