antivírus – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png antivírus – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Meltdown and Spectre Are Aimed At Your Sensitive Data]]> https://www.psafe.com/en/blog/meltdown-and-spectre-are-aimed-at-your-sensitive-data/ Sun, 20 May 2018 12:00:33 +0000 https://www.psafe.com/en/blog/?p=18079 Two of the computing world’s most significant threats were unveiled a few months ago by a research team at Google, showcasing an exploit present in nearly all computer processors that could give hackers access to sensitive information passing through your machine. Known as Meltdown and Spectre, the alarming timeline of the malware was bad enough, but now research shows that the risk is spreading to smartphones.

An excellent way to take this new threat seriously is to download dfndr security. This 4.5 rated app has a full virus scan feature that scans your files, images, and even the SD card of your Android to check for any viruses or malware. You can’t stay alert all day and night, so utilizing an app that has your back is the best way to start.

Read More: AV-TEST Rates dfndr as Top Among Antivirus Apps

What’s Vulnerable and Why
A feature known as CPU data cache timing, which allows computers to work fast, is at the heart of this major security breach. Explained in easy terms, a machine’s data cache allows it to access bits of information faster than it would without this feature. Unfortunately, a vulnerability in the data cache timing process allows malware to intercept sensitive data such as password information.

Exploits Are Rapidly Increasing
While the most substantial issue has been laptop and desktop computers running Intel or AMD processors, the ARM processors found on smartphones are also at risk. With almost 140 pieces of malware utilizing the new vulnerabilities, consumers and businesses need to remain cautious and on the lookout.

Most Android devices utilize a processor architecture known as ARM – one of the more vulnerable platforms. This means the most popular devices in the world such as Samsung Galaxy, Google Pixel, and Motorola’s Moto, are at risk for the vulnerability.

Possible Solutions to Stay Safe
One possible solution implemented by Intel was halted as the company found the security patch caused system instability. When new vulnerabilities are discovered, companies are typically able to patch them and prevent further damage. However, as we stand months later, Intel and other CPU manufacturers have yet to provide a solution for such a collection of risky vulnerabilities.

For now, the best option for protecting yourself is to ensure that all of your devices such as laptops, computers, smartphones are fully updated to the latest software versions. Running a reliable antivirus solution is also strongly recommended and is your best chance of remaining unaffected by the exploits.

]]>
<![CDATA[Beware of New Android Malware That Steals Your Facebook Password]]> https://www.psafe.com/en/blog/android-malware-facebook-phishing-scam/ Thu, 22 Mar 2018 12:00:44 +0000 https://www.psafe.com/en/blog/?p=16972 The team at Google works hard to prevent malicious Android apps from entering the Play Store, but occasionally something will slip by the gatekeepers. A new threat to Android smartphones, dubbed as ‘GhostTeam’ has been discovered. The malware was found in over 50 different Android applications and targeted users of Facebook.

Keeping yourself protected against malicious malware can be a difficult task. One way to prevent an infestation on your phone is to use dfndr security’s Full Virus Scan feature on your Android phone, which scans for viruses, malicious content, or infected apps even checking your SD card.


Now that you have a way to employ a defense, learn more about this Android malware that’s out there infecting devices.

Read More: All About the Trusted Contacts Feature on Facebook

Dole Out Administrator Permissions Selectively
In the specific instance of the GhostTeam malware, its developers took advantage of both your device’s permissions and your trust. You download and install a supposedly safe app, which then downloads malware in the background and requests administrative access to your device.

Take time to read any Android prompts which ask for specific permissions. For example, consider why a calendar application would require access to your microphone or camera – it typically wouldn’t need this to function. Be careful of what permissions granted to your apps and if one asks to become a device administrator deny the request. Apps with device administrator privileges can prioritize themselves and take control of your device.

Two-Factor For Enhanced Security — The Smart Way to Go
Gaining administrative access to your device was only the first step for GhostTeam. Once the needed permissions were obtained, the device would attempt to phish the user through a barrage of Facebook login requests. Phishing attacks are used to trick users into giving sensitive information to a brand or service they believe to be trustworthy but is only being spoofed for malicious intentions.

While it would be impossible to be completely aware of every trap out there on the web, we should be as alert as possible to potential phishing scams. Some phishing scams are incredibly realistic and fool even the best of us.

This is where two-factor authentication can help. Adding this to your Facebook account is easy, and try to do the same for every account if you can, so hackers won’t be able to get in with just your password. Two-factor authentication ensures you have two pieces of information; in most cases, this includes your password and a one time code texted or emailed to your device of choice.

