{"id":4076,"date":"2025-03-21T14:09:45","date_gmt":"2025-03-21T13:09:45","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=4076"},"modified":"2025-12-17T10:23:36","modified_gmt":"2025-12-17T09:23:36","slug":"bezpecnost-mobilnych-zariadeni","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni\/","title":{"rendered":"Mobile Device Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4076\" class=\"elementor elementor-4076\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mobile Device Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47d5bca e-con-full e-flex e-con e-child\" data-id=\"47d5bca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-842e29c elementor-widget elementor-widget-button\" data-id=\"842e29c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e07fc86 elementor-widget elementor-widget-button\" data-id=\"e07fc86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/malver-sposoby-sirenia-a-ochrana-pred-malverom\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8c0eaa elementor-widget elementor-widget-button\" data-id=\"b8c0eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni-ako-si-vybrat-bezpecny-telefon\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fef7fc e-flex e-con-boxed e-con e-parent\" data-id=\"0fef7fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88d7580 elementor-widget elementor-widget-heading\" data-id=\"88d7580\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why do attackers constantly target smartphones?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a1996e elementor-widget elementor-widget-text-editor\" data-id=\"5a1996e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approximately 83.72% of the world's population owns a smartphone. Their popularity, as well as the amount of data people store on their smartphones, naturally attracts attackers. Smartphones are no longer just for making calls or sending messages. They contain a huge amount of sensitive data that is extremely valuable to attackers. <span style=\"color: #0c3a76;\"><strong>What might interest an attacker<\/strong><\/span>, when gaining access to your device? Here are a few areas:\u00a0<\/p><ul><li><strong><span style=\"color: #0c3a76;\">Communication<\/span><\/strong>: An attacker can monitor your SMS, emails, chat apps (e.g. WhatsApp, Messenger) or even eavesdrop on your calls. The obtained data can be used for blackmail or phishing attacks.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Photography and video<\/strong><\/span>: Personal or sensitive files can be stolen, misused for fraud, creating a false identity, or used for blackmail.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Financial data\u00a0<\/strong><\/span>: Access to banking apps, payment cards, and mobile wallets can lead to unauthorized transactions and theft of money.<\/li><li><span style=\"color: #0c3a76;\"><strong>Location data\u00a0<\/strong><\/span>: GPS on your smartphone allows an attacker to track your movements in real time, which can lead to physical tracking or theft.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Digital keys and documents:\u00a0<\/strong><\/span>If your phone contains an electronic ID card, insurance card, or digital keys to a car or building, an attacker can gain access to your identity and assets.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Microphone and camera:\u00a0<\/strong><\/span>A compromised device can be used to secretly record audio or video without your knowledge.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Personal documents and access data\u00a0<\/strong><\/span>: Saved passwords, contacts, or important files can be misused for further attacks or sold on the dark web.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a557b22 elementor-widget elementor-widget-image\" data-id=\"a557b22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-1024x341.jpg\" class=\"attachment-large size-large wp-image-4078\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-1024x341.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-300x100.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-768x256.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-1536x512.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-2048x683.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Hands-holding-touching-mobile-phones-displays-using-apps-18x6.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: pch.vector \/ Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c18415c e-flex e-con-boxed e-con e-parent\" data-id=\"c18415c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dcd404 elementor-widget elementor-widget-heading\" data-id=\"2dcd404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Isolated application environment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e38565 elementor-widget elementor-widget-text-editor\" data-id=\"0e38565\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When talking about attacks on applications, it is important to know that most modern applications run by default in a so-called <span style=\"color: #0c3a76;\"><strong>\"sandbox\"<\/strong><\/span>. This is<span style=\"color: #0c3a76;\"> <strong>an isolated environment<\/strong><\/span>, where applications operate with <span style=\"color: #0c3a76;\"><strong>limited permissions<\/strong><\/span>. This means that<span style=\"color: #0c3a76;\"><b> <strong><span style=\"color: #0c3a76;\">applications do not have<\/span> <span style=\"color: #0c3a76;\">access to all parts of the device<\/span><\/strong><\/b><\/span>\u00a0and its data. If they need to work with another part in order to function, the user must grant them permission.\u00a0<br \/><span style=\"color: #0c3a76;\"><strong>A permission<\/strong><\/span> allows access to certain functions or data on the device. Most often, an application requests it when it first starts. It is important <strong><span style=\"color: #0c3a76;\">not to give unnecessary permissions <\/span><\/strong>to applications that do not need it (e.g., a calculator does not need access to our contacts). Some applications can abuse user permissions. The goal of attackers is to manipulate the user into granting the requested permissions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a29cb0f elementor-widget elementor-widget-image\" data-id=\"a29cb0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"950\" height=\"370\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/blog-article-malware-sandbox-evasion-techniques-principles-solutions-figure-1.png\" class=\"attachment-large size-large wp-image-6935\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/blog-article-malware-sandbox-evasion-techniques-principles-solutions-figure-1.png 950w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/blog-article-malware-sandbox-evasion-techniques-principles-solutions-figure-1-300x117.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/blog-article-malware-sandbox-evasion-techniques-principles-solutions-figure-1-768x299.png 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/blog-article-malware-sandbox-evasion-techniques-principles-solutions-figure-1-18x7.png 18w\" sizes=\"(max-width: 950px) 100vw, 950px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Sources: https:\/\/www.apriorit.com\/dev-blog\/545-sandbox-evading-malware<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e848173 e-flex e-con-boxed e-con e-parent\" data-id=\"e848173\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9612ffc elementor-widget elementor-widget-spacer\" data-id=\"9612ffc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7c1c91 e-flex e-con-boxed e-con e-parent\" data-id=\"a7c1c91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db26c60 elementor-widget elementor-widget-heading\" data-id=\"db26c60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How can an attacker abuse privileges?