threats – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png threats – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Drammer Attack Threatens Millions of Android Users]]> https://www.psafe.com/en/blog/drammer-attack-threatens-millions-android-users/ Tue, 25 Oct 2016 21:33:53 +0000 https://www.psafe.com/en/blog/?p=5105 Google has recently discovered a new security threat that could leave your Android device exposed to hackers. Much like the Linux-based attack known as Rowhammer, Drammer is a particularly pernicious form of malware that allows hackers to gain full access to your phone by first targeting a specific memory chip. Because of this security loophole, all PSafe users who have downloaded apps recently should click below immediately to remove threats.

Run Virus Scan

For the most part, the attack is transmitted through an app that contains harmful code. Once the app is downloaded, it can repeatedly activate a specific row of memory chip transistors to cause a bit flip (a switch of states from 1 to 0 and/or 0 to 1). Since all data is written in binaries, having the ability to change values for stored information is the equivalent of successfully picking a lock.

According to Emilio Simoni, PSafe’s Security Manager, checking the app permissions before downloading them does not work, because the malware does not need any permission to perform this kind of attack. “We strongly advise users to download apps only in Google Play, and check if the app is well recommended,” he says.

With PSafe Total’s Quick AV Scan active and running, any threats to your phone will be immediately detected and removed. Click below to check if

Run Virus Scan

]]>
<![CDATA[The Major Threats That Target Your Backed Up Data]]> https://www.psafe.com/en/blog/major-threats-target-backed-data/ Fri, 30 Sep 2016 22:30:34 +0000 https://www.psafe.com/en/blog/?p=4291 The Cloud Security Alliance is working hard to make cloud technology virtually impenetrable. Lately, they have released a list of practices that will keep your cloud drive at maximum security. Here’s what they found.

Loss of Data
When you backup your data, it is sent to your cloud service provider. As a result, you place full faith in them to responsibly protect your data. Unfortunately, the cloud service companies don’t always vigilantly protect the stored data. To avoid this, you should ensure that your cloud service provider has protection against accidental deletion. It is also important to confirm that your provider has some form of duplication with your data in case the original files get deleted.

Read More: Why You Should Be Concerned About the Privacy of Your Phone

Account Hacking
Hackers are constantly finding clever ways to gain access to the credentials that keep your account safe. There are a few easy steps you can take to keep your passwords safe. First of all, do not click on any emails that have suspicious content. Many of these emails are malicious and designed for phishing your account and hacking your password. Moreover, it is important that you use different passwords across different accounts. If you use the same password for your email, work, and social media accounts, then a hacker will have easy access to all of your personal information.

Insiders
Business partners and former employees can potentially breach the credentials of your business if you are not careful. If an employee leaves the company with significant knowledge of company security information, then they can easily circumvent the security systems and hack your systems. Information Technology policies can amend for these vulnerabilities in the backup data.

So now that my backup data is protected, what about my cell phone?
PSafe Total is a phone application that provides a variety of services that will help optimize the speed, safety and functionality of your device.

Advanced Protection is a function within PSafe Total that allows PSafe to protect your device from third-party uninstalls in case of loss or theft. This maximizes the privacy of your photos, messages, and personal data.

PSafe Total also contains anti-theft protection. The system can track, block, locate, and even erase all of your data remotely in case of loss or theft.

]]>
<![CDATA[Cybersecurity Threats You Should Watch for in 2016]]> https://www.psafe.com/en/blog/cybersecurity-threats-watch-2016/ Wed, 29 Jun 2016 15:41:19 +0000 https://www.psafe.com/en/blog/?p=1754 As you’re probably aware, the incredible digital age we’re living in comes with its dangers. If you’re looking to protect yourself, and your personal information, it’s important to understand the cyber threats you face each day. Here are some major cybersecurity threats you should look out for in 2016:

The Internet of Things

Rather than purchasing information from suppliers, companies are taking advantage of the Internet of Things (IoT) to obtain data from the physical world. The IoT refers to the wireless network connectivity of physical objects that lets them collect, send, and receive data. While this is futuristic and exciting, hackers have gained additional opportunities to attack, as an increasing number of objects are equipped with Internet connectivity.

To make matters worse, many consumer IoT devices do not prioritize security, partially because consumers aren’t willing to pay the higher price necessary for it. Hackers therefore use breeches in consumer product security to access important data from major companies.

Two Faced Malware and Ghostware

Elvis Presley’s “Devil in Disguise” might as well have been about two faced malware. It appears harmless while under surveillance, but morphs into destructive code once the inspection is over. Similarly, the introduction of “ghostware” has made it possible for hackers to penetrate networks, steal data, and delete all evidence of compromise prior to detection. Both of these developments are representative of hackers’ attempts to evade law enforcement, and security measures by changing their tactics.

Read More: The Hackers Are Here: 3 Ways Cybercriminals Target Android Phones

Phishing Attacks

You’ve likely been warned to be wary of emails, and websites that ask you for your personal information. But, what if you received an email from your bank asking you to update your account information? Phishing is a hacker’s attempt to solicit sensitive information, like passwords or credit card numbers. It’s usually accomplished through fraudulent emails, and typically results in identity theft. As we become more comfortable with handling tasks online, like banking and shopping, it becomes harder for us to distinguish between legitimate, and illegitimate sources.

Headless Worms

A headless worm may seem less malign than a regular computer worm, but unfortunately, it can be much more dangerous. A headless device is essentially a computer in non-computer form, like a smart watch, fit bit, or smart phone, and a headless worm is a piece of malicious code that spreads across these devices. As with the Internet of Things, the lack of security in consumer products makes it easier for these headless worms to crawl through millions of devices.

How Can You Stay Protected?

Fortunately, the solution is far less complicated than the threats. Download PSafe TOTAL for antivirus protection, this way you can keep your Android, and personal information protected from hackers’ new methods, and techniques all year long.

]]>