apps – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png apps – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Spoofing: What’s it all about?]]> https://www.psafe.com/en/blog/spoofing-whats-it-all-about/ Fri, 08 Apr 2022 21:34:50 +0000 https://www.psafe.com/en/blog/?p=21236 We can define spoofing as an act of disguising something: usually a communication or request for action — seemingly from some known and trusted party, inducing the user to interact with the (unknown) source. It can occur on a somewhat superficial level, such as emails and messages, or through more technical means: such as DNS and IP spoofing.

In practice, spoofing is used by hackers to achieve numerous goals, such as getting sensitive information from their targets, or gaining access to restricted digital environments from which they can launch additional attacks (such as ransomware) — and much more.

How does spoofing work?

It is possible to commit a wide variety of crimes by using information obtained through spoofing activities. Just imagine what a hacker or cybercriminal might do if they’re able to convincingly impersonate a company or another person.

A well-engineered spoof can take over the domain of an email or website to approach a possible victim, or gain access to internet protocols or IP addresses (which act as an identifier for computers connected to the network). Thus, it’s possible to have access to a person’s applications, get hold of their confidential data (whether personal or banking), and a spoofer can even send messages on their behalf.

This type of scam is not new, but its methods and purposes vary and increase every day.

What are the dangers of a spoofing attack?

With the possession of sensitive data, criminals can carry out a series of financial transactions using the spoofing victim’s name. Sometimes this transaction can be done with the leaked credit card details, and sometimes they can impersonate the victim in order to get credit, money from people they know, or make debts on their behalf.

A spoofer can also monitor your activities, gain access to messages sent from your device, and even sell the data they obtain to other companies.

What are the types of spoofing?

Now that you know what spoofing is, it is important to understand that this type of attack can take many forms, from the simple to the complex. Here are a few of the main forms spoofing can take:

email spoofing

Probably the most typical model occurs when an attacker uses an email to trick the recipient into thinking the message came from a trusted source. Typically, this is done in one of two ways: by removing the sender field (so that it is not possible to know who sent it), or by disguising known addresses from unknown senders.

For example, a lowercase “l” and an uppercase “I” are practically impossible to identify in a sender’s address. This type of message can also be sent via SMS (known as “smishing”), or through social media messages and other channels.

spoofing website

Website spoofing occurs when an attacker uses elements of a known page to create a similar or virtually identical copy, often displayed within a context that makes sense.

The idea is for the victim to put their information into the impostor website so that it is intercepted by the attacker.

IP Spoofing

IP spoofing is one of the more sophisticated attacks, looking to mimic a more technical point. It’s probably a type of attack that the user’s rarely even see, as the goal is to trick the system itself.

For example, a network can be configured to authenticate users according to their IP address. If the attacker manages to disguise the IP and trick you, their access is easily granted.

DNS Spoofing

The idea of ​​DNS spoofing is similar to the previous one. As you may well know, DNS (Domain Name Server) is a system that helps you translate website addresses into IPs. With DNS spoofing, attackers are able to trick the system and redirect traffic to an IP they control.

A simple metaphor can make this example clearer: just imagine that DNS are the signs on the streets, which indicate where a driver needs to go. With spoofing, a criminal “swaps” the street signs, with the aim of taking drivers wherever they want.

Facial Spoofing

This is a different strand of spoofing, with a similar principle. More and more, facial recognition models are becoming popular (to unlock smartphones, for example). For this approach, it’s common for hackers to use photos or videos of the person, with the aim of tricking the system and pretending that they are indeed there.

Good artificial intelligence may offer protection here, because it will be able to identify whether a person is trying to access that system or not.

Spoofing on social networks

Telegram, WhatsApp, Instagram and any other online service of the same category can also be used as a vehicle for spoofing.

In these cases, the victim has their account hacked, and cybercriminals use their profile or account to contact friends or family. Generally, these people simulate some emergency situation to ask for money, or they’ll announce products for sale (at extremely low prices) — but the products don’t even exist.

Telephone spoofing

Telephone spoofing calls can happen when someone impersonates a company or an institution over the phone. This usually happens through a service called Voice over Internet Protocol (VoIP), which is used to transmit online calls and spoof the number or name to be displayed on the caller ID.

So be suspicious when your cell phone shows a call with a certain name, but from some number or locale you don’t recognize

How can you detect spoofing?

