hack – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png hack – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[SMS Phishing: The New Threat Targeting Smartphones]]> https://www.psafe.com/en/blog/sms-phishing-new-threat-targeting-smartphones/ Sat, 29 Jul 2017 23:52:48 +0000 https://www.psafe.com/en/blog/?p=12783 To most “connected” individuals, phishing scams are not new. Traditionally sent via email, phishing scams attempt to extract personal or financial information from the target. From a suspicious request by a distant relative, to a threat about loss of property, phishing scams generally use fear tactics or emotional manipulation to get information from the intended recipient. If you think you may have a virus on your device from a phishing scam, click here to run a Full Virus Scan and remove any threats:

run-security-scan
SMS phishing scams are no different in intent, but are sent directly to the recipient’s SMS inbox. Like email phishing scams, SMS phishing scams are a serious threat for both consumers and businesses. Because they can often mimic reputable senders (i.e. your bank), many people fall victim to them, which can lead to a loss of information and even identity theft. When protecting yourself from such scams, keep the following in mind.

Read More: Security Risks of Apps Sharing Data with Advertisers

  1. Utilize Anti-Hacking and Remain Diligent

DFNDR’s Anti-Hacking tool protects your device against phishing attacks, if you click on a bad link from an SMS. This tool will automatically block any dangerous sites that you may attempt to visit, and warn you of deceptive websites designed to steal your personal information. Click here to protect your device from phishing attacks:

Deeplink_Activate-Anti-Hacking

  1. Be On the Lookout For Suspicious SMS Messages

If the message is from an unknown sender or a blocked number, it is best not to engage with the content, especially if the SMS message links out to a website. Typically, SMS phishing scammers use third party tools to mass deliver their messages and block their numbers from phones, so be aware if you see such a message come through.

  1. Only Engage With Companies That You’ve “Opted-In” to Receive SMS Messaging

If you’ve never received SMS messages from your bank before and have not opted-in to do so, it is very likely that it could be a scam intended to collect your banking information. Be aware of which companies you’re expecting marketing messages or alerts from, and be wary of imposters.

  1. Be Cautious of the Content, Even if the Sender May Seem Familiar

Even if the company or person the message is coming from may seem familiar, be aware of the information they are asking you to provide and how they are asking for it. Phishing scams usually over-exaggerate a sense of urgency in order to create fear in the mind of the recipient. Know that most companies will not ask for sensitive information over SMS. If in doubt, contact the company that’s trying to contact you by using a number from their website or a document — not the SMS!

]]>
<![CDATA[Here Are 4 Tips on How to Avoid Phone Hacking]]> https://www.psafe.com/en/blog/4-tips-avoid-phone-hacking/ Wed, 26 Jul 2017 23:00:48 +0000 https://www.psafe.com/en/blog/?p=12660 The security of our mobile devices and Wi-Fi networks are a constant source of worry. It seems like hackers are finding new ways to breach our networks and steal our information every day. To protect your phone, activate the Anti-Hacking feature now:

Deeplink_Activate-Anti-Hacking
Our phones hold so much personal information that the risk of them being hacked is an intimidating thought. The Anti-Hacking feature protects against malicious sites with warnings and prevents password theft by making sure your login credentials are never found by hackers. Besides a good security app, the following are other ways to protect yourself.

Avoid Public Wi-Fi

It can be tempting to tend to some personal business while sitting in a local coffee shop and taking advantage of their free Wi-Fi network. However, doing so can put your phone’s security at risk. If you’re going to use public Wi-Fi, make sure that you are not entering any sensitive information while doing so, such as your banking information or passwords. These networks are particularly susceptible to being hacked, putting your information at risk.

Read More: How Hard is it to Hack an Android Passcode?

Use Passcodes

Using a passcode on your phone may be considered a pain, but it’s worth the effort to protect your device. Avoid using passwords that are easy to guess, and stay away from generic passcodes such as “1234” or “0000.” The more numbers or characters, the better, so switch the length of the code to six digits for extra points (and protection).

