All your data is of value
Your name, age, gender, marital status, health status, etc.

Why this data is sought after?
To know more about the victim, and how to be targeted

How such data is collected?
There are many ways, including every time you press allow or share in any application or website that asks for unnecessary permissions.

Download apps from trusted sources

Make sure that all the applications you are using are up-to-date

Read the terms of use and beware of the permissions used for the applications and websites

Make sure that your applications are granted access only to the data necessary to perform the job.

Review and modify the permissions granted to applications on your device with the following steps: