malware

share

Turning on the Bluetooth on your mobile device enables other Bluetooth-enabled devices to see your device and possibly make connections with it. It could allow an attacker to install malware through that connection, or secretly activate a microphone or camera to eavesdrop on you. 

 

Best practices 

share

Phones and tablets contain a large amount of personal information. Lost or stolen devices can be used to gather information about you and potentially others. Protect your phone like you would your computer. If your phone can browse the web and check email, you have probably already been targeted by the same malicious attacks and scams that go after your computer. 

 

What are the risks? 

Pages