PSafe Newsroom – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png PSafe Newsroom – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Careful With That QR Code! Five Steps For QR Code Safety]]> https://www.psafe.com/en/blog/careful-with-that-qr-code-five-steps-for-qr-code-safety/ Fri, 11 Mar 2022 18:14:35 +0000 https://www.psafe.com/en/blog/?p=21198 For 20 million people, the temptation proved too hard to resist. For a full minute, a simple QR code ping-ponged back and forth on their television screens during a break in the action at the Super Bowl. Cryptocurrency company Coinbase reportedly paid 14 million dollars for that ad – but clearly, they got their money’s worth: 20 million people were redirected via QR code to their landing page, specially designed for the ad. 

Caution Flags 

The radical simplicity and irresistible pull of the Coinbase spot was the talk of the post-game ad reviews. But out of the din of this discussion came another message — this one from the Federal Bureau of Investigation (FBI). Inc Magazine’s Jason Aten pointed to a warning they had issued a month prior to the big game – the first lines lay out the situation quite clearly:

The FBI is issuing this announcement to raise awareness of malicious Quick Response (QR) codes. Cybercriminals are tampering with QR codes to redirect victims to malicious sites that steal login and financial information.

QR Codes Are Back, And Bigger Than Ever

Once again, it seems that bad actors have seized on a popular trend to help them do their dirty work. A simple technology dating back to the 90’s, QR Codes are on the rise lately – as they’ve become a very effective digital tool for marketers who want to quickly convert mobile phone readers into shoppers and buyers. The Wikipedia entry on QR codes gives you a quick grasp of just how powerful they can be when scanned on a mobile phone:

QR codes may be used to display text to the user, to open a webpage on the user’s device, to add a Card contact to the user’s device, to open a Uniform Resource Identifier (URI), to connect to a wireless network, or to compose an email or text message.

All you have to do is think about how hackers might use that kind of power, and you can quickly see that indiscriminate scanning of QR codes could lead you into some serious trouble. 

Two Primary Sources of QR Code Danger

The first danger with malicious QR codes is the fact that they can transport you seamlessly to a fake website. As with most hacks, the first layer of the transaction seems to be legitimate: the QR code works! The user arrives at a site that has the offer or information they were seeking. 

And this is when many users will let their guard down, and fail to notice telltale signs that the site isn’t legitimate. Super-sweetened offers can also play a role in softening up otherwise careful users. The bad website can be a collection point for private information and financial data, and the path to financial losses and ID Theft is paved.

The second danger is QR codes that include malware themselves. Once again, let’s turn to the FBI for — “just the facts”:

Malicious QR codes may also contain embedded malware, allowing a criminal to gain access to the victim’s mobile device and steal the victim’s location as well as personal and financial information. The cybercriminal can leverage the stolen financial information to withdraw funds from victim accounts.

That’s about as bad as it can get. So, short of forsaking the use of all QR codes — how do you defend yourself?

What Can You Do?

Here are the five steps you can take – we discuss each below in more detail:

  1. Get informed about what QR codes are and what they can do.
  2. Make sure your device has good security software.
  3. Use that security software regularly!
  4. Before scanning any QR code, scan “the situation.” 
  5. Make sure you land where you expected to!

You’ll be glad to know that you’re well on your way to completing the first step. We hope this article has helped in this regard, and if you want to get even more up-to-date on potential threats to you and your mobile device, we highly recommend these two companion articles:

Six Ways That Cybercriminals Try To Take Over Your Device – QR codes are covered here along with several other traps, like WiFi Honeypots, Fake Apps, and even Subtitles in Streaming Apps. Do give it a careful read – lots to learn here.

Can a QR Code Be Used In A Phishing Attack? – If you’ve followed us so far, you know the answer to this question is YES! But hit the link to get more information on how QR codes can bait the hook for hackers’ big Phishing expeditions.

Security Help

If you’re using dfndr security, make sure you activate the anti-hacking feature to protect you from scams and malware. dfndr security PRO plan also has a dedicated Safe App function to help sniff out apps that contain malware, and also provides complete Identity Theft reports should you suspect trouble.

Eyes Up!

But your awareness is always going to be your first line of defense. Remember that QR codes primary benefit is to help you connect to a specific spot on the web without your having to type in a URL. The “fun” of seeing this work is no doubt a major part of the success of that Coinbase ad. 

If you decide you do want to scan a QR code – make sure you can verify it’s from a trusted source, and take a good close look at the surroundings: the copy and design, the context of use. Is the code stuck on a wall outside a club? Or did it come to you via a traceable source like a mass mailing? If you can verify that the code is from a trustworthy source – make sure the landing spot is what you expected it to be.  

Just remember what your friends in the FBI told you: a QR code isn’t a game to be taken lightly — or a Pokemon type game where you have to capture and collect. They serve a very specific function, and they’re more powerful than they look. Treat QR codes with the same caution you’d give to any unknown app or web address.

]]>
<![CDATA[Are Your Apps Leaking Data? How To Know and What To Do]]> https://www.psafe.com/en/blog/are-your-apps-leaking-data-how-to-know-and-what-to-do/ Mon, 17 Jan 2022 19:06:47 +0000 https://www.psafe.com/en/blog/?p=21151 One of the ways we make our world more convenient these days is by loading apps from platforms, services, and companies we buy from or consult frequently. Most companies have invested in their apps to make them more useful, and also invested in promoting those apps to us, with special deals or promotions. 