Detecting spoofing yourself is possible, but as we’ve noted, it’s not necessarily easy. 

However, there are some signs that can help identify this type of attack.

Look for English and grammar errors in messages. These can be more serious grammatical errors, such as wrong words, or more subtle, such as certain inconsistencies or strange structures. 

Make it a habit to always check the links you are clicking or the email address of senders. Look for any unusual changes, however small. Look closely and compare the domain if you can. 

On smartphones, you can place your finger on links for a few seconds, so that a preview window of the content opens, as well as the link;

Note if your browser does not automatically fill in your information (if it usually does) Especially on a site you visit frequently, this may be an indication that you are on a spoof site instead.

Confidential information such as credit card numbers, passwords should only be shared on secure and encrypted sites using HTTPS at the beginning of the URL.

If an email looks sketchy, do a Google search for the content of the email itself. If it’s a known scam, it will likely turn up. 

Use the dfndr lab link checker. This is a free tool that tells you in a few seconds if a link is trustworthy or not.

How to protect yourself from spoofing?

Even if you follow all the tips above, protecting yourself can be hard to do. The big problem is that most folks won’t be able to closely observe all these details and stay aware on a daily basis.  And this is exactly what hackers count on.

Imagine someone who is going through an extremely busy day, doing a thousand things at once, who receives an email with these subtle changes. The chance of the person stopping to look and detect these errors is small. Hackers know that it is virtually impossible to be alert 100% of the time.

Of course, it’s best not to click on unfamiliar links or attachments coming from emails you’re not sure where they came from. However, as we mentioned throughout the post, the purpose of spoofing is precisely to disguise these attacks as something familiar and reliable.

Another big problem with modern companies is underestimating hackers. Attacks are no longer made by a single person wearing a hood, in a dark basement. There’s a lot of strategy and sometimes large organizations behind these hacks, resulting in attacks that are extremely sophisticated and very difficult to identify, as we have discussed in the examples above.

One option is to avoid clicking on direct links. For example, if you receive an email, an SMS (Short Message Service) or a call from your bank notifying you of a problem, avoid clicking on the link. Access the direct website or the app to confirm the information.

In cases involving social media intrusions or phone line cloning, it is important to be cautious when opting for two-step verification. Several applications already provide this option in their menu to enhance your security.

By creating extra phases for your login in communication apps, a spoofer will not have access to your message history (even if they have access to the confirmation code needed to login) and will certainly find it more difficult to hack your account.

Finally, it’s important to use some security solution (like dfndr enterprise) on your computer to make sure that the pages you access really are trustworthy. A software based on artificial intelligence will have more resources available to assess the security of your network, block potential threats, and protect your device before it becomes the target of an attack.

Did you learn something from this post? Now that you know what spoofing is and how to protect yourself from it, take the opportunity to subscribe to our newsletter. 

Then you’ll have access to more first-hand safety tips, right in your email!

]]>
<![CDATA[Pharming: Phishing’s Nasty Big Brother]]> https://www.psafe.com/en/blog/pharming-phishings-nasty-big-brother/ Tue, 08 Mar 2022 17:31:21 +0000 https://www.psafe.com/en/blog/?p=21190 Pharming is somewhat less familiar than the term “phishing,” but both are methods employed by hackers to perpetrate fraud and gain illegal access to your private information. 

The ph prefix means that both are…well…phake.

But despite the cute names, the damage that can be wrought with either method is considerable. Identity Theft is the end game for many of these swindles, and as you may know, the long tail effects of ID theft can be personally devastating (and if you’ve never really experienced or read-about just how hard ID Theft can be for individuals, we highly recommend reading through that linked article. Not fun, but essential information).

While phishing attacks are made through phishy emails, pharming is the term applied when the hacker sets a trap in the form of a malevolent website: frequently, an impostor-site posing as a well-known and trusted company site. 

Pharming: Individual User Attacks

Phishing and pharming often go together – and the phishy email lures a single user to a malicious website, where the user enters their private information and the pharmer makes off with it, using it later to sow havoc by deploying it on the real site.  

Sometimes these sites are simply set up like traps on the web – you may have encountered one or more of these by simply misspelling the name of a popular site. The result may be a jarringly different site than what you expected. 

In truth these situations are relatively easy to avoid.  But sometimes the site you’re delivered to can be very close to what you expected, and that’s where real pharming trouble can begin.

