Pegasus is designed to be virtually undetectable. The software leaves limited traces and can delete itself once it detects that the device is being scanned for such a program. That is why it is impossible to determine whether you have been targeted by Pegasus or not. People in the professions we mentioned above in the list are at risk of becoming a target of this program.
In 2019, the software was installed on hungary whatsapp data using vulnerabilities in iMessage and Facetime. All it took was a phone call, even if the caller did not answer.
How to protect yourself?
There are some rules you can follow to minimize the risk of becoming a target of any software that poses a security risk, such as:
✓ Always keep your device updated
✓ Do not click on suspicious links
✓ Use the strongest passwords possible
✓ Install antivirus
Everyone knows about these simple rules, but few follow them to ensure maximum security online.
The most effective method against any software that is involved in surveillance is to abandon the smartphone.
Or at least a temporary refusal from it, for example, when you go to an important meeting. Also in the smartphone you can completely turn off individual elements, for example, the phone camera or sound recording. But even this will not give a 100% guarantee of protection against hacking of your data.
The Pegasus data leak showed that the technology to access and control our smartphones not only exists, but is also very vulnerable. At the moment, it is used against a limited number of people, but who knows what will happen in the near future.
Pegasus: is it possible to identify it?
-
- Posts: 75
- Joined: Sat Dec 14, 2024 4:12 am