With the Pegasus snooping issue creating uproar in political and business circles, a cyber security expert gives the lowdown on how to protect the data on your smart gadgets
The smarter your gadget is, the easier it gets for hackers to access it
* Be sceptical: Don’t blindly allow apps access to features on your phone. You have to understand the minimum requirement of the basic information that you have to provide. “But the problem is that most people sign up without checking data policies while installing apps,” Sonsurkar says. He gives the example of a calculator app asking for access to a person’s photo gallery. “Why does it need that, or access to your microphone? You have to be alert about what the app is asking for and how comfortable you are about sharing that information,” he cautions.
Prathamesh Sonsurkar
* Use browsers: Companies like Facebook and Twitter have in-built policies that require people to share specific data while downloading the app. But you can circumvent that by simply surfing their websites on a laptop without downloading the actual app.
* Use mobile data: Try to avoid using free, public Wi-Fi systems. Sonsurkar says, “There might be a hacker sitting on a free network, who might access your gadget. So, it’s always better to use the data on your mobile phone to access the Internet.”
* Software solution: Sonsurkar says that people should always download an anti-virus software that has anti-phishing, anti-malware and anti-ransomware capabilities. You also need to scan the content in external devices attached to your computer, such as a pen drive, which the anti-virus software does automatically. “Apart from that, disable the auto-run capability of Windows, since some pen-drives have an auto-run function,” Sonsurkar says.
* Check emails: An unsolicited email is a sign of danger. “Any email that creates a sense of urgency or offers discounts should be discarded. Sometimes, a mail will say that you have a notice period to respond since your Facebook account has been hacked. But the truth is that whenever anything is hacked on such platforms, they will let you know through their in-house notifications — Facebook will tell you that there was a suspicious sign-in on their site itself. They won’t email you,”
Sonsurkar explains.
* Watch your waste: When you receive a package from an e-commerce platform like Amazon, it will arrive with details like your name, address and phone number. Always shred that information before dumping that package in the dustbin. “Hackers have a racket with raddiwalas, and they get that information from them to use it for the wrong intentions,” the expert says. Never give your name to an unsolicited caller either, because they will then Google you and find out where you work, for example, to strike a familiarity with you the next time they call.
Android vs iOS
* iOS platforms give you a more secure approach than Android ones, Sonsurkar says. “Apple gives you a detailed approach to what you want to and don’t want to access. Basic Android phones also have pop-up ads for games. Ask any Apple user and they will say they don’t get the same, because the security doesn’t allow for that,” the expert explains.
