scan – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png scan – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Who Called Me and How Did They Get My Information?]]> https://www.psafe.com/en/blog/called-get-information/ Mon, 15 May 2017 14:00:40 +0000 https://www.psafe.com/en/blog/?p=11081 Sometimes, it can seem like you get phone calls from unknown numbers or telemarketers once or twice a week. These callers don’t usually leave messages, and their phone numbers are often untraceable. You wonder how these people got your phone number in the first place. In what way do they get ahold of your information? One way, of course, is that telemarketers collect information you share online. To make sure you’re keeping your privacy as well as you can, make sure to quickly run DFNDR’s Security Scan feature. Regularly run a Security Scan to ensure that your device isn’t infected with viruses or security breaches:

run-security-scan
But even a trustworthy anti-virus app isn’t enough to completely protect yourself from telemarketers. There are other ways these crafty companies find your information.

Read More: 500 Million Yahoo Accounts Stolen

Terms of Use Clauses

Lots of apps are only in operation because they want to collect and sell your personal information to telemarketers. Make sure you’re carefully reading the Terms of Use before you click the “Yes, I accept” button on the app. You might be giving more information away than you even need to for the app to operate. Often, people rush through app downloads and don’t read the Terms of Use — don’t be caught like this.

Data Mining

The more information you share online, the easier it is for telemarketers to find your number — and to learn lots of information about your life. In the age of Big Data, companies can find out all about you: public records, census data, your Likes, your Tweets, and even your personal information, like your phone number shared on Facebook. Additionally, companies, including credit bureaus and department stores, sell the information you’ve used to sign up for things like store credit cards. Share wisely online — you never know who might find you.

Random Calling

Even if you haven’t given your number away to anyone, sophisticated technologies can generate hundreds of thousands of randomized telephone numbers in no time. A robo-caller might have come up with your phone number out of thin air.

What else can you to stop telemarketers besides running regular security scans? For one, make sure you know the Terms of Use of various apps before you download them. Additionally, register your phone number with the National Do Not Call Registry. Some unscrupulous companies will call you anyway, but it doesn’t hurt to try.

]]>
<![CDATA[How to Stop, Limit, or Customize Sharing in a Google Doc]]> https://www.psafe.com/en/blog/stop-limit-customize-sharing-google-doc/ Sat, 06 May 2017 15:00:11 +0000 https://www.psafe.com/en/blog/?p=10827 Even though Google’s tools are fairly safe to use — since the company actively works to rid its products of security flaws — sometimes, many users can have their devices infected with malware before Google can fix the issue. Hackers often take advantage of the vulnerabilities in software to spread malware to compromise devices. Use DFNDR’s Full Virus Scan to check your smartphone and SD card for the latest viruses:

run-security-scan
Google Docs is one of the most-used apps for companies because it is such an effective document-sharing platform. You can share documents with your colleagues, and work together to write and edit documents. Still, you don’t always want everyone in your company to have endless access to Docs you’ve shared with them. The following will show you how to stop, limit, or customize Google Doc sharing on your Android and computer.

Read More: Google Fixed Over 100 Security Flaws, But Are You Safe?

Edit Sharing On Android

Stop sharing with certain people.

  1. In the Google Docs app, click “More” next to the file you want to stop sharing.
  2. Tap the “Info” button on the right of the document.
  3. Click on the down arrow button next to the name of the person with whom you no longer want to share the document.
  4. Click “No access.”

Delete a document’s file link.

  1. To ensure that only the people with whom you’ve shared a document can access it, click “More” next to the file.
  2. There, tap the “Info” button on the right of the document.
  3. Click on the down arrow next to “Link sharing on.”
  4. Change the permissions to “No access” and click “OK.”

Edit Sharing on Your Computer

Stop sharing with certain people.

  1. In Google Docs, select the file or folder you want to limit.
  2. Click “Share” and navigate to the “Share with others” window.
  3. Click “Advanced.”
  4. Next to the person’s name, click the “X.”
  5. Save your changes.

Stop others from sharing your file.

  1. Navigate to “Share” and click “Advanced” in the bottom right of the box.
  2. Check the box next to the option “Disable options to download, print, and copy for commenters and viewers.”
  3. Save your changes and click “Done.”

Customize sharing permissions.

  1. To create an expiration date for a file’s sharing permissions, navigate to “Share” and “Share with others” window.
  2. Click “Advanced.”
  3. Navigate to “Who has access.”
  4. There, click on the user whose time you want to restrict and click the down arrow next to the user’s name.
  5. On the list, click “set expiration.”
  6. Click the date you want the user’s access to the file to end next to “Access expires” and save your changes.
]]>
<![CDATA[Pickpockets Are Now Targeting Wallet Apps]]> https://www.psafe.com/en/blog/pickpockets-now-targeting-wallet-apps/ Fri, 05 May 2017 15:00:41 +0000 https://www.psafe.com/en/blog/?p=10806 Few people carry cash now, thanks to credit cards and mobile payment apps. If you use mobile payment apps, a banking app, or have debit and credit cards attached to your device, then you should be more cautious of security threats to your device. If you’re on-the-go and want to verify the security of your phone, use the Security Scan feature. Click here to quickly check your device for malware:

run-security-scan
Security Scan will quickly check your phone’s files and apps to make sure that your device is free of any viruses or threats. If any malware is found, Security Scan will quickly remove any threats. That way, you never have to neglect the security of your payment apps and personal information because you’re short on time.

Read More: New Credit Card Skimmers Harder to Detect Than Ever

Thieves Are Targeting Wallet Apps

In China, pickpockets are now targeting mobile payment apps. It was recently reported that more than $14 million was stolen from consumers through fraudulent QR codes. A QR code is a type of barcode that can be used for a variety of purposes: it can send you to a web address, log you into a website, or it can hold your payment information, such as your bank account information or your credit card number.