Limit Bluetooth Usage

Using Bluetooth on your device can make your phone more susceptible to being hacked. While this feature of our smartphones is useful, it gives hackers an easy “in” to record your keystrokes, steal credit card numbers, and even to send scam text messages to your device. To minimize this risk, limit your Bluetooth usage as much as you can, always turning it off when it’s not being used.

Be Cautious When Downloading Apps

Believe it or not, not all apps offered on the Google Play store and beyond are safe for our phones. Before downloading any apps to your device, ensure that they are from a trusted source, such as via the manufacturer’s app store. Do your research, and read reviews and the description of the app so that you’re not unknowingly putting your device at risk.

Even if we’re not always consciously aware of it, our phones are typically at some level of risk of being hacked by a predator. Protect your information and your device by following these simple tips and you’ll be glad you did!

 

]]>
<![CDATA[Why Do Some Users Neglect Anti-Virus Protection?]]> https://www.psafe.com/en/blog/users-neglect-anti-virus-protection/ Sun, 09 Jul 2017 22:00:36 +0000 https://www.psafe.com/en/blog/?p=12433 A surprising number of Android users don’t have any anti-virus protection installed on their cell phones. In 2017, viruses, malware, and other insidious threats are more prevalent than ever before. Bots are even known to attach themselves to innocent apps, infecting them with ransomware that can hold your phone hostage — and you might never get your data back. That’s why it’s so important to regularly scan your device for malware, so that you can catch any malicious apps or hidden security threats before they can do significant damage. Click here to scan your device for malware:

run-security-scan
All in all, no one should leave themselves vulnerable to a malware attack. The Full Virus Scan feature looks through your entire phone for threats, including both the SD card and your phone’s memory. If you regularly run the Full Virus Scan, your Android is far better protected against malicious attacks. Definitely scan your phone after downloading any new apps from the Play store or if your phone suddenly starts to behave abnormally.

Read More: How Effective is Your Android Security App?

3 Reasons Why Your Android Needs a Virus Scanner

Many smartphone users don’t use anti-virus protection because it seems unnecessary to them. But with the dramatic increase in viruses, ransomware, and malicious attacks over the last few years, they should be more concerned about how vulnerable their devices are. Still not convinced? Here are the top 3 reasons you should regularly check your phone for viruses, malware, and other dangerous bots:

  • Personal Data: Your Android knows you better than anyone. It holds the phone numbers of everyone you care about, your emails and text messages, and a plethora of other personal data. Hackers can use bots to access all of this. Suddenly, nothing is secret anymore! Some viruses even send themselves to your contacts through SMS or MMS, thus compromising your friends’ and family’s cell phones too.
  • Identity Theft: If your phone comes into contact with a virus or malware agent, you could become a victim of identity theft. By hijacking your phone, a hacker could potentially view your personal information, especially through the use of a social media app like Facebook. Identity theft can have disastrous and costly effects on its victims. So, it’s best to arm your phone with anti-virus protection to shield any vulnerabilities.
  • Precious Memories: Many people don’t even own a camera anymore. Instead, they take photos with their Android. After all, the Google Play store offers plenty of amazing, user-friendly apps for photo editing with cool filters and enhancing effects. Some malware strains, such as Mazar, are known to erase a phone’s data. If you haven’t backed up your photos, all those precious memories could be lost forever.
]]>
<![CDATA[Can You Ever Really Browse the Web Secretly?]]> https://www.psafe.com/en/blog/can-ever-really-browse-web-secretly/ Sun, 09 Jul 2017 21:06:54 +0000 https://www.psafe.com/en/blog/?p=12463 When you’re surfing the Internet, sometimes it’s best that you hide your online activity. Users crave privacy for a lot of reasons. Maybe you’re logged into a shared computer, your work laptop, or a public Wi-Fi hotspot, and you want to reinforce your security. There are also personal motivations, like trying to surprise your partner with a birthday gift you bought online. Whatever the case, there are steps you can take to keep your browsing secret. You should also make an effort to make your browsing safer, too. Click here to use Anti-Hacking to browse the web safely:

Deeplink_Activate-Anti-Hacking
Anti-Hacking will block you from malicious websites and phishing attempts designed to steal your personal information or money. You’ll also receive warnings about deceptive websites so that you never compromise the security of your device.

