Bonus podcast: How much money are we talking? In this episode of Consumer Tech Update, Kim talks about Jeff Bezos impending divorce. The circumstances leading to the divorce may have more than meets the eye, though. No, we’re not here to speculate about the couple’s personal lives, that’s their own business. However, new details are emerging that may impact you more than you think. Read on and see what these new reports might mean for our national cybersecurity.
Was Jeff Bezos’ phone hacked by Saudi Arabia?
In a lengthy Daily Beast article, de Becker revealed an alleged Saudi Arabian plot to compromise Bezos’ smartphone. Although he didn’t offer any concrete proof, relying solely on circumstantial evidence, de Becker wrote that his “investigators and several experts concluded with high confidence that the Saudis had access to Bezos’ phone and gained private information.” “As of today, it is unclear to what degree, if any, AMI was aware of the details,” he continued. For its part, AMI dismissed the alleged connections with the Saudis and maintained that its information about the affair actually came from Sanchez’s own brother, Michael.
Bezos hack has scary implications for cybersecurity
I don’t know about you, but acquiring Bezos’ private information via a tattletale instead of a smartphone hack is more reassuring to the public, don’t you think? If a high-profile individual like the tech mogul Bezos, whose smartphone is supposed to be as impenetrable as a nuclear bunker, can be compromised, what does that mean for the rest of us mere mortals? Well, we’re not exactly Jeff Bezos, but this means that anyone who is persistent enough and is in possession of the right tools can compromise any phone or gadget. If someone wants to hack your phone, with enough patience and elbow grease, they sure can. But how? There are a variety of ways. For instance, Bezos’ may have clicked a boobytrapped link sent to him via email. The poisoned webpage, in turn, could have installed the necessary malware to compromise his phone. Could it be a malicious app that was downloaded and installed on the billionaire’s phone? How about a supply chain attack similar to Asus update malware hijacking that happened recently? Or worse yet, maybe there’s a still unknown zero-day exploit that allowed the hackers to remotely spy on Bezos’ phone without detection. Now, that’s a scary thought! Remember, the Saudis were also accused of conducting extreme surveillance on murdered journalist Jamal Khashoggi’s electronic devices without his knowledge. Until further details are revealed about this alleged hack (which I doubt will ever come to light), we’ll never know for sure. However, what you can be sure about are the steps you can do to protect yourself from similar attacks. Bonus podcast: No one is immune to hacking. You may not be a billionaire like Bezos, but you can take steps to make your phone hack-proof. Listen to this free Consumer Tech Update for more tips on how to lock down your phone.
How to protect your smartphone from hacks
Avoid third-party app stores If you are going to download apps, get them from official app stores like Google Play and the Apple App Store. These official app stores have security measures in place that stop malicious apps from being available. With a few exceptions, in almost every case, a malicious app will come from a third-party source. If you’re an iPhone user, don’t jailbreak your gadget and avoid installing jailbroken apps Install security software Make sure you have strong security software on your gadget, If you’re an Android user, make sure, you enable Android’s real-time security program, Google Play Protect. It certainly will be a huge help in containing malicious apps before they can cause damage. Never open risky attachments in emails Don’t open attachments from unsolicited emails. These attachments from fake emails are typically vectors for infections. Be cautious with links If you get an email or notification from a site that you find suspicious, don’t click on its links. It’s better to type the website’s address directly into a browser than clicking on a link. Always double check the URL of sites you visit too and look out for typos. Update your gadget Make sure that you have downloaded the latest security and operating system updates. These updates usually include patches to help protect your device from the most recent threats. Enable your phone’s lock screen Here’s a simple way to prevent snoops and hackers from physically installing malware on your phone – lock your phone! You may choose to use a passcode, a fingerprint, a pattern, or facial recognition but make sure you have this basic security setting enable all the time. Oh, and if you use a passcode, be sure it’s something that won’t be easily guessed. Don’t use your birthday or home address. Even better, use a longer string of numbers or characters. CLICK HERE FOR SIX ESSENTIAL STEPS TO SECURE YOUR SMARTPHONE OR TABLET.