Unfortunately, this technology is still not a very secure payment method: hackers can easily manipulate a QR code and paste their own code over the original code. This allows them to then steal money from consumers. For example, a consumer could scan a QR code that, once scanned, becomes a malicious link. This could then lead to the consumer’s device being compromised, which is why it’s important to regularly scan your device for malware — you never really know how and when a virus will show up. Once the smartphone is infected with the virus, it can then be used to steal money from mobile wallet apps.

Payment apps are extremely popular in China — you can pay for just about any item, anywhere. You can use it to pay for dinner, get groceries, get a massage, and etc. You’ll then pay for goods by having your QR code scanned. More recently, a number of fraudulent QR codes have been attached to bike rentals in China. Thieves were able to trick consumers into sending money to them instead of the bike rental company.

While pickpocketing mobile payment apps is currently more of an issue in China, it’s always best to be vigilant about cybersecurity across the world: it’s very possible that this scam could make its way to the US. In order to improve the security of QR codes, payment apps need to actively alert users to suspicious activity. Further, QR codes should regularly be examined in shops and elsewhere to make sure that no one has been tampering with them.

]]>
<![CDATA[Here Are the Most Common Android Viruses]]> https://www.psafe.com/en/blog/common-android-viruses/ Thu, 04 May 2017 16:00:39 +0000 https://www.psafe.com/en/blog/?p=10764 Viruses can be a disruptive and dangerous presence on your Android phone — they can ruin your device and steal your personal information. It seems like there is always a new virus to worry about on Android. Whether it’s spyware lurking in the app you downloaded or ransomware hijacking your system, you need to remember to run antivirus scans often to protect yourself. Click here to run a Full Virus Scan on your device:

run-security-scan
The Full Virus Scan will check your device and SD card for the latest malware so that you can catch any security threats before they do too much damage on your Android.

Read More: Windows Malware Found in Over 100 Android Apps

But which types of viruses are the most common on Android? The following will discuss the four  most common types of malware that infect Android phones with viruses.

Ransomware

Ransomware is a kind of malware that takes your device hostage until you pay the cybercriminal a certain amount of money. Usually this payment happens through bitcoin, or another untraceable form of currency transfer. For example, a hacker might pose as the FBI, lock down the phone, and keep it hostage until a fee is paid.

Universal Cross-Site Scripting (UXSS) Attack

If you’re using an older Android model, then you’re susceptible to this attack. This attack is when cybercriminals write code using JavaScript if you accidentally click on a malicious link. That means that the hacker can automatically download a malicious app onto your phone. The best way to stop the possibility of this kind of attack? Upgrade your Android to a newer model.

Malware Hidden in Downloaded Apps

Some of the most innocuous apps have hidden malware that infects users’ systems. Even solitaire games and history apps have downloaded viruses onto users’ Androids. The problem with these apps is that they might seem like they are functioning fine for weeks or even months before they download the virus. This means that you’ll stop looking at your newly-downloaded app as the source of your new virus.

Android Installer Hijacking

A shocking number of Android devices — nearly 50% — are at risk for this virus. The Android Installer Hijacking app comes into play when you try to download a valid app. Instead, the hijacker installs a malicious app in place of the real one. While you are reviewing the permissions for the app you want, the Hijacking virus sets up an innocent-looking app that will later install the malware.

]]>
<![CDATA[Preinstalled Malware Has Been Discovered on Android Devices]]> https://www.psafe.com/en/blog/preinstalled-malware-discovered-android-devices/ Wed, 29 Mar 2017 20:00:49 +0000 https://www.psafe.com/en/blog/?p=9280 Recently, preinstalled malware was found on nearly 40 Android smartphones and tablets, from manufacturers such as Samsung, Google, and LG. The malware was added to the phone at some point later in the supply chain; it was not added by the manufacturers. In several cases, malware was found on the ROM firmware, which means that someone with system privileges was able to manipulate the software.

Preinstalled malware is especially worrisome because, no matter how cautious you strive to be online, you cannot prevent this type of malware. Thankfully, this type of malware can be discovered and removed if you scan your new device for security threats immediately after turning it on. Use DFNDR’s Security Scan to quickly scan your new device for malware, so that you can remove any threats before they compromise your data. Click here to scan your device for preinstalled malware:

Security Scan
Various Devices Were Infected

In most cases, the malware on the infected devices was easy to spot. Many of the devices came preinstalled with malicious apps that contained adware or ransomware. Other malicious apps gave themselves system privileges in order to have more control over the infected devices.

The preinstalled malware was found on 38 smartphones and tablets. Some of those included various Galaxy Note and Galaxy Tab models, LG G4, Asus Zenfone 2, and LenovoS90, among many others. Although it’s still unknown exactly when these devices were infected with malware — and how the devices were obtained — it’s important to avoid low-cost tech resellers that offer a too-good-to-be-true bargain.

Regularly Scan Your Device for Malware

Make sure to buy all of your tech devices from a reputable source, so that you can minimize your risk for purchasing a device with preinstalled malware. Still, it’s a good idea to scan any new tech device — whether or not it’s listed as one of the infected models — that you purchase for malware to truly eliminate your risk. It doesn’t take long to scan a new device for malware, and it’s a safe practice that will prevent your personal data from being stolen.

Preinstalled Malware is Not Uncommon

Unfortunately, this isn’t the first time this has happened. Last year, malicious apps were found preinstalled on a variety of Android devices as well. Further, preinstalled backdoors were discovered on millions of devices that were manufactured by BLU and others. A majority of these phones sent regular data updates from US smartphone users to China.

 

]]>