Consider security practices like two-factor authentication, watch what you download, and you should be quite safe. If you believe that you may have already been infected, be sure to download a security app or use the one you already have to scan your phone.

]]>
<![CDATA[3 Ways to Protect Yourself From Malvertising]]> https://www.psafe.com/en/blog/3-ways-to-protect-yourself-from-malvertising/ Wed, 21 Feb 2018 22:00:49 +0000 https://www.psafe.com/en/blog/?p=16513 When you see an ad on a website you trust, you may feel confident that it’s safe to click. Unfortunately, this is not always the case. “Malvertising” (malicious advertising) can spread malware to unsuspecting website visitors. Even though high-end websites strive to prevent this unfortunate situation, the fact remains that not all ads are safe.

The problem is not always with the ads themselves. For instance, someone may try to download a program but then click the wrong link. This malicious link then brings them to a virus that carries out the attack. Websites, browsers, and plugins are attacked on a daily basis. Whether you’re shopping, doing research, reading the news, or just surfing the web, it is important to take some crucial steps to protect yourself.

  1. Enable Click to Play

Enable the plugin to choose when and what you want the plugin to play. Most of the malvertising out there uses these plugins to play the content and then download it to your computer. When you choose to do this manually, you can protect yourself from many viruses.

Read More: Can’t Stop Clickbaiting? Anti-Hacking Will Protect You

  1. Do a Full Virus Scan

When you perform a full virus scan through a high-quality secure malware and virus detection software, you can recognize and remove the virus that might be on your computer. These programs can also locate and warn you of any programs that might be lurking within the web browser or other areas. PSafe has a strong antivirus app for this.

  1. Keep Your Web Browser Up to Date

Make sure that your web browser is not outdated. An up-to-date browser ensures that any suspicious links are scanned and then can be removed if necessary. This protects you if you tend to be tempted to click on questionable links. They can also remove any previous malware that might have popped up on older versions that did not have the right protection.

Malvertising is found throughout many places on the web. You don’t want these links to cause you further harm than they have too. Thankfully, a few simple safeguards can help protect your personal information and your privacy.

]]>
<![CDATA[Learn How Android Antivirus Apps Are Tested]]> https://www.psafe.com/en/blog/learn-android-antivirus-apps-tested/ Wed, 21 Feb 2018 20:00:43 +0000 https://www.psafe.com/en/blog/?p=16624 If you’re going to use antivirus software, it’s common sense to make sure that it works and that it’s the best possible option. Luckily, the Internet is full of sites that compare and contrast different antivirus systems. Many of them assign scores to individual programs, which makes finding the top one easy. But what isn’t always apparent is exactly how they’ve come up with the scores.

Testing apps is just like any scientific experiment, and like an experiment, you want to make sure there is only one variable (in this case, the app itself). In order to ensure this, testers need to ensure that the phones they are using to test the product all run the same way, that they have an equal amount of processing power, free memory, etc. After setting the constants, the testers download the apps, and the real testing begins.

Learn More: The Most Common Viruses of 2017 and How to Stop Them

How Successful Is the Antivirus Program?
Generally, the folks running the experiments are looking for two things. The first is obvious: Can this app successfully detect and prevent malware? This is tested by targeting the phone with numerous types of popular malware. It’s important to offer both quantity and variety. A score of 100 out of 100 is obviously better than 10 out of 10. Testers want to ensure the app is able to catch different types of malware, so nothing slips through the cracks. It’s also important to run normal programs in this stage, to see how accurate an app is. Sometimes apps will recognize a perfectly normal app, web page, or file as malware when in truth it’s totally safe, and this can affect the app’s score.

How Does the Antivirus Program Function?
The second important thing to test for is how well the app runs alongside other apps. Antivirus apps have to run alongside a lot of other apps, constantly ensuring the apps aren’t somehow letting malware in the backdoor. But you don’t want the antivirus app to slow down the other apps. It’s great if your Internet is safe, but if keeping your Internet safe means it’ll take an hour to load a web page, it’s hardly worth it.

Finally, there is going to be some subjectivity. Different apps may offer features that others do not, and it’s impossible to perfectly score each app on the same things. Some people may prefer added features at the cost of usability, and some might not. Some may prefer user-friendly interfaces, and some may prefer higher levels of security, even if it grants them less control. At the end of the day, it’s best to do as much research as you can into how testers tested the apps they’re recommending.

