The smart phone has now become an integral part of our daily life. It is a powerful "pocket computer" that allows us to do almost everything, from hailing a taxi to consulting our doctor. However, the cost of the latest models can be prohibitive for many.
It is not surprising that used and refurbished (Refurbished) devices are steadily gaining ground, points out Phil Muncaster from the team at global security software company ESET. They offer access to cutting-edge technology at a lower price, appealing to both budget-conscious consumers and those choosing a more sustainable way of consuming.
Smart phones, after all, are one of the most desirable gifts during the holiday season. But the high price of newer models makes used devices a particularly attractive and affordable option. Many get a new one mobile phone την περίοδο των εορτών, είτε σαν gift for themselves or because their loved ones offer it to them. This, in turn, creates a "secondary" market, as they themselves then often sell or trade in their old device.
The main problem, however, is that we don't always know what state these devices are in and what dangers might be lurking. To protect yourself and avoid unpleasant surprises, follow the tips below.
What are the dangers of used phones?
The used phone market is booming, especially due to the economic crisis and inflation in many countries of the western world. According to estimates, sales of used and refurbished devices brought in over 13 billion dollars worldwide in the first quarter of 2023, recording 14% increase year-on-year. In mature markets such as the UK, almost one quarter of phones sold in 2023 were used or refurbished.
However, as pointed out by Phil Muncaster by her team ESET, purchasing these devices poses significant cybersecurity risks.
- Outdated software
Many used devices may no longer be supported by the manufacturer, which means they do not receive software and security updates. This leaves the device vulnerable to new threats and vulnerabilities. According to a 2020 UK study, almost the one third of used models were no longer supported with security updates.
- Malware
In some cases, devices may have been "infected" with malware by the previous owner (either unknowingly or intentionally). Malware can:
- To steal personal information and passwords.
- To spy on the user's calls and messages.
- Fill the device with unwanted ads or enroll it in premium services.
The goal of cybercriminals is usually financial exploitation through fraud or digital extortion.
- No checks have been made
When used phones do not pass reliable checks they are likely to run on outdated software or have other hidden malfunctions, putting the new user at risk.
How to avoid the dangers of used appliances
As Phil Muncaster from the ESET team points out, reducing the risks requires care and method during the purchase process and after the device is downloaded. Here are some critical steps to protect yourself:
Before purchase
- Research the seller
Αγοράστε από αξιόπιστες πηγές, όπως κατασκευαστές, πιστοποιημένους εμπόρους ή εταιρείες τηλεπικοινωνιών. Αποφύγετε αμφιβόλου quality προσφορές και διαβάστε κριτικές από άλλους αγοραστές. Μια εγγύηση at least one year is important to ensure the quality of the device. - Avoid jailbroken ή rooted Appliances
Devices with disabled security features are more vulnerable to attacks. - Select devices supported by the manufacturer
Make sure the device is still receiving security updates, which is usually the case for 2-3 years after its release.
After purchase
- Do a factory reset
Delete all the previous owner's data, such as photos, contacts, passwords, apps and browsing history. - Update the software
Upgrade the operating system to the latest version and activate them automatic updates. - Check for malware
Look for signs of infection, such as:
- Unwanted ads and pop-ups.
- Apps you didn't install.
- Unusually high battery consumption or low performance.
- Install security software
Use reliable security software to scan the device for potential threats.
Best practices for lasting protection
Once the device is up and running, adopt the following habits:
- Set screen lock and PIN, password or biometric identification (face recognition/fingerprint scan) for secure access
- Make frequent backups of your data in the cloud.
- Delete unnecessary apps to reduce the attack surface.
- Enable encryption device.
- Use multi-factor authentication factors to access your device and any software/accounts on it.
- Turn it off Bluetooth This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. tethering or Wi-Fi when you are not using them.
- Check application permissions and avoid apps that ask for excessive permissions.
- Download apps only from official stores such as Google Play and the Apple App Store.
- Be on the lookout for text messages and phishing emails and avoid interacting with suspicious links or attachments.
- Use VPN when you connect to public Wi-Fi.
Special cases and BYOD policies
If you are using your used phone for business purposes or in an environment Bring Your Own Device (BYOD), check your employer's additional security policies. Your unsecured device could be a gateway for cybercriminals to access corporate data and systems.
Final thoughts
A used cell phone need not be a source of concern. Just follow the best practices above to ensure its security. If you plan to give your own device to someone else, make sure to create first backup copy, delete your data and perform restore factory settings.