3 ways an attacker may compromise a phone without the victims knowledge

From latesthackingnews.com

We carry our mobile phones everywhere with us. These devices store our personal information. If this data falls into the wrong hands, it can be disastrous for us. Hackers and scammers are already known to phish for personal information. They can use the data, including usernames, passwords, social security numbers, PINs, and bank account information, for identity theft, stealing money, blackmailing, scams, etc. Hackers have come up with unique ways to monitor mobile phones. Often they make use of vulnerabilities in the operating system of a phone to hack it. However, hackers also use social engineering to dupe unsuspecting people into downloading malicious software on their mobile phones. Here are three popular ways someone can hack your phone without you even knowing about it:

Read more…