< img src = "/uploads/blogs/7e/31/IB-1IP6pidbn_2037b8ac.jpg" Alt = "What messages are best removed from the smartphone"/> < P > The phone in the hands of the attacker can be compared to an open wallet that is left unattended in a crowded park. All data are available and only the time of time when they are used by dishonesty.

< p > exist & nbsp; three categories of messages & nbsp; which is extremely undesirable to store on a mobile device if you do not want to be victims of frauds < h3 >1. Passwords and access codes

< p > & laquo; that can happen ? is only a one -time code! It can no longer be used! & Amp; raquo; & ndash; Records a trusting user. However, the fraudulent corresponds to: & laquo; thank you, friend & raquo;.

< p > The essence of the problem is that even a few digits can provide attackers valuable information. Especially if they already have part of information about you, such as a name, phone number or login to a bank account. Recovering access to accounts is reminiscent of a complex quest in which each item matters.

< p >Therefore, if you receive a SMS with a confirmation code, enter it immediately and delete the message. Without hesitation. Ideally & ndash; Also clean the basket. Remember that in Android and iOS systems, distant SMS can remain in the memory; Rsquo; the device of the device for several weeks or even months.

< h3 > 2. Photos of personal documents

< P > This category includes: & nbsp; passport, driver's license & nbsp; and any other data that can be used to legitimize your person.

< P > What can fraudsters with similar images ? decorate micro-posts, buy seven-cards, create counterfeit accounts and even sell this data in Darknet.

~ ~ < p > Just one clear shot with the data read & ndash; This is the way to many problems. Therefore, you should not think: & laquo; because I only photographed and sent a friend, then I will remove & raquo;. Delete now and not then.

< p >If you need to save the following data, download them in a secure cloud storage with two -factor authentication or use reliable password managers such as 1password, Nordlocker or Google Files with Encryption.

~ ~ < H3 > 3. Correspondence containing personal and confidential information

< P > PIN CODES, Bank Card numbers, CVC codes, home addresses, close-ups of close & nbsp; nbsp; nbsp ;, answers to secret questions, such as & laquo; what your dog's name is in your childhood ? & All this data can be used against you.

< P > Malimists, having access to your phone, are often looking for SMS and messages in messengers. And if they find correspondence with a mother & rsquo; yu, where you reported: & laquo; password from wi-fi as from card & raquo;, it can end badly.

~ ~ ~ > < P > Even if you store similar information in a chat with yourself, this is not a safe option. If the phone is in the hands of a fraud without lock, your safety will be threatened.

< P > Do not forget about the message basket and backups! Removed data does not mean they have disappeared in Pam & Rsquo; yats and automatically stored in backup.

< P > Finally, all that can potentially cause problems should not be stored on your phone, especially in the form of ordinary messages. It is not an archive, a safe or a capsule. Is a device that can be lost, stolen or just broken.

< p > thus simple recommendation: be careful and you can keep your peace.

Natasha Kumar

By Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116