Malware can drive pharming too – redirecting you to the substitute site without your awareness or permission. It’s important to remember that hackers are increasingly fond of using techniques of misdirection. You may inherit malware through a new app you download, but the consequences arrive later, when you first log on to your bank-site or try to pay your credit card bill, and the malware takes you to an impostor site to steal that information from you.

DNS Switching  

DNS switching takes the whole pharming idea to a more dangerous height. Whereas the malware or phishing-driven pharming operates at an individual user level, DNS Switching redirects all traffic to a given website to a pharmed-out impostor. 

The malware works within the DNS server and redirects requests to reach the authentic site to the pharming site. These more sophisticated attacks often involve more sophisticated fakery, and the pharming sites can be very convincing.

How To Protect Yourself, Down on The Pharm

As always, there are a few different layers of protection you can enlist to keep yourself from pharming — and the more of them you employ, the safer you’ll be:

Mindset: Your mindset as a user is one of the best defenses you have against hackers. Remember that hackers are fond of using social engineering – which some might refer to as “good old psychology” — to lure users into interactions with iffy emails, sketchy sites, and strange-people on well-known platforms. Keep your guard up, and if somebody, something, or some site asks you for information that your bank or health club or grocery-delivery (etc.) already should have, let that alarm bell go off loudly in your head. Then take three giant steps away from your keyboard. 

If your spider-sense has even an inkling that an email from a friend or a site isn’t the real deal: slow down and check it out. In general: try not to confer the trust you have in a person or company onto any representation made for them on the web. The web is…the web. And it should always be treated with caution.

Unprotected?: Public, unsecured wifi networks really are the devil’s playground.

The upshot is that public networks have chinks in their armour, and hackers use those chinks to “eavesdrop” on your conversations. Information they steal through this technical kind of listening can lead to direct attacks, or…down the road, a phishing or pharming attack tailored just for you. 

S matters: There’s a big difference between http:// and https:// — the difference is that “s,” which stands for secure. When you see the full https://, it means that information on both ends of the website transaction is encrypted and secure. When you don’t – that may not be the case. This is such a widely accepted standard now that the absence of that s should put you on high alert.  

Phishy?: If it looks or sounds phishy, it probably is. It might also be pharmy. Here’s an example of what we mean: in one of the biggest pharming attacks ever launched, a DNS Switching attack on more than 50 financial institutions, the affected users were presented with an error screen that asked them to switch off their anti-malware and any firewall protection they might be running. Many users simply complied, and provided access to the pharming malware to do the rest of the work. 

This obviously relates to our mindset discussion as well, but we wanted to emphasize that even very sophisticated pharming attacks will sometimes rely on users turning off systems of defense: whether it be their own mindset, or settings in place on their computer designed to protect them!

Speaking of Defense…  

Of course one of the essential bits of protective equipment is a good security software solution. dfndr Pro provides several excellent tools to help you protect not only your private information but your physical phone as well. Having that combination of protections is important. 

Pro also offers a Safe App function that enables you to screen any app you might want to try before downloading it, and that can be an excellent first line of protection from malware of all types – including those that are designed expressly to uh, ”take you down on the pharm.” 

With your mindset on high-alert, and your phone protected with a well-designed, and multi-layered security capability, you can move about confidently. Just be careful out there, and try not to get any mud on your shoes!

 

]]>
<![CDATA[Always Update Your Android Apps: Start With dfndr security]]> https://www.psafe.com/en/blog/update/ Wed, 27 May 2020 17:34:29 +0000 https://www.psafe.com/en/blog/?p=20687 One of the drawbacks people perceive for having a great phone and lots of wonderful apps is the need to keep all them updated. The more apps you have, the more often you’ll receive reminders about them. Even though truth be told, most apps update pretty fast these days, it can seem like a bit of a bother.

However, there’s one great reason to always stay on top of things and update your Android apps whenever they offer one. And it may just be the best reason of all: SECURITY.

“Most apps will update for a variety of different reasons, but one of the most common reasons is security,” says Emilio Simoni, Research Director at dfndr lab. “Engineers are always testing and discovering vulnerabilities in their apps, so even if an update has no new features, for your own good, you should make it a habit to update. Or, set your device to update apps automatically.”  

