Antiphising – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png Antiphising – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Here Are 4 Tips on How to Avoid Phone Hacking]]> https://www.psafe.com/en/blog/4-tips-avoid-phone-hacking/ Wed, 26 Jul 2017 23:00:48 +0000 https://www.psafe.com/en/blog/?p=12660 The security of our mobile devices and Wi-Fi networks are a constant source of worry. It seems like hackers are finding new ways to breach our networks and steal our information every day. To protect your phone, activate the Anti-Hacking feature now:

Deeplink_Activate-Anti-Hacking
Our phones hold so much personal information that the risk of them being hacked is an intimidating thought. The Anti-Hacking feature protects against malicious sites with warnings and prevents password theft by making sure your login credentials are never found by hackers. Besides a good security app, the following are other ways to protect yourself.

Avoid Public Wi-Fi

It can be tempting to tend to some personal business while sitting in a local coffee shop and taking advantage of their free Wi-Fi network. However, doing so can put your phone’s security at risk. If you’re going to use public Wi-Fi, make sure that you are not entering any sensitive information while doing so, such as your banking information or passwords. These networks are particularly susceptible to being hacked, putting your information at risk.

Read More: How Hard is it to Hack an Android Passcode?

Use Passcodes

Using a passcode on your phone may be considered a pain, but it’s worth the effort to protect your device. Avoid using passwords that are easy to guess, and stay away from generic passcodes such as “1234” or “0000.” The more numbers or characters, the better, so switch the length of the code to six digits for extra points (and protection).

Limit Bluetooth Usage

Using Bluetooth on your device can make your phone more susceptible to being hacked. While this feature of our smartphones is useful, it gives hackers an easy “in” to record your keystrokes, steal credit card numbers, and even to send scam text messages to your device. To minimize this risk, limit your Bluetooth usage as much as you can, always turning it off when it’s not being used.

Be Cautious When Downloading Apps

Believe it or not, not all apps offered on the Google Play store and beyond are safe for our phones. Before downloading any apps to your device, ensure that they are from a trusted source, such as via the manufacturer’s app store. Do your research, and read reviews and the description of the app so that you’re not unknowingly putting your device at risk.

Even if we’re not always consciously aware of it, our phones are typically at some level of risk of being hacked by a predator. Protect your information and your device by following these simple tips and you’ll be glad you did!

 

]]>
<![CDATA[Can You Ever Really Browse the Web Secretly?]]> https://www.psafe.com/en/blog/can-ever-really-browse-web-secretly/ Sun, 09 Jul 2017 21:06:54 +0000 https://www.psafe.com/en/blog/?p=12463 When you’re surfing the Internet, sometimes it’s best that you hide your online activity. Users crave privacy for a lot of reasons. Maybe you’re logged into a shared computer, your work laptop, or a public Wi-Fi hotspot, and you want to reinforce your security. There are also personal motivations, like trying to surprise your partner with a birthday gift you bought online. Whatever the case, there are steps you can take to keep your browsing secret. You should also make an effort to make your browsing safer, too. Click here to use Anti-Hacking to browse the web safely:

Deeplink_Activate-Anti-Hacking
Anti-Hacking will block you from malicious websites and phishing attempts designed to steal your personal information or money. You’ll also receive warnings about deceptive websites so that you never compromise the security of your device.

Read More: How Incognito is the Incognito Window in Chrome?

Use Incognito Mode

If you don’t want your history saved, Chrome’s Incognito mode is great for casual use. It also doesn’t keep any of the cookies from your browsing session. Everything disappears as soon as the Incognito window closes. However, Incognito isn’t a great option for using in your workplace. The websites you access will still be visible in your company’s log.

Get a Proxy Network

If you want to go a step further, another great option is using a proxy network. Known more commonly as virtual private networks (VPN), they work by hiding your IP address and assigning you a new one. When you’re browsing the web, an IP address is your online fingerprint, which can be easily traced back to you. Proxy networks are effective, because they retrieve the websites before displaying them for you. So, the remote server only sees the proxy network’s data — not yours!

Disable and Delete Cookies

Cookies are often the culprits when it comes to online tracking. For instance, even Flash Player uses cookies to take note of your browser’s movements. These so-called “super cookies” can actually reload third-party cookies that you may have deleted. Unfortunately, Flash is everywhere. If a website shows any type of video loop — from a news stream to advertisements — you better believe that Flash is powering them.

