Search Results for “malware” – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Tue, 28 Oct 2025 19:18:38 +0000 en-US hourly 1 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png Search Results for “malware” – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Over 183 Million Emails and Passwords Leaked — Find Out If You Were Affected]]> https://www.psafe.com/en/blog/over-183-million-emails-and-passwords-leaked-find-out-if-you-were-affected/ Tue, 28 Oct 2025 19:18:38 +0000 https://www.psafe.com/en/blog/?p=21392 A massive credential dump has recently come to light. According to recent reporting, over 183 million email-password combinations, including many tied to Gmail accounts, have surfaced online — gathered not from a direct breach of Google’s servers, but from malware-based harvesting and infostealer activity. 

This incident shows that no one is truly immune — even users of major services like Gmail must remain vigilant.

What We Know So Far

  • The leak involves approximately 183 million unique email/password pairs.
  • The data appears to stem from “infostealer” malware logs — i.e., malicious software installed on devices that captured credentials and uploaded them, rather than a single platform being hacked.
  • A large volume of the data reportedly includes Gmail accounts or credentials linked to Gmail users.
  • The credentials were often stored in plaintext (or easily reversable form) alongside other identifying data.
  • Importantly: this is not the same as saying Gmail itself was breached; rather, the leak is from external malware-based collection.

Why This Leak Represents a Real Threat

1. Password reuse across services

If your email + password were exposed, and you reuse the same credentials across banking, shopping, social media, cloud storage, then attackers may use them to gain access elsewhere.

2. Enhanced phishing & targeted attacks

Attackers armed with your email address (confirmed leaked) can craft more convincing phishing messages or credential-stuffing attempts, increasing the chance of success.

3. Automation and scale

With millions of credential pairs available, criminals can automate large-scale credential stuffing — trying leaked email/password combos across many services and platforms.

4. Hidden compromise & secondary risk

Even if the service you used wasn’t directly targeted, the fact that the credentials leaked means your digital identity has a serious vulnerability — which can lead to account takeover or fraud.

5. Time is of the essence

Every hour your compromised credentials remain unchanged increases the likelihood of misuse. Quick detection and reaction are essential.

 

How dfndr security’s Leaked Credentials Feature Protects You

If you use the dfndr security app, here’s how the built-in “Leaked Credentials” function becomes a key layer of defense:

    • It checks your email (and optionally other login data) against known databases of leaked credentials.
    • If your credentials are found, you receive an alert, enabling you to take immediate corrective action (change password, review account).
    • The app also supports best-practice recommendations: creating strong unique passwords, activating two-factor authentication (2FA), avoiding reuse of passwords.
    • In short, while the leak put credentials into circulation, dfndr acts as an early-warning system — helping you detect exposure and respond before attackers exploit it.
  • Without such a function, you might remain unaware of compromised credentials for a long time — giving attackers a head-start.

What You Should Do Right Now

    1. Change your password immediately on all accounts tied to the affected email(s). Use a strong, unique password for each service.
    2. Enable two-factor authentication (2FA) everywhere possible. This adds a vital extra layer of security.
    3. Use the dfndr security “Leaked Credentials” feature: check whether your email appears in the leak, and follow the app’s recommendations if it does.
    4. Avoid using the same password across multiple services. Consider a trusted password manager to generate/store unique passwords safely.
    5. Monitor your email inbox for suspicious activity: login alerts, unfamiliar password reset requests, etc.
    6. Scan your devices for malware or suspicious apps — since the leak was rooted in device‐based credential harvesting, device hygiene matters.
  • Educate friends/family: many people reuse weak passwords or aren’t aware of credential leaks — their vulnerabilities may impact you (via shared accounts, contacts, etc).

With over 183 million credentials already exposed, this is not just a theoretical risk — the data is floating around in cyber-criminal ecosystems.

Delaying action means increasing your exposure. Don’t rely on a service provider to alert you — many do not offer proactive notifications in time.

Being proactive now gives you a better chance at staying ahead of attackers.

This leak is a wake-up call: digital account security is no longer optional. But the good news: you can act now to defend yourself. With dfndr security’s Leaked Credentials feature, you can check your exposure, respond quickly, and reduce your risk of falling victim to attacks.

Open or download the dfndr security app, activate the Leaked Credentials check, and verify your accounts now. A few minutes of action can mean the difference between staying safe or becoming a victim.

Protect your digital world — start with dfndr security.

]]>
<![CDATA[How to identify a spy app on your smartphone]]> https://www.psafe.com/en/blog/how-to-identify-a-spy-app-on-your-smartphone/ Thu, 04 Sep 2025 10:33:39 +0000 https://www.psafe.com/en/blog/?p=21380 In the United States, the use of spyware apps is a growing concern, affecting mobile phone users. These hidden applications can compromise your privacy and security, but there are tangible signs and steps to help you detect and remove them.

Apps you don’t recognize

Review the complete list of apps installed on your phone. If you spot applications you don’t remember downloading or that seem suspicious, this is a red flag. Many spyware apps disguise themselves with innocuous names or hide within folders. To view the list of installed apps, you can use the scan feature in dfndr security.

Battery draining fast

Spyware runs silently in the background, consuming resources. If your battery suddenly drains much faster than usual—even without heavy usage—it could indicate hidden surveillance software.

Device overheating

Unusual overheating, especially while your phone is idle or performing basic functions, may be a sign that malicious apps are running behind the scenes.

System slowdowns and freezes

If your phone becomes sluggish, apps crash, or the operating system feels buggy, spyware could be stealing system resources for its activities.

Unusual data usage

Watch for unexplained spikes in your monthly data usage. Spy apps often transmit information back to the attacker using your cellular data, so increased usage with no clear cause deserves attention.

