
Tero Vesalainen/Shutterstock
ByZach Scheepers/Sept. 15, 2022 11:03 am EDT
Most people think hackers only target computers. However, with the advancement of technology, most modern smartphones can rival the capabilities of entry-level laptops. Hackers have now set their sights on airport travelers in particular, as unsecured free public Wi-Fi is an easy gateway into your phone.
Phone hacking, therefore, occurs when a cybercriminal infects your device using malicious software that can steal or compromise personal data. Unfortunately, this includes everything, from photos, and login details, to banking information. Once the hacker is inside, they can transfer any file, authorize financial transactions, or impersonate you on social media platforms.
The airport is an ideal place to institute a hack because you're most vulnerable and unaware. After all, weary travelers aren't going to be monitoring their personal data and private information as closely as they should. By the time you land in another state or country and realize what has occurred, it might be too late.
But all is not lost, there are ways to stay safe and prevent this from happening to you. Here are our top 10 tips to protect your phone from hackers at the airport!
Verify free public wi-fi

Aris-Tect Group/Shutterstock
Nearly all airports offer free public Wi-Fi to those traveling abroad. While free internet might seem great at first, it does come with an increased risk of hackers infiltrating your phone. The most frequent public Wi-Fi hacking technique is called twin or false hot-spotting. The names intertwine, but the underlining principles of the hack remain the same.
Cyberthieves will start off by setting up a public Wi-Fi connection that looks official. This might be the name of the actual airport itself, or, a recognized restaurant or store that you're familiar with. The false or twin hotspot may be named something along the lines of ATL Free Wi-Fi, or McDonald's 2. Once you've logged into their malicious Wi-Fi connection, the hackers will then start monitoring usernames, passwords, and private data that you type or view while you're connected to the web.
The best way to protect yourself from a public Wi-Fi hack is to verify the connection with a staff member at a nearby establishment. An even better option would be to choose a public Wi-Fi connection that is password protected. You'll often find the exact Wi-Fi name and password on a nearby noticeboard, which would guarantee you've chosen the correct internet connection.
Alternatively, consider paying for a public Wi-Fi connection. Why would you want to pay for Wi-Fi you may ask? Well, the network is going to be much less crowded, and your internet speed will remain lightning fast.
Use a VPN and an antivirus software

Tada Images/Shutterstock
While most phones provide some level of built-in security, the best way to keep your data safe is by utilizing a VPN (a virtual private network) and trusted antivirus software. A VPN protects your phone by hiding your IP address and encrypting all the data you exchange with the server. In other words, all of your sensitive data will be transmitted safely, and hackers won't be able to see what you're doing.
A VPN probably sounds like the ultimate airport security solution right? Well, in most cases yes, it will shield the majority of travelers from the scavenging eyes of cyberthieves. With that said, a good VPN isn't free and can cost approximately $10 a month. If your travel is work-related, you may be able to ask the IT department to secure all your internet devices at the cost of the company.
Now, depending on whether you've accidentally downloaded a harmful file from the internet, or, your free VPN has let you down, the next best defense is an antivirusapp. Antivirus software will detect any suspicious activity on your phone and remove it before it accesses your important information.
There are various mobile antivirus apps available, but once again, you should make sure you're working withsoftware from a brand that's well-established and reviewed. A trusted brand such as Norton 360 would be a great example.
Avoid public USB charging stations

patpitchaya/Shutterstock
In 2019, tech company Asurion published research that showed Americans check their phones 96 times a day — or once every 10 minutes on average. The same research suggested that users aged 18 to 24 years old used their phones twice as much as the national average. If you're a traveler waiting for an airplane at an airport, these numbers will likely skyrocket even further.
Airport officials are aware that battery life is essential while traveling, and the most forward-thinking airport designers have, by now, begun incorporating a selection of charging stations at all heavily-trafficked terminals. These open electrical outputs allow users to recharge their phones quickly but also create an opening for hackers to employ their juice jackingplan. According to the Los Angeles District Attorney's Office, juice jacking is executed when a criminal creates a fake USB charging station at an airport with the intention to load malware onto an unsuspecting victim's phone.
While you may think your phone is charging, the cyberthief is actually stealing information from your phone or infecting your device in the hopes of later spying on your private usernames and passwords. Avoid plugging your USB cord into a public USB port on one end and your phone on the other.
Instead, using your own charger in a standard AC power outlet bypasses the juice jacking issue altogether.You could also use your own USB power bank.International flights occasionally have AC power ports onboard, but you'll still need your own charging plug, and the ports are never really guaranteed to function properly — on the majority of the flights we've taken in the last half-decade, anyway.
Avoid sensitive websites