But the sense of ease and security we have when dealing with the teller at our local bank, or flying on our favorite airline, may not serve us well when we use an app provided by a company we know well “IRL” (in real life). 

“The widespread development of apps by businesses is not only good for marketing and sales,” remarks Emilio Simoni, Director of Research at PSafe’s dfndr lab, “but it also feeds a billion dollar business in re-use of your data.”

Data Means Dollars

Modern day operating systems for both iOs and Android provide some mechanisms for you to limit the way apps can track your behavior across the web, but these only offer limited protection. “The data you use in everyday interactions with these apps is of tremendous interest to hackers,” Simoni observes,  “and data breaches for some of the world’s biggest and most respected companies have become almost commonplace.” 

Leaked data is commonly resold or accessed on the dark web, and once procured, it can be used in a variety of ways. It’s fairly common for leaked data to be used to fuel scams that entice users to expose even more information, or, to provide direct access to financial levers.

“What users need,” Simoni explains, “is the means to see the whole picture for their apps and the data they use.  This is what we provide with dfndr security Pro: a Privacy Scan, which gives users the ability to see, in one place, a complete picture of how apps are using and sharing your data – whether voluntarily, or through leaks.”  

Here’s what that complete picture shows:

  • The data and access permissions you have granted for each app
  • Where each app sends the data it collects
  • A data breach history for each app (more than one breach is not unusual).
  • Apps you have installed that may be malicious or known to pose risks 

Obviously the first thing you can do with this information is to make judgments about which apps you want to keep – but it may also help guide you to further steps, like changing passwords, or changing settings on the app. It can also give you important information for staying aware of likely hacks or doing further research to determine precisely what sort of personal data may have been compromised.

“Getting this comprehensive picture is really the best way to see context and to stay alert and ahead of the game,” Simoni says.

Before You Load Apps

PSafe’s dfndr security Pro also includes a feature called Safe App, which enables you to evaluate apps before you load them on your phone. Safe App tells you if an app is known to be malicious, or if it has previously been breached. 

Try PSafe dfndr security for Free

The easiest way to see how both Safe App and Privacy Scans work is to try dfndr security for yourself. You can start with the Free Version of the app, which will help you manage your phone’s memory, storage, and battery power – and also give you some good basic security capabilities like a URL checker and an Antivirus App scan.

Add dfndr security Pro. and you’ll be able to do a quick Privacy Scan and see where you stand, and you can check any new apps you want to install with Safe App. You’ll also get Anti Theft functionality to locate your phone (and protect your data) if it’s stolen. 

Use this link to learn more and try out the free version of PSafe’s dfndr security.

Stay Alert

“The capabilities a good security app can provide offers essential protection,” Emilio Simoni emphasizes, “but staying alert ourselves is another key element of our overall defense.”

In addition to procuring and using a proven security solution like dfndr security Pro, Simoni suggests the following “data hygiene” habits for users:

Strong Passwords: Use a password manager and make sure you never use the same password for more than one account. 

Take Care With Social Media: Many social media accounts these days, asking questions and offering quizzes, are simply storing and selling clues to hackers. 

Beware of Phishing: Hackers are certainly not above using news about data leaks as an occasion for reaching out to defraud users. For any communications you receive about data, passwords, accounts, or any transactions you’ve made (or pines you haven’t!) — always double check the source.  

“With a good security app and the conscientious use of privacy ‘best practices,’ your use of apps can provide the convenience and ease you’ve come to expect from them,’ Simoni concludes. “We’ll continue to research viruses and hackers methods to make sure we’re doing our part to maintain our interesting-leading solutions.”

]]>
<![CDATA[Joker Malware is Back (And It’s No Joke)]]> https://www.psafe.com/en/blog/joker-malware-is-back-and-its-no-joke/ Mon, 20 Sep 2021 22:17:38 +0000 https://www.psafe.com/en/blog/?p=20978 Old malware never dies — it just morphs into something more devious and dangerous — and this pattern is playing out with “Joker” malware, which was first identified in 2016. In 2021, it’s back and more diverse and devious than ever.

During the past few months, Joker has become one of the most active Android malware infections. Joker rides on the coat-tails of seemingly legitimate apps, then covertly signs up users for pricey subscription services. It can also steal SMS messages, contact lists, and device information. 

Joker variations seem to arrive in batches, with a fresh batch leeching onto dozens of apps as recently as September. 

Joker Infiltrates The App Store

“One of the best ways to avoid malware and trojan apps is to use Google’s sanctioned app store,” says Emilio Simoni, PSafe’s dfndr lab Research Director, “but unfortunately, Joker has managed to disguise itself and mutate so profusely, that it has found its way on to several apps within the official Google Play marketplace. Of course third party app stores are also offering Joker-tainted apps — so the best protection is going to be a strong security app that sniffs out malware-tainted apps immediately, like our dfndr security Pro.”

Google removes the offending apps as soon as they’re reported — but the high rate of variation and concealment with this particular trojan keeps bringing new specimens on board.

Delay Tactics

“Part of what makes Joker so effective is that it waits to take effect,” Simoni remarks. “After the trojan-app is downloaded (many of these are knockoffs of better-known apps) it waits to drop a very small packet of code, it then reaches out to the server that loads the malware that does all the dirty work.” 

What Can You Do To Stay Safe?

