The news of the Pegasus infecting the phones of journalists and activists has shocked the media and people across the world. In India, various reports suggest that the Central government may have used the Israel-based software for surveillance. However, the government has denied these charges, and the debate goes on.
According to the reports, many famous journalists, politicians are also under the target of the software. These include Rahul Gandhi, Prashant Kishore, I.T. Minister Ashwini Vaishnav, and many others
So, What Exactly Is Pegasus?
It is an Israeli-based NSO Group spyware. While the company is not ready to share which countries are currently using its software, it says that 40 countries are using the same. Besides, it has 60 customers in these 40 countries.
It came into existence in 2010. However, this is the first time that is come so prominently into the media reports and channels. Additionally, Pegasus is a world-leading cyber solution. It assists in enabling law enforcement and also helps in extracting data from mobile phones.
One license of the software can cost up to Rs. 70 lakh. Additionally, with the help of one license, it can help to track around 50 mobile phones.
What Does It Do To Your Phone?
If your phone gets infected by Pegasus, it can collect all the essential details from your device. Moreover, it can also secretly activate microphones or cameras. Additionally, it could also take control over all your messages, pictures as well as emails. It can also trace your location and keep your records in check.
It is almost near to impossible to get rid of the software once it infects your mobile phones. Even if you wish to insert a new sim into your device, the software will still keep working. The only way to get rid of the Pegasus software from your device is by destroying it.
Besides, it can infect phones of various operating systems, including Android, IOS, Blackberry, and many others.
How To Protect Your Device From Pegasus?
As mentioned above, it is nearly impossible to protect your phone once the software infects it. However, you can try to divide your contacts and text conversations on various devices. Also, make sure that you isolate your handsets and contacts in your phones.
Lastly, you can wait for the operator to get rid of the software once the mission is complete.
The software is indeed a dangerous one as it can be secretly installed in the phones and get you the details from the same.