One of the constant risks faced by large Business that require their users to register to access their services is to the cyber attacks who come to access their databases and extract information like their emails or phone number.
Is information many times it is sold to cybercriminals with access to the black market, which can generate the initiation of different risks to the privacy digital for each of the people who was affected by the infringement of systems security of these companies.
According to the digital media CyberNews, a hacker would have put up for sale a database made up of a total of 500 million of users of WhatsApp distributed throughout the world, so the digital security of these people would be at risk.
According to the records, the largest number of people affected would be in Egypt, with 44,832,547 stolen accounts, but the distribution of those affected would include 84 countries such as the Czech Republic, Ghana, Lithuania, Ecuador, Hungary, Guatemala, Tunisia, Serbia, Cyprus, Turkey, Bulgaria, Puerto Rico, Canada and Spain.
Following this informationusers whose numbers were leaked and subsequently sold may fall victim to attacks such as smishingwhich implies the supplanting of the identity of an organization that sends a message of text SMS to people with the intention that they fall into a hoax and can extract even more information and even money his bank accounts.
Another of the modalities used can be that of vishingwhich is very similar to the previous one, but based on calls telephone. Whatever the forms of contact of users with cybercriminals may represent potential damage to the security of people.
In addition to being vulnerable to attacks targeted specifically at them, such as those already mentioned smishing Y vishingcybercriminals can also try to gain access to users’ conversations and accounts by opening the profile of WhatsApp on other devices.
That is why it is important that people activate methods of security as the authentication double factor. However, this measure can also be evaded by cybercriminals through Applications Y links scammers who gain access to text messages from smartphones and collect confirmation keys that provide access to this data.
In general, the best shape for users to protect yourself when your number has been compromised in the leak of databases is to know the dangers to which they are exposed and avoid coming into contact with potential scams among which is also the phishingwhich has the concept of the previous ones but uses the email as a means to defraud users.
To prevent the cyber security of users is further compromised, it is recommended that people change their passwords by others that meet high security requirements, such as having more than 12 characters, containing upper and lower case letters as well as numbers and letters, using special symbols (!”#$%&/=?) and being different in each account. app or service to increase your efficiency.
In addition, it is also recommended to use a password managerwhich can make password management easier old and create new access keys that are safe and random for greater security.
#Hackers #put #mobile #numbers #sale #WhatsApp #activated