Read More: How Incognito is the Incognito Window in Chrome?

Use Incognito Mode

If you don’t want your history saved, Chrome’s Incognito mode is great for casual use. It also doesn’t keep any of the cookies from your browsing session. Everything disappears as soon as the Incognito window closes. However, Incognito isn’t a great option for using in your workplace. The websites you access will still be visible in your company’s log.

Get a Proxy Network

If you want to go a step further, another great option is using a proxy network. Known more commonly as virtual private networks (VPN), they work by hiding your IP address and assigning you a new one. When you’re browsing the web, an IP address is your online fingerprint, which can be easily traced back to you. Proxy networks are effective, because they retrieve the websites before displaying them for you. So, the remote server only sees the proxy network’s data — not yours!

Disable and Delete Cookies

Cookies are often the culprits when it comes to online tracking. For instance, even Flash Player uses cookies to take note of your browser’s movements. These so-called “super cookies” can actually reload third-party cookies that you may have deleted. Unfortunately, Flash is everywhere. If a website shows any type of video loop — from a news stream to advertisements — you better believe that Flash is powering them.

Remove Online Trackers

A lot of major sites will track your activity. That’s why opting out, blocking them, or changing your settings manually is advised. For example, Google’s targeted ads can be an annoyance, especially since Google has a monopoly on many users’ personal information through Gmail, Google+, YouTube, and Google searches. Luckily, turning off these targeted ads is pretty easy. In the “Activity” section of your Google account, you just need to opt out of “Shared Endorsement” and turn off the personalization feature.

]]>
<![CDATA[How Hard is it to Hack an Android Passcode?]]> https://www.psafe.com/en/blog/hard-hack-android-passcode/ Wed, 21 Jun 2017 13:58:42 +0000 https://www.psafe.com/en/blog/?p=11956 While your Android’s passcode can keep the “everyday” person out of your cell phone, it won’t stand up against hackers, thieves, and other trained criminals. Indeed, if your Android is stolen or lost, you should contact your provider and law enforcement at once. You should also take advantage of our Anti-Theft features. To protect your phone in the event that it is lost or stolen, you should enable Anti-Theft in advance. Click here to activate Anti-Theft now:

activate-anti-theft
Depending on what data your phone holds, the loss of personal information could result in identity theft. Many people’s Androids hold their banking info, home address, contacts, emails, and even some NSFW photos. These items could be used against you if they fell into a hacker’s hands. That’s why it’s so important to protect your information with Anti-Theft. Anti-Theft will prevent thieves from accessing your device, even if they can bypass your passcode. You’ll be able to remotely lock your device, track it, erase all data, and sound an alarm (if you lost it nearby).

Read More: What Should You Do After Losing Your Phone?

So, you’re wondering why your locked Android is so vulnerable to hacking attacks? There are two methods that a thief could employ to easily gain access to your phone. These methods are brute force hacking and using forensic equipment to breach security measures. Read on to learn about the two forms of Android hacking and how they work.

Guessing Your Password with Brute Force Hacking

Brute force hacking is a trial and error strategy, where the thief tries to guess your password. This method may seem ineffective, but you’d be surprised how well it works. Often, Android users’ passwords aren’t that complicated. Indeed, researchers found last year that “123456” was still the world’s most popular passcode. Also, your actual fingerprints can give you away. A thief could eventually trace your PIN number or your pattern on a smudged cell phone screen. Finally, there is also hacking software that will guess a series of passcodes until your cell phone’s lock screen opens.