Good hygiene with your digital devices includes:

  • Installing only the apps that you need and use. Loading up your device with as many apps as you can imagine using is a hazardous path. 
  • Being wary. Look for apps from developers you know and trust.  Do a little background checking and make sure that cool new app is coming from a known and trusted provider.
  • Cleaning house periodically. To keep the number of apps you use to a minimum, do a periodic review of the apps on your phone and delete the ones you’re not using. 

“Good security habits are always the first step,” Simoni observes, “but we can see that with truly devious malware like Joker, personal vigilance may not be enough.  When a piece of malware is mutating on a monthly basis, you need a dedicated security solution to help keep you safe.” 

The Best Defense Begins BEFORE Dangerous Apps Are Downloaded

An excellent way to protect yourself is to use a security application like dfndr security Pro, which has a dedicated Safe App Installer that can tell you if the app you’re about to install has been identified as malware.  This is exactly what the Safe App Installer does: it AUTOMATICALLY protects you from malware and apps known to compromise your data — before you even install them.

More Protection for Your Digital Life

Safe App Installer is only one of the key features dfndr security Pro offers.  It also comes with a full suite of security capabilities that can protect you not only from digital threats, but from thieves “IRL” as well.

Beyond Safe App, there are four additional features dfndr security Pro offers to protect you and make your digital life easier:

Anti-theft protection: Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock  it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.

Privacy Protection: You can locate on a map where your app data is going and how it might be used by third-parties.

Unlimited Identity Theft Reports: These reports provide “perimeter defense,”looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 10 billion compromised credentials. 

Ad-Free: As an extra bonus, Pro is totally ad-free.

Get The Protection You Need Today

Click here to download dfndr security and free trial dfndr security Pro to put all of these features to work securing your phone, your data, and your digital life. dfndr security Pro offers a full suite of protection, constantly updated, to make sure “you’re safe out there.”

]]>
<![CDATA[Have you already been the victim of a data leak?]]> https://www.psafe.com/en/blog/have-you-already-been-the-victim-of-a-data-leak/ Thu, 09 Sep 2021 18:41:43 +0000 https://www.psafe.com/en/blog/?p=21122 Here’s what you need to know…and do.

Data breaches — even among major platforms and providers — are becoming an almost daily occurrence. With so much of our life and business being carried out online, and the multitude of devices and platforms we use to work, shop, and play, the “attack surface” for hackers grows (much) larger every minute. Even the biggest and best-run companies and platforms have become favorite targets for hackers. So much so, that attacks on well-known companies and platforms have become almost commonplace. 

“There’s a double danger in data leaks becoming so common,” says Emilio Simonis, Research Director at PSafe’s dfndr lab. “First, of course, are the attacks themselves — but as they become more ubiquitous, many people start to take them for granted, and assume they pose only modest personal danger.” Significant lag time between the breach-event itself, and subsequent criminal action on the part of hackers, also contributes to the lack of decisive response. “Hackers are very patient — they know many victims won’t take immediate action to protect themselves,” Simoni remarks, “and they use that aspect of human nature to their advantage.”

Try dfndr security today, it will help you secure your phone and protect your data from hackers and malware of all kinds.

How do breaches happen?

Just as hackers use their knowledge of human nature to design their scams, they also rely on human error to create openings they need to get at private data. Poor passwords and weak credentialing processes are probably the most common source of breaches, and lost or stolen (and unprotected) laptops and drives also contribute. 

Phishing scams, enticing recipients to give up data voluntarily, have never flagged in popularity. Malware is also a common method, and is often combined with phishing techniques to get at personal and financial data stores. “Increasingly, these attacks are targeted at corporate assets, so employees must remain vigilant,” Simoni warns, “especially now, as so many people are using devices from their home to connect to work.” 

Malware and ransomware have become a more favored method as many users have become used to “shopping by downloading” — trying out free versions of new software solutions before deciding if they want to keep a new app or game. Malware often asks for extensive permissions, then quietly works behind the scenes with the permissions it has accrued, logging data and  building up significant data-leverage, before shipping that information payload off, or using it to launch further attacks on the user.

External, code-driven attacks are also growing more common than ever. Often called “brute force attacks,” these are now guided by increasingly sophisticated artificial intelligence, and very powerful computers, to crack weaker protections.

What information do they target?

Hackers have a wide-open market for the information they steal, and generally they’re after Personal Identification Information that most individuals and companies (and laws) seek to protect. Of course they also seek information like bank and credit card account information that gives them immediate financial leverage. The worst nightmare for individuals is when a hacker is able to transact business as their victim through identity theft. Identity theft can be very complicated to undo, and the process of undoing the damage wrought by an identity theft can be protracted and painful. “Hackers are keenly aware of the leverage that personal identifying information gives them,” Simoni cautions, “they know how to make the most of it, and rarely show any restraint once they have the upper hand.” 

What can you do?

Major breaches are on the rise and show no signs of tailing off. That’s the bad news.  “The good news,” Simoni observes, “is that protecting yourself is still something that you have a lot of control over individually.. It’s something you can do well with some simple habits and tools.“

“We recommend taking three fundamental precautions to all of our customers,” says Simoni. “Make sure you adopt best-practices for your passwords, use two-factor-authentication whenever you can, and use a solution like dfndr security Pro for immediate notice if your personal data has been accessed outside of your control. Our Pro solution also scans new apps to prevent malware attacks.”

