Cybersecurity advocate Joshua Asige has issued a warning to tech consumers, urging them to avoid purchasing used phones. Asige cautioned that buying pre-owned devices could make users and buyers vulnerable to hacking attacks, as some of these phones have been rooted.
Mr. Asige claims that rooted phones can be updated in ways that render them vulnerable to security breaches, potentially compromising sensitive personal data such as banking information, passwords, and secret documents. Furthermore, these flaws can expose users to dangerous software such as spyware and malware.
He was speaking on A1 Radio’s Day Break Upper East Show with Mark Smith today, Friday, April 21, 2023.
Asige’s warning comes as the market for used smartphones expands, pushed by rising new device prices and a rising desire for sustainable and eco-friendly alternatives. While purchasing second hand phones can be a cost-effective and ecologically friendly option, Mr. Asige warned that buyers should proceed with caution and due diligence.
To safeguard themselves against potential security risks, Mr. Asige recommended that users perform a thorough security check on any used phone they intend to buy. This includes verifying the device’s operating system, checking for any signs of physical tampering or software modifications, and running a malware scan.
Mr. Asige also emphasised the importance of staying informed and vigilant about cybersecurity risks, especially in an age where technology is increasingly integrated into our daily lives. By taking proactive steps to protect our personal information and devices, we can help ensure a safer and more secure digital future.
“Our system has become used to buying used phones. These phones have become a big source of vulnerability. Most of the phones are cloned. Most of the phones are also rooted. Rooted phones are phones that have been broken to the extent that they can perform functions other than what the developers have asked the devices to do. So if he has rooted the phone and you buy it as a home used device, that phone is open to the world. If you are online, it is open. Anybody can hack into it,” he said.
Source: A1radioonline.com|101.1MHz|Mark Kwasi Ahumah Smith|Ghana