Third, Software that is not updated (out-of-date devices).
Namely, the software of each application on our cellphone usually provides an update (update) within a certain period of time.
This is done to update the application version, including updates for security holes that are known to have existed.
"If it is not updated, the security risk of our cellphones becomes even greater because there are these loopholes," he said.
Fourth, Leaks through Physical Devices (physical device breaches).
An unguarded and unlocked cell phone can also be a gap for data leakage.
This allows the user's cellphone to be accessed by people who are not responsible.
Fifth, social engineering.
He said, sometimes it doesn't take complicated technology to hack or steal someone's private data.
Through social engineering, data thieves can trick their victims.
"Through social engineering, we can do this by, for example, pretending to be someone else to dig up the victim's personal information, providing fake links to trick the victim, and so on," said Ariandi.
Sixth, Cryptojacking attacks.
Namely, Cryptojacking is a relatively new security threat. With this attack, someone will use the victim's device to mine cryptocurrency without the knowledge of the owner.
Related Article
BSSN Launches 2021 Cyber Security Monitoring Results Annual Report
BSSN Holds Talks Regarding Cybersecurity and Identifying Critical Assets During the 2022 G20 in Bali
BSSN Talks About Laws and Policies Regarding Cyber Security Infrastructure at the Cybersecurity Connect 2022