The IT expert said that you shouldn't allow applications on the smartphone

IT experts warn, what kind of access you can allow applications on the smartphone and what is not. According to PRIME, in the case of illiterate action there is a serious risk to transmit information to fraudsters.

According to the IT-expert of the Academy of management Finance and investing, Gennady Nikolaev, in the world of Big Data companies are willing to buy any information that will allow them to make money. “For example, many banks are using their applications, or data purchased from third parties, choose locations for new ATMs. However, there are those companies that will use the information for fraudulent purposes or try to make money on the sale”, — he explained.

According to him, if the app is released by unknown developers, you should carefully ensure that their requests did not go beyond the functionality of the applications themselves. In particular, the expert urged to pay attention to the permissions to access SMS, because, having gained access to the correspondence users, fraudsters can consider messages with one-time codes to log in to online banks and confirmation of transfers.

the Expert also said that if the crooks will have access to different functions. So, after obtaining permission to access contacts, the attackers possess not only notebook, but also social media. Access to the camera will give them the opportunity to take pictures at any time. Access to the microphone will record both phone conversations and everything that is happening around the device. If the scammers got access to the device memory, they will be able to view all files, and optionally encrypt them demanding money for the decryption.

At the same time Nikolaev pointed out that the need to check each program will save the use of a specialized directory of apps from the App Store and Google Play where developers ‘ requirements are often harmless, but vigilance is not to lose.

Stories about how you tried to get help from the Russian state in terms of coronaries and what came of it, email it to