Money and business

Buying used phones of unknown origin threatens privacy

Experts in information technology and cybersecurity have warned of the great risks associated with purchasing used smartphones, or those obtained from unknown sources, noting that some of these phones may be pre-loaded with malicious software aimed at penetrating individuals’ personal and financial data and tracking their activities on an ongoing basis.

They told Emirates Al-Youm that there are wrong practices followed by some individuals when they purchase smart phones while traveling to some Asian countries, especially counterfeit phones or phones of unknown origin, which exposes them to the risks of hacking and poses a direct threat to their privacy and financial security.

They stressed the need to follow precautionary measures before using these phones, most notably ensuring that they are factory reset and installing reliable programs to combat cyber intrusions.

Common errors

In detail, technology expert, Dr. Muhammad Al-Feki, said that there are many individuals who make common mistakes, such as buying used phones and using them directly without taking any precautionary measures, which makes them vulnerable to having their personal or financial data hacked.

He added that some individuals go abroad, especially in some Asian countries, to buy smartphones of unknown origin at low prices, whether they are counterfeit or from unknown brands, which may expose them to electronic hacking through these devices.

He explained that the risks associated with using these phones lie in the possibility of using them as backdoors to steal individuals’ data through pre-installed malicious applications, pointing out that the user may not notice any direct hacking upon initial use, as hackers follow a method of gradual monitoring of data and accounts, and this may include personal photos and videos.

Al-Fiqi pointed out that many users of used phones assume that sellers have removed malware from the devices, which prompts them to use them immediately without any preventive steps, stressing the importance of taking precautionary measures such as factory reset, updating operating systems and applications, as well as installing reliable programs for cybersecurity and privacy protection, while avoiding buying phones of unknown origin or counterfeit when traveling abroad.

Malware

For his part, digital security expert and head of security consultants at Kaspersky, an international company specializing in cyber solutions, Imad Al-Haffar, said that there is a spread of wrong practices that may lead to the hacking of individuals’ personal and financial data through the purchase of used phones, of unknown origin, or of unknown brands.

He added that these phones may be pre-loaded with hidden malicious software, which may not be discovered immediately, but its effects appear later when specialized cybersecurity programs are used.

Al-Haffar explained that these programs act as portals for data breaches and track the activities of individuals, and may direct them to fraudulent sites to steal their personal information and login data. He pointed out that the spread of these practices requires more caution when using used phones, especially since hackers rely on users operating the devices directly without any precautionary measures, so they monitor the data and gradually exploit the loopholes to steal financial or personal information.

Al-Haffar stressed the importance of taking precautionary measures when dealing with used phones, starting with a factory reset before using them, installing specialized programs for cybersecurity and privacy preservation, and activating two-factor authentication for accounts linked to the phone and applications.

Favorite tool

In turn, technology expert, Jesse Kilmer, said that the widespread use of smartphones has made them a preferred tool for hackers, who exploit vulnerabilities in phones of unknown origin, whether they are counterfeit or from unknown brands, especially when purchasing from foreign markets while traveling.

Kilmer stressed the need to be careful by using privacy protection programs that detect malware, activating precautionary measures for passwords and two-factor authentication for applications, and making sure to buy phones from official and approved stores only.

Related Articles

Back to top button