There is no doubt that the smartphone has become an essential part for all of us. On the personal side, it has helped us a lot during the pandemic to stay connected with our family and friends, but also to enjoy those moments of leisure with social networks, videos or games. However, its use is also increasing for other more productive tasks, such as basic medical procedures or access to our bank accounts. On the professional side, there is no doubt of its usefulness, with access to professional applications or document management. Where we find a coincidence is in email management, as it is one of the first actions when configuring a smartphone, adding as many accounts as we have.
The point is that, as time goes by, smartphones contain more important information for us, and we are not always aware of it. What if someone has access to my emails? What if someone has access to my SMS or WhatsApp/Telegram type programs? What if screenshots are taken or keystrokes recorded? What if calls are made without my consent?
What are the main risks of a smartphone?
There are multiple methods to infect a smartphone, either because we install an illicit or fraudulent app (sometimes it is not even necessary to leave the official store), or because someone has access to our device remotely taking advantage of some unknown vulnerability of the operating system (as in the case of Pegasus) or because we access a fraudulent website that infects us without realizing it.