Why You Should ALWAYS Update dfndr security

dfndr security’s main objective is to keep you safe. That is the reason why you should always do updates with dfndr security immediately when you receive notice of them. Our antivirus database is constantly being updated, often with the defense against the latest, most widespread threats – so if there’s ONE app you want to keep up to date, make it dfndr security.

Why not take a moment and check now to see if your drndr security is up to date?

Follow the instructions from Google below to make sure your dfndr security app always updates automatically:

  • Open the Google Play Store app.
  • Tap Menu > and then > My apps & games.
  • Select dfndr security as the app you want to update.
  • Tap More.
  • Tap Enable auto update.

dfndr security will then update automatically when updates are available. To turn off automatic updates, just uncheck the box.  This is what the Enable Auto Update looks like when selected:


Set Your Android Apps To Update Automatically

Android lets you control automatic updating so that it always occurs only when you’re connected to WiFi. Setting to Auto Update with WiFi is a great way to make sure all your apps are always up to the second.  Here’s how to make that happen:

  • Open the Google Play Store app.
  • Tap Menu, Menu and then Settings.
  • Tap Auto-update apps.
  • Select the Over Wi-Fi only option to automatically update apps only when connected to Wi-Fi.

If you need to do an emergency update and you have no WiFi you can override this setting.

Viruses, Hackers, and Malware Are Out There.  Keep them OUT!

“We’re seeing lots of aggressive activity among hackers since the start of the Coronavirus Pandemic,” Emilio reminds us, “If you keep your dfndr security always app up-to-date it’s going to give you the best protection we have to make sure you can use the web safely.” Simoni concludes: “And right now, with social distancing still in effect in so many places, you want to make sure your access to the web is safe and secure.”

]]>
<![CDATA[The Best Apps for Father’s Day]]> https://www.psafe.com/en/blog/the-best-apps-for-fathers-day/ Thu, 14 Jun 2018 12:00:07 +0000 https://www.psafe.com/en/blog/?p=18175 Father’s Day is on June 17 and it’s the perfect time to give back to your dad with mobile apps that will make his life easier. There’s an app for just about everything these days and the ones we recommend are geared towards appeasing your father’s musical taste, helping him find the perfect brisket recipe, or facilitating his search for the ideal home.

Read More: 5 Ways to Turbo Charge Your Smartphone’s Internet Speed

Read more to learn which 5 best apps your dad deserves on Father’s Day.

Get Dad to Download StubHub
One of the most popular apps of the last 5 years has been StubHub, which compares ticket prices from various websites in order to find your dad the best deal. Whatever his musical taste or favorite sport may be, StubHub can be tailored to find tickets for the right event on any given night. The app can be linked to your dad’s Spotify, plus it can connect to various e-payment platforms to ensure every transaction is hassle-free.

Help Dad Find His Dream Home
If your father is on the hunt for some new real estate, Zillow.com will help him find a more comfortable home for the entire family. The home search app has an intuitive and logical user interface to search for the ideal home based on your dad’s price range. It can also help him sell his current home by valuing properties in his neighborhood.

For the BBQ Hero of Your Life
If your dad loves to grill meats, check out hundreds of recipes on the Weber Grills app. Each recipe has step-by-step instructions, a built-in grill timer, and a grocery list feature to keep your father’s grilling days organized.

When Your Dad is Mad About Sports
Perhaps the hottest sports app at the moment is Bleacher Report, which offers timely scores and news in football, basketball, baseball, hockey, and just about any sport imaginable. The app can be programmed to fit your dad’s interests so he gets notified of the latest stats for his favorite teams.

Improve Your Dad’s Mobile Performance
The best app for optimizing your dad’s mobile device is dfndr performance, which has a quick cleanup feature that gets rid of old files that could be slowing down his phone. It also has an app manager function to remove unused apps he no longer needs. A memory booster feature can enhance his device’s RAM speed as well. After all, you have to help him make room for all these awesome apps. 🙂

]]>
<![CDATA[My Apps Gave Up Personal Info Again]]> https://www.psafe.com/en/blog/my-apps-gave-up-personal-info-again/ Sat, 19 May 2018 12:00:42 +0000 https://www.psafe.com/en/blog/?p=18136 There are many apps out there that may be giving out your personal information to third-party advertisers and maybe even to hackers. Under Armour recently announced that its fitness app, MyFitnessPal, was targeted by hackers in a data breach that compromised the information of approximately 150 million accounts. These included names, email addresses, and hashed passwords. One saving grace is no financial information was revealed.