Remove Online Trackers

A lot of major sites will track your activity. That’s why opting out, blocking them, or changing your settings manually is advised. For example, Google’s targeted ads can be an annoyance, especially since Google has a monopoly on many users’ personal information through Gmail, Google+, YouTube, and Google searches. Luckily, turning off these targeted ads is pretty easy. In the “Activity” section of your Google account, you just need to opt out of “Shared Endorsement” and turn off the personalization feature.

]]>
<![CDATA[Why You Should Be Worried About Password Phishing on Android]]> https://www.psafe.com/en/blog/worried-password-phishing-android/ Sun, 09 Jul 2017 20:00:16 +0000 https://www.psafe.com/en/blog/?p=12449 Like ransomware, phishing scams and social engineering attacks are on the rise this year. The recent scams are becoming far more clever, with hackers learning more about their victims before they strike. This helps them to carry out a far more effective attack. Still, some of the most common and effective password phishing scams include spoofing a bank’s website or an email login page. To stay protected from phishing attacks while online, activate Anti-Hacking:

Deeplink_Activate-Anti-Hacking
DFNDR’s Anti-Hacking feature will keep you safe online. It will block you from malicious websites and phishing attempts designed to steal your account information or money. Once this feature is activated, you’ll also receive warnings about deceptive websites so that you never enter your account information on an unsafe site. With Anti-Hacking you’ll be fully protected against password phishing on your Android.

Read More: The 7 Password Mistakes You Might Be Making

How Common is Password Phishing on Android?
Think about the progress that app developers have made over the years, and how advertisers are no longer having trouble displaying ads on smartphones. Malware and malicious attacks have made progress, too. It was only a matter of time before password phishing increased on Androids — and it will likely continue to do so.

Take, for example, the recent Google Docs phishing scam. In this phishing scam, Gmail users would receive a link to a Google Doc from one of their contacts or a seemingly legitimate person. After clicking the link, they would then be sent to a real Google page, where they’d be tricked into giving access to a third-party “Google Docs” app that would request access to all of their account information. Google has since responded to the attack and has issued an update for their Android app to make the app more secure. Unfortunately, Gmail is still vulnerable to future phishing attacks of a similar nature. The attack was so successful because it used real Google pages. This is why it’s important to use Anti-Hacking to ensure you’re always protected — such as when a phishing attempt goes undetected by Google.

Another common password phishing scheme involves the Cloak & Dagger malware. This malware is downloaded onto an Android when you download a malicious app from the Play store. Once it has infected your device, it can then spoof your Android’s appearance in order to carry out phishing attacks. This malware has been able to infect older Android operating systems in addition to the latest operating system, Nougat. As a reminder, you should always pay attention to the language, design, and reviews of an app before downloading it. In order to ensure that your device is free of hidden malware, use Full Virus Scan to check your phone and SD card for threats:

run-security-scan

]]>
<![CDATA[How to Mitigate Robotic Cyber Security Threats]]> https://www.psafe.com/en/blog/mitigate-robotic-cyber-security-threats/ Fri, 30 Jun 2017 19:30:23 +0000 https://www.psafe.com/en/blog/?p=12198 As robot development accelerates, they have taken on a larger role in our everyday lives: robot drones are used to carry out military commands around the world; robots have been used in manufacturing since the early 1960s; and robots are even relied upon during lengthy and complicated surgeries. Yet one of the most common ways that we interact with robots on a day-to-day basis is through our smartphones. Internet bots can now help people shop online, purchase plane tickets, order food, and even carry out malicious attacks. Protect your personal information from malicious bots online by activating Anti-Hacking:

Deeplink_Activate-Anti-Hacking
Anti-Hacking will protect you from malicious websites and bots that are designed to steal your money and personal information. Yet this is just one robotic threat, and how to protect yourself. Despite the potential for critical services to be endangered by robot hijacking and manipulation, cybersecurity is rarely prioritized during the design and production of robots. Below are some suggestions for mitigating this threat in the future.

Read More: Hackers Can Now Use Your Phone Sensors to Steal Your PIN Info

What Malware Threats Do Robots Face?

Robots are embedded systems, meaning they are a computing system constructed within a larger system. As an embedded system, these machines are vulnerable to a number of different attacks including hardware attacks, firmware or OS attacks, and application attacks. In addition, many robots rely on insecure methods of communication and lack acceptable cryptographic standards. While there has yet to be a major cyber attack against robots, researchers have successfully hacked a teleoperated surgical robot, pointing to a real possibility of robotic cyber attacks in the future.

Potential Impact of Robotic Cyber Security Attacks

Many robots operate in close proximity to people and as such, a cyber attack poses a danger to the humans directly interacting with these machines. A hijacked military drone could be rerouted to target civilian populations while an automated vehicle could be manipulated to override collision avoidance software.

