Today the 'smartphone' has becomean indispensable part of our lives.In this small device we store ourPhotos, contacts, videos and a multitude of data associated with applications with which we manage our day to day.
To think that someone could access such data is a frightening idea butmore real than we think. There are some 'apps' that allow tracking of a mobile from another, such as those used to control children or to locate the 'smartphone' in case of losing it.
Other more advanced applications, whichborder the legality, are able to control a foreign device from the mobile itself (MobileSpy or Mspy). Of course, must be installed previously on the 'smartphone' to be controlled.
But also, there are 'malware'that' hackers' use to access thelocation or filesof our phones and that can be installed in them without us noticing when downloading an application. These are utilities that can be used by cybercriminalswith a lucrative purpose,even through blackmail.
How to know if they are spying on me?
Although making sure that our mobile is being 'hacked' is very difficult if you do not have the help of an expert, there are some signs that can serve as an alert.
If we suddenly notice that the battery of our 'smartphone'it runs out much fasterof the usual and we do not find an explanation in the use we make of it, we should be alert.
Another indication that your phone may be being 'hacked' is the temperature. It is normal for a phone to warm up after spending a good time playing a game, surfing the Internet, and so on. But if that temperature rise suddenly occurswhen the mobile is not in use, it can be a sign that you are being spied remotely.
The consumption of data
If we have a contracted data rate, the normal thing is that we will already have an idea of the amount of gigas or megabytes we spend at the end of the month.It is normal for that number to change from time to time, depending on whether we see more YouTube videos, if we download more things outside of a WiFi network, and so on. But if the data consumption starts to be higher than usual, we should start to suspect.
The bill of the month
Checking the 'smartphone' bill is something that many overlook as they assume that they will only charge them for the contracted rate. But it is something that should be done more often, since although some 'hackers' use the 'apps' to monitor a device and access their files, others can use them tomake calls or send messages.
Explore the files
A very simple way to discover if our mobile is being spied on is to exhaustively examine the galleries and other folders with a file explorer. In this case it may happen that we come acrosssome suspicious document.
How to prevent them from spying on my mobile?
Install an antivirus
When it comes to protecting our phone properly, it's best to start with the basics.A good antivirus programIt should be enough to detect those malicious applications and block them. Some of the most popular free antivirus programs you'll find on Android are PSafe or Avast Mobile Security.
In the case ofiPhone, the best thing is to avoid the so-called 'jailbreak', a dangerous process by which the limitations that Apple includes in its devices are suppressed.
Manage application permissions
When downloading an application on the 'smartphone' it will ask for several permissions. We have all fallen at least once in the error ofaccept those permissions without lookingnot even in what they were. It is at that moment when many of these 'apps' take the opportunity to access our galleries or the microphone.
To know what permissions each application has on our Android, we must go toSettings> Applications> Application permissions(in the three points of the upper right corner)> And here choose storage, microphone or whatever you want to know.
It is normal that 'apps' like the camera or those used to record audios have permission to access the microphone of our 'smartphone'. But if in this list of permissions you find one that seems suspicious to you, it is best that you block that permission (although the application may stop working properly) or eliminate it directly.
When everything else fails
If we have well-founded suspicions that our information is in danger and it is not enough for us to uninstall the malicious 'apps', we can always choose to re-establish the mobile's factory data. In this way all installed applications will be removed from the device, as well asphotos, music or any other document downloaded.That's why before you have to make a backup to not lose anything important. If we still feel that our phone is in danger, we can always use a specialist technical service.