Burdun Iliya/Shutterstock
According to Statista, 263 million Americans regularly shop online as of 2022 — that's nearly 80% of the population. If you're an avid shopper, chances are you'll want to pass time at the airport by searching for potential deals. Having said that, if you're on free public Wi-Fi, we strongly advise against this.
As previously discussed above, free public Wi-Fi is an easy way for hackers to get access to the information stored on your phone. If you have chosen to connect to the free public Wi-Fi anyway, you should avoid sensitive websites. These include websites that ask for banking information in order to facilitate financial transactions, shopping sites, social networks, and basically any other website that requires login info.
Sensitive websites also expand to those that use personal data. Any website that requests your name, address, or social security number can put you at risk of identity theft. Hackers can use this information to create fake social media profiles or answer security questions to attain passwords to services you might not even visit during your trip.
Should the situation arise that you're already automatically logged into a sensitive website, it's important that you log out immediately and disconnect from the web. Once you've done that, reconnect to a secure web connection (mobile internet or private Wi-Fi) and set a new password for yourself as fast as possible.
Use Two-factor authentication

David Gyung/Shutterstock
What happens if a hacker already has access to your phone, username, and password? Although this might seem like the end of the world, there is another security measure in place that can provide a safety net to your compromised device. Enter Two-Factor Authentication (2FA).
2FA will force you to provide an extra piece of information once you have logged into your chosen account. 2FA can be enabled on most mobile applications within the Security and Account Access setting. There are three types of 2FA categories, but they all provide the same function, ensuring that the person accessing the account, is really the account owner.
Whether you enable 2FA via a social media account, Google, or a banking institution, you'll likely come across one of the three available categories. This will be something you know, something you have, and something you are.Something you know might be an answer to a secret question. Something you have could be a message sent to your phone or an alternative email address. Something you are includes biometrics elements like your fingerprint or photo ID.
A 2FA that includes a secret answer or a fingerprint scan is likely your best option when phone security is your top priority at the airport. An SMS prompt or email 2FA might be accessible to hackers depending on the extent of control they have over your phone. Nevertheless, 2FA is easy to enable, and a great solution to ward off cybercriminals.
Be careful of suspicious emails or messages

Philip Steury Photography/Shutterstock
Generally, your email service should catch most spam or phishing emails and send them to your spam folder. These emails are often easy to spot — for example, a stranger telling you that you've won the national lottery, or an executor informing you that you're entitled to an amazing inheritance. Unfortunately for weary travelers, airport hackers are becoming better at their game.
If an airport hacker has somehow found your email address or phone number while you're at the airport they can use it to their advantage. Spam or phishing emails at the airport can be set up professionally, include the airline logo, and have a legitimate-looking email address to match. They'll often request you to log in to confirm an action or verify your flight booking by clicking a link.
With an unfortunate combination of jet lag and fatigue, what are the chances you'd identify a fake email from the exact airline you're about to fly on? Probably slim to none, and that's how fast an airport hacker can get you to click a malicious link. Nevertheless, there are some safeguards you can follow to protect yourself.
Avoid opening suspicious emails, includingemails or messages that have a weird title, emoji, or font.It's always important to inspect the email addresses of incoming communications, especially when you're out and about.Close inspection of an email address from a malicious entity often reveals a missing letter, a misspelled word, an extra number — anything even the slightest bit strange or suspicious-looking.
If you discover that a malicious or otherwise misleading email has reached your standard inbox (and has not been stopped by your email service's automatic safeguards), be sure to flag the email as "spam."This will give your email service's system a better idea of what to watch for and block in the future.
Turn your notifications on