In recent years, the number of manufacturing jobs held by robots has increased, hovering around 10 percent. Should a cyber attack dismantle robots in manufacturing settings, such an attack would drastically alter or potentially halt production at assembly plants.

Mitigating Robotic Cyber Security Threats

To mitigate the possibility of cyber attacks, robotic manufacturing employees should strictly limit access to sensitive material regarding robot hardware. Robot manufacturers should also consider implementing a common, standardized operating system and create a council to oversee security issues and updates to the operating system. Most importantly, robot manufacturers should turn their attention to creating a secure application code and placing emphasis on cybersecurity considerations throughout the design and development stages. While these changes likely won’t happen overnight, researchers and security experts agree that robot cybersecurity should be a priority moving forward.

]]>
<![CDATA[Security Risks of Apps Sharing Data with Advertisers]]> https://www.psafe.com/en/blog/security-risks-apps-sharing-data-advertisers/ Tue, 27 Jun 2017 14:00:50 +0000 https://www.psafe.com/en/blog/?p=12112 Even though it is so ubiquitous, using the Internet is not a totally risk-free experience. You should always be on the lookout for suspicious looking links, bots, ads, websites, and apps. To make this task much easier, use the Anti-Hacking feature to make your Internet experience safer. Anti-Hacking will help to improve your safety online by blocking you from malicious websites and phishing attacks designed to steal your information or money. Click here to increase your safety online:

Deeplink_Activate-Anti-Hacking
Further, you not only have to worry about your security online, but your privacy, as well. Often, security and privacy go hand in hand. Businesses track your behavior both online and through their apps. Both paid and free apps alike will collect information on you and then sell that information to advertisers or other businesses.

Read More: Unknown LinkedIn Connections Could Be Hackers in Disguise

While some apps allow you to opt out of data tracking, many do not. They may be collecting information on your location, what type of phone you use, and how often you use your phone or certain apps. But that’s just the minimum. Many apps collect far more information than that — especially if you give them permission to. This means they may also share your contacts, calendar, and other more personal apps with advertisers, too. It’s even possible that they could share your photos or messages if they have malicious intentions.

How Safe is Your Data?

The big issue with this practice of collecting and selling user data — besides privacy concerns — is that these companies then have to securely store all of this data. The data could be transferred in an insecure manner, stored on insecure servers, or generally mishandled. This could allow hackers to easily compromise a system and steal user data. With the increase in data breaches over the years, you should definitely be concerned with the data that apps collect and how that data is then stored, both before and after it’s sold.

Your apps could also be sold to advertisers with malicious intentions. This could happen if you use a free app that doesn’t care about the security or privacy of your data, or if the app developers are unaware of the advertiser being malicious. In any case, be cautious of apps that you download, such as apps that ask for too many permissions or apps that want to know everything about you. If an app lacks necessary transparency in its practices, you should definitely steer clear of it.

]]>
<![CDATA[How to Spot a Malicious Link Through Text Message]]> https://www.psafe.com/en/blog/spot-malicious-link-text-message/ Thu, 01 Jun 2017 14:00:30 +0000 https://www.psafe.com/en/blog/?p=11596 Have you recently opened a suspicious link on your smartphone by accident? Run Security Scan to quickly search your phone for malware and security threats. If any malicious threats are found, this feature will quickly remove them. It can be a great alternative to the Full Virus Scan feature, because you can use the Security Scan when you’re short on time but don’t want to sacrifice the security of your phone. Click here to quickly scan your device for malware:

run-security-scan
Read More: The Top 5 Symptoms of a Hacked Smartphone

 

Ways You Can Detect a Phishing Link

As an Android user, you’ll be happy to know that malicious URLs are often easy to spot. Here are the top 3 ways to recognize a phishing attempt.

 

You don’t recognize the sender. Remember how your parents said never to talk to strangers? Well, you shouldn’t be opening their URLs either. If you get a message from someone you don’t know, opening the link they send you is a very poor idea. Additionally, hackers often pretend to be a reputable institution, like your bank, school, or employer, so be very careful.

The text message seems too good to be true. If the SMS says you’ve won the lottery or a contest you didn’t enter, then unfortunately for you, it’s probably a hacking attempt. While it’d be lovely to become an instant millionaire, you’re more likely to end up being someone with a hacked phone. So, don’t open that tempting URL.