While there’s not much you can do about data breaches that happen from the services you use, since it’s up to each company to fix these security holes, there are steps you can take to protect your phone from sharing private information with apps.

Read More: Protect Your Personal Information When Using Public Wi-Fi

Here are 4 ways you can protect yourself from getting hacked, targeted for ads, and exposing your personal data for companies to collect.

Be Vigilant With Your Apps
One of the best ways to protect your data is to audit your apps, which can help you learn which apps are connected to your social media sites. Checking your privacy settings for Facebook, Google, and Twitter can help you see which apps are linked to those accounts.

On Facebook, go to the top-right corner, hit the down arrow, click Settings and check the Apps tab. Here you can choose which apps retain access of your personal information. In Google, go to Settings and hit “Connected apps & sites,” and on Twitter, you go to “Settings and privacy” and hit the Apps page. At that point, you can minimize which apps are linked to each social account.

Delete Old Apps
If there are some old games and apps you’re no longer using that are still hanging around, make sure to delete them. By getting rid of them, these apps will not be able to collect any additional personal information about you, along with all the data stored within them.

Change Your Password Every 6 Months
Another good rule of thumb is to change your password every 6 months to keep passwords fresh and prevent hacking attacks targeted at you. If someone manages to get their hands on your hashed password, they’ll be able to use decryption methods to attain the full password. You could change your passwords more often than every 6 months, but make that the minimum amount of time to update your passwords.

Read Privacy Policies
Some apps may have lengthy privacy policies, but these are worth reading because they give you a solid idea how much data each app shares or guards. If you need to connect your personal data to the app, make sure the app comes from a reliable source and you know exactly how much information it’s gathering.

]]>
<![CDATA[Malware Hidden in QR-Reader Apps Infects Android Devices]]> https://www.psafe.com/en/blog/malware-hidden-in-qr-reader-apps-infects-android-devices/ Wed, 16 May 2018 12:00:47 +0000 https://www.psafe.com/en/blog/?p=17937 Malware hiding within apps is nothing new to the industry, but the latest occurrence has a focus on QR-Code readers – and worst of all, the malware itself is smart. This begs the question, how do you prevent your phone from being a casualty?

One way to ward off malicious apps is to download a third-party security app such as dfndr security, which includes a full-virus scan feature. A scan of your Android device will do a deep dive into your files and even your SD card. Worried that you might forget to scan your phone regularly? Not a problem, just use scheduled scans which can run while you’re asleep.

Read More: Is it Safe to Download Apps Outside of Google Play?

In this latest case of infected apps, a piece of malware known as ‘Andr/HiddnAd-AJ’ (try to say that ten times fast) was able to load itself onto a number of apps designed to read QR-Codes. Apps infested with the malware included: QR Code / Barcode Reader, QR Code Free Scanner, and QR & Barcode Scanner. There were a total of seven apps infected, and the malicious apps were downloaded over 500,000 times before being pulled by the Google Play Store.

We know how hard it can be to avoid malware in a world filled with it, but here are a few tips to get you started on a safer journey through the endless world of Android apps.

Download Only Official Sources
We’re aware that this point may appear moot as we noted that the infected apps came from the official Google Play Store, but even though an official source may not be 100% clean, it’s still much safer than downloading an app elsewhere. Despite missing the occasional piece of malware, Google has quite a positive record of keeping their ecosystem clean from the mess.

Avoid Apps From the Web
As you can infer from our last comment, you’re best to avoid downloading apps directly from the Internet or something you found on social media. These apps are more likely to be infected with dangerous malware and are typically prefaced with a request to turn off a security feature to allow app installations from ‘unofficial sources.’ Take this as an immediate red flag and don’t download.

Watch Those Permissions
Once you’ve downloaded an app from an official source such as Google Play or Amazon App Store, try to remain aware. Legitimate apps ask for permissions to access certain parts of your system. In some circumstances, this is normal but use your best judgment. A new email app would request access to your contacts, but why would a QR-Code reader need the same?