RoBird/Shutterstock
Most apps have a Security Notification feature that you can enable. This feature will let you know if there have been any unusual log-ins from new devices. If a hacker has stolen your login details, you can then be notified if your account has been compromised.
These security notifications also extend to banking services and credit cards. Similar to an app, you can enable a notification to inform you when any amount of money enters or exits your account. We'd also suggest pairing this strategy with a Two-Factor Authentication (2FA) to avoid any possible form of financial transaction fraud.
It's also important to note that you should be careful when granting app permissions. Once you have allowed the security notification setting, the app may ask for your phone number, location, contacts, or the ability to use your gallery. Only allow what you believe is necessary, as it could become a privacy issue later on if a hacker gains access to the app.
Airports are loud, so we would also advise making all security notifications vibrate on your phone. This way, you won't miss anything and you'll be able to take action immediately. On top of that, it's probably a good idea to know how to cancel or freeze your credit card should the situation arise.
Use secure websites only

Robert Avgustin/Shutterstock
Websites that utilize an SSL (Secure Socket Layer) are becoming an industry norm. SSL is a standard security technology that secures the information that is shared between your phone's browser, and, the website you are interacting with. If a hacker gains access to your phone, SSL encrypts the information sent/received by you and the website, making it unreadable to prying eyes.
According to the University of Wisconsin-Madison, there are two ways to know if the website you're about to visit is considered secure: HTTPS and a padlock icon. Look at the website's URL and check for the letter S. A secure website URL will start with HTTPS, with an emphasis on the letter S as this indicates that the website is using an SSL certificate. You may find website URLs that start with HTTP, without the S– in general, these are no longerregarded as secure.
Look for a padlock next to the URL. The lock symbol is found on the top left of your phone's browser, usually in the same line as your URL. The padlock confirms that the website is secure and the information is encrypted.
With the above considered, you should still be wary when visiting any kind of website at the airport. A secure website that uses an SSL can still technically give away your private info if your device is compromised bykeylogger malware.That's where your trusty antivirus software can come in and ensure your system is clean and ready to browse the web.
Create a personal hotspot

Paosun Rt/Shutterstock
Throughout the article, we have outlined the dangers and risks associated with free public Wi-Fi. A solution to safe and secure internet can therefore come in the form of a portable 4G router. With the ability to create your own hotspot, you can then access your own internet and be confident the network isn't at risk to a hacker — provided you have created a complex password of course.
Alternatively, if you are traveling with a friend, you can also ask them to make their own phone a mobile hotspot for you. We'd advise asking them if they have an unlimited data plan, just in case you end up running up their phone bill. If everything is A-OK, you can follow these steps on how to create a hotspot for Android or Apple products:
For Android Phone Connections:
- On your friend's phone, swipe down from the home screen and tap Hotspot.
- On your own phone, open Wi-Fi Options, and select your friend's Hotspot Name.
- Enter your friend's Hotspot password, and then tap Connect.
For Apple Phone Connections:
- On your friend's phone, go to Settings, Mobile Data, Personal Hotspot, and activate.
- On your own phone, go to Settings, Wi-Fi, and look for your friend's Hotspot name.
- Select the Wi-Fi network, and enter the password.
Download and update apps from a trusted platform

Tada Images/Shutterstock
Most users who turn off their phone's auto-update feature do it to preserve space, or because they simply prefer the current version of their app or operating system. While updates to apps and operating systems can be a fuss, they often include new security features to protect users from hackers. This is especially important for apps that deal with money or personal information.
Similar to a phishing email, hackers can also send you a fake notification that says your app needs to be updated. If you've ever visited an unsecured website, you've probably come across a fake WhatsApp or Messenger update pop-up. Once you tap the screen prompt in your internet browser, malware can then be downloaded onto your phone.
The only secure way to update your apps is through the platform where you downloaded the app in the first place.Those using Android should visit the Google Play Store with some exceptions, while iPhone should always update apps using the Apple App Store.In terms of apps that are not found on the official Google or Apple app stores, we'd strongly recommend using your antivirus software. Scan the app and make sure it's safe before you start inputting your private information.
How can I tell if my phone has been hacked?