“Your phone itself can also be a target,” Simoni advises, “which is why dfndr security Pro has the capability to shut your phone down for use, and show you its location, in case of theft. ”

Best practices for passwords include the following: 

  • Never use the same password for more than one site. 
  • Make sure that your passwords are kept up to date on every site, and change them immediately whenever you’ve been notified of a breach. 


The Big Benefits of Two-Factor Authentication 

Most financial and major social sites now offer two-factor authentication (usually with an option to send a code via-text to your phone).  Use these protocols whenever they’re available, as they greatly reduce the capability of hackers to break through.

Breaches are occurring with disturbing frequency, so the best way to stay ahead of the hackers is to have immediate notification of leaks with your personal data at any time. dfndr security Pro offers free unlimited ID theft checks, which can give you the flexibility and insight you need.

As noted, dfndr security Pro also has other important safety features, like a Safe App Scanner to protect you from malicious (data stealing) apps, and Anti-Theft features that help you locate and control your mobile device if it gets lost or stolen. 

With dfndr security installed on your phone, you will have more protection, so you can test it now if you like. Click here if you want dfndr security for free.

]]>
<![CDATA[More fake apps are causing real losses]]> https://www.psafe.com/en/blog/more-fake-apps-are-causing-real-losses/ Thu, 01 Jul 2021 02:23:13 +0000 https://www.psafe.com/en/blog/?p=21079 Rogue apps remain the biggest security threat for mobile phone users, with hundreds of thousands of new malware apps being generated on a daily basis. Malicious apps are not only abundant, but also especially devious and greedy when it comes to stealing and using your personal data.

Phones are a prime target

“Hackers target smartphones because they are so rich with data,” advises Emilio Simoni, Research Director at the dfndr lab, “our lives are tied to our phones in so many ways: our work, our families, our buying habits, our financial tools, and of course we’re physically tied to them as well.” Simoni continues: “With accelerometer and GPS functions becoming standard “always on” functions, our phones literally follow our every move.”

What are the risks?

The variety of uses made of personal data are almost as numerous as the types of malicious apps generated. Many apps simply steal personal information and resell it to companies who are eager to gobble up masses of personal data. Browser histories, GPS information, accelerometer data, and network information can be gathered and exported without your permission when an app has been given (or taken) the right permissions. Of course, logins, personal security and financial information can also be more directly leveraged. Ransomware is another common technique, where an app locks up a phone and demands payment to release it back to the user. 

“We see increasingly sophisticated scams taking place,” Simoni warns, “where gathering data is simply the first step in the process. This information then used to leverage the subject or to perpetrate fraud or crimes involving phishing or identity theft.”

Simoni concludes: “The costs can be significant,” which is why you have to protect yourself — both with knowledge, and with a good software solution.”

How to identify malicious apps?

This is getting harder to do all the time, as hackers have become more sophisticated — which is why we suggest employing a software solution like dfndr security pro. (dfndr security, in premium version, features a SafeApp checking function designed expressly for this purpose). But your own wary eye can also provide a first-line of defense. 

Here are a few key guidelines:

  • Get your apps from a reputable source. Google’s Play Store isn’t able to immediately catch every malicious app that comes down the pike: but they are on the lookout, and apps that are offered to you through alternative channels are much more likely to be malicious.
  • Check permissions. If a simple app is asking for a lengthy list of permissions, you may be signing up for more than you bargained for.
  • Find out who made the app. Check to see the developer’s name and click on the link to their page and all their other apps. Does everything look legitimate? Or are the apps sketchy and the presentation of their features incomplete?
  • Google it. Find out what you can find out about the developer. You may find a conversation already underway that can save you a heap of trouble!
  • Examine their language. Does the developer sound like they wrote their description while thinking about something else — like maybe the next malicious app they’re going to create? Not a good sign. In fact, a common sign that you’re dealing with malicious software.

Use a reputable security app, like dfndr security 

“We would recommend that everyone employ a good security app on their devices these days, especially their mobile phones,” Emilio Simoni urges, “the risks are just too numerous and the potential losses can be steep.” 

However, the good news is that a focused security capability can spot malicious apps with great accuracy and reliability. dfndr security Pro offers a Safe App feature, which checks-for, and warns you about malicious code, before you download any application. It also provides historical insight — warning you if the app has had its data breached and leaked to unauthorized users. “Our team is on the case around the clock, making sure our security solutions are the most complete on the market,” Simoni concludes: “it’s the kind of job you definitely want to entrust to experts!”

What to do if you have downloaded a mailicious app?

The free version of dfndr security offers a full antivirus capability that can remove viruses from your phone. This version also enables you to schedule an auto virus-scan to run periodically, which will search-for and identify any new digital threats.

Prevention is the best way to go, and that’s why we encourage you to get a good security solution for your devices as soon as possible.

More about dfndr security

dfndr security is a free app that can help you manage the storage, battery life, and wifi security of your digital device, while also offering protection via a url checker, and anti hacker and phishing protections. You can try dfndr security PRO for 3-days free, and upgrade if you like the protection it provides. dfndr security Pro offers:

Safe App installer — checks for malicious apps before you install them

Identity Theft Reports — So you know if your online credentials have leaked

App Privacy Protection — Offers notifications about issues with apps you’re using; app data breaches, permissions you’ve granted to various apps, and info about where your data may be used.

