The Limited Times

Now you can see non-English news...

Without panic: No, you can not break into your phone through voicemail - Walla! technology

2021-10-21T13:58:53.777Z


A WhatsApp message circulated last night in various groups warned Israelis against hacking into their phone through a call in an initiated voice response. This post has no basis and is not technically possible - but it is not


  • technology

  • news

Without panic: No, you can not break into your phone through voicemail

A WhatsApp message circulated last night in various groups warned Israelis against hacking into their phone through a call in an initiated voice response.

This post has no basis and is not technically possible - but that does not mean that your information is secure.

This is how you will defend yourself

Tags

  • WhatsApp

Niv Lillian Winon Ben Shoshan

Thursday, 21 October 2021, 10:45 Updated: 11:13

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

(Photo: ShutterStock)

Last night (Wednesday) many Israelis were horrified after receiving the message that appears here on the side, which was distributed in various WhatsApp groups.

The message allegedly talked about a possible attack impersonating the third vaccine survey, and by pressing the 1 key in response, your phone will be hacked.

So first thing for those who have been clicked and forwarded to alert or just clicked - this is a false message.

There is no truth in things, and it is not possible to hack into your phone through a voice answering call.



The message read (original errors):

"There are already victims. New scam: call on the phone and ask you if you are vaccinated with a third vaccine then ask to click on number 1. You clicked? "On the phone. Please be careful to pass the information on to family and friends."



Companies like Pegasus have developed tools that allow hacking into a device even with an unanswered or hidden call, but these are rare cases and in general, it is not practically possible to hack a smartphone in a voice call or at the touch of a key in voicemail.

Good to know (promoted)

The technology in shoes that will save you from back and knee pain

To the full article

What do you need to be careful of?

Suspicious messages and links.

As mentioned, clicking on a link that will lead you to a site that contains malicious code or a virus, opening a file attached to a message - these can be dangerous.

Therefore, if you receive such a message, you will recognize it and defend against it:



as a general rule, do not open links or files from messages sent to you not on your own initiative or following an action you initiated (such as receiving a one-time code or password recovery).

These will usually come in the form of a SMS containing a link, sometimes ostensibly from a known entity to which the intruders will impersonate: Shufersal, your HMO, Netflix, Microsoft "support" and other reputable and trusted entities, whose intruders will try to use their identities while impersonating them.



Second, the message you did not request will often have a stressful nature that demands immediate action from you - a bank account that is about to be blocked, your Facebook profile, email box or other important item.

Breathe.

The message as it was transmitted on WhatsApp (Photo: screenshot)

The real entities that manage your valuable information will not usually send such messages on their own initiative, certainly not in stressful language that requires immediate action from you. The hackers trust your panic, and you click on the link that will give them access to your device. Do you have a doubt? Contact the customer service or the technical support of the body that allegedly sent you the message, and find out with them whether such a request was really made on their part.



Finally, the well-known IDF rule of "there is a doubt - there is no doubt" works here as well: even if you received a link from someone you think is familiar (some viruses use hacked phone contacts to spread themselves further), but something seems suspicious to you, If in the style of writing or there is no reason for that person to send you a link or file by surprise - do not click, but also do not click.



This is an absolute pike.

"Taking over a phone requires the use and exploitation of advanced weaknesses and is usually done on individual phones," says Oded Vanunu, head of the product weaknesses department at Check Point.

In order to take control of a device, it is usually necessary to click on a link that comes in a message or email or in rare cases when making a call without the need for an answer from the other party.

If you are asked to click on a link during an ann after a call - do not click anyway. "

  • Share on Facebook

  • Share on WhatsApp

  • Share on general

  • Share on general

  • Share on Twitter

  • Share on Email

0 comments

Source: walla

All tech articles on 2021-10-21

You may like

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.