Alex Volot/Shutterstock
The most common warning signs you can look out for when your phone has been hacked include constant pop-ups, higher-than-usual data usage, reduced system performance, random texts, random calls, and the appearance of apps on your device that you don't remember downloading in the first place.
If your phone has suddenly started increasing its data usage, a hacker may be accessing your information while you're away. Furthermore, try checking your data usage settings on your Android or iOS device (Settings, Cellular, scroll to check the list) to discover the exact apps that may be compromised. Reduced system performance cancome in the form of apps not responding properly, or your overall system slowing down. If your phone's battery seems to be draining at a high rate, even while it's sitting idle in your pocket, something may be amiss.
Take a scroll through your messages or call log, and look for any texts or calls that you do not recognize. This includes messages sent via social media apps, too. Hackers won't always stop with you. If they have the opportunity to use your device to pull others into their web of deceit, they'll do so.
How do I secure my phone?

MeSSrro/Shutterstock
If you've been the unfortunate victim of a phone hack at the airport, there may still be time to save your personal information and prevent further damage. To secure a compromised smartphone, you'll want to go ahead and reset the whole thing. A clean factory reset will return your phone to its original state. Just make sure you create a backup of all your photos, contacts, and important data.
If you're not worried enough to fully reboot, start by deleting any newly installed apps you don't recognize. Additionally, try not to open them, as this could be a trap that activates a malware attack.
In all cases — even if you find yourself just a tiny bit suspicious of malicious behavior on your phone, you should change your passwords. Make certain your data connection is secure (with a non-public option, or mobile data), and reset your passwords. If a hacker gained access to your device in any way, chances are good that theyautomatically copied any and all of your passwords and login information. Unless you used a password manager, of course.
FAQs
What is the best protection against hackers? ›
Using secure passwords is the most important way to prevent network intrusions. The more secure your passwords are, the harder it is for a hacker to invade your system.
What are 3 ways you can ensure your safety if you get hacked? ›- Don't access personal or financial data with public Wi-Fi. ...
- Turn off anything you don't need. ...
- Be skeptical about links and attachments.
Mysterious apps, calls, or texts appear
A potential telltale sign that your phone has been hacked is the appearance of new apps that you didn't download, along with spikes in data usage that you can't account for. Likewise, if you see calls in your phone bill that you didn't make, that's a warning as well.
Fix a hacked Android phone with a factory reset
A factory reset is a simple procedure that completely cleans your phone's internal storage. A factory reset deletes not only your photos, videos, messages, and other personal data, but also wipes out malware that lets hackers in.
Download a good security app
A good security app can help you block hackers from your phone as well as detect any malicious apps that may already be on there. On Android devices there are plenty of apps available on the Play Store, including our own Certo Mobile Security.
- 1) White Hat Hackers.
- 2) Black Hat Hackers.
- 3) Gray Hat Hackers.
- 4) Script Kiddies.
- 5) Green Hat Hackers.
- 6) Blue Hat Hackers.
- 7) Red Hat Hackers.
- 8) State/Nation Sponsored Hackers.
Unfortunately, some attackers want to steal your data just to prove that they can. They are not motivated by monetary gain, access to free resources or the ability to steal your users' identities. They simply want to prove to themselves – and their hacker friends, perhaps – that they can break past your defenses.
Can hackers be stopped? ›There's a wide range of tools you can deploy to stop hackers from getting your information. We recommend the following best practices: Deploy firewalls or boost network protection to scan devices and networks for threats. Sometimes, these come bundled with antivirus software.
How will you prevent the password from the hackers? ›- Create strong passwords. 'password', '123456' or 'abc123' are terrible passwords because they're easy to guess. ...
- Secure your passwords. ...
- Recall value. ...
- Update your recovery options. ...
- Phone-y business. ...
- Check your settings. ...
- Also read: Goodbye, password! ...
- Also read: Compromised!
Two-factor authentication is often used to keep hackers from accessing your personal information. But for hackers, using their real contact information is too risky. Hackers use burner phones, multiple dummy email addresses, and truly encrypted messaging services like Signal to maintain privacy.
How do hackers get caught? ›
Following an attack, many will turn to hacker's forums to brag about their exploits and this often provides police with the vital clues they need to start identifying the person responsible. Honeypots have also proved an effective way to lure cybercriminals in and find out more about how they operate and who they are.