Anti-Theft Protection — Protects your phone from thieves with an alarm, remote lock-out, and a picture of the thief.

dfndr security Pro is a full suite of protection for users who recognize that they must take an active role in their own digital security.

You can download dfndr security Pro and start your free trial right away.

]]>
<![CDATA[As Schools Go Online, Cyberattacks Are On The Rise]]> https://www.psafe.com/en/blog/as-schools-go-online-cyberattacks-are-on-the-rise/ Wed, 30 Jun 2021 22:17:32 +0000 https://www.psafe.com/en/blog/?p=20968 The continued fallout from coronavirus in online environments has begun to trend upward in an environment that poses serious risks to both hosts and users: online schooling. Schools, parents, and students need to take care, and take steps to protect themselves.

Source: Checkpoint Research

The figure above, from Checkpoint Research, shows a significant ramp-up (and spike) in Cyberattacks as pupils returned to remote classes, held via online meeting platforms and tools. Worth noting in this figure is the fact that this sector has always been more vulnerable to attack, but is even more so now.

“The urgency of the situation and the speed with which schools needed to make online learning avaccommodations is a kind of perfect storm for hackers and cyber criminals,” explains Emilio Simoni, director at the dfndr lab. “The numbers and the activity convincingly demonstrate that security can’t be taken for granted, or arranged last minute,” Simoni adds.

The range of methods used to attack educational institutions is similar to the kinds of attacks seen in the general population: phishing, ransomware, and malicious apps are all in play — along with the “Zoombombs” receiving more exposure and attention. 

If you haven’t heard: Zoombombs are unwanted take-overs of hosted meeting sessions by hackers. Note that the Zoom app is not especially vulnerable — but its widespread popularity as a meeting-host service has simply caused the name to be associated with the phenomenon. Distributed denial of service attacks (DDOS) are also common. These are purposeful efforts to overwhelm the capacity of a given connection or platform, and frequently they’re the “blunt weapon” of choice for ransom-motivated attacks.

“Of course institutions need to take steps to protect themselves with enterprise grade security solutions,” Simoni notes, “but teachers and student families have to be wary as well.”  Adds Simoni: “If you’re attending classes through a digital connection at home or on-the-go, you will want to have a personal solution you can rely on.”

For these purposes, dfndr security PRO offers a full suite of  capabilities, including:

Anti Hacking Protection: Anti-hacking protects users from malicious URLs and phishing sites. It also blocks scams directly on the SMS app, web browsers and messaging apps (WhatsApp and Facebook Messenger).

Safe App Installer: Lets you know if an app is safe — before you install it.

Wi Fi Theft Protection: Protect you WiFi connection and immediately be notified if anyone is trying to intrude upon or hijack you wifi connection.

App Privacy Scan: Know which installed apps on your device are malicious, or have already been victim of leaks. Also easily see the permissions granted for each app, and where they send data they collect from you.

You can use this link to learn more about dfndr security, and also consider upgrading to our PRO offering. You’ll be glad to know that Anti-Hacking comes with the free version of our solution.

With governmental funding for improved education-institutional security defenses still up in the air, the necessity for students and families to protect themselves is keener than ever.  

We’ll keep you posted on any specific / large-scale attacks, but for now, a good security solution should be considered a requirement for any online student family.

LEARN MORE BY TRYING OUT OUR APP: You’ll get Anti-Hacking protection and be able to see anyone who is priating your WiFi signal with our free dfndr security program. You can download it for free here, and try it out yourself!

Instale o dfndr security.Instale o dfndr security.

]]>
<![CDATA[Leaks and Breaches: The What, How… and Why You Must Protect Yourself!]]> https://www.psafe.com/en/blog/leaks-and-breaches-the-what-how-and-why-you-must-protect-yourself/ Wed, 30 Jun 2021 17:57:32 +0000 https://www.psafe.com/en/blog/?p=20992 You read about them in the news, or — you receive notices about them in the mail or on your everyday personal social feed. And no, it’s not just you: they’re happening more often, and getting more brazen and serious all the time. Large scale data breaches, leaks, and hacking attacks occur multiple times each day. Estimates for major (large-scale, corporate) data leaks ran upwards of 2000 in 2021 — and of course smaller-scale hacks aimed at private users are happening far more often — think more along the lines of 2000 attacks per day.

Leaks can be caused in a wide variety of ways.” Emilio Simoni, Director of Cybersecurity at PSafe’s dfndr lab, notes: “However, the usual result of a breach is that the stolen data is put to use for financial gain or leverage.” 

Common methods of using data for financial gain:

  • Stolen financial-information (like credit card or bank numbers) can immediately yield goods or dollars, and they’re often used quickly to do just that — but, Simoni notes: “Not always immediately, and not always in noticeably large amounts.”
  • Stolen passwords and personal data are used as keys or leverage to gain financial information, or to apply ransoms; 
  • Hijacked / Frozen technology offers another means for criminals to get leverage and ransoms: hackers “lock-out” hard drives or create denials of service for networks from which users must “buy” their way out
  • Stolen email, phone numbers, and social ids are regularly used for scams that prey on the unsuspecting, and often, on the good-natured and helpful — targeting the person and known vulnerabilities of human nature.
  • Identity theft — the use of detailed personal information to open new credit accounts and / or steal from established accounts. 