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f623659 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"f623659\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"258094681\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2580946811\" data-tab-title-id=\"e-n-tab-title-2580946811\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2580946811\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAbused SMS permission\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2580946812\" data-tab-title-id=\"e-n-tab-title-2580946812\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2580946812\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAccessibility services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2580946813\" data-tab-title-id=\"e-n-tab-title-2580946813\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2580946813\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tExploitation of security vulnerabilities\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2580946811\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2580946811\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-310f006 e-con-full e-flex e-con e-child\" data-id=\"310f006\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38d69a7 e-flex e-con-boxed e-con e-child\" data-id=\"38d69a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a5ff7f elementor-widget elementor-widget-text-editor\" data-id=\"0a5ff7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Logging in to banking, email, and other services often requires a verification code via SMS (second factor). Attackers can abuse access to SMS and steal these codes, gaining access to sensitive data even when two-factor authentication is in place.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2580946812\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2580946812\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-87ecc5b e-con-full e-flex e-con e-child\" data-id=\"87ecc5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8feef55 e-flex e-con-boxed e-con e-child\" data-id=\"8feef55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88aaee6 elementor-widget elementor-widget-text-editor\" data-id=\"88aaee6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These services allow screen overlays and alternative text input, especially for people with visual impairments. Since they require special permissions to overlay the screen, they can be abused by attackers to capture everything you do. The image shows how a fake window overlays the real application. The user unknowingly enters their data into a fake form, which sends it to the attacker.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b12ff6c elementor-widget elementor-widget-image\" data-id=\"b12ff6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/ezgif-7576dc13d6f93a-800x450.jpg\" class=\"attachment-ocean-thumb-ml size-ocean-thumb-ml wp-image-6986\" alt=\"\" srcset=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" data-srcset=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/build38.com\/blog\/solutions\/protect-android-apps-from-overlay-attacks\/<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2580946813\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2580946813\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-6e09c57 e-flex e-con-boxed e-con e-child\" data-id=\"6e09c57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b98fbe e-con-full e-flex e-con e-child\" data-id=\"4b98fbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-171cfc0 elementor-widget elementor-widget-text-editor\" data-id=\"171cfc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Not all malware requires user approval. Sometimes, opening a malicious website or receiving a text message is enough. These are cases where attackers bypass the granting of permissions by exploiting logical errors (security vulnerabilities) in the code. The process of exploiting a vulnerability is called <span style=\"color: #0c3a76;\"><strong>exploitation<\/strong><\/span>.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da90324 e-flex e-con-boxed e-con e-parent\" data-id=\"da90324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c948564 elementor-widget elementor-widget-spacer\" data-id=\"c948564\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8b96dd e-flex e-con-boxed e-con e-parent\" data-id=\"c8b96dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfa6ebb elementor-widget elementor-widget-heading\" data-id=\"dfa6ebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Mobile phone exploitation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e31c406 e-flex e-con-boxed e-con e-parent\" data-id=\"e31c406\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7cce7d elementor-widget elementor-widget-text-editor\" data-id=\"c7cce7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Exploiting phones is typically extremely complex and requires exploiting multiple vulnerabilities simultaneously. Below is an example of an exploit using Pegasus spyware.\u00a0<\/p><p>Step 1: The user receives an SMS or message via the app, for example: \u201cYou have a new voicemail. Click this link to listen\u201d or a threatening message.\u00a0<\/p><p>Step 2: The user clicks on the provided link, which redirects them to an infected website.\u00a0<\/p><p>Step 3: Without the user's knowledge, Pegasus spyware is installed on the device, which exploits operating system vulnerabilities (unknown to the developers).\u00a0<\/p><p>Step 4: The attacker can now access messages, emails, and contacts, activate the microphone and camera for surveillance, track the device's location, and more. The attacker will obtain sensitive information that can be used for extortion, surveillance, or other malicious activities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-690a966 e-flex e-con-boxed e-con e-parent\" data-id=\"690a966\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51808dd elementor-widget elementor-widget-spacer\" data-id=\"51808dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Bezpe\u010dnos\u0165 mobiln\u00fdch zariaden\u00ed Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Pre\u010do \u00fato\u010dn\u00edci s\u00fastavne cielia na smartf\u00f3ny? Pribli\u017ene 83,72% svetovej popul\u00e1cie vlastn\u00ed smartf\u00f3n. Ich popularita ako aj mno\u017estvo d\u00e1t, ktor\u00e9 si \u013eudia v smartf\u00f3noch ukladaj\u00fa, prirodzene l\u00e1ka aj \u00fato\u010dn\u00edkov. Smartf\u00f3ny u\u017e d\u00e1vno nesl\u00fa\u017eia len na volanie \u010di posielanie spr\u00e1v. Obsahuj\u00fa obrovsk\u00e9 mno\u017estvo citliv\u00fdch d\u00e1t, ktor\u00e9 s\u00fa pre \u00fato\u010dn\u00edkov [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-4076","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=4076"}],"version-history":[{"count":58,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4076\/revisions"}],"predecessor-version":[{"id":6989,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4076\/revisions\/6989"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=4076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}