Hello friend. My experiment is going on, so I'm not getting time to write blogs. Today i will try to represented how people face cyber attack. Lets see,
Most of the people using android or IOS. They are using most common trustable apps. When try to install apps for android/IOS then shows some permission. People are easily install apps without reading access permission. When you give back permission then the infection begins start. All your personal information ,data ,call list, and many other information control attacker. It means that you give the permission before install on your devices. Lets see example:
Its a media player apps. I'm hiding this app name. Here shows some access permission. Most of the people install without reading access permission. Here shows that device &app history and device ID & call information. How related this condition in this app ? Its a media player apps so device ID &Call information not related for install apps. Its a vulnerable point that attacker can perform their action.
This is most common trustable apps. I think you understand about this apps. What happen when you install ? Before install you give permission. When you give permission all data and information was handled by attacker . People daily lost their information and face cyber threat. Most of the virus are spreading this. People are not aware. So, before install application you should check the permission.
Its a media player apps. I'm hiding this app name. Here shows some access permission. Most of the people install without reading access permission. Here shows that device &app history and device ID & call information. How related this condition in this app ? Its a media player apps so device ID &Call information not related for install apps. Its a vulnerable point that attacker can perform their action.
Comments
Post a Comment