 

Practically speaking, leaks occur in a variety of ways — some quite technical, and some not very technical at all:

  • Credentials that are stolen or insecure: As noted above, credentials can sometimes be the treasure that gets robbed, and leveraged later. Of course, they can also provide the path in for the thieves. The number of data breaches caused by weak passwords, like passwords or last names or birth dates is…way too many!
  • Unhappy (or careless) employees: Both can be devastating, and as you might guess, in corporate settings there are usually plenty of both. This is why companies have to plan for the possibility that their personnel can go rogue..or just inattentive. No good security policy relies entirely on the integrity and personal conduct of human resources — but unfortunately, far too many do.
  • Vulnerable softwares: Commercial and enterprise software is designed to be safe — but hackers are ever watchful, and tirelessly work to find and exploit software vulnerabilities. 
  • Real world vulnerabilities: Hard drives and devices of every kind are smaller than ever, hold more information than ever, and they’re more portable than ever: that means physical compromises and seizures are an increasing threat.

Yes, you’re at risk. But here’s how you can protect yourself.

Good “hygiene” with your digital devices means committing to the following:

First, make sure you use strong passwords — and use only one password for each app or site that requires one.  Stay vigilant, and if a site or app is compromised, change your password immediately!

Next, try to install only the apps that you really need and use. Loading up your device with three or four apps for every purpose is a dodgy game. Whenever in doubt, go with a leader in the space, or look for apps from developers you already know and trust.  Do a little background checking and make sure that cool new app is coming from a known and trusted provider.

Finally, make sure you have a full-spectrum security solution on your devices:

An excellent way to protect yourself is to use a security application like dfndr security Pro, which covers your data and your device. 

For app security, dfndr security Pro features a dedicated Safe App Installer that can tell you if the app you’re about to install has been identified as malware.  This is exactly what the Safe App Installer does: it AUTOMATICALLY protects you from malware and apps known to compromise your data — before you even install them.

There are four additional features dfndr security Pro offers to protect you:

Anti-theft protection: This feature protects against physical loss that (frequently) also leads to data loss: in case of theft or loss of your device, you can lock it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.

App Privacy Scan: You can locate on a map where your app data is going and how it might be used by third-parties.

Unlimited Identity Theft Reports: These reports provide “perimeter defense,” looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 4 billion compromised credentials. 

Ad-Free: As an extra bonus, dfndr security Pro is totally ad-free.

Data breaches will continue to occur on both the large and small scale. As Emilio Simoni remarks: “Unfortunately, hackers never take the day off. That’s why our software doesn’t either.” We hope you’ll consider dfndr Pro as your best line of defense to protect your devices and personal data. 

Get The Protection You Need Today

Click here to try dfndr security and put all of these features to work securing your phone, your data, and your digital life. dfndr security offers a full suite of protection, constantly updated, to make sure “you’re safe out there.”

]]>
<![CDATA[What is Your Personal Data? And How To Know Where It Goes]]> https://www.psafe.com/en/blog/what-is-your-personal-data-and-how-to-know-where-it-goes/ Mon, 28 Jun 2021 13:43:53 +0000 https://www.psafe.com/en/blog/?p=21033 Headlines about data leaks and unauthorized sharing of personal data continue to  proliferate, with the Cambridge Analytics case making waves that are still spreading throughout the world. Yet as of now, there is no Federal law in the US with a similar scope and sweep to the EU’s GDPR (General Data Protection Regulation). California’s Consumer Privacy Act comes closest at the state level, but that doesn’t provide a lot of reassurance to those of us who don’t live in the Golden State.

However, given that there are data breach laws in all 50 states, and good data protection products like dfndr security Pro available, there are a few important ways to get a better grip on your personal data, and keep yours protected. At PSafe, we believe in, and advocate for your rights regarding control of your private, personal data, and our products are designed to help you know who might be using your data, and where that data goes, as the world moves toward a better overall framework of personal data rights. Our Research Director at PSafe’s dfndr lab, Emilio Simoni offers perspective: “At PSafe, we strongly advocate for comprehensive data rights legislation, but in the meantime, we urge our customers to be vigilant, and use the tools we make available to make good decisions about their online interactions – and be aware of the ways these interactions shape the distribution, exposure, and use of their personal data.” 

Before we talk about those capabilities, we want to take a moment to more fully understand what is meant by the term personal data.

Foundations: What Is Personal Data?

“At the most fundamental level,” Simoni explains, “your personal data is any data that can be attached directly and uniquely to you. However, there are some subtleties involved that are worth discussing, to get a more nuanced understanding.”

A simple example of personal data would be your Social Security number, birthdate, or full name. Your credit card and bank account numbers are also clearly personal and private. But there are also pieces of data that have a “double” character: when you shop online, the items you buy are personal information, but they also have a public aspect: the retailer who sells them to you must replenish their stock after all, so they of course track the items and maintain their inventory.

Your Consumer Data

What has expanded greatly in the age of internet commerce however, is information that connects you to your buying (and browsing) habits. What do you buy when shopping online? What do you watch on streaming TV? What websites do you browse? What games do you play? Sellers of services and products, and advertisers, are highly interested in all of those things about you, and this is the area being navigated now by privacy laws and existing or developing data rights legislation. At pSafe, our position is simple: you should have control of where data of this kind is collected, who sees it, and how they use it.

dfndr security Pro offers Privacy Protection 

dfndr security Pro plan enables users with knowledge. Our App Privacy Scan provides four key pieces of information that we see as essential for today’s digital environment.” Check these capabilities as follows:

  1. Knowing if apps you are using are known to be malicious.
  2. Seeing if any of your apps have suffered data breaches.
  3. Being able to easily see the information permissions you have granted for any app.
  4. Seeing (on a global map) where app information is being sent or used.