Using Forensic Equipment to Steal Internal Data

Unless your Android’s memory is fully encrypted, a hacker can drain every last drop of cell phone data with forensic equipment. These elite tools are mostly used by official law enforcement, military, and intelligence services like the FBI. But if hackers know where to look online, they can also purchase this technology themselves. Essentially, cell phone forensic equipment is an all-in-one tool, which bypasses your security and gives the criminal complete access to your phone. These devices are also extremely fast. So, if your phone is stolen, don’t wait around to act!

]]>
<![CDATA[Can Someone Hack My Android’s Bluetooth?]]> https://www.psafe.com/en/blog/bluetooth-security-vunlerabilities/ Mon, 05 Jun 2017 13:30:49 +0000 https://www.psafe.com/en/blog/?p=11617 These days, almost all phones have a Bluetooth connection available. What you might not know is that this connection could be exposing your phone to hacking attempts. If you think your phone has been hacked, be sure to use the Security Scan feature to see if there have been any security breaches:

run-security-scan
The Security Scan function allows you to quickly verify phone and app files to scan for viruses and fix any security breaches. Learn more about Bluetooth hacking and discover other ways to protect your Android phone.

Bluetooth hacking occurs when a hacker is able to connect to your phone using its Bluetooth connection. This hack can only occur if the hacker is within a potential hacked phone’s Bluetooth range, which is roughly 30 feet. Once the hacker is connected, however, it opens up a hacked phone to all sorts of security vulnerabilities.

There are 3 major types of Bluetooth hacking: bluejacking, bluesnarfing, and bluebugging. Bluejacking allows a hacked phone to send anonymous messages to other phones in the vicinity. Bluesnarfing is the practice of taking information like calendars, call lists, emails, and text messages, as well as pictures and private videos away from your phone and transferring them to the hacker. Bluebugging allows the hacker to take complete control of the phone, giving them the ability to listen in on taking and receiving calls from a hacked phone as well as complete access to a hacked phones call records.

So what can you do to make sure your phone does not get hacked? Here are a couple solutions:

  • Turn off your phone’s Bluetooth when you aren’t using it. Keeping your Bluetooth on for unnecessary amounts of time just exposes you to the threat of being Bluetooth hacked.
  • Don’t accept any Bluetooth requests unless you know where they are coming from.
  • The older your phone is, the more susceptible it is to Bluetooth hacking, so if you are able, try to buy the most recent model of the phone of your choice.
  • Keeping your phone firmware updated as well is a good way to prevent against Bluetooth hacking.

Be constantly aware of your phone’s functions and how they can be used to exploit a vulnerability. Doing so can try to put you one step ahead of hackers.

]]>
<![CDATA[What Are the Concerns of Outer Space Hacking?]]> https://www.psafe.com/en/blog/concerns-outer-space-hacking/ Fri, 12 May 2017 16:00:08 +0000 https://www.psafe.com/en/blog/?p=11036 Our world now relies on satellites to function properly: they’re used to track our weather, monitor our oceans and land, help us get from one location to another with GPS, allow us to make international phone calls, and many more functions. They’re also used to monitor the sun, asteroids, and various planets, and to explore outer space.

Therefore, it’s very concerning if these satellites can become hacked — false information could be transmitted, entire satellite systems could be shut down, or valuable data of all types could be stolen. That means that satellite hacking, in the future, could potentially affect billions of people, depending on how large a cyberattack is. It certainly extends far beyond sensitive information on space explorations.

Read More: How NASA’s Free Software Can Help Entrepreneurs

NASA’s Concern with Space Hacking

That’s why NASA has grown increasingly concerned with space hacking — specifically satellite hacking. NASA gathers a lot of valuable data from space explorations — data which could easily be stolen, due to NASA’s aging computer system. Although efforts are made to secure this data, it is still not as secure as it could be.

