Skip to main content

Mobile Phishing-How Your Phone Gets Hacked

Simple Tips to Mobile Phone Security

As technology in the mobile sector advances, targeting more users, there is a growing trend of phone phishing. Phishing, is where a cyber criminal or a fraudster pretends to be a legitimate organization, such as a bank or websites of major retailers, in order to deceive you into giving up personal and financial information such as account or credit card information. Two key areas through which

Mobile phone phishing is one way through which your cell phone can be hacked. These phishing attacks are launched behind fake wireless application protocol (WAP) pages and exposed domain names. WAP pages are website pages customized for compatibility on mobile phones, hence they have reduced file sizes and graphics.

Many organisations and companies use WAP pages to easily display their brands on mobile devices. Therefore, these pages use reduced levels of web design technologies, making them easier to fake. In some cases, phishing sites use fake WAP pages to request for user's login details after which it opens the legitimate major websites.

The case for altered domains at times used by cyber-criminals stems from the fact that URLs for mobile phone screens are shortened when shown in the address bar. This can allow attackers to create deceptive URLs to cheat you. Phishing attacks collect sensitive data from users' that can be used for fraud. for example, recently Nokia alerted phone users over computer scams on mobile phones. Fraudsters were using the Nokia brand to cheat people via SMS that they were winners of a Nokia promotion and UK lottery. to sensitize the public, it warned recipients from replying to the message or calling the UK number that came along with the scam message.

Sometimes back, Google had to seal up software loopholes which exposed its android OS to malware that compromised users' data. Software exposures in the OS allowed a malicious DroidDream programme to root the smart-phone to serves set up by the hackers to harvest data.

Root-kits on mobile phones can relay users' data without the phone owner realising the extend of damage and even their very existence on the phone. Although hackers have not infiltrated the mobile money networks, there are chances of individuals being targeted from within their mobile phones.

To be safe, you are advised to remain alert. Also, there is need for you to observe basic security measures when using your cell phone.


Popular posts from this blog

How to Verify Your Land Title Deed is Genuine

Cases of forged title deeds are on the increase. Therefore, people are losing money to con men as they are taken advantage of due to their ignorance regarding land transaction matters. While thinking of owning land, it is vital to be aware of how you can verify a title deed before investing your hard earned cash.

As you plan to commit your money to buy and construct your dream home, verify that, the seller is the genuine owner, the land exists and is free from restrictions. Also be sure that you are not buying land on a road or railway reserve and above all, that the title deed is genuine.

How farmers can double their bean yield production

"As Jack slept, the beans germinated in the soil, and by morning a big beanstalk grew in their place. When Jack saw the great beanstalk, he immediately decided to climb..." This is a classic scenario of 'Jack and the Beanstalk' fairy tale. The same is true for Kenya's bean variety that climbs and spreads on sticks producing double the yield of local varieties.

Due to subdivision of land in Kenya, farmers are not able to produce enough beans to feed the 38.6 million people living in Kenya.This is mainly due to shrinking land sizes. This is the reason why high yielding varieties of beans that only need a small area to grow has been developed. These new varieties of beans require support with stakes (sticks) to climb on when they are growing.

The beans can grow up to a height of 3.5 meters. The long stems of this variety of beans enable it to produce more pods as compared to the normal bean varieties (bush bean).   With good management climbing beans can produce u…

Herbal Plants used for Alternative Medicine with no side effect

In a sad note, most indigenous informants keep herbal knowledge, especially the actual preparation methods, strictly secret. Luckily, an aged medicine man from Gatundu in Central Kenya, whose great knowledge of medicinal plants facilitated the write-up of this article.
In part one of this article, plants are grouped according to their medicinal use. According to the aged medicine man, simply boil the leaves, roots or the bark; add honey or milk or soup to sweeten the concoction. He recommends taking a glass in the morning and in the evening for preventive measures. 
He cautions on their medicinal uses which should be considered as neither preparation methods nor dosage prescription are provided. This is a topic that would require much more time and I have decided to leave it for part two of this article.
Best Herbal Plants for alternative Medicine with no side effects

I have grouped their medicinal uses in three parts which are,       Alternative medicine for preventive measuresHerbal …