“These fundamentals are each interesting in and of themselves, but they combine to help users truly get a grasp of how their interactions with various applications affect their personal data,” Simoni concludes.

How Can You Get This Protection ?

 

dfndr security is a free app that can help you manage the storage, battery life, and wifi security of your digital device, while also offering protection via a url checker, and anti hacker and phishing protections. You can try dfndr security PRO for 3-day free, and upgrade if you like the protection it provides.

dfndr security Pro offers:

Identity Theft Reports — So you know if your online credentials have leaked

Safe App installer — checks for malicious apps before you install them

App Privacy Protection — Offers the four protections mentioned above: notifications about issues with apps you’re using; app data breaches, permissions you’ve granted to various apps, and info about where your data may be used.

Anti-Theft Protection — Protects your phone from thieves with an alarm, remote lock-out, and a picture of the thief.

It’s a full suite of protection for users who recognize that they must take an active role in their own digital security.

 You can download dfndr security and start your free trial right away.

 

]]>
<![CDATA[More than 103 million Americans use Wi-Fi networks that are vulnerable to theft]]> https://www.psafe.com/en/blog/wi-fi-theft/ Fri, 25 Jun 2021 21:56:40 +0000 https://www.psafe.com/en/blog/?p=20956  dfndr lab, a digital security laboratory managed by PSafe, conducted a survey to discover the habits of broadband Internet users in the United States: including the methods users employ to protect their connections, and the main concerns they have related to network security. The research projects that, of the 313 million Americans with access to the Internet,* 103 million don’t protect their WiFi connections, and more than 56 million already suspect that their Wi-Fi may well be used by unauthorized people.

* Statista data released in 2019.

Usage habits obscure the risks

Asked about the places where they usually access the Wi-Fi Internet, 86% of respondents said they connect from home, 21% in public places, 14% also use a work network, and 13% say they frequently connect from friends’ homes. For the 18% of respondents who suspect that their connection is being stolen, the main reasons given for this suspicion are: a slow connection (62%), suspicious browsing (41%) and shared passwords (19%).

According to Emilio Simoni, director of the dfndr lab, theft of Wi-Fi is a real possibility with an unprotected connection. Simoni’s recommendation is to always have a security solution on your devices to prevent virtual threats from reaching your connection: “Among the most common dangers are the theft of personal data, theft of confidential information, leaks of credentials and passwords, and phishing scams. With the WiFi compromised, you can also get alterations of the router, infection of the connected devices, and even hijacking of your broadband,” Simoni warns. 

The risks are even greater for those who use the home network to do work: Simoni explains: “Aware that several companies adopted the model of remote work during the pandemic, cybercriminals have created scams focusing on home-office workers. This is because the successful attacks on employees have more lucrative potential for cybercriminals, since the leakage of corporate data can cause millions in losses to companies, in addition to the exposure of personal data of the attacked person.”

Most want to know: “Who’s connected to my Wi-Fi?”

87% of respondents said they would like to be able to identify devices connected to their Wi-Fi network. The desire is already a reality for users of the dfndr security application, through the “Wi-Fi Theft Protector” function, launched this week for Android users of the app. On iOS, the function is found within “Network Tools> Devices.” The new function identifies devices connected to a network, and can provide alerts about new connected devices. “If the user identifies a device that does not know the source using his network, it is recommended that he change his password immediately, to avoid the leakage of private information”, advises Simoni.

Despite the concern of the interviewees, 33% of the respondents said they did not use any protection method for the wireless connection, the number corresponds to approximately 103 million Americans. Of the 34% who said they used some security measure for Wi-Fi, 69% chose to trust their security with a secure password, and only 36% said they never share their passwords with third parties. These measures, however, are not enough to guarantee the security of the connection. The ideal is to always have security software installed on your devices — a solution capable of protecting against data leaks.

How to protect against Wi-Fi theft?

1 – Use a security solution on your cell phone capable of identifying the devices connected to your Wi-Fi network. The dfndr security app, for example. Download it for free here.

2 – It’s essential for companies to have a solid security solution against data leaks. The dfndr enterprise is designed to identify vulnerabilities in corporate systems. It does so in real time, and helps companies tackle issues before they become a problem.

3 – Avoid using the same password for different services; always use a secure password that mixes numbers, letters and special characters; and never share your password with third parties. 

4 – Finally, don’t click on links received through social networks and messaging applications without knowing the source and the link-destination — and never enter personal or bank details on websites you are not 100% sure of.

See the research in full: click here.

]]>
<![CDATA[Is dfndr security Pro a good digital security solution?]]> https://www.psafe.com/en/blog/is-dfndr-security-premium-good/ Wed, 23 Jun 2021 13:00:29 +0000 https://www.psafe.com/en/blog/?p=20055 There’s no denying it: the smartphone has become an inseparable companion for most people and a ubiquitous presence in American life. But most people rarely take a moment  to think about the many threats the use of their devices create, and the ways in which these devices jeopardize their privacy and safety? Owning and using a phone exposes you to a continuous stream of potential trouble: suspicious links, hackers, viruses, and countless digital scams. These days everyone has encountered the work of hackers and scam artists, and many have had to deal with problems or concerns with their smartphones due to breaches in their security. If you’ve ever thought you should get some help to make sure your defenses against these problems are as strong as possible, we wanted to let you know specifically, how dfndr security can help.

