Tech

What you need to know about hackers mirroring your smartphone

It’s one thing for Facebook and Instagram to use your search history and online activity and appear to know what you are thinking to find what ads are relevant to your interests.

Article content

But it’s another for your phone screen to be mirrored by a hacker to use your device against you.

Article content

“Hackers carry out illegal phone mirroring to access personal information, for financial gain or to track your location, steal your identity or even blackmail you,” said Marijus Briedis, chief technology officer at NordVPN.

“They can perform this intrusion without your consent through malware or spyware obtained from malicious links, man-in-the-middle attacks or physical access.”

What’s scary is that phone mirroring isn’t easy to spot, as the feature lets you cast your phone’s screen to another device (like a television or monitor) and is commonly used at home and at work.

Article content

Advertisement 3

Article content

But there are some things to watch for such as odd noises during calls, rapid battery discharge, random screen activity or a spike in data usage.

See also  Hackers release corporate data stolen from London Drugs

Other warning signs include unusual logins on your Google, Facebook or iCloud accounts as well as fake virus alerts and unexpected reboots.

For cybercriminals, it can become a tool for them to spy on you and gather personal information like photos, passwords, private conversations and even your real-time location.

“When viewing photos or videos on your phone, someone mirroring your device can also access and screenshot them, potentially for malicious purposes such as blackmail or to pinpoint your geolocation,” Briedis explained.

“On a mirrored phone, hackers can track your movements using apps like Google Maps, gaining insights into your location and future plans, especially if they have been discussed via messaging apps or text messages.”

Advertisement 4

Article content

RECOMMENDED VIDEO

To execute phone mirroring, hackers often trick users into installing what appears to be legitimate software — but is actually spyware or malware that captures a phone’s screen activity.

Phishing tactics, such as sending misleading emails with bad links that once clicked install malware, allow them to monitor their victim’s device.

Hackers also intercept communications between devices by using unsecured public Wi-Fi networks.

By creating unique, complex passwords — none of this “1-2-3-4” or “P-A-S-S-W-O-R-D” business — or activating two-factor authentications can help.

Learn to recognize phishing emails. Trust your gut; if a message rubs you the wrong way or has you questioning it in the slightest, you are probably right to be suspicious.

Also, often just keeping your phone’s operating system and apps updated can go a long way.

See also  Mating dance of sea fireflies is 'the coolest fireworks show that you've ever seen'

Article content

Related Articles

Leave a Reply

Back to top button