]]>
<![CDATA[Malicious Android Malware Intercepts Your Bank’s Phone Calls and Texts]]> https://www.psafe.com/en/blog/malicious-android-malware-intercepts-your-banks-phone-calls-and-texts/ Wed, 02 May 2018 12:00:21 +0000 https://www.psafe.com/en/blog/?p=17705 Malware has always been and will continue to be, a concern for users attempting to protect their mobile security. Now, a new piece of software, known as Fakebank, is taking device hijacking to the next level. Previous versions of the malware have been able to intercept SMS text messages from your bank and present users with fake banking login windows. However, Fakebank has gone beyond that and can now intercept your confidential phone calls. How can this disturbing strain of malware be stopped?

An excellent way to start is to secure your device from becoming infected by malware. Most cases of the Fakebank malware occurred from downloading software from third-party app markets and through social media. dfndr security’s full virus scan feature ensures that all files and programs on your Android’s internal memory or external SD card are entirely secure. 

Read More: What You Need to Know About Online Banking

Of course, being protected is also about practicing basic security guidelines in your day to day smartphone habits. Here are a few tips you can follow to prevent your device from becoming infected by malware such as Fakebank.

Download From Reputable App Stores
Most malicious apps do not come directly from the official Google Play Store but from other questionable third-party markets. Worse yet, some applications are downloaded directly from the web due to receiving a link on social media or within an email. Make sure you only download from reputable sources such as Google Play or the Amazon App Store.

Dole Out App Permissions Carefully
When you install an application, it may ask you for specific permissions to access parts of your phone. Fakebank takes advantage of a permission setting in some Android versions called ‘System Alert Window,’ allowing the app to display an official message that appears to be from your phone itself. Before accepting any permissions for apps you download, use your best judgment to determine what an app truly needs to access in order to function.

Make Sure Your Bank Security is Updated
Lastly, although not entirely related, be sure that your bank account security is adequately set up. While Fakebank does have an ability to intercept SMS two-factor messages, it still doesn’t hurt to set the feature up to protect yourself against other types of malware. Also, check with your bank to see if you can receive emails alerts for any suspicious logins.

Follow these bits of advice, and you should be just a tad safer from malicious malware like Fakebank.

]]>
<![CDATA[Uh Oh, Hackers Can Barrel Through Two-Factor Authentication]]> https://www.psafe.com/en/blog/uh-oh-hackers-can-barrel-through-two-factor-authentication/ Mon, 23 Apr 2018 12:00:03 +0000 https://www.psafe.com/en/blog/?p=17671 You’ve probably been pushed to use two-factor authentication on your smartphone in order to add a more than basic security. However, security experts have now discovered that hackers can just as easily steal your device’s information by spoofing your SIM card. In fact, two-factor authentication is more vulnerable than using cybersecurity apps for mobile devices. One such highly rated app is dfndr security, which has an anti-hacking feature that protects you from phishing attempts that could be used to take over your device.

Read More: Avoid Being Hacked When Shopping Online

Here’s what you should know about the latest threat that spoofs SIM cards and how you can protect yourself.

How Hackers Intercept Unencrypted Messages
The way cyber criminals go about stealing your information is by intercepting SMS messages sent through your device as it’s sent over the network. They can also steal databases full of data about mobile device accounts from phone carriers. One way they do this is by sending phishing emails, followed by exploiting a vulnerability in the signaling network that connects calls and messages.

One such scam was used through a T-Mobile bug on the company website that gave hackers access to the personal details of customer accounts. Hackers then used this information to impersonate T-Mobile customers in order to get a copy of their SIM cards. The scam involved pretending to lose a phone and then calling customer service and requesting an identical SIM card. They are then able to drain your bank account if it is linked to your phone or access other personal details.

Two-Factor Authentication? May Not Be So Secure
Experts now believe SMS is not as secure as using physical tokens or authentication apps on smart devices. One alternative to two-factor authentication that some companies are offering is a hardware token, as it does not send information over a carrier’s network.

The benefit of using this technology or a security app with authentication features is that they do not depend on the SIM card. Plus, these apps are not randomly generated since they are based on a seed code connected to your identity, making it harder for hackers to access.

Cryptocurrency Owners Being Targeted Too
Hackers often target wealthy groups or individuals flush with bitcoin and other cryptocurrencies in order to drain their accounts. Security groups have discovered that it’s very easy for hackers to intercept text messages and steal bitcoin from unsuspecting digital wallet holders. For example, Coinbase accounts linked with specific Gmail accounts that were secured by two-factor authentication fell to hackers hands.  

