New threats to mobile devices: how to ensure the security of smartphones and tablets

Every user keeps some form of personal information on a smartphone or tablet. By 2025, mobile cyber threats grew by 40%. Hackers are now focusing on smartphones the most. Tablets too have started attracting attention from mobile hackers. Knowing how to protect oneself and one’s devices from these risks is crucial.

Dangers for users

Ransomware programs have begun to actively attack mobile devices. In 2024, losses from such attacks amounted to €1.200. Phishing sites have adapted to mobile platforms. Attackers create copies of popular applications. More than 70% of fake programs in Google Play and the App Store contain viruses. These applications use access to user data to steal information.

Trojans remain one of the main threats. In 2024, the share of Trojan programs increased by 35%. Attackers use them to steal passwords. Banking applications have become the main targets. Fraudsters steal card and account data. Sometimes Trojans introduce spyware modules, increasing the risk of data leakage. It is difficult to detect such threats without an antivirus.

Public Wi-Fi networks have become a place for attacks. Attackers create fake access points. Users connect to them without suspecting the danger. More than 50% of Wi-Fi attacks are associated with data substitution. Attackers intercept messages and passwords. Malware can also be distributed through such points. This increases the risk for users without a VPN.

Spyware collects data about users. It is often hidden in free applications. Attackers sell information on black markets. In 2025, 12 million users may become victims of such software. The main goal is personal data. Malicious programs can access geolocation, camera, and microphone, allowing them to spy on users.

How to protect your devices

Use antivirus software. This will reduce the risk of infection by 80%.

Install operating system updates regularly.

Avoid downloading applications from unverified sources. More than 90% of malware is distributed through third-party stores.

Phishing protection

Be cautious with emails and links. Never enter data on suspicious sites. Check sender addresses carefully. Use browser extensions to protect against phishing. These extensions block suspicious sites. Avoid opening attachments from unknown senders.

Regular backups

Create backups of your data. This will protect them in case of attacks. Use cloud storage with encryption. Backups help restore data. Make copies weekly and store them on protected devices or external drives.

Summary