The experts at Adnkronos: “Contextualized cybercrimes are centered on the name and mobile number. Always be wary before opening a link and pay attention to what is written”
smartphones for the increase of cyber scams
Street mobile and attacks with are on the rise malicious links. “Definitely scams via smartphone – even through Whatsapp or apps like Linkedin – have increased and this has allowed cybercriminals to have the coupling between name and telephone number thus being able to carry out very contextualized attacks” explains the expert Raoul Brenna, Manager of Information Security at Fastweb to Adnkronos. Cyber attacks “these phenomena occur in waves and this is a period in which there is an intensification” of cyber attacks, “the advice is therefore to always be super suspicious” because “it is something that happens often and, if we receive a message strange, you have to be very, very wary” underlines Giulio Coluccia, CEO of ToothPic, a spinoff of the Polytechnic University of Turin and i3P, to Adnkronos. But how do these intrusions happen and how can you defend yourself?
Fastweb’s expert Manager of Information Security, Raoul Brenna, explains that “using a name known to the user and pairing a link misleads the person, for example a path often followed by cybercriminals is hiding behind the name of a courier and behind a hypothetical ‘send package’ by coupling a link. In this way you access strategic delivery data that convey mobile phone numbers, emails, addresses” Brenna also warns. In this context, “WhatsApp is the master, but the ‘doors’ are also an SMS, or fake emergency alerts with attached links, in short, every topic is good when the mobile phone is involved which now ‘rules the roost’ in cyberattacks” observes Brenna. To defend yourself from intrusions, Brenna suggests paying attention to the “content of the malicious message” and “doing a lot of prevention”. “We need to pay close attention to the contextualisation of the message we receive, do a quick check with the interlocutor who often communicates with us and who has been ‘used’ without his knowledge to ‘enter’ our mobile phones” he states. “There are clear cases of account theft, you should always be suspicious” when you receive a strange message “from a known person” and, in these cases, “blocking the account is a drastic measure but it can certainly be useful” finally adds the manager of Fastweb underlining that “prevention is as strategic as the use of the second authentication factor” and that, as a telecommunications player, “for this reason we activate many information campaigns for our users”.
Giulio Coluccia, CEO of ToothPic, is also pushing to raise the bar of attention towards cyber attacks. The expert of the spinoff from the Polytechnic of Turin and i3P explains that “even if the malicious link seems to come from known people, the mobile phone can be ‘infected’ and, unfortunately, we only manage to notice it later if we act on impulse”. “It is useful instead – he suggests – to pay close attention to how the link that we are asked to open is formulated”. “If what is written in the link is uncertain then it is easier to understand the deception but now technologies have made giant strides and these criteria have changed, it is much more difficult to understand whether the message is legitimate or not” warns Coluccia, Ph .D. in electronic and communications engineering at the Polytechnic of Turin. “When strange words are added to the link that we are asked to open, terms that do not lead to official sites, or when we are offered overly advantageous offers, chimeras that do not make commercial sense, then it is time to be clever” he says . And how to find out if your cell phone has been cloned? Coluccia explains that one indicator is when “you receive messages with attempts to log in with authentication, or the camera is activated or the microphone is activated without us having turned anything on.” Coluccia himself and his team created technology for protecting cell phones. “We, as a spinoff of the Polytechnic of Turin, deal with technologies for secure authentication with a technology that recognizes the device being accessed, through a fingerprint of its camera sensor. In this way – he assures – it is impossible to cheat the system.” (by Andreana d’Aquino)