Home » Technology » It is possible to live the nightmare while sitting in a cafe! Why are wireless file shares dangerous? | 5 QUESTIONS 5 ANSWERS

It is possible to live the nightmare while sitting in a cafe! Why are wireless file shares dangerous? | 5 QUESTIONS 5 ANSWERS

class=”medianet-inline-adv”>

Along with the conveniences it offers, the digital world has included a problem in our lives: Data security!

Especially considering that smartphones are a part of our lives, danger is with us every minute. Because hackers usually attempt to hack people over various links or Wi-Fi in order to infiltrate phones and seize social media accounts and banking transactions.

Even the vulnerabilities of software and hardware and the risks that may arise from our usage errors also cause costly results for users. Cyber ​​hackers are now the new target developed by Apple. AirDrop The contactless data transfer feature prepared to facilitate the transactions of users such as…

NOT ONLY APPLE, ANDROID IS RISK AS WELL

Although the AirDrop wireless file and link transfer system developed by Apple pioneered this technology, Android manufacturers also developed technologies that enable file transfers on their own brand and model devices in the following years.

In fact, wireless file transfer has provided significant time savings and practicality for users using tablets, phones and computers of the same brand. But this practicality also brought danger.

class=”medianet-inline-adv”>

in sound GermanyResearchers at Darmstadt University’s Department of Computer Science have revealed that the AirDrop feature is vulnerable to hacking attempts.

Researchers explained that while the devices are sending data, it is possible for an incoming stranger to obtain personal data such as AirDrop user’s phone number and e-mail due to a software vulnerability.

Cyber ​​Security Specialist Osman Demircan is one of the users exposed to this attack. Demircan said, “Many times, while sitting in one of the coffee chains, I received a request to send files to my phone via AirDrop from people I do not know” and added:

“Not me, but many people living around me have experienced this. Although I warned what I witnessed, many people accepted these file requests and had to deal with difficult situations.”

So what information can hackers get with wireless data sharing? What precautions should be taken against this danger? Osman Demircan shared very important information on the subject.

news-fullwith-img">
news-fullwith-block">—
1- What exactly is the wireless file sharing feature used for?class=”medianet-inline-adv”>

Designed for secure file sharing, this feature comes with the operating system. In other words, it is not an application that can be installed on the phone later. It is used to transfer files with our own devices or our friends using the same brand phone as us.

It is generally preferred to share large-sized videos or photos that we have taken in an environment. In addition, the wireless sharing feature is used to share links such as web pages.

‘THEY PREFER ELEGANT PLACES AND GO USER HUNT’

2- How exactly does it show up in danger?

First of all, these file transfer applications are affected by many vulnerabilities discovered in the operating system over time and may be vulnerable to danger. But the main problem is that the phones with AirDrop feature up to nine meters can see each other… At this very moment, users become vulnerable to attack.

class=”medianet-inline-adv”>

Even this problem happened to me. Many times, while sitting in one of the coffee chains, I received a request to send files to my phone from people I do not know. Then I learned that this didn’t just happen to me.

Too many people have lived around me. Most of them even accepted these file requests. Although those who experience this situation laugh about it, there is actually a situation in the back that will cause much bigger problems.

3- What are they?

If you’re within nine meters of the person sending you the file, he sees you even if he doesn’t know it’s you. If you have friends where you sit and they call you by your name, they may even be able to see you directly if your wireless file sharing name is your name.

Therefore, it is very important that you try to hide your identity. When a malicious person takes his phone and starts to transfer files, he scans the contacts in the first access area. If your phone’s name is your real name, knowing your gender may increase your chances of sending and clicking on a file or link that may be more compelling.

The most important thing here is that the name of your phone consists of a pseudonym that does not express gender and identity rather than your real name. In this way, even with your wireless file sharing feature turned on, a gender-targeted phishing attack may not be made against you.

However, they may choose you as a target with an analysis of the accessories you use and the material values ​​of your clothing. It is not an impossible scenario for you to open the file he sent and then take control of the phone.

In fact, they often prefer exclusive venues. In this way, they narrow their target range and send such files and links. Your “Who is this now?” Opening the incoming file can become the beginning of a big nightmare. Recently, there has been a significant increase in the number of phone owners who receive file requests from people they do not know in cafes and restaurants.

class=”medianet-inline-adv”>

SOCIAL MEDIA ACCOUNTS AND BANKING APPLICATIONS UNDER THREAT

4- Well, what problems can we encounter if the hackers infiltrate the phone?

If the over-the-air files and links contain malicious software, the control of the entire phone may fall into the hands of hackers. Thus, you can put your personal data at risk. Cyber ​​hackers who can access the phone; can access your photos, our notes, which we often save passwords, and all of our messages.

In particular, access to messages means that they can access the verification codes sent from banking applications. Therefore, banking applications are also at risk.

news-fullwith-img">
news-fullwith-block">It's possible to have a nightmare while sitting in a cafe Why wireless file sharing is dangerous |  5 QUESTIONS 5 ANSWERS
Cyber ​​Security Specialist Osman Demircan

LOW MODEL PHONES ARE MORE RISKY

class=”medianet-inline-adv”>

5- What precautions should we take against this danger?

The basic rule applies here as well. It is absolutely necessary not to accept any file and link from a person we do not know. Whatever the content of this sent file, it should never be accepted and opened. We should only accept wireless file requests from people we know. In addition, wireless file shares also contain some security settings.

You can specify who can send you files. These contacts can only be contacts in your phone list. Usually, there are two options: accept from everyone or accept only from my contacts. A third and most secure setting is to disable file imports for everyone with this feature. If it is closed to everyone, you can enable this feature to work safely when you receive files only from people you know.

Another security measure is to update the phone’s operating system regularly. In this way, you can ensure that the wireless file sharing feature works securely with people you know. But I can say that low model phones are much more risky. Because they don’t get security updates.

news-blockquote" id="blockquote-cd23" style="background-color:#DCC953">

Sometimes parents give their children their phones. Some kids even have phones. For this reason, it is very important that this feature is turned off on phones. Because photos or files that will negatively affect the development of children can be sent by cyber hackers while children are using the phone. These settings, which vary according to the phone brand and model, are found in the user manuals of the phones or on the manufacturer’s web pages.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.