digital security – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png digital security – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Drammer Attack Threatens Millions of Android Users]]> https://www.psafe.com/en/blog/drammer-attack-threatens-millions-android-users/ Tue, 25 Oct 2016 21:33:53 +0000 https://www.psafe.com/en/blog/?p=5105 Google has recently discovered a new security threat that could leave your Android device exposed to hackers. Much like the Linux-based attack known as Rowhammer, Drammer is a particularly pernicious form of malware that allows hackers to gain full access to your phone by first targeting a specific memory chip. Because of this security loophole, all PSafe users who have downloaded apps recently should click below immediately to remove threats.

Run Virus Scan

For the most part, the attack is transmitted through an app that contains harmful code. Once the app is downloaded, it can repeatedly activate a specific row of memory chip transistors to cause a bit flip (a switch of states from 1 to 0 and/or 0 to 1). Since all data is written in binaries, having the ability to change values for stored information is the equivalent of successfully picking a lock.

According to Emilio Simoni, PSafe’s Security Manager, checking the app permissions before downloading them does not work, because the malware does not need any permission to perform this kind of attack. “We strongly advise users to download apps only in Google Play, and check if the app is well recommended,” he says.

With PSafe Total’s Quick AV Scan active and running, any threats to your phone will be immediately detected and removed. Click below to check if

Run Virus Scan

]]>
<![CDATA[All That You Need to Know about DDoS Attacks]]> https://www.psafe.com/en/blog/need-know-ddos-attacks/ Tue, 11 Oct 2016 21:38:41 +0000 https://www.psafe.com/en/blog/?p=4584 A DDoS attack stands for a “distributed denial of service.” It is a type of DoS (denial of service) attack. DoS and DDoS attacks are an attempt to take control of a particular machine or network. A DoS attack originates from a single machine; its purpose is to flood a system or network with data. If a website has too much web traffic and too many tasks to complete at once, the site will stop responding and crash. This will prevent actual users from accessing the website.

Unlike a DoS attack, the attacker in a DDoS attack is often made up of multiple (or thousands of) machines, all with unique IP addresses that can come from around the world. Often, hackers take advantage of machines with poor security to help launch their attacks. The attacks usually target banks or other financial services. The attacks typically send about 50+ gigabits per second of data in order to crash the network. However, larger attacks have sent up to 500+ gigabits per second.

Read More: Why Are Dangerous Cybercrimes Going Unpunished?

DDoS attacks are often motivated attacks, and the reasoning could be political or vengeful. This has been exemplified by hacking groups like Anonymous, who target specific organizations and businesses that they believe to be corrupt. Another example would be the cyber warfare between the United States and Iran. In 2013, Iran attacked U.S. banks with DDoS attacks, supposedly in response to economic sanctions.

How to Prevent a DDoS Attack
A business or organization isn’t necessarily vulnerable to a DDoS attack if they take the right precautions. These precautions are necessary, because without them, a DDoS attack could greatly affect a business financially, in addition to resulting in a loss of customers. One of the first steps in DDoS prevention is learning how to recognize an attack. Some signs might include slow site performance, inability to access a site or page, and dramatically increased bandwidth and site traffic. The second step involves protection. Track your website’s behavior so that you have an idea of normal behavior. If a business is particularly vulnerable to a DDoS attack, it might be best to seek out a company that offers DDoS software protection.

Download PSafe Total
While you might not personally experience a DDoS attack, it’s always a good idea to protect your devices against any potential cyber attacks. Download PSafe Total for your Android devices and PSafe Total Windows for your PC to protect your devices against malicious threats 24/7. In addition, both services offer cleanup tools so that you can ensure your devices are free of unnecessary files and running as efficiently as possible.