The link appears to be shortened or contains odd characters. Phishing links often look a little strange. Hackers like using shortening services to create a compact URL. This trick is excellent for masking insidious URLs. But you can safely expand these links by using online tools, such as CheckShortURL and Unfurlr. On the flip side, a malicious link can also be very long and contain unusual characters. Symbols like “%” are often a warning sign that the original URL is encoded and hiding its dangerous origins.

When it comes to detecting malicious text messages on your Android there is a secondary way to safeguard your phone. Clicking on a link in a text message is a quick and easy way for a hacker to take control of your phone. To protect your device and personal information from phishing attacks, activate Anti-Hacking now:

Deeplink_Activate-Anti-Hacking
Anti-Hacking will block phishing attacks and malicious websites so that you never have to worry about your personal information being stolen.

]]>
<![CDATA[5 Ways to Check if a Website is Secure or Not]]> https://www.psafe.com/en/blog/5-ways-check-website-secure-not/ Fri, 26 May 2017 16:00:43 +0000 https://www.psafe.com/en/blog/?p=11416 Here is a common phishing scenario: you receive an email from your credit card company requesting you to click on a link, so you do. On the website, you are prompted to enter your personal information. But soon after, you find out that the website had been spoofed — your information has been stolen by cyber criminals. The best way to ensure you’re not falling for cyber criminals’ scams is by using an Anti-Hacking tool. Click here to stay safe online:

Deeplink_Activate-Anti-Hacking
The Anti-Hacking feature blocks malicious websites and warns you about a website’s intentions so that you won’t enter any personal information into it. It will make sure that you never fall prey to phishing attempts. Nonetheless, it’s always good to know when a website is not secure, too, in case you ever happen to click on one. Here are five sure bets that a website is not legitimate.

Read More: How to Quickly Double-Check a URL Address

  1. The URL is Not Correct.

If a website wants your personal information — legitimately — its URL should start with an “https://.” If the website to which you want to navigate doesn’t start this way — but normally, it does — you can bet it’s a fake.

  1. The Website Doesn’t Have a Badge Verification.

On the bottom of a secure website, you will see a “Secure and Verified” badge at the bottom of the website. You can click on this badge for more information. If the information provided doesn’t match up with the website you’re on, you might be on a fraudulent web page.

  1. The Website Doesn’t Have a Lock Icon.

The lock icon — which is on the URL address bar at the top of your browser, usually to the left of the URL — is included on secure websites. Fake websites might not have a lock icon or they might create a fake one. Click on the lock icon to check for more information about the website.

  1. The Website Doesn’t Have a Privacy Policy.

If a website doesn’t have a privacy policy, they also can’t promise the security of your information. This could signal it’s a bogus website, therefore, move on to a legitimate one.

  1. The Website Has an Expired SSL Certification

A website with an expired SSL certification means that the website — and any information you enter into it — is susceptible to attack.

It can be easy to be fooled by a spoofed website that looks and operates like websites you use regularly. However, be sure to be wary — and to use DFNDR’s Anti-Hacking feature — to make sure you don’t give away your private information.

]]>
<![CDATA[Tips for Detecting and Avoiding Spam Emails]]> https://www.psafe.com/en/blog/tips-detecting-avoiding-spam-emails/ Tue, 23 May 2017 14:00:57 +0000 https://www.psafe.com/en/blog/?p=11357 Even though email filters have evolved, spam messages can still show up in your inbox. To avoid having your laptop or Android infected by harmful viruses, it’s important to know how to recognize spam. Once you identify that you’re dealing with a spammer, you must dispose of their phishing email safely, so its contents won’t attack your device. An easy way to keep from being affected is by enabling Anti-Hacking feature. Click below to activate Anti-Hacking:

Deeplink_Activate-Anti-Hacking
Anti-Hacking is a security feature that protects your Android against phishing attempts. While you’re scrolling through the Internet, Anti-Hacking blocks virus-infested websites and pop-ups, so you can browse safely. If you do come across a malicious site, the tool will warn you immediately. The following will teach you the 101 on spam emails.

Read More: Personal vs. Corporate Email: Which One is More Secure?

Detecting Spam in Your Inbox

There are a few ways to tell if an email is spam, even when it looks authentic. Here’s how to figure out if a spammer is trying to phish you:

  • The email address is suspicious. Look closely at the sender’s email address. If the URL doesn’t match with the establishment’s official URL address, they’re almost definitely a phisher.
  • Check the spelling. A major corporation rarely sends out emails with typos or grammatical mistakes.
  • They don’t use your name. If the sender doesn’t know who you are, that’s a big red flag.
  • Outrageous demands, threats, and/or claims are made in the message. Phishers often try to create a sense of urgency. Their ploy is to get you to open their attachments, send them money, and so forth.
  • The email seems too good to be true. If you won some contest you didn’t enter, like the jackpot lottery or a free cruise, it’s definitely a scam.
  • There’s no signature. If there are no contact details, be very cautious. Real companies never send emails without a signature. They want their clients to be able to contact them.