]]>
<![CDATA[How Do Phishing Attacks via Google Docs Work?]]> https://www.psafe.com/en/blog/how-do-phishing-attacks-via-google-docs-work/ Sun, 04 Feb 2018 13:00:41 +0000 https://www.psafe.com/en/blog/?p=16497 If you’re savvy on digital tech trends, you may have noticed the highly publicized phishing attack that occurred in early 2017 that gained access to Google accounts via Google Docs. The report affected millions of people, and required Google to send out a notification warning users to ignore the phishing request and to change their permissions quickly. This shows how important it is to not only be aware of the latest scams, but to take measures to block phishing attempts. To protect your phone from these kind of hacks use dfndr security’s anti-hacking feature:

 

If you like the idea of having an antivirus app block malicious links before you even click on them, the anti-hacking feature does just that. So how did this Google Docs attack work, and what can users do in the future to sniff out future attacks before they happen, in addition to using anti-hacking? Continue reading to find out more about Google Docs phishing attacks.

Read More: Google Play Protect Fails to Deliver – Only Stops 65.8% of Malware

How This Attack Worked
First, the initial issue that caused this was a minor one, and it stemmed from a simple email that appeared as if it was sent by a recent contact. The email then encouraged individuals to open and log in with their Google account. The page that users were delivered to looked exactly identical to the normal Google permission pages, which is what caused so many users to grant and fall for the attack.

Of course, once they had signed over their information, it was too late. Hackers were able to use the information and passwords for whatever they wanted, and users were left scrambling to change their information and ungrant permissions. Of course, while the attack targeted less than .1% of Gmail users, that still means that millions of people were at risk, and many clicked on the link.

Of course, there’s a lot to learn about this that users can use to protect themselves in the future. First and foremost, users should be careful and always think twice about sharing their information. If an email takes you to a page looking for information that you’ve likely already shared on your computer, you may have encountered the phishing page. Maintaining a healthy skepticism is key to staying vigilant and on top of attacks that may be incoming.

]]>
<![CDATA[How Do Ransomware Criminals Make Their Money]]> https://www.psafe.com/en/blog/how-do-ransomware-criminals-make-their-money/ Tue, 30 Jan 2018 22:00:50 +0000 https://www.psafe.com/en/blog/?p=16080 Chances are, you’ve seen a news report or have possibly been exposed to a virus or ransomware attack at some point while online. If your phone is suddenly behaving oddly, it’s a good idea to use dfndr security’s full virus scan feature to check your phone for hidden malware. This can help you to quickly remove any dormant or silent viruses that may put your information at risk to hackers:

But have you ever wondered how the perpetrators behind those hacks and programs make their money? By understanding what they do to extort information and earn their money, you can better prepare yourself against future attacks, and know the warning signs to watch out for.

Read More: The Net Neutrality Battle Could Affect Your Access to Netflix

Step 1: Hacking Into the Device
The first step for any hacker is to get access to your device or your information. This can be done through software or through a tracker that has been installed on a sketchy website. It can come from a variety of programs or apps that may be vulnerable — which is one reason to make sure that you constantly update your devices. Once that area has been exposed, it can be identified and targeted for installing the ransomware onto your computer or phone.

Step 2: Extort the Device Back to the Owner
Once installed or hacked, hackers and ransomware criminals will try to extort your information for money, likely by emailing you or demanding a form of payment from you, if you want your data kept safe and restored. An example is a famous case involving the HBO hackers, who demanded money from HBO to prevent them from releasing new Game of Thrones episodes.

Oftentimes, criminals will demand payment in the form of Bitcoin, a digital currency that can’t be tracked, so their information won’t be revealed. This form or ransom payment allows cybercriminals to continue doing this to other unsuspecting victims. If you refuse to pay, oftentimes it isn’t worth it for the criminals to continue extorting.

With the knowledge of how ransomware hackers make their money, you can take better steps to prepare yourself against attacks and prevent your information and devices from being compromised. Make sure to be aware of how ransomware attacks work and to report to the authorities when you’re being extorted. More importantly, make sure that you browse safely to ensure that you won’t get a virus or malware to begin with by downloading a reliably performing antivirus app. You can have peace of mind knowing that the security of your device has safeguards in place.

]]>
<![CDATA[How Antivirus Works on Windows Vs. Android]]> https://www.psafe.com/en/blog/how-antivirus-works-on-windows-vs-android/ Wed, 10 Jan 2018 13:00:18 +0000 https://www.psafe.com/en/blog/?p=16054 If you have devices that run on both Android and Windows, you may be thinking that there isn’t much of a difference in how antivirus software works on each device. However, their operating systems are very different: one is primarily tasked with protecting desktop users, while the other is aimed at mobile devices. If you have an Android and want to ensure that it is free of malware, use dfndr’s security scan feature to quickly scan your SD card and device to remove any threats.


