The fact that smartphones have become practically one more extension of our body and that consequently are increasingly necessary to carry out procedures or activities of our day, makes all the information and documents that house it is very valuable.
And today, What “our phones” hide “reflect how we are in their fullness, our mobile knows us better than any person, And as we said it contains all kinds of information, both personal and banking, it has become Smartphones in one of the most precious objectives by cybercriminals.
For that reason, Most cyber attacks are designed to control this device Specifically, because the rate of return for cybercrime is very large. There are all kinds of attacks and ways in which they manage to infect a device, many of them from Downloads of fraudulent documents or for entering a malicious website, But there are also other types.
As a general rule we also think or fear that We can put ourselves in danger by connecting to an open and public Wi -Fi network, just as we are afraid to connect to other Bluetooth devices. While it is true that these threats are real and we must be careful with these aspects, An investigation by Lmafield At the beginning of December last year they revealed that it is not the only thing that should worry us.
Apparently, it has been discovered that USB-C cables have also proven to be a weak point that could endanger our cybersecurity. The researcher and expert in the field Thomas Roth, said this by detecting a vulnerability in the USB-C controller of the iPhone 15 that allowed to execute a malicious code on the mobile with just connecting it.
While you can think that it is more complicated to infect by connecting your phone by USB than by WiFi or Bluetooth, it is true that attackers have more ease with these other modalities, but The fact of asking for a charger in a bar, in a library or putting it in public transport is something very commonand in all these scenarios we are exposing ourselves to it.
Besides Being a more unknown attack modality, in these cases we lower our guard and we are not attentive to this threatso in the background it can be even easier for cybercounts infect your mobile phone and take control of it.
#Bluetooth #wifi #expert #points #real #weak #point #smartphone