Avoiding Getting Phished

Once you identify an email as spam, do not answer it, reveal personal information, or open the attachments. The email’s attachments likely contain viruses or malware, which can be used to steal your identity, spy on your activity, or damage files on the device. The same advice goes for suspicious links. On most computer browsers, you can hover your cursor over a link. If the URL appears fishy, don’t click on it. Finally, if the email comes from an establishment you belong to (i.e. a bank or company), you can contact them directly, in person or by phone, to double-check the authenticity.

 

]]>
<![CDATA[The Everyday Devices Targeted By the CIA]]> https://www.psafe.com/en/blog/everyday-devices-targeted-cia/ Wed, 03 May 2017 14:00:16 +0000 https://www.psafe.com/en/blog/?p=10686 WikiLeaks recently revealed how the CIA has a number of tools that can allow them to hack into smartphones and smart devices, such as Internet of Things devices. A former NSA employee tweeted that this leak of the CIA’s hacking tools for smart devices could fall into the wrong hands. He said that the “security hole[s] [that] the CIA left open” could be used to break into any smartphone in the world. So, what can you do to help protect your smartphone? One way is to use Anti-Hacking to block malicious websites as you browse the web:

activate-safe-navigation
If you land on a web page that is trying to steal your information, Anti-Hacking will notify you that the website is unsafe and that you should not enter any personal information on the website. Doing so could lead to a phishing scam or your login credentials being stolen. If you’ve ever lost a cell phone, then you know how it feels to think that someone else could be scrolling through your photos and your private texts. Think about all of the personal information someone could find — and steal — from your devices. The following are some of the devices that have been targeted by the CIA.

Read More: How to Protect Yourself from Social Engineering Attacks

Smart TVs

You may not want to have any private conversations in any room with your Samsung TV. Weeping Angel is one attack utilized by the CIA that can target a Samsung F8000 TV. It makes the TV look as though it is off, but it is in fact able to monitor a conversation. They call it “fake off.”

The public was unaware of this “remote bug” until the WikiLeaks documents were released. Reports believe one version of the malware was eliminated with a patch. However, this specific type of malware has not been used on U.S. citizens. Further, it must be manually installed onto a smart TV by using a flash drive.

Smartphones and Tablets

Both Apple and Android smartphones and tablets were targeted. According to WikiLeaks, the CIA could collect audio or messages from smartphones and tablets through apps like WhatsApp, Signal, and Telegram by intercepting the information before it’s been encrypted.

Laptops and PCs

The CIA also specifically targeted Microsoft’s Windows operating system. They gained access to a system by spreading malware through CDs and flash drives.

WikiLeaks revealed that the CIA didn’t inform tech companies like Google and Microsoft of security vulnerabilities in various devices in order to continue with their experimentation and probes. Their failure to privately disclose crucial vulnerabilities allowed citizens’ devices to remain less secure.

Since the leaks, the tech companies have been looking into the vulnerabilities in order to fix any issues. But don’t just count on tech companies to keep your information secure, remember to install the necessary protection like DFNDR’s Anti-Hacking. Stay aware of developments through reliable news sources as well — keeping informed gives you control over your personal data.

]]>
<![CDATA[Over 300,000 Android Devices Affected Using Chrome]]> https://www.psafe.com/en/blog/300000-android-devices-affected-using-chrome/ Thu, 10 Nov 2016 14:30:26 +0000 https://www.psafe.com/en/blog/?p=5629 Hackers are quietly compromising bank information and using Google Chrome as a vehicle. The fraudulent virus detector uses adware with a Google logo to build trust with the user. Once the user clicks the ‘Remove Virus Now’ button, a virus is instantly added to their device.

Problems like these can be solved with select antivirus apps designed for Android devices. Click below to use PSafe to scan for threats and eliminate any hidden viruses.

Run Virus Scan
The virus is in the form of a .apk file once the button to remove the virus and will not request approval upon download. Google is taking actions to address the issue, but hackers are still using an evergreen technique to continue infecting devices by way of malicious app downloads.

virus android chrome

PSafe’s security team also recommends keep the Antiphising feature activated. It blocks malicious websites in their tracks combined with an anti-virus that eliminates the virus on your device altogether. To check or remove any vulnerabilities and keep the Antiphishing enabled, click below.

Run Virus Scan

]]>