app1 – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png app1 – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Is Facebook’s New Phishing Tool Effective?]]> https://www.psafe.com/en/blog/is-facebooks-new-phishing-tool-effective/ Mon, 23 Jul 2018 23:00:12 +0000 https://www.psafe.com/en/blog/?p=18789 With phishing scams continuing to rise in volume, Facebook is taking a stand and getting into the hacker fighting game by introducing a new tool that cracks down on malicious look-alike websites. The tool could be useful for stopping you from opening fake websites, but it may not do everything.

Read More: Google Introduces Over 20 New Security Features to Protect Users

You still need a security app on your device to fully protect yourself from phishing scams. Download dfndr security and you can block phishing attempts by activating the anti-hacking feature. With advanced AI built in — this feature can block attacks coming from your web browser, SMS, or chat apps.

Get dfndr security now

The Facebook phishing tool has some advantages, particularly in identifying homograph attacks. Uh, what are those you might ask?  

Homograph Attacks
Some phishing attacks come in the form of a homograph attack. Hackers create websites with domain names that are almost identical to a brand name site, with the sole purpose of fooling someone and getting them to unknowingly input login credentials.

The only way to tell a site is fake is by examining the name of the site. A fake one usually has a letter or a punctuation mark out of place. Unless you’re watching closely, you could easily be fooled. This is where the Facebook tool comes in.

What the Tool Does
Named Certificate Transparency Monitoring, the tool is a Facebook-hosted application that any webpage owner can access for free with a Facebook account. The tool has been around since 2016 but it was recently updated it, allowing webmasters to detect homograph domains that are spoofs of their websites.

Webmasters add their domain to the tool’s dashboard which will scan the public Certificate Transparency (CT) logs. The logs have information about new domains that recently got an SSL certificate. The tool will then warn website owners about fake sites in the CT logs that use a similar name to theirs.

Will the Tool Help You Really?
As someone concerned about your security, the Facebook tool can help you identify phony websites, but in the end, it’s really for domain owners to suss out imposters. While the tool is useful, it will not actively block phishing scams lurking out there.

Once again, it’s wise to take security into your own hands, and have an antivirus app downloaded and ready to be your eyes and ears against hacking attempts.

]]>
<![CDATA[How to Hide Private Files on Your Computer or Smartphone]]> https://www.psafe.com/en/blog/how-to-hide-private-files-on-your-computer-or-smartphone/ Mon, 23 Jul 2018 22:00:15 +0000 https://www.psafe.com/en/blog/?p=18701 Organizing data is sometimes the last thing we want to deal with, but if you have critical financial documents or collections of embarrassing party photos lingering around, these are the types of files you should keep private in case of snoops or hackers (it does happen!). Having a passcode on your device is smart, but it’s not always enough if you share your computer or phone with friends and family. Be even smarter and limit access to your hidden world with the following tips.

Windows
A simple trick for Windows is to merely place your sensitive information within a folder and then mark the folder as ‘hidden,’ which will hide it within the file explorer. To hide a folder, right click on the folder and select the properties option. Once the properties dialogue is open, ensure there is a checkmark next to the hidden label – that’s all there is to this method! When you want to view that hidden folder, simply select the view tab within the file explorer and check the option to display hidden items.

Read More: 3 Private Messenger Apps That’ll Keep It Confidential

MacOS
The process isn’t as easy on Mac and does involve a bit of time in the Terminal application. If you’re unfamiliar with using Terminal, we suggest checking out a quick tutorial first. Start by opening the Terminal app from your Applications folder and navigate to the directory in which your folder is placed. Once you are within the proper directory type the following command, followed by the enter key,’ to hide the folder: “chflags hidden [name of folder].” For example, if we have a folder named ‘photos’ which we want to keep hidden, we would type: “chflags hidden photos.”