As mentioned, much more than data from space explorations is at stake. In NASA’s case, they must maintain the security of their email system, scientific data, and their control systems at various labs and research centers. There is also a big concern for data transmissions being intercepted, whether by a certain company or else by a country. Either way, space hacking would be an act of cyber warfare — and it could come with much more severe consequences than stolen data.

Making Efforts to Improve Cybersecurity

In an effort to decrease their risk of hacking, NASA is working on improving its cybersecurity efforts over the next year or two. This is a crucial move, especially since NASA reported nearly 1,500 cases of cyber attacks in 2016. They are currently working on analyzing their systems to catch any vulnerabilities and quickly patch any issues.

Still, it’s not enough — all organizations and companies dedicated to launching satellites and exploring space should be more concerned with the security of their equipment than how quickly they can launch it. Plus, spending more time on testing equipment should help to reduce or eliminate costly space failures.

One way to improve cybersecurity in space is to use a quantum communications satellite. China launched this type of satellite last year. According to cybersecurity experts, this type of satellite is virtually hack-proof.

]]>
<![CDATA[There’s an Insulin Pump That Can Be Hacked]]> https://www.psafe.com/en/blog/theres-insulin-pump-can-hacked/ Mon, 07 Nov 2016 17:50:22 +0000 https://www.psafe.com/en/blog/?p=5480 Recently, Johnson & Johnson issued a statement warning about a potential security issue with its Animas OneTouch Ping Insulin Infusion Pump. A computer security firm found that it would be possible for hackers to hijack the pump through the unencrypted radio frequency system it uses. Strange as it might seem, this isn’t an entirely new thing. Several people have already hacked into their own device in order to change its configurations or just to satisfy curiosity about how it works. Still, the fact that someone with bad intentions could access a person’s pump is enough to cause legitimate concern.

Read More: Is the Wi-Fi Available On Airplanes Safe to Use?

How Do You Hack an Insulin Pump?
Insulin pumps are used to help diabetic people control their blood sugar. These pumps are worn on the body, usually underneath clothes, and deliver insulin through a catheter. Used predominantly by people with Type 1 diabetes, these pumps can receive dosage instructions through a wireless remote. A hacker would have to use a radio frequency monitor to zero in on the particular pump they were targeting. They could then theoretically repeat the command to deliver a dose multiple times, causing the pump to administer dangerous and even fatal levels of insulin. According to the manufacturer of the OneTouch pump, someone would need to be within 25 feet of the pump and would need to possess sophisticated technical equipment to accomplish this.

Should We Worry?
Experts in the healthcare and medical device industries say that while the possibility exists, it is highly unlikely that someone would break into another person’s insulin pump for the purpose of harming them. So far, there are no known incidents of any insulin pumps — or other medical devices — being hacked maliciously. IT security isn’t typically something a doctor or medical device manufacturer would need to understand. In today’s world, however, this knowledge gap between the healthcare industry and the tech it uses creates an unignorable risk.

How Can Medical Device Security be Improved?
Department of Defense hospitals have already addressed the medical device security threat by requiring that all implanted devices must comply with DIACAP (Department of Defense Information Assurance Certification and Accreditation Process), a risk management protocol for information systems. This means that all of their networked devices are subject to mandatory security evaluations. Perhaps civilian hospitals will follow suit in the near future. Going forward, Johnson & Johnson has said that they will incorporate security features into any future devices manufactured under their name. Additionally, the company has been working alongside the FDA to develop guidelines for medical device cybersecurity.

]]>
<![CDATA[How to Protect Your Webcam from Hacking]]> https://www.psafe.com/en/blog/protect-webcam-hacking/ Fri, 21 Oct 2016 20:05:15 +0000 https://www.psafe.com/en/blog/?p=4982 Personal webcams can be — and are — hacked. If someone wanted to hack into your computer’s webcam, he or she probably could. That’s why it’s essential to take precautions to protect yourself from being spied on via your webcam. Here are four precautions you can — and should — take to make sure your webcam isn’t hacked.

