{"id":5046,"date":"2023-11-02T10:18:18","date_gmt":"2023-11-02T14:18:18","guid":{"rendered":"https:\/\/counterespionage.ca\/?p=5046"},"modified":"2023-11-08T15:52:03","modified_gmt":"2023-11-08T20:52:03","slug":"securite-du-smartphone-supprimez-ces-applications","status":"publish","type":"post","link":"https:\/\/counterespionage.ca\/en\/securite-du-smartphone-supprimez-ces-applications\/","title":{"rendered":"Smartphone Security: Delete These Apps"},"content":{"rendered":"<h2>Unmasking Apps That Spy on You<\/h2>\n<p>You view your smartphone as an indispensable tool. But are you aware that widely-used applications might be a threat to your privacy? We will provide you with useful information so you can assess the dangers and make informed decisions regarding your privacy.<\/p>\n<h2>CamScanner: A Hidden Danger<\/h2>\n<p>Ana Bera, a cybersecurity expert at Safe at Last, raises concerns about CamScanner, an app designed to emulate a scanner on your phone. She reveals that this app actually contains a malicious component acting as a Trojan horse that retrieves infected files. The dangers associated with such industrial espionage are frightening and can seriously damage your phone. It is therefore strongly recommended to uninstall this kind of application. Rest assured, once you have removed it, it is very unlikely that any damage will persist.<\/p>\n<h2>Beware of Weather Apps<\/h2>\n<p>Shayne Sherman, CEO of TechLoris, draws our attention to weather apps. Several of them have been implicated in hiding Trojans or other malware, tools commonly used in industrial espionage. It is therefore advised to exercise caution with such apps, particularly \"Good Weather,\" which poses a significant risk. Opt for checking local forecasts instead, and make sure to remove this app immediately.<\/p>\n<h2>Facebook, the Data Collection Leader<\/h2>\n<p>We all enjoy our social networking apps. However, according to Raffi Jafari, a cybersecurity expert and co-founder of Caveni Digital Solutions, if you are looking to protect your information, the first culprit is Facebook. Its level of data collection is astonishingly high, often far more intrusive than large companies like Google. If you had to delete one app to protect your data, it would be Facebook.<\/p>\n<h2>WhatsApp, an App That Plays It Close to the Chest<\/h2>\n<p>Michael Covington, VP of product at Wandera, a mobile security specialist, draws our attention to WhatsApp, whose vulnerabilities were revealed earlier this year. Attacks can be targeted at users by simply sending a specially crafted message to their phone number. Once the attack is successful, hackers have access to all the features that WhatsApp has access to, including the microphone, camera, contact list, etc.<\/p>\n<h2>Instagram, Another Member of the Facebook Family<\/h2>\n<p>Like WhatsApp, Instagram is owned by Facebook, making both apps potential threats to industrial espionage. Dave Salisbury, director of the Center for Cybersecurity and Data Intelligence at the University of Dayton, points out that Instagram \"requests several permissions, including, but not limited to, reading and modifying your contacts and stored content, tracking your phone's location, reading your call log, changing system settings, and accessing full network capabilities.\"<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>In conclusion, it is crucial that smartphone users are aware of the potential risks in terms of industrial espionage and surveillance. Be vigilant in your usage and in detecting apps that could pose a threat to your privacy and security.<\/p>","protected":false},"excerpt":{"rendered":"<p>D\u00e9masquez les applications qui vous espionnent Vous consid\u00e9rez votre smartphone comme un outil indispensable. Mais avez-vous id\u00e9e que des applications largement utilis\u00e9es pourraient constituer une menace pour votre vie priv\u00e9e ? Nous allons vous donner les informations utiles pour que vous puissiez analyser les dangers et prendre des d\u00e9cisions \u00e9clair\u00e9es concernant le respect de votre&hellip;<\/p>","protected":false},"author":1,"featured_media":5048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[92],"tags":[],"post_series":[],"class_list":["post-5046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite-sur-lespionnage-industriel","entry","has-media"],"_links":{"self":[{"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/posts\/5046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/comments?post=5046"}],"version-history":[{"count":1,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/posts\/5046\/revisions"}],"predecessor-version":[{"id":5049,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/posts\/5046\/revisions\/5049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/media\/5048"}],"wp:attachment":[{"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/media?parent=5046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/categories?post=5046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/tags?post=5046"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/counterespionage.ca\/en\/wp-json\/wp\/v2\/post_series?post=5046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}