Can someone hack my phone without my phone? ›The truth is that someone can spy on your phone without physically touching it. People can remotely install spying software and track your phone without your knowledge.
Can someone hack my phone by texting me? ›Android phones can get infected by merely receiving a picture via text message, according to research published Monday. This is likely the biggest smartphone flaw ever discovered.
Will resetting phone remove hackers? ›Reset your phone
The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device. Follow the instructions below to reset your iPhone or Android.
*#21# This simple code let you find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone's screen.
How do I clear my phone of viruses? ›- Clear your cache and downloads. Open Settings, go to Apps & notifications, and select Chrome. ...
- Restart your Android device in safe mode. ...
- Find and remove malicious apps. ...
- Activate Google Play Protect. ...
- Install anti-malware software.
If you've experienced identity theft, you should probably change your phone number. It's a massive inconvenience, but the pros will outweigh the cons. Let's understand why. Most people upgrade their smartphone every two years — especially if they're on a contract plan.
Can hackers get your phone camera? ›All sorts of apps can request permission to access the camera, microphone, and other features, such as location information, on your phone or computer. Using the steps below, it's easy to see which apps have requested permission and revoke permissions that you've granted in the past.
Can someone spy your phone? ›How do you know if someone is spying on your phone? Whether you have an Android or an iOS phone, malicious parties can install spyware on your phone to snoop on you. You'll notice strange behavior, like high battery usage, an elevated temperature, and poor performance.
Who is the No 1 hacker in world? ›Kevin Mitnick | |
---|---|
Kevin Mitnick speaking at Cyber Incursion event 2018. He spoke about social engineering and its risks for users. | |
Born | Kevin David Mitnick August 6, 1963 Van Nuys, California, U.S. |
Nationality | American |
Other names | The Condor, The Darkside Hacker |
Which type of hacker is best? ›
White hat hackers are the good guys of the hacker world. These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system. They focus on security and protecting IT system.
How do hackers profile you? ›They routinely trawl through social networks to identify high-potential targets, before learning more about them by scouring their public profiles for details on their history, their job, their activities, their interests.
How do hackers target people? ›Personal Accounts
Personal email, social media and messaging accounts are all useful targets for a hacker, because if the criminal can gain control of just one of these, then she can impersonate the executive by launching “Business Email Compromise” (or BEC) attacks on other executives and employees.
This can be really serious, hackers can use your identity details to open bank accounts, get credit cards, order products in your name, take over existing accounts and take out mobile phone contracts. Hackers could even get genuine documents such as passports and driving licenses in your name once they have stolen your ...
Can someone hack my bank account with my phone number? ›If someone steals your phone number, they become you — for all intents and purposes. With your phone number, a hacker can start hijacking your accounts one by one by having a password reset sent to your phone. They can trick automated systems — like your bank — into thinking they're you when you call customer service.
Why do hackers hack? ›The biggest motivation is often financial gain. Hackers can make money by stealing your passwords, accessing your bank or credit card details, holding your information to ransom, or selling your data to other hackers or on the dark web.
Why do I keep getting hacked? ›There are two big reasons why people get hacked. Flaws in software and flaws in human behaviour. While there's not much you can do yourself about coding vulnerabilities, you can change your own behaviour and bad habits. The risks are just as real for the average person – even if the stakes aren't quite so high.
How do you protect your account? ›- Add or update account recovery options. ...
- Remove risky access to your data. ...
- Turn on screen locks. ...
- Update your browser. ...
- Update your operating system. ...
- Update your apps. ...
- Manage your passwords. ...
- Help protect your password from hackers.
The recommended best practices for password policy include: Requiring a minimum password length. Establishing a password history policy where at least the ten most recent passwords are remembered and cannot be reused. Passwords must meet complexity requirements.
Where are hackers located? ›- Romania. Responsible for 2.8 percent of the world's hacking traffic during the last quarter of 2012, Romania comes in at seventh place. ...
- Brazil. ...
- Taiwan. ...
- Russia. ...
- Turkey. ...
- United States. ...