Turn your webcam off or cover it up.
Hackers can’t gain access to your webcam if it isn’t on. So, if you’re not using it, turn off the portable webcam you might have for your desktop PC. If you’re using a laptop, close the webcam’s sliding cover, or if you don’t have one of those, cover the webcam with a piece of electrical tape or a Post-It note.

Read More: Researchers are Studying Ways to Prevent Car-Hacking

Change your password.
A webcam that connects to a Wi-Fi network will have a settings page that requires you to set a username and password. If you haven’t changed your password from the default that came with the network, then you’re making your webcam vulnerable to hacking. Sophisticated hackers will certainly know the passwords associated with popular webcam brands.

Keep an eye out for the indicator light.
Most built-in webcams have a light next to them when they’re in use. If your light is lit when you’re not using it, don’t just assume that there’s a glitch with your computer. Instead, you should assume that your computer might have been breached by hackers, and you should take precautions to remove the malware from your computer immediately.

Enable your firewall.
Your PC should be protected by a firewall to stop all kinds of malicious attacks. A firewall is a piece of hardware or software that tracks network traffic to make sure there’s no unauthorized access attempts on your Wi-Fi network. On Windows computers, the firewall is turned on by default. You can check to see yours is enabled by navigating to the control panel and typing in “Firewall.” Once you click on Windows Firewall, you’ll have the option to turn the program on or off.

After you’ve secured your webcam, make sure your PC is equally secure with PSafe Total for Windows. PSafe’s unmatched anti-virus protection ensures that your computer is protected from hackers 24 hours a day, while its optimization settings will help make sure your PC is running as smoothly as the day you bought it.

]]>
<![CDATA[How Drones Present New Hacking Opportunities]]> https://www.psafe.com/en/blog/drones-present-new-hacking-opportunities/ Wed, 05 Oct 2016 22:49:00 +0000 https://www.psafe.com/en/blog/?p=4449 Commercial drone sales have tripled over the last year, totaling about $200 million in sales. Drones are aerial machines that can be remotely operated to perform a specific task. Certain types of drones have recently been approved for commercial use, as long as the person operating it has received a certification to do so.

There are many restrictions attached to drone use, but a number of organizations do not have to obey these rules. Drones can perform a variety of functions: they might serve as a type of camera, a racing toy, or a video camera. They may include Bluetooth or built-in GPS technology. But with this popularity comes more than just privacy concerns. It presents another hacking opportunity, and it’s a lot easier than you might think.

Read More: How Hackers Can Get Into Your Device Through a YouTube Video

Despite continuous concern for drone security over the past several years, consumer demand led to the early release of commercial drones. These drones are incredibly vulnerable to security threats. Despite this, sales are projected to increase exponentially over the next several years. But commercial drones aren’t the only drones at risk. Companies like Amazon want to eventually use drones to deliver merchandise.

Police forces are using drones to combat crime, utilizing them for tasks such as tracking suspects and exploring dangerous crime scenes. Even though these drones are much more expensive, they are still vulnerable to hackers. Drone security is a major concern that will only grow in the coming years.

How Drones Can Be Hacked
Not that long ago, several graduate students from John Hopkins University proved just how easy it is to hack a commercial drone. They did so by taking control of a drone from a laptop. They showed that they could cause a drone to crash by sending it too many commands, or too much data, at once. They were even able to convince the drone that it was giving itself certain commands. Ultimately, they showed that once a hacker has control of a drone, they could use it for their own agenda, destroy it, or even steal it. For a device that costs more than $500, this isn’t information that should be ignored. Hopefully in the coming years, drone security will drastically improve.

How to Protect Your Devices
The ability to hack drones reminds us that we need to protect our devices against malicious threats. Nearly one million new malware threats are created per day. Download PSafe Total for your Android device and PSafe Total Windows for your PC to protect your devices against malicious attacks 24/7.

]]>