Now that you have a big tip on how to take care of your security, check out how antivirus software works between Windows and Android devices.   

Windows Vs. Android
Windows systems often have dedicated software to help control and ensure that the system runs safely. Since the technology for Windows predates phones by several decades — which is an eternity when it comes to phones — a lot of security experts have had time to work out the kinks and specialize their antivirus programs so they can best protect the desktop users and clientele they serve.

Read More: 5 Unknown Phishing Scams to Watch for During the Holidays

However, smartphones and the Android OS are a totally different story. Since the operating system was only released nine years ago, the availability of applications (and antivirus protection) is relatively new. It also faces unique challenges that many desktop programs don’t have to deal with, such as connections to multiple Internet connections, security over mobile networks, and the increased sharing that often occurs on mobile devices by nature of them being phones first. So, mobile antivirus programs face unique challenges that must protect their users on the go.

While both programs need security scans, this is even more true on Android as users can have their information exposed by being connected through public networks, or through the hundreds of malware programs that target mobile users. That’s why mobile users need to stay smart and treat their phones with the protection they give to their desktop devices. This is especially important since more mobile devices are entrusted with personal information like the use of banking apps. It’s important to take steps to make sure that this information is secured no matter how you use it.

That’s where programs like dfndr security steps in. It’s one of the most downloaded and highest-rated antivirus apps for Android in the Google Play store. Not only does it ensure that your device is protected against malware, but it can also help clean up your device to help ensure it runs faster. If you’re looking to better protection, make sure to take advantage of all of the features dfndr security has to offer.

]]>
<![CDATA[How Can dfndr Help You When Traveling Abroad?]]> https://www.psafe.com/en/blog/how-can-dfndr-help-you-when-traveling-abroad/ Tue, 24 Oct 2017 00:00:13 +0000 https://www.psafe.com/en/blog/?p=13093 During the summer months, more than nine million Americans will travel outside of the country. With these increased traveling numbers come a heightened number of phone thefts. Even popular vacation destinations such as Spain have reported theft incidents at rates as high as 1,074.9 per 100,000 individuals. Travelers also face dangers when relying on public Wi-Fi networks, which are common in airports, hotels, and other transportation hubs. Click here to quickly check your Wi-Fi’s security:

Test-Your-Connection

The danger of simply misplacing a phone or plugging a charger into an unsafe outlet is magnified in an unfamiliar city. Luckily for dfndr users, the service’s built-in anti-theft and advanced protection features can help prevent and remedy these worst-case scenarios. Find out how to take advantage of both features to protect your phone on your next trip abroad.

Read More: New AI Can Crack Android Pattern Locks from Afar

anti-theft
Thefts in popular tourist locations, such as (but not limited to) Mexico and Costa Rica, specifically target vulnerable foreigners. Some robberies will occur while a thief poses as a plainclothes cop and asks for credentials, which are then stolen along with valuables. Other times, nice cars harboring visible electronics will be targeted and the windows will be smashed.

However, if you activate anti-theft on your phone in advance, then you will be fully protected in the event of loss or theft. This feature allows you to remotely control your Android device and block thieves from accessing apps and media files or delete these files entirely.

anti-theft also allows users to remotely erase all data on the device, track the device’s location, and sound an alarm (to find the phone nearby). Thanks to these protective functions, thieves will not be able to locate sensitive data or access accounts within the phone. Click here to activate anti-theft now:

activate-anti-theft

advanced protection
Public Wi-Fi networks are notoriously unsafe options for mobile users. Unfortunately, the cost of international data plans forces travelers to become almost entirely dependent on such networks for Internet access. In particular, both Russia and China pose significant risks to mobile security thanks to the number of cybersecurity threats. Further, while travel ports and charging stations within airports are tempting for travelers running low on juice, these outlets are often targeted by hackers, as well.

