The ‘smartphone‘has become a disaster drawer in which the entire life of the user fits. From your photos and videos, to your conversations and your bank passwords. Therefore, it is capital that we take all the measures that we have in our power to prevent third parties from having access to the information that they store. Be it malicious third parties and scammers or people with little respect for privacy who, inadvertently, have managed to install ‘stalkerware’ on the device. It is a software that is usually associated with espionage between couples. But it can also be used for an employer to monitor the movements of its employees and for parents to know the use that their children make of devices. The imagination is the limit. You just need to have access to the terminal.
Be that as it may, when a code of this type or some other form of ‘malware’ (i.e. computer virus) is used there are certain signs that reveal it. Here are some of the most important ones.
If you have doubts about the status of your ‘smartphone’, the first thing you should do is make sure that it works at the correct speed. And it is that, although current mobiles are not designed to be eternal, it is not normal for them to slow down suddenly. If something like this happens, it could be the product of malicious code that runs in the background, overheating the terminal and quickly draining the battery. This can also damage the terminal and end up rendering it unusable over time..
Lots of publicity
If every time you unlock your phone you receive notifications with advertisements or advertisements, then you probably have some application with ‘adware’ installed (program that displays unwanted advertising). These pop-up windows tend to appear after downloading and installing an application, which is generally utilities or RAM memory optimizers. Pop-ups, as they are known, show a wide variety of messages, from invitations to the application store to download one to alerting about the existence of a mobile virus.
It should be remembered that ‘adware’ is one of the great dangers that users of devices with Android operating system currently face. According to a recent study by the cybersecurity firm Avast, almost one in two threats (45%) detected in terminals of this type during the first five months of 2021 corresponded to the category of ‘adware’.
Messages from strangers
An important part of ‘malware’ found on devices with Android operating system uses the number to unilaterally subscribe the user to premium services, so the user will begin to receive messages from services (horoscope, etc.) that they do not know. On the other hand, it is possible that you are not only receiving these messages, but you are also sending them to your contacts without the owner noticing, or even that some messages are published on social networks. In addition to the risks associated with ‘malware’, the user runs the risk of being affected in economic terms, since these services are usually paid.
The rise of mobile applications has caused many users to install them without taking precautions. Many times, the excess of these types of utilities means that we do not realize that some are downloaded without our permission. When we see that these cannot be removed correctly, it is because they have been downloaded thanks to a ‘malware’ that we have installed on the device.
It should be remembered, in turn, that all cybersecurity experts emphasize that it is capital download all the ‘apps’ from within the device’s official application store, in case it is Apple, in the App Store, and if it is Android, in the Google Play Store. In no case should we do them through links received from unknown or known third parties, since we could be upset and end up with a malicious code installed on the terminal.
In addition, you must inform yourself well about the application before proceeding with the download. This happens by looking at the ratings that other Internet users have left and checking the permissions that are requested.
How to check it
From the Internet Association, three codes have been shared to put on the phone and be able to check if it has been hacked. The first is the universal code: ** ## 002 # **. With it, it is possible to deactivate all call forwarding. Namely, mobile phone redirects will be instantly disabled. For this reason, if you think that your calls may be redirected to other receivers that are not the real ones, dial the code on the phone and in a matter of seconds you will be able to verify it.
Another quite interesting code is the following: *** # 62 # **. If on any occasion our friends or family tell us that our number is out of service or simply does not respond, we should check it with this code. When marked, it will tell us where all those calls, messages and data are being redirected. It will be necessary to verify that the number to which everything is being redirected is from our own company, if not, it is best to act immediately, contacting the operator.
A third code is *** # 21 # **, very similar to the previous one, since it will also indicate if our calls, messages, data, even the fax are being intercepted or diverted to another number, but it has an important difference: this code shows a small screen where it is indicated by text if a service is actually being diverted.