Android
Due to the open nature of the Android platform, one of the best options for hiding sensitive data is a third-party solution. One such option is dfndr vault, an app that easily allows you to create a hidden gallery of photos and videos; it even offers a feature known as applock, which can prevent access to certain apps by letting you add a secure passcode. No need to worry anymore about friends snooping around your Tinder profile or co-workers discovering embarrassing snapshots. Android users can also take advantage of dfndr performance, which has a ‘quick cleaner’ feature to remove any private information that might be in your device’s temporary files.

iOS
If you’re an iPhone or iPad user, you can choose to add your private photos or videos to a ‘hidden gallery’ built into the device. Simply visit your Photo app and navigate to the media you wish to hide, once there tap the share button (the square with the upward facing arrow), and select hide from the menu. The photo you just chose to hide will no longer be viewable from the main camera roll or any of the adjacent photo features. To view the private collection, head to your albums and locate the folder named Hidden. Sadly this option won’t keep the most curious of individuals out, but it will prevent any private images from popping up while scrolling through your camera roll.

]]>
<![CDATA[Going to College Next Year? Beware of Cyber Attacks]]> https://www.psafe.com/en/blog/going-to-college-next-year-beware-of-cyber-attacks/ Fri, 29 Jun 2018 00:00:21 +0000 https://www.psafe.com/en/blog/?p=18788 If you’re going to college next year, make sure you know about cyber attacks that are hitting post-secondary schools. There are more cyber crimes than ever in 2018, but you can avoid these with the right security software.

Read More: My Apps Gave Up Personal Info Again

One wickedly smart way to protect your Android or IOS phone is by using dfndr vpn, a virtual private network that hides your IP address and location, especially on campus Wi-Fi. With a VPN, you can keep your gaming, snapchatting, or Facebook sessions totally anonymous from snoops or hackers.

Here’s what you should know about cyber attacks before you land at college.

The Stats
Last year alone, there was an average of 12 DDoS attacks per week. These types of attacks can infect entire colleges by hitting multiple computers or devices at once, causing them to lose Internet access. Additionally, about a quarter of all colleges or universities were the victim of cyber attacks in 2017.

Devices Get Targeted
Plenty of institutions have a policy that requires you to bring your own device, which can expose any personal info stored on tablets or smartphones to potential hacking attempts. Criminals sometimes take advantage of anyone not using security apps or VPNs and hack into their devices to steal data, oftentimes planting ransomware in order to get a fast payoff.

Your devices should always have security software downloaded, as well as the right authentication methods to make sure cybercriminals have a hard time gaining access.

How Do Hackers Target College Kids
In addition to attacking single devices, hackers also target full-on networks with DDoS attacks and viruses. Phishing scams are also common, so steer clear of any weird emails that could contain malware. Make sure your password is randomized and has a mix of letters, numbers, and symbols. While it feels like a hassle, change your passwords frequently, at least every 6 months during college life.

And while it’s fun to exchange files with your friends, don’t download any files when using a public computer because these are accessed by other people (ahem, potential hackers). Always log out of public computers after you use them, especially if you send a file from your smartphone to your email or vice versa.

Bad News… Colleges are Huge Targets
The main reason why hackers go after higher education institutions is that they can easily access a lot of personally identifiable information (PID) such as social security numbers, payment information, medical records, and more. Also, the average cost of a data record belonging to a university is worth roughly $200 with registration, which can net hackers money if they steal school records and put it for ransom.

]]>
<![CDATA[The Equifax Breach Might Have Compromised Your U.S. Passport]]> https://www.psafe.com/en/blog/the-equifax-breach-might-have-compromised-your-u-s-passport/ Thu, 28 Jun 2018 23:00:24 +0000 https://www.psafe.com/en/blog/?p=18794 Back in September 2017, a massive security breach within the credit monitoring service, Equifax, led to over 148 million customer records falling into the hands of hackers. Shortly after, collections of sensitive data including social security numbers, credit cards, and driver’s licenses appeared for sale on the dark web. Now, a new report notes that approximately 3,200 digital passports were also stolen in the attack. But, what can you do if your passport was part of the breach?