The white hackers then experimented by intercepting text messages and exploiting flaws in the cell network, giving them the ability to reset passwords to Gmail accounts and take over their Coinbase information.

In addition to using security apps and hardware tokens, you can avoid falling prey to these attacks by setting up a special PIN number with your mobile phone carrier that’s required every time you call customer service. With that extra security measure in place, this can deter spoofing of your SIM card.

Finally, be careful when using two-factor authentication. It’s always wiser to use it, rather than not, but perhaps disable it for any web based email that’s connected to your cryptocurrency account.

]]>
<![CDATA[How Can Apps be Repackaged With Malware?]]> https://www.psafe.com/en/blog/can-apps-repackaged-malware/ Thu, 22 Feb 2018 23:00:47 +0000 https://www.psafe.com/en/blog/?p=16578 The world of technology is great in so many ways, but it also can present some serious dangers. When it comes to hackers and those with malicious motives, they are unfortunately relentless and ruthless when it comes to finding a way to get your information. From your banking information to credit card numbers to even personal information that you wouldn’t want shared with a stranger, they find crafty and downright frightening ways to break into your personal devices. To keep your Android phone safe from prying eyes, use dfndr security’s full virus scan to scan your phone and SD card for malware and viruses:

 

One of the criminal methods used by cybercriminals involves repackaging apps with malware. This may seem like a confusing concept, but it’s a simple one – and it’s something to definitely be aware of as you use your mobile device. Especially since so many of us use and enjoy apps on our phones, it’s certainly something to lookout for.

When an app becomes popular – whether it is one for productivity, a game, or something in between, it’s not uncommon for other developers to put “knock offs” of that app on app stores to give users more variety. However, these choices may come with a price. Cybercriminals are frequently masking what is actually malware in these alluring apps’ packaging.

How this works is that before apps are distributed, the hackers add a malicious code to them. This could lead to issues such as premium service abuse – which causes users to unknowingly wrack up charges – to data theft and even anti-malware deactivation.

The scariest thing about this is that users will not even know that it’s happening as the “malicious” app runs on their phones. The function of the app will be likely to run exactly as an unsuspecting user would expect it to, all the while exposing him or her to harm to their device and even their personal life and finances.

Users should keep in mind that hackers are crafty. They create these apps to look nearly identical to the original, which can lead to users even downloading them by accident and not even realizing they are downloading a “knockoff”. Developers make these particularly alluring and intriguing to device users, as they are looking for any way to penetrate their device and to put their bad intentions into action.

]]>
<![CDATA[Why You Should Take an Inventory of Your Apps]]> https://www.psafe.com/en/blog/take-inventory-apps/ Wed, 21 Feb 2018 01:00:26 +0000 https://www.psafe.com/en/blog/?p=16633 Has your phone been running more slowly recently? Chances are, if you have had your phone for more than six months, then you’ll notice that your loading speeds, download speeds, and the overall abilities of your device have stagnated or decreased greatly. This isn’t uncommon, as your phone will slow down over time when its memory is devoted to photos, applications, and who knows what else running in the background. But there are steps users can take to reclaim their device’s speed. It all starts with taking inventory of your applications and clearing useless apps you aren’t using any longer. Try out dfndr security’s app manager feature to control those out of control applications:   

 

How Many Apps Are on Your Phone?
Odds are, you’ve downloaded a lot of applications since you first pulled your new phone out of the box. Consider all of the social media applications, games, and all of the applications like Netflix and Uber that most users can’t go without, and the average smartphone user has 32 applications installed. Chances are, you may not be using some of them, or some of them may serve the same function, like Lyft and Uber. Users can thus take steps to consolidate their applications.

Read More: Does It Matter If You Leave Your Phone to Charge Overnight?

Take an Inventory of Your Apps
Users can manually go through all of their applications and not only delete unused apps, but also manage data preferences. They can also configure what information is shared through applications, and if those applications are allowed to store information on the device itself. Many applications like Facebook ask to track location or save cookies on your device, and these can eat up huge chunks of memory without users knowing why. While manually going through these applications can be tedious and thankless, many users have reported that it is an effective way to increase device speeds and return the device to normal. Try all these tips to bring your beloved phone back to life and remember you can always add back an app at a later date.

]]>