{"id":5046,"date":"2023-11-02T10:18:18","date_gmt":"2023-11-02T14:18:18","guid":{"rendered":"https:\/\/counterespionage.ca\/?p=5046"},"modified":"2023-11-08T15:52:03","modified_gmt":"2023-11-08T20:52:03","slug":"securite-du-smartphone-supprimez-ces-applications","status":"publish","type":"post","link":"https:\/\/contreespionnage.com\/en\/securite-du-smartphone-supprimez-ces-applications\/","title":{"rendered":"Smartphone Security: Delete These Apps"},"content":{"rendered":"<h2>Unmasking Apps That Spy on You<\/h2>\n<p>You view your smartphone as an indispensable tool. But are you aware that widely-used applications might be a threat to your privacy? We will provide you with useful information so you can assess the dangers and make informed decisions regarding your privacy.<\/p>\n<h2>CamScanner: A Hidden Danger<\/h2>\n<p>Ana Bera, a cybersecurity expert at Safe at Last, raises concerns about CamScanner, an app designed to emulate a scanner on your phone. She reveals that this app actually contains a malicious component acting as a Trojan horse that retrieves infected files. The dangers associated with such industrial espionage are frightening and can seriously damage your phone. It is therefore strongly recommended to uninstall this kind of application. Rest assured, once you have removed it, it is very unlikely that any damage will persist.<\/p>\n<h2>Beware of Weather Apps<\/h2>\n<p>Shayne Sherman, CEO de TechLoris, attire notre attention sur les applications m\u00e9t\u00e9o. Plusieurs d&rsquo;entre elles ont \u00e9t\u00e9 incrimin\u00e9es pour dissimulation de chevaux de Troie ou autres malwares, des outils couramment utilis\u00e9s dans l&rsquo;espionnage industriel. Il est donc conseill\u00e9 de faire preuve de prudence vis-\u00e0-vis de telles applications, en particulier \u00ab\u00a0Good Weather\u00a0\u00bb qui repr\u00e9sente un risque majeur. Pr\u00e9f\u00e9rez consulter les pr\u00e9visions locales et assurez-vous d&rsquo;\u00e9liminer imm\u00e9diatement cette application.<\/p>\n<h2>Facebook, the Data Collection Leader<\/h2>\n<p>We all enjoy our social networking apps. However, according to Raffi Jafari, a cybersecurity expert and co-founder of Caveni Digital Solutions, if you are looking to protect your information, the first culprit is Facebook. Its level of data collection is astonishingly high, often far more intrusive than large companies like Google. If you had to delete one app to protect your data, it would be Facebook.<\/p>\n<h2>WhatsApp, an App That Plays It Close to the Chest<\/h2>\n<p>Michael Covington, VP of product at Wandera, a mobile security specialist, draws our attention to WhatsApp, whose vulnerabilities were revealed earlier this year. Attacks can be targeted at users by simply sending a specially crafted message to their phone number. Once the attack is successful, hackers have access to all the features that WhatsApp has access to, including the microphone, camera, contact list, etc.<\/p>\n<h2>Instagram, Another Member of the Facebook Family<\/h2>\n<p>Comme WhatsApp, Instagram appartient \u00e0 Facebook, ce qui fait de ces deux applications une menace potentielle en mati\u00e8re d&rsquo;espionnage industriel. Dave Salisbury, directeur du Center for Cybersecurity and Data Intelligence de l&rsquo;Universit\u00e9 de Dayton, indique qu&rsquo;Instagram \u00ab\u00a0demande plusieurs autorisations qui incluent, entre autres, la lecture et la modification de vos contacts et du contenu de votre stockage, la localisation de votre t\u00e9l\u00e9phone, la lecture de votre journal d&rsquo;appels, la modification des param\u00e8tres du syst\u00e8me et l&rsquo;acc\u00e8s total au r\u00e9seau.\u00a0\u00bb<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>In conclusion, it is crucial that smartphone users are aware of the potential risks in terms of industrial espionage and surveillance. Be vigilant in your usage and in detecting apps that could pose a threat to your privacy and security.<\/p>","protected":false},"excerpt":{"rendered":"<p>D\u00e9masquez les applications qui vous espionnent Vous consid\u00e9rez votre smartphone comme un outil indispensable. Mais avez-vous id\u00e9e que des applications largement utilis\u00e9es pourraient constituer une menace pour votre vie priv\u00e9e ? Nous allons vous donner les informations utiles pour que vous puissiez analyser les dangers et prendre des d\u00e9cisions \u00e9clair\u00e9es concernant le respect de votre&hellip;<\/p>","protected":false},"author":1,"featured_media":5048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[],"post_series":[],"_links":{"self":[{"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/posts\/5046"}],"collection":[{"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/comments?post=5046"}],"version-history":[{"count":1,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/posts\/5046\/revisions"}],"predecessor-version":[{"id":5049,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/posts\/5046\/revisions\/5049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/media\/5048"}],"wp:attachment":[{"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/media?parent=5046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/categories?post=5046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/tags?post=5046"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/contreespionnage.com\/en\/wp-json\/wp\/v2\/post_series?post=5046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}