]]>
<![CDATA[Kim Kardashian Losing 2 Phones May Be Worse Than Stolen Jewels]]> https://www.psafe.com/en/blog/kim-kardashian-west-losing-2-phones-paris-heist-may-detrimental-stolen-jewels/ Wed, 05 Oct 2016 22:50:44 +0000 https://www.psafe.com/en/blog/?p=4376 Following Paris Fashion Week, Kim told officials that she was held at gunpoint around 2:30am Paris local time at a ‘private residence’ Monday morning. In addition to millions of dollars in jewelry stolen, the gunmen got away with 2 phones, sparking fear that her private information could be leaked. PSafe’s Antitheft offers an app for this very situation to erase data remotely stopping thieves in their tracks.

TURN ON ANTI-THEFT

In a meeting with the Emilio Simoni, Senior Security Researcher at PSafe, he addressed that many things could occur when a phone is stolen, particularly when it comes to a celebrity breach. One motive may be to capitalize on the fear of leaked photos, numbers, and other sensitive information the celebrity stored on their device. Another motive may be to sell the celebrity’s personal information altogether.

The gunmen are still at large and with no leads, the reality star could face public humiliation if personal photos and information is leaked to the public.

In 2014, over 100 celebrity phones were hacked where hackers leaked nude photos for public consumption. It included A-listers, notably Oscar-winning actress Jennifer Lawrence. Many of the celebs only knew about the leak when there were reports in the media. Others took to social networks where they learned the news.

What to do now:
Stay protected. This could happen to anyone.
Download an Anti-theft to keep your Android device protected from hackers in the event of loss or theft by clearing data remotely. You may also track your phone’s location, block your phone with an access code and disable the power off menu so other people can’t turn off the device unless they know the password.

USE ANTI-THEFT

]]>
<![CDATA[The Major Threats That Target Your Backed Up Data]]> https://www.psafe.com/en/blog/major-threats-target-backed-data/ Fri, 30 Sep 2016 22:30:34 +0000 https://www.psafe.com/en/blog/?p=4291 The Cloud Security Alliance is working hard to make cloud technology virtually impenetrable. Lately, they have released a list of practices that will keep your cloud drive at maximum security. Here’s what they found.

Loss of Data
When you backup your data, it is sent to your cloud service provider. As a result, you place full faith in them to responsibly protect your data. Unfortunately, the cloud service companies don’t always vigilantly protect the stored data. To avoid this, you should ensure that your cloud service provider has protection against accidental deletion. It is also important to confirm that your provider has some form of duplication with your data in case the original files get deleted.

Read More: Why You Should Be Concerned About the Privacy of Your Phone

Account Hacking
Hackers are constantly finding clever ways to gain access to the credentials that keep your account safe. There are a few easy steps you can take to keep your passwords safe. First of all, do not click on any emails that have suspicious content. Many of these emails are malicious and designed for phishing your account and hacking your password. Moreover, it is important that you use different passwords across different accounts. If you use the same password for your email, work, and social media accounts, then a hacker will have easy access to all of your personal information.

Insiders
Business partners and former employees can potentially breach the credentials of your business if you are not careful. If an employee leaves the company with significant knowledge of company security information, then they can easily circumvent the security systems and hack your systems. Information Technology policies can amend for these vulnerabilities in the backup data.

So now that my backup data is protected, what about my cell phone?
PSafe Total is a phone application that provides a variety of services that will help optimize the speed, safety and functionality of your device.

Advanced Protection is a function within PSafe Total that allows PSafe to protect your device from third-party uninstalls in case of loss or theft. This maximizes the privacy of your photos, messages, and personal data.

PSafe Total also contains anti-theft protection. The system can track, block, locate, and even erase all of your data remotely in case of loss or theft.

]]>
<![CDATA[How to Prevent Security Cameras From Being Hacked]]> https://www.psafe.com/en/blog/prevent-security-cameras-hacked/ Tue, 20 Sep 2016 21:59:10 +0000 https://www.psafe.com/en/blog/?p=3871 As IP security camera technology is getting easier to use, more people are purchasing security cameras to watch their property. The problem, of course, is with increased technology often comes increased security risks. In this case, security cameras can pose problems because hackers can break into these systems. Here are five ways you can make sure your camera is protected from voyeurs.