How to Check if You’ve Been Compromised
To begin, head over to Equifax’s security website and use your social security number to check if your private information was included in the stolen data. Unfortunately, Equifax does not detail exactly what parts of your private data was compromised. With the scary possibility that your personal information is going to the highest bidder, we recommend obtaining identity theft protection as soon as possible. Luckily, Equifax provides this service at no charge.

Read More: What Should You Do After Losing Your Phone?

If you have reason to believe that your passport may have been included in the Equifax breach, take a few measures to enhance your security. For example, the DMV recommends that you contact them in regards to the stolen document. A passport is an official piece of government identification that could allow malicious individuals to impersonate you.

Replace Your Passport
If you’re a frequent traveler, you can quickly replace your passport through a United States passport agency office in under 2 weeks. Otherwise, you can visit a local post office to have your passport renewed, but the process may take over 2 weeks to complete. Don’t forget to bring a secondary piece of identification such as a driver’s license when applying.

Besides replacing your passport, you should also be aware of any activity on future credit reports. If a cybercriminal decides to use your information, your credit report will log this. To be safe, consider ‘freezing’ your credit report so that none of them can be used without prior authorization.

Look Ahead at Credit Reports
If you discover possible fraudulent activity on your credit report, go to this Equifax page to report any fraudulent activity, The reporting tool will also alert the 2 other major U.S credit bureaus, Experian and TransUnion that fraud may be at play.

Equifax’s critical data breach is a cybersecurity blunder that affected us all, but with careful attention, we can all remain safe by being diligent and aware.

]]>
<![CDATA[A Cyber Drive-By Attack Could Be Lurking in Your Hood]]> https://www.psafe.com/en/blog/a-cyber-drive-by-attack-could-be-lurking-in-your-hood/ Thu, 28 Jun 2018 22:00:47 +0000 https://www.psafe.com/en/blog/?p=18743 Ever heard of a drive-by? A disturbing picture comes to mind, but now apply the same idea to a cyber attack. Huh, sounds confusing right? But this crime has been gaining traction and is called a cyber drive-by attack. What’s disturbing is these hacking attacks target users without the usual method of having to open a malicious file or link. What hackers do at a cyber drive-by is station themselves close to a house or a place of business and attack.

Read More: The Danger of Spoofed Websites: Learn to Tell the Difference

The best way to protect yourself from cyber threats is to ensure you download antivirus software on all your devices, your phone included. For Android users, we recommend dfndr security, which has a security scan feature that combs your entire device, even the SD card, and blocks viruses or malware.

Get dfndr security now

How It All Began
A cyber drive-by attack wasn’t much of a threat in the early days, mainly it was used to gain free access to Wi-Fi. Hackers would drive by the streets of a town, locate a Wi-Fi signal and If the signal was insecure, they would hack through to siphon Internet.

How They Evolved
Now cybercriminals use this same practice but in more sophisticated ways. They often target badly secured routers and first figure out the router manufacturer. Once they’ve gotten that information, they’ll next tap in and listen to the traffic and find ways to compromise the password, which eventually gives them access to a computer or phone.

With all systems weakened, the next stage of an attack is to introduce malware or a keylogger, and once this happens, tapping into someone’s sensitive information is child’s play.

A keylogger can bait a victim by having them visit a legitimate website that’s infected through a popup or ad, or by slyly redirecting the person to an infected site. Information like bank accounts, logins, or social security numbers could be discovered and used in illegal ways.

Criminals are also targeting businesses with this type of attack, which requires no user interaction at all and depends on the vulnerability of a device or modem.

In other cases, cybercriminals use ‘man in the middle’ software, by having attackers spy on victims by setting up conversations between multiple parties.

Last Words and Tips
In addition to downloading a security app, individuals and companies should update devices regularly with the latest security patches and script blocking plugins. Additionally, businesses should ensure employees don’t have local administrative access to their devices. Set them up with a separate account instead.

