In short, yes. Many people assume it’s only your computer.
However, through fraudulent messaging clients, hackers can access data,
location, photos and more from your personal or business mobile phones,
invading your privacy. And there are a handful of ways they can get sneaky.
According to EFF.org, “The trojanized apps, including Signal
and WhatsApp, function like the legitimate apps and send and receive messages
normally. However, the fake apps also allow the attackers to take photos,
retrieve location information, capture audio, and more.” (source: https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around)
Along with fake apps, you can also receive text messages,
e-mails, and instant messages with web links from an unknown source. This
technique is called phishing messages and can allow hackers to acquire any
login information you may have saved on your phone.
If you notice an open WIFI when choosing a network, you might
also be at risk of your phone being hacked. Unsecured WIFI networks can
sometimes have snoopers behind the scenes, waiting for users to join and surf
the web or log in to highly sensitive (or personal) accounts. This gives them
ample opportunity to steal anything they want. Keep an eye out for URLs with
unsecured vs secured connections (http: VS https:).
You can protect yourself from these, and other possible
risks, by creating strong passwords, using two-factor authentication and setting
up security questions for your passwords. Be sure to play it safe with any and
all personal information you add to your phone.
Computer viruses affect millions of computers each year,
with 2018 ranking at over 800 million. In turn, this costed individuals and
businesses billions of dollars in the process. This malicious software is
created to access sensitive information, causing disastrous issues to your
computer and allowing hackers to either collect or destroy data. In turn, this slows
the computers functionality and operation or might even crash it all together,
making it unusable.
The viruses can be spread through e-mail attachments, scam links, and pop-ups and often times seems legitimate. And while it’s extremely frustrating, you can take the necessary precautions of reducing your computers risk for a virus by avoiding clicking on any advertisements shown on web pages you might visit. You can also download anti-virus software, which can detect and remove harmful trojans or malware, and is beneficial to have even if you’re not concerned about a potential threat. Norton and McAfee are well known anti-virus software subscriptions, available for you to purchase online. Keeping your OS updated to the latest version is helpful as well, as it contains the protection and security needed.
Trust your gut – if it seems fishy, it probably is!
A newly published exploit for the Nintendo Switch console is unpatchable. The exploit can’t be fixed via a downloadable patch because the exploit makes use of a vulnerability in the USB recovery mode, circumventing the lock-out operations that would usually protect the bootROM. The flawed bootROM can’t be modified once the chip leaves the factory. Access to the fuses needed to configure the device’s ipatches was blocked when the ODM_PRODUCTION fuse was burned, so no bootROM update is possible.
Nintendo may be able to detect hacked systems when they sign into Nintendo’s online servers. Nintendo could then ban those systems from accessing the servers and disable the hacked Switch’s online functions.
You can read more about the Unpatchable Nintendo Switch Exploit at: