Digital wallets allow your data to be stolen through Gmail

Recently, the case of talent agent Bruno de Paula raised a series of discussions on the internet. Bruno, who had his cell phone stolen and his digital bank accounts defrauded by criminals, published an outburst on Twitter.

As a result, thousands of users began to discuss the security measures that we should apply to our devices. Experts even point to the risk of data theft through Gmail in similar cases.

see more

Should I share the soap with my family?

Dreaming of living abroad? Discover the countries that love the most…

Read more: Criminals use Nubank's image to promote bank scams

How can Gmail help criminals?

Despite being a secure system, cell phones with Gmail connected can present a certain vulnerability. If they are stolen and not blocked, the thieves can easily access all content owned by the smartphone owner. After all, the application does not have any type of access restriction.

That way, if you have digital wallets like PicPay and Mercado Pago installed on your device and use the same Gmail to access them, you can be sure that criminals can take advantage of this. Similar to what happened with the talent agent, loans can be made on their accounts, bank transfers and purchases with digital credit cards.

What to do to avoid these data thefts?

According to cybersecurity experts, some measures can be taken to avoid this type of problem. Through them, the user can keep their financial institution applications installed and take the cell phone to the street with less worries.

If you have Mercado Pago on your cell phone, you can simply activate a password to unlock the application. To do this, look for the menu in the lower right corner with the word “More”. After touching this item, go to the “Your profile” option and open the “Security” option and then “App security”. There, you can set a password.

As for PicPay, the user can register a biometric in the system and make it necessary for the confirmation of every transaction. In addition, it is also possible to limit the amount that can be transferred by Pix in your account and even even activate access protection, which works similarly to the password to enter the Market Paid out.

In addition, in general, some other habits are indicated, such as two-step verification, which can be useful for all the most sensitive software on your smartphone.

Internal Bisector Theorem: what is it, proof

Internal Bisector Theorem: what is it, proof

THE The internal bisector theorem was developed specifically for triangles and shows that when we...

read more
Lamprey: characteristics, habitat, is it a parasite?

Lamprey: characteristics, habitat, is it a parasite?

Lamprey it is a vertebrate animal belonging to the order Petromyzontiformes. With hagfish, lampre...

read more
Aphasia: what it is, types, causes, treatment

Aphasia: what it is, types, causes, treatment

Aphasia is a language disorder associated with brain damage. It is not a disease, but the manifes...

read more
instagram viewer