Other measures to take include segmenting a company’s network so that everyone isn’t running on the same server, which ensures that malware doesn’t spread throughout an entire office.

Finally, all work and personal data should be backed up as frequently as possible on external hard drives or a cloud service, which should not be left connected to the main network.

]]>
<![CDATA[Alexa or Google Home Could Be Spying on You]]> https://www.psafe.com/en/blog/alexa-or-google-home-could-be-spying-on-you/ Wed, 06 Jun 2018 18:00:53 +0000 https://www.psafe.com/en/blog/?p=18213 Alexa and Google Home are among the most innovative artificial intelligence applications in recent years, but they could be spying on you. Smart-home voice assistants can actually record the information you give them, regardless of whether you’re asking for the weather or requesting a special song as you sit down to dinner.

Read More: Vulnerability Found in Alexa App, What Should You Do?

There are lots of positives to using these devices, but they may know more about you than you’d like. Here’s a breakdown of why Alexa and Google Home could be a detriment and not a help.

How It Works
These devices may not be listening to everything you say, but once you request an interaction with “Alexa” or “OK Google,” they will record you. As soon as these devices hear these keywords, they will instantly upload everything uttered to cloud servers.

The reason for this action is Alexa and Google Home need to store information in the cloud in order to respond back to you. The data is processed into machine-comprehensible instructions and the devices return with an answer to your command. For example, if you ask Alexa to read you an email or an SMS, this information could be stored on cloud servers forever.

What Else Should I Know?
An estimated 31 million Alexa devices have been sold already, as well as 14 million Google Home devices, which is a dream for marketers. Your data could be compiled and used for marketing purposes and all your data will be concentrated in a central place. Having all your data exposed in one area could make it easy for hackers and cybercriminals to target you.

What Can I Do?
You are able to delete the information that Alexa and Google Home collects about you by going to your Amazon or Google account and deleting old recordings. But, if you do this, the devices will unlearn some of the information they know about like your email account to read messages out loud or your musical preferences.

Be careful which devices you link to Alexa or Google Home. Remember that sensitive, personal information may belong to the device as much as it belongs to you. Another option is you can choose when to turn off a smart home device’s connection to your information. For example, if you’re not using an online shopping feature on your device, turn it off.

]]>
<![CDATA[How to Protect Your Child From Identity Theft]]> https://www.psafe.com/en/blog/how-to-protect-your-child-from-identity-theft/ Wed, 06 Jun 2018 17:00:51 +0000 https://www.psafe.com/en/blog/?p=18218 One of the scariest forms of cybercrime is identity theft, and children are falling prey to these scams in higher numbers than ever before. While identity theft is inflicted upon adults by familiar players, like a disgruntled friend or co-worker, this is rarely the case with a child whose identity is stolen by a faceless hacker. Anyone with a social security number and mobile data can be victimized by identity theft nowadays.

Read More: How to Prevent Identity Theft When You’re Online

As a parent, you should ensure that your children are protected from cybercrime. If they use your Android device frequently to play games, install antivirus software on your phone, like dfndr security. This AV-TEST approved app has a full virus scan feature that checks your mobile device for any malware or potential threats, eliminating them instantly. If your child is older and you’ve generously granted him or her with an Android, be sure they have dfndr security installed and have activated the full virus scan feature.

It can feel helpless on how to protect what’s most important to you, but knowing how this faceless enemy operates gives you the power to support your children as they grow up in the digital age.

The Stats on Child Identity Theft
Listen to these sobering stats. In 2017 alone, there were more than 1 million children targeted by cybercriminals. The stolen information was commonly used to extort money from parents. $2.6 billion in losses were caused by hackers who stole the data of children, regardless of age. Out of that $2.6 billion, families endured losses of approximately $540 million, while the rest was spent by the authorities and government.

While 60% of adults who fall prey to identity theft likely knows the perpetrator (a vengeful ex-partner or cousin, for example), only 7% of children were found to be connected to a perpetrator. Another shocking stat is that 11% of households in the U.S. reported that at least one child had personal information compromised in 2017. It’s also easier for criminals to target children because their parents are unlikely to check their child’s credit report.