That’s why it’s important to add additional protection on your phone, especially when traveling abroad. The advanced protection feature will prevent thieves and viruses from disabling dfndr’s security, and ensure that your phone stays protected no matter what. Click here to enable advanced protection on your phone:

Educação digital

]]>
<![CDATA[Why Investing in Cybersecurity Is a Great Idea]]> https://www.psafe.com/en/blog/why-investing-in-cybersecurity-is-a-great-idea/ Mon, 02 Oct 2017 13:00:26 +0000 https://www.psafe.com/en/blog/?p=14624 Many companies think that they won’t be a target of cybercrime, either because they’re too small or they just don’t think it could happen to them. In reality, however, cybercrime is a growing business, and every day hackers are targeting hundreds of thousands of businesses. They can take all of your customers’ private credit card information or even leak your internal emails, besides other devastating information. No matter what the hack consists of, it’s almost always incredibly damaging for a business, the customers, and the employees.

Why Is Cybersecurity Important?
Attacks on a company’s private data are very frequent, and it can be incredibly damaging to a business. These hacks can cost a company not only damage public relations, but it also can be costly because of possible legal fees. In fact, it’s estimated that dealing with these cybersecurity breaches can cost a company anywhere from $10,000 to $100,000 for each hour of remediation costs.

The cybercriminals will often go after and target the lowest level members of your organization. Instead of trying to hack your current software, the hackers will just hack your employee’s account to find the login and password so that they can access your software, which is why it’s important to make sure that employees understand best practices for cybersecurity.

Read More: Here Are 4 Tips on How to Avoid Phone Hacking

Invest in Cybersecurity
It’s also important because it can keep your computers running quickly. Many viruses that may attack your company’s computers can slow them down and make working much less efficient for your employees. Therefore, spending money on cybersecurity will actually make your computers run better and make your employees more efficient with their time. Another benefit is that having cybersecurity can prevent adware, which is a virus that can spam your computer with advertisements and will also slow it down.

How Much Does Cybersecurity Cost?
Most cyber security companies are relatively affordable. The real cost benefit of having one is that it can save you from having to pay out remediation costs or even from paying a new PR firm after the hack has occurred. If you want to keep your company safe and save money in the long run, then cybersecurity education costs are well worth it. In the long run, you will save your company a lot of money and hassle by hiring a cybersecurity expert or even by hiring a team to help keep your company’s computer virus and hack-free.

]]>
<![CDATA[Why You Should Only Buy AV-Test Certified Antivirus Software]]> https://www.psafe.com/en/blog/why-you-should-only-buy-av-test-certified-antivirus-software/ Wed, 27 Sep 2017 13:00:39 +0000 https://www.psafe.com/en/blog/?p=14530 Rather than taking a chance with your antivirus software — and all of the sensitive data it protects — rely on a professionally tested and trusted antivirus software such as dfndr. The full virus scan feature scans your phone and SD card for hidden malware that can infect and take over your phone. Click now to activate:

run-security-scan

dfndr was rated 6.0 by the AV-Test Institute and before you ask what AV-Test is, read more about the importance of finding the best and most effective antivirus software.

The AV-Test
Since its inception in 2013, the AV-Test has stood as an industry-wide standard for separating the best of antivirus and security software from the worst. The test’s multi-step approach inspects software performance in several categories like protection, performance, usability, and repair. Each device is scored within individual categories. It must meet a total passing score, without receiving a zero in any single category, in order to receive official certification. The AV-Test institute has been tasked with setting industry standards for antivirus software for years, as a result of its unrivaled testing capabilities, standardized testing procedures, and dedication to state-of-the-art testing technology.

Read More: Can a QR Code Be Used in a Phishing Attack?

Validate Vendor Claims
While it’s easy to claim that your security software protects devices from every potential virus threat, backing up these claims with the software’s actual performance is a much more difficult task. During testing, AV-Test challenges pit antivirus software against zero-day malware threats, as well as viruses prevalent in the four weeks leading up to the test.

Additionally, AV-Test results verify claims about performance strain created by antivirus software. When effective security software places strain on daily performance, the software becomes close to useless. While users can uncover these false claims themselves after purchase, relying on the AV-Test certification can save you time and money — and a headache.

Managed by Independent Experts
The AV-Test’s status as independent experts is invaluable to the security software community and its consumers. To achieve the most accurate test results, the institute manages 1,500 terabytes of test data and collects approximately 390,000 new pieces of malware every day. This data is managed with the help of over 200 servers spread over multiple floors, tens of thousands of emails, URLs, and files, and three physically separated networks that ensure the highest possible security standards.

Thanks to the institute’s broad capacity, it’s able to adapt all technical equipment to meet up-to-date IT industry standards, and manual tests are conducted under staff supervision every day of the week. Smartphone users purchasing AV-Test certified antivirus software know that the institute’s approval means peace of mind for users.

]]>