The Limited Times

Now you can see non-English news...

Don't leave Amazon CEO: Here's how to protect your smartphone - Walla! TECH

2020-01-22T09:49:24.672Z


Jeff Bezos smartphone founder and CEO of Amazon, the world's richest person, was also hacked in 2018, the Guardian reported. It is estimated that Bezos had many smartphone protection software, but no ...


Don't leave Amazon CEO: This is how you protect your smartphone

Jeff Bezos smartphone founder and CEO of Amazon, the world's richest person, was also hacked in 2018, the Guardian reported. It is estimated that Bezos had a lot of smartphone protection software, but nothing helped about the video sent to him. Protect your smartphone

Don't leave Amazon CEO: This is how you protect your smartphone

Photo: Reuters, edited by Tal Reznik

Last night, the Guardian, a British newspaper, reported that Jeff Bezos' smartphone - the world's richest - was hacked in 2018. The burglary was made by a video sent from Ben Salman, the Saudi heir, after running malware sent to the CEO and Amazon founder. Investigations have found that Bezos's smartphone is likely to be infused through an infected video file sent through a completely normal chat conversation, and it is known that Bezos also owns the Washington Post - where Saudi journalist Jamal Hashokji worked before Murdered at the Saudi Consulate in Istanbul a few months later.

According to investigators, who spoke anonymously, a large amount of data was transmitted from Bezos's mobile phone within hours of the time the same infected file was sent to it. The Guardian made it clear that he did not know what details were stolen from the phone and what was used. We have previously reported on a number of cases where a hostile person has taken control of Israeli smartphones, and in other cases, through calls from foreign numbers and malicious apps, has resulted in huge charges and slowing down of devices. Contrary to what it used to be in the past, mobile devices of all kinds are currently being attacked - both iOS and Android devices. For the security of your personal information, here are some important rules for protecting your mobile device.

More in Walla! TECH More in Walla! TECH

The update has arrived: your wetsap is going to look completely different

To the full article

It is unclear what information was taken from his mobile device. Jeff Bezos (Photo: AP)

Jeff Bezos, Amazon CEO, February 10, 2019 (Photo: AP)

More in Walla! TECH

Then the inspector fined all the passengers on our line; Dan: "Apologists" "Unable to enjoy content": Adam Deaf sues Pornhab website for lack of access for the first time in Israel: Paying in stores via the smart watch Free demo: The Platform aligns with content from the first step

Do not open files and links from unknown sources

This is undoubtedly one of the first, most important, and most important rules for protecting your device: We have often reported scams done through the messaging app, whether through a malicious file or through a dangerous link. If that's not enough, every year, hackers are discovered that allow hackers to take control of entire Wetsap accounts and endanger billions of users. Therefore, it is very important to pay attention when you open a link that you came from a reliable source - such as a friend or family member - and that it did not come from a forwarded message, which can be easily identified by the arrow that Wetsap added to such messages last year. It is also important not to open files, photos or videos from unidentified numbers, and avoid passing your passwords or personal information through the chat on Wetsap.

The updates are for you: update your operating system

Apple and Google do their best to update our operating systems regularly, especially when it comes to security-related updates. The known damage pool is expanding daily, so you should check for updates to your operating system and update it whenever possible. You will notice that a very large portion of the updates will include, besides bug fixes, regular security updates that Google and Apple release every few weeks. Especially nowadays, when it seems that every few weeks we hear about a new security breach or breach, this is the way for the major manufacturers to cushion these damages and protect cases of intrusion and hacking into our mobile devices. To check for updates, log in to your mobile device settings, click About, and then Software Updates.

Update your operating system. Android (screenshot)

Android 9.0 pie (Photo: Android's official Twitter page, screenshot)

Try to install apps only from the store and remove ones you don't know

Our smartphone would not have served us properly if the wide and growing selection of apps we currently have did not exist. However, every day, stores also have malicious code or weaknesses that can cause your device to be exposed to serious security breaches. Unrecognized (and usually free) games can easily slow down your mobile device and flood it with commercials. Therefore, it is highly recommended that you download only those you know and trust, and even then, do so only through your device's original app store manufacturer and notice if your smartphone speed or performance is significantly down.

Install antivirus

Just like the world of computers, even in the smartphone world, it is advisable to install an antivirus application. It may be a bit burdensome on the smartphone, but the security it provides should be a priority. The antivirus will help get rid of burdensome advertisements, and most importantly, malicious apps, security breaches, and potentially harmful ones in the future. There are some recommended apps like ESET or AVG that also filter websites if you choose, and Malwarebytes is considered highly recommended not just on smartphones.

Source: walla

All tech articles on 2020-01-22

You may like

Life/Entertain 2024-02-28T10:53:14.931Z
Life/Entertain 2024-03-10T16:17:50.902Z
Life/Entertain 2024-04-15T16:22:29.125Z

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.