The Tell-Tale Signs
The Federal Trade Commission outlines some ways your child’s identity may have been stolen. First, if your child is rejected for benefits because an account was already opened elsewhere, that’s a huge clue. Another example is if the IRS sends a notice claiming your child should have paid income taxes but didn’t, or you discover your child’s Social Security number appeared on another tax form — these are both red flags to pay attention to.

Additionally, if debt collectors begin calling regarding unpaid products and services that your child never purchased or used, this could be identity theft.

Don’t Feel Paralyzed; Get Proactive
Monitor your child’s phone or your own phone to ensure apps are locked down with parental controls, so only certain apps can be opened. It’s also important to have a conversation with your child about being prudent when sharing photos, videos, or any sensitive data with friends. Having an open, honest dialogue means your children are more likely to admit sharing the wrong information or experiencing oddities when using apps.

]]>
<![CDATA[Scam Letters in This Day and Age? You Betcha]]> https://www.psafe.com/en/blog/scam-letters-irs-this-day-and-age/ Mon, 05 Mar 2018 00:00:08 +0000 https://www.psafe.com/en/blog/?p=16403 Have you ever received a letter from a Nigerian prince offering to leave you your fortune in exchange for your Social Security number, bank account numbers, and other personal information? Yeah, you’re not the only one to receive one of these scam letters.

These scam letters were all the rage during the early days of the Internet, fooling many into believing they were the special ones selected for the opportunity of a lifetime. There’s no shortage of new versions of the original scam letter nowadays, aimed at your wallet.

Read More: Dropbox Phishing Attacks Are on the Rise

One such letter is a beneficiary of will email claiming you will inherit a million or more, requiring you to share your personal financial information. Counterfeit cashier’s checks have also been popular, as well as donation solicitations hoping you’ll fall prey to fake images of hungry children in need.  Scams are evolving online daily, and even though a paper letters seem defunct they’ve evolved too and have fooled a large number of people.

Tell-Tale Signs of a Fake Letter
Scam letters have evolved quite a bit since then as some scammers are writing letters claiming to be from the government. One of the most popular examples of the scam letters is fake IRS documents. As we enter tax season, pay close attention to any documentation you might receive, even if it seems legitimate.

Taxpayers have been receiving fake notices that look legitimate enough, asking for personal information that reportedly doesn’t match other records on file. One of these scams is a fake letter that claims to be from the Affordable Care Act law that requires taxpayers without health coverage to pay a penalty, making it seem legitimate.

Many of these letters are coming from an Austin, Texas address and list the letter number in your payment voucher as being 105C. These letters seem legitimate since the IRS has an office that accepts payments in Austin, but beware, they aren’t!

Other Scams to Watch Out For
Unclaimed property scams are also running rampant with letters that grab your attention and claim that the state has hold of your unclaimed property. In some cases, recipients are tricked into believing they are owed thousands of dollars, and all they have to do is pay a fee upfront or provide personal information.

Con artists are also cashing in on the fact that Medicare is sending new cards to beneficiaries with random numerals to prevent identity theft. Some scammers are acting as Medicare agents, telling seniors they must buy a replacement card, which are actually free.

Is That Letter Fishy?
Keep your eyes peeled for any scam letters sent to you, your family and any friends who may have been offered a deal that sounds too good to be true or asks for their personal information, banking details and Social Security number.

If you receive a letter that appears to be from the IRS or Medicare, look up the phone number for these agencies online, give them a call and ask about any penalties or unpaid taxes mentioned in the letter.

