Friday, March 11, 2016

“Malicious” software or Wi Fi unsafe: the main roads by … – Clarín.com





What say computer security specialists consulted by Next. They warn about certain habits that leave bare the content of our device, as happened to Ivana Nadal and other celebrities.

the list of starlets, models and celebrities who suffered filtration prohibited material from the cell grew in the last years. I remembered the case of Wanda Nara and Florencia Peña, was joined Cinthia Fernandez, Melina Lezcano (Agapornis singer), Analissa Santi, Karina Jelinek and Ivana recent Nadal, among others, who saw their privacy violated. Even the footballer Ezequiel “Pocho” Lavezzi was the victim of hackers.

Florencia Peña. Your Banned video was distributed in several parts.

But how these leaks happen? In many cases the loss of the device, forgetfulness or theft, were some of the causes. Sometimes, unscrupulous take the material from those devices were sent to technical services. They can also become widespread in the framework of a press campaign, although the protagonists in question never reached to confirm publicly.

“When you send an image by WhtasApp started to put together a string that came out of your control “

$ count

‘, userAction. act_887}

One way common theft files from a smartphone is due to a “malicious” software -malware- that is activated after installing an application on your phone. Most of them are signed or not Google or Apple, request permission to have from your list of contacts, camera phone, the gallery and to the files shared via WhatsApp.

“If the device is broken and have pictures prohibited, directly , I destroy it and buy a new one “

$ count

‘, userAction: act_4fa}

in the case of prohibited photos of Ivana Nadal, computer security specialist, who declined to reveal his identity, he said that “it is difficult to know how leaked”, although there may be multiple ways. “The simplest way is that someone has installed an application, without authorization, and from there start sending regularly all images from the camera to a third,” he said about it.

See also: Four applications to avoid being robbed photos cell

“the fault was that the person is not physically secured their phone or had not encrypted the data “, added the source on the recent case of the conductive Escape perfect.

to ensure that it is not any trace of prohibited material on our smartphone is a need for an application to ensure the files stored both in the memory cell and the micro SD, or permanently destroyed. The app Secure Delete it is a good remedy for Android devices.

Another more radical option is to use the security wipe that removes all free space on the phone; This is where the remains of files that have been removed, so you can retrieve saved.

& quot; Yes, the video is me & quot ;, Cinthia Fernandez had confessed to the media material was already viralizado..

Undoubtedly, free wireless networks are the other traditional means to compromise the security of our device, increasing the deficit uilizadas by telephone companies in the 3G and 4G spectrum.

“In a free network applications connect below to receive new chat messages or updates. Now, if for any error, deliberate or malicious network, configuration may see the connected cellular traffic and even encrypted material, “he explained. He added: “All your passwords remain there”

.

LikeTweet

No comments:

Post a Comment