- China.
Can hackers hack without Internet? ›
Anything created by humans can be hacked. Connected to the internet or not.
What will a VPN not protect you from? ›A VPN helps you stay invisible and behind the scenes, but it doesn't give you immunity against online risks like malware, ransomware, phishing attacks, or even computer viruses. That's where your antivirus software comes in.
Can you track hackers? ›Most hackers will understand that they can be tracked down by authorities identifying their IP address, so advanced hackers will attempt to make it as difficult as possible for you to find out their identity.
Can I report a hacker to the FBI? ›Contact Your Local FBI Field Office
If you or your organization is the victim of a network intrusion, data breach, or ransomware attack, contact your nearest FBI field office or report it at tips.fbi.gov.
In order to identify the criminals behind the cyber attack, both private and public security agencies often work with ISPs and networking companies to get valuable log information about their connections, as well as historical service, websites and protocols used during the time they were connected.
Is my phone being remotely accessed? ›Signs That Someone Has Remote Access to Your Phone
It shuts down or crashes often. The battery drains quickly even when not in use. Higher data usage than usual. Noises in the background when you're on a phone call.
- Use phone locks. 1.2.
- Use a VPN. 1.3.
- Use two-factor authentication. 1.4.
- Download apps only from the Google Play Store. 1.5.
- Use anti-virus software. 1.6.
- Do not use WiFi and Bluetooth connections at an unknown place. 1.7.
- Enable Android's “Find My Device” feature. 1.8.
- Browse in safe mode. 1.9.
- Enable two-factor authentication. ...
- Set a strong passcode (and consider disabling Touch ID or Face ID) ...
- Change what's accessible on your lock screen. ...
- Clean up lock-screen widgets and notification settings. ...
- Audit app permissions. ...
- Use “Sign in with Apple” ...
- Enable automatic updates. ...
- Disable ad tracking.
The short answer: Yes. Webcams and phone cameras can be hacked, giving bad actors complete control over how they function. As a result, hackers can use a device's camera to both spy on individuals and search for personal information.
Can someone watch you through your phone camera? ›Plenty of spy and stalkerware exists that could compromise your device, and anyone with the right software and expertise could realistically use your phone's camera to spy on you. On top of that, popular app developers aren't immune to accusations of watching you through your phone's camera.
Can someone hack my phone by texting me? ›
Android phones can get infected by merely receiving a picture via text message, according to research published Monday. This is likely the biggest smartphone flaw ever discovered.
How do I make my phone completely secure? ›Use a pin, password or pattern to lock your phone
For most Android™ devices, go to your Location & Security Settingsfor instructions. iOS users can find these functions in the General options of their settings.
- Tap Settings from your devices apps menu.
- Tap on Security (or Security and Screen Lock), this is usually located under the Personal section.
- Under the Screen Security section tap Screen lock.
- You are presented with several choices, from here you can pick the lock type you want for your device.
- Avoid public Wi-Fi. ...
- Keep your mobile phone number private. ...
- Travel light. ...
- Use strong passwords. ...
- Use built-in device protections. ...
- Back up.
- #1 Apple iPhone 12 Pro Max Secure Phone.
- #2 Samsung Galaxy Note 20 Ultra Secure Phone.
- #3 Google Pixel 5 Secure Phone.
- #4 Samsung Galaxy S20 Ultra Secure Phone.
- #5 Apple iPhone SE Secure Phone.
- #6 Silent Circle Blackphone 2 Secure Phone.
- #7 Sirin Labs Finney U1 Secure Phone.
How can I tell if my iPhone has been hacked? The easiest way to tell if your iPhone has been hacked is by running a full device scan with top-tier antivirus security software. This will check your iPhone for any suspicious apps or activity and alert you to any unusual behaviors that may have gone unnoticed.
Is iPhone safer than Android? ›So what is more secure: Android or iOS? Studies show that mobile malware targets Android much more than iOS, so for this reason, and all the others stated in this article, iOS is more secure. While you can remove malware from Android and iPhone, it's better not to get it in the first place.
Is there an app to stop hackers? ›Norton is the leading antivirus app for Android and iOS devices and will protect your phone against all types of cyberthreats, including phishing links, identity theft, viruses, malware, and more.
How do I make my phone Location private? ›To stop sharing your location with all apps and services, for even a short period of time, go to Settings > Privacy > Location Services and turn off location sharing. This stops all apps on your device, such as Maps, from using your location.
What apps should not be on my Android phone? ›- UC Browser.
- CLEANit.
- Dolphin Browser.
- Virus Cleaner - Antivirus Free & Phone Cleaner.
- SuperVPN Free VPN Client.
- RT News.
- Super Clean - Master of Cleaner.
- Fildo Music.