]]>
<![CDATA[Net Neutrality is Dead: Here’s What That Means For You]]> https://www.psafe.com/en/blog/net-neutrality-dead-heres-means/ Sun, 04 Mar 2018 23:00:33 +0000 https://www.psafe.com/en/blog/?p=16552 Last December, the FCC repealed net neutrality rules that had been set in February 2015. In its distilled essence, the death of net neutrality now means that your internet service provider (ISP) doesn’t need to treat all of your online activities in the same manner. Providers now have the option to charge more for certain services they deem more extensive, such as streaming services like Netflix or Hulu. Or, create bundles for different services as ISPs in Portugal currently do with their packages.

However, you can still take back the power with virtual private network solutions (VPNs), such as dfndr vpn to make your data private and prevent ISPs from discriminating against you and the services they will or won’t offer.


You can imagine VPNs as private tunnels that encrypt your data from your computer to its end-point to prevent individuals and companies from seeing exactly what websites and services you are utilizing.

Read More: 3 Court Cases That Shaped The Modern Internet

Let’s say that you decide to visit to visit your favorite social networking website. In a normal circumstance, your computer or phone would send out a request to that social network’s server; this request can be seen by others snooping on the network or private internet providers. Without net neutrality, ISPs can decide if they want to charge more for certain types of traffic.

But, if you use a VPN to visit your social networking site, all of it remains hidden. Your computer takes your website request and encrypts it. This request is then ‘tunneled’ to another location where it is fulfilled. Finally, the resulting information is then encrypted and sent back to you. What’s encryption exactly? Well, the entire process hides your activities from anyone keeping a close eye on your connection.

Proper VPN solutions should also have privacy protocols that prioritize your confidentiality. dfndr vpn, for instance, doesn’t track your IP to maintain your privacy. Also, top speeds may be a must if you’re into video streaming or gaming, which is why going premium is sometimes the better choice if you need the best connection at all times.

There is a possibility that net neutrality could be restored, but until then your data is under your ISP’s control. Don’t allow ISPs to take control of your internet, take the power back to choose how your Internet is delivered.

]]>
<![CDATA[Astro: The AI app That Can Help Manage Your Inbox]]> https://www.psafe.com/en/blog/astro-ai-app-that-can-help-manage-your-inbox/ Sun, 04 Mar 2018 22:00:11 +0000 https://www.psafe.com/en/blog/?p=16216 Cleaning out your phone once in a while is always a good idea, because apps and files can add up quickly. While you’re having Astro clean up your inbox, you may as well clean out your entire phone. Use dfndr performance’s App Manager feature to quickly identify unwanted apps and uninstall them in one screen. Try it right now:


App Manager will free up tons of space on your phone for new photos, videos, and apps — like Astro — so you can enjoy a decluttered phone experience.

The Benefits of Astro
Maybe you’re interested in the idea of using artificial intelligence to clean up your email inbox and free up some space, but you’re afraid that the AI will delete emails you wanted to keep. Don’t worry, Astro is truly intelligent and it is the first email app that comes with a built in chatbot to talk to you. Astro will chat with you, and recommend to you what you should unsubscribe from, what to save, and which contacts you should make VIP. The app asks your permission before deleting things so you will never wake up to a string of important work emails being erased from your inbox.

Read More: How to Prevent Identity Theft When You’re Online

Astro is designed to make your life easier. It has Astrobot Voice and Alexa. This makes it easy to read your emails aloud using Alexa on the Amazon Echo or your phone. This is a great benefit of Astro because you can now hear important emails when you’re on-the-go or driving. It’s also supported by Gmail and Office 365, so no matter what email provider you use, Astro is there to help you and clean up your inbox.

Where You Can Download Astro
You can download Astro from the Google Play store. In addition to downloading it from this store, you can also add Astro to Slack because it has full Slack integration. This means that you can add Slack search and Slack email so that you can manage your email from your Slack app. Another place you can use Astro is on the Amazon Echo, also known as Alexa. This way you can give commands to Alexa, and Astro will go in and complete those commands in your email inbox.

Overall, if you want a cleaner inbox, why stop there? Clean up the rest of your phone with App Manager to make space on your phone for new applications and pictures. A phone free of clutter is a more efficient phone.

]]>