Read More: America’s most common scams and digital threats: what to watch for in 2021

Hackers Are More Sophisticated Than Ever

“Hackers are always looking for ways to exploit new security holes in order to elaborate and refine their attack methods. Take phishing as an example. Over time, we’ve seen that these fake pages have become increasingly realistic — and they’re using advanced techniques, like social-engineering to radically increase the number of victims they recruit with each strike,” explains Emilio Simoni,  PSafe’s director at dfndr lab.

To respond to this increasing sophistication, dfndr security Pro offers a smartly integrated set of tools to create an effective defense against the most common (and damaging!) security and privacy problems routinely reported by smartphone users.

By now, you may well have heard the name dfndr security. After all, the app has more than 150 million downloads worldwide, and now has a premium version, dfndr security pro. If you’re considering adding security to your phone to protect yourself, dfndr security should definitely be on your shortlist. 

What is dfndr security?

dfndr security was the first application of the dfndr family (yes, it’s pronounced: “defender”), developed by PSafe – a leader in mobile security in the Americas. dfndr security protects your phone against malware, phishing, and other cyber threats using state-of-the-art technology. It also protects the phone itself: in case of loss or theft, the app enables you to lock and locate your device remotely.

In addition, dfndr security is the only application on the market that offers constantly updated, real-time protection against scams within WhatsApp, Facebook Messenger, and SMS. In total, the app has more than 10 functions focused on ensuring the privacy and security of its users. You can also choose between the free or premium plan – which removes advertisements within the app and gives access to even more powerful security features.

Is dfndr security premium Good?

The key to dfndr’s great track record is research: a vast database of scams and hacks that is constantly updated. In the first half of 2021 alone, dfndr security detected more than 28 million online scams. According to the analysis released by the application, approximately 3.2 million of these online scams were accessed by Americans in that period.

With the sophistication of cyber attacks, it has become increasingly difficult to identify them without the help of a specialized tool. That is why DeMello warns that it’s essential that smartphone users have a security feature installed on their mobile phone that provides protection against virtual threats.

What do experts say about dfndr security?

AV-TEST, a worldwide expert in analyzing digital security products, periodically reviews security software for their effectiveness and performance. According to tests carried out by the institute, dfndr security received a maximum mark on malware detection abilities more than 20 times and obtained the best index – number 6 – in all aspects of security and usability.

In Google Play, for example, dfndr security received more than 5.5 million ratings and has an average 4.5 satisfaction rating. This means that more than 90% of all the people who installed gave a positive nod to the application. Check out some of the comments:

What’s Included in dfndr security premium?

In addition to all the features of the free plan, dfndr security offers 5 more features.


Premium Feature 1: Identity Theft Reports

This feature will help you find out if your data has been leaked to the Internet, and where the source of the leak is. As you know, even the biggest companies and platforms have had data breaches: Facebook, LinkedIn, Dropbox, Adobe, and Snapchat. When these events occur, millions of users’ data files are leaked on the internet.

“Hackers vary greatly in the way they invade security software to leak data. Whether by infiltrating large enterprise systems, creating new phishing scams or spreading malware, the truth is that all these methods inevitably end up exposing sensitive information at some point,” DeMello explains.

However, users can verify if their data leaked over the internet easily with the dfndr pro Identity Theft Report feature. It lets you know if information such as email, passwords, history of private conversations or home addresses have been exposed, when it happened, and how it was disclosed. Just input your email address and a complete search shows the results.

Premium Feature 2: Anti-Theft Protection

Ever thought you could find your mobile phone in case of loss or theft and know who the culprit is? The dfndr pro Anti-theft feature has 5 benefits that help you locate your phone and allows you to remotely control it:

Locate your device With the Anti-theft, it’s possible to know exactly where your phone is, in addition to triggering an alarm to locate it.

Delete data at a distance You can delete all installed apps, private messages, and photos from your mobile phone remotely.

Block intruder access To prevent intruders from accessing the contents of your mobile phone, simply activate your device lock via a password.

Get a picture of the thief If the thief attempts to access your device but fumbles the access code, you will receive an email with a photo of the criminal immediately.

Premium Feature 3: Safe App Installer

“Hackers have stepped up their use of malicious apps to gain access to you information and to expand permissions on your devices,” DeMello says, “this is why we developed Safe App, which scans apps for malicious code before you even install them.”  Safe App gives users a clear and timely security alert if it recognizes problems with an app you’re installing.

Premium Feature 4: Privacy Scan

The dfndr pro Privacy Scan enables users to know which apps on your phone have already been victim of leaks, what permissions you have been granted for each app, and where they send the collected information. “Privacy Scans are a great way to stay informed about the Security Performance of apps and platforms you use on your phone every day,” DeMello adds.  

BONUS Premium Feature: dfndr security Pro Is Ad-Free 

It’s common for apps to contain ads. After all, advertising is the only way that app developers can monetize their products and keep them completely free, up-to-date, and available to the entire population. But at times, advertisements can become annoying to encounter.

But dfndr security pro is completely ads-free and also allows you to choose which notifications you receive, either from dfndr security or from other apps. You’ll be safe, secure, and satisfied, knowing your protections are the best.

Try AV-TEST approved dfndr security premium and get to know these beneficial features:

]]>