Chief Prosecutor of the Deira Prosecution Office of the Public Prosecution in Dubai, an expert in electronic crimes, Counselor Dr. Khaled Al-Junaibi, told Emirates Al-Youm that electronic fraudsters are developing hacking methods and are well aware of the varying degree of awareness among members of society, and once someone’s phone is hacked, they move from it to the contacts. registered with him.
He revealed that hacking through WhatsApp messages or social media is the most recent and common method, and many people fall into it by mistake, as a message reaches the targeted person, perhaps via an unknown person, and he is given the choice either to accept the addition of that person or to block him, pointing out that it is natural for him to press The victim clicks on the blocking icon, only to discover later that he has fallen into the hacking trap.
He added that the other side of this type of hacking occurs after infiltrating the phone of one of the people on the victim’s contact list, as the fraudster creates a WhatsApp group and sends a request to join the targeted person, and when the latter tries to cancel the group or leave it, he in turn falls into the trap.
Al-Junaibi explained that the problem remains the cultural disparity between members of society. The phone is now in the hands of young children and the elderly, who often do not know how to use telephone technology except sending a recorded message or a prayer in addition to answering the phone. He pointed out that these are the target groups in this stage. The first is hacking, and their phones often do not have bank data or stored cards or payment methods, such as Apple Pay, but they are like a Trojan horse to hack into the phones of people registered with them.
He continued that the hacker studies the nature of the people registered in the contact list of the easy victim who succeeded in hacking his phone, then chooses the second victim, and sends him a message to join a group, a friend request, or any of the suspicious links that could be the hacking loophole.
He pointed out that these methods certainly represent a major challenge, and whenever a particular method is revealed, hackers develop their methods and leap forward, and this will continue in light of the use of communication technologies, so awareness remains necessary to protect members of society.
#Beware #it…the #common #means #hacking #mobile #phones