Localize Your Cameras
You don’t need to connect your home security camera to the Internet at all. Instead, you can hook up your camera to a local network and then set up a non-routable internal IP address. Your camera manufacturer’s website will usually give you instructions on setting up this kind of non-routable camera.

Read More: Can Hackers Access Your Phone’s Camera and Microphone?

Add Passwords to Your Cameras
While not every security camera comes with password protection, you can still password-protect your camera. Most cameras let you set up a password in the initial setup, but you can also add one later in your settings, as well. You want to make sure that you set up a strong password that includes a mix of letters, numbers, and symbols. Make sure you change it regularly.

Encrypt Your Wireless
If your camera is wireless, you want to make sure you’re joining a wireless network that can’t be accessed by people trying to find your video. The best wireless you can join is an encrypted network – look for a WPA2 encrypted network on your new camera device.

Update Firmware
If there are problems with your camera’s firmware, the manufacturer usually will repair these problems in newer firmware versions. Make sure you’re checking your camera manufacturer’s website to see if any updates have been made. You want to make sure that your camera has up-to-the-minute security features.

Keep Your Camera Out of Private Areas
The best way to keep any embarrassing footage off the Internet is to make sure you keep your camera out of places you wouldn’t want footage seen. While it might be creepy to see yourself online eating dinner, that kind of footage isn’t as creepy as other footage types that could be posted.

Since you’ve gone to the trouble of protecting your home with a security camera in the first place, you want to make sure you can use it effectively. To better your camera’s function, download PSafe Total. With PSafe’s Memory Booster, you can optimize your device’s memory and storage so that you can speed up your device. Make sure all your security camera footage is recorded and stored properly with PSafe.

]]>
<![CDATA[Why You Should Be Concerned About the Privacy of Your Phone]]> https://www.psafe.com/en/blog/concerned-privacy-phone/ Wed, 31 Aug 2016 22:17:39 +0000 https://www.psafe.com/en/blog/?p=3345 Maintaining your phone’s privacy can be extremely challenging. Your phone faces countless threats, such as hacks of the data in your cloud, GPS tracking, and invasive privacy settings on app. The good news is, there are steps you can take to insure the privacy of your valuable data.

Here are some of the biggest privacy threats your phone faces and some steps to keep your information secure.

Read More: Security Threats Present in Android Health Apps

Cloud Data Storage

You try to be responsible with your data. You diligently back it up in your wireless cloud, so it will be safe in the event that your phone becomes damaged. But did you realize you may be putting your privacy at risk if you’re not careful? Hackers often target information stored in your cloud and can access financial and personal information if your cloud is breached.

Additionally, in the unfortunate event that law enforcement asks to seize your data, the information you have stored in the cloud can be turned over without your permission.

So while there may be some benefits to backing up your information with the cloud, doing so may actually leave your data vulnerable.

If you don’t want to rely on the cloud to store your information, you should consider using PSafe Total. The Memory Booster improves your Android device’s memory and storage capabilities. Let PSafe Total make the most of your phone’s storage space and speed up your device by letting you decide exactly what data your phone needs to save. By using your phone’s memory more efficiently, you might not need to use the cloud to store excess data.

The Apps on Your Phone

You may be aware of the privacy risks involved with social media sharing. But the apps on your phone may be posing an even deeper threat to your privacy than you realize. Many apps you have on your phone, even ones you rarely use, may be tracking your every move. Apps often use GPS tracking to access your location at all times.

If this feels like an invasion of your privacy, you should consider changing the privacy settings for your apps. To do this, go to to “Setting” and then “Apps,” and adjust the privacy settings as you wish. Alternatively, you can hover over an app whose privacy settings you wish to change and press the “edit” icon.

]]>