Messages marked as read

If your texts or messages appear as read before you’ve opened them, this could mean someone—or something—is accessing them without your consent.

Strange sounds during calls

Persistent echoes, static, or faint voices during phone calls might signal that spyware is listening in or recording your conversations.

Unfamiliar files or settings

Find files, photos, or changed settings you didn’t create or modify? These artifacts can be leftover evidence of spying apps.

How to protect yourself

  • Always inspect app permissions and review what access each app has to your device (camera, microphone, location).

  • Run a full scan with a trusted antivirus, such as dfndr security, which detects and removes hidden spy apps and threats automatically.

  • Keep your operating system and all apps updated to defend against newly discovered vulnerabilities.

  • Use strong, unique passwords and enable two-factor authentication whenever possible.

Proactive Tools

Modern apps like dfndr security have features to display all installed apps, monitor for privacy risks, provide real-time protection against malware, and alert users about leaked data or unauthorized access. Using such solutions along with general awareness greatly reduces your risk.

Your best defense is vigilance: question unfamiliar apps, strange device behavior, and always be mindful of your digital footprint. Stay protected by keeping your phone secure and up to date.

]]>
<![CDATA[5 trending digital scams: how AI is making fraud more dangerous]]> https://www.psafe.com/en/blog/5-trending-digital-scams-how-ai-is-making-fraud-more-dangerous/ Thu, 28 Aug 2025 10:18:41 +0000 https://www.psafe.com/en/blog/?p=21376 Every day, millions of mobile phone users receive malicious links through SMS, email, or social media. These links are increasingly sophisticated: with the assistance of artificial intelligence, scammers can craft messages without errors and even personalize them to their victims.

Phishing and Smishing With AI

AI-powered scams use personalized messages to deceive even cautious users. Scammers pose as trustworthy companies, requesting sensitive data, passwords, or money transfers. Reports show an increase in phishing driven by AI-generated emails to improve speed and credibility.

Payments Scams

Fraudsters deploy malicious apps that monitor and divert transactions, fake QR codes to mislead payment, and false requests for refunds. Techniques even include impersonating tax authorities or banks, demanding quick responses to fraudulent claims.

Fake Call Centers and Employees

Scammers simulate bank call centers, aiming to capture passwords, install malware, or transfer funds. The rise of synthetic AI voices allows for more convincing vishing attacks, making phone-based fraud much harder to detect and resist.

Fake E-Commerce

False online stores and social media profiles lure victims with unreal deals; after payment (often via instant transfer platforms), no product is delivered. AI tools help scammers design authentic-looking websites and manage deceptive customer interactions.

SIM Swap

Criminals transfer a victim’s phone number to a new chip, gaining access to bank accounts and social media via SMS codes. SIM swap fraud has spiked over 1,000% year-on-year, fueled by AI-powered social engineering and voice cloning. Attackers exploit weak carrier identity checks and automated support systems, quickly hijacking entire digital identities and financial assets.

General Recommendations

  • Never click links from unknown sources.

  • Always use two-factor authentication.

  • Be skeptical of offers that seem too good to be true.
  • Keep your phone and apps up to date.

  • Use trusted mobile antivirus software. 

If you want maximum protection for your device, consider downloading security apps such as dfndr security for real-time defense.

 

]]>
<![CDATA[Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers]]> https://www.psafe.com/en/blog/pix-gains-momentum-abroad-convenience-and-security-for-brazilian-travelers/ Fri, 22 Aug 2025 15:11:52 +0000 https://www.psafe.com/en/blog/?p=21371 Travel is about new experiences — and making payments without hassle is a crucial part of that. Pix, Brazil’s instant payment system developed by the Central Bank, has been gaining traction abroad, especially in neighboring countries like Paraguay and Argentina. This trend brings greater convenience to Brazilian travelers looking for secure ways to manage their finances.

  • How it works in practice:

    Specialized fintechs enable Pix through QR codes generated in the local currency. Travelers scan the code, instantly converting the amount into reais, tax (IOF) included. 
  • Advantages for travelers: 
    1. Speed and efficiency — instant transaction. 
    2. Security and familiarity — control via an app and lower fraud risk. 
    3. Transparent conversion — amount shown in reais with IOF included, making expenses clear. 
  • Current limitations:

    Usage is still limited to transactions between Brazilian bank accounts, even when made abroad. Both sender and recipient must have accounts in Brazil. 
  • What’s next?

    There are no concrete plans yet to make Pix international. Its global expansion depends on complex financial agreements between countries. Still, current adoption marks a significant step in simplifying payments for Brazilian tourists. 

For travelers, Pix abroad offers a safe, fast, and practical alternative — when accessed via partner fintechs. It’s especially advantageous compared to traditional credit cards, which often involve more bureaucracy and additional fees. dfndr security is Latin America’s #1 mobile security app, with over 200 million installs worldwide. It protects your smartphone from malware, online scams (like phishing and WhatsApp cloning), data leaks, and insecure Wi-Fi networks, using state-of-the-art technology to keep you safe 24/7 and alert you instantly to any threats.

Safeguard your digital assets with trusted security tools, ensuring your Pix transactions and sensitive information remain protected.

#Cybersecurity #PixSecurity #MalwareProtection #DigitalSecurity #FinancialFraud #CyberThreats #PhishingAwareness #SecureTransactions

]]>
<![CDATA[Malicious links: what they are and how to protect yourself]]> https://www.psafe.com/en/blog/malicious-links-what-they-are-and-how-to-protect-yourself/ Wed, 13 Aug 2025 15:44:31 +0000 https://www.psafe.com/en/blog/?p=21365 Every day, millions of  cell phone users receive malicious links via SMS, email, or social media. These scams are growing more sophisticated—scammers now commonly use artificial intelligence to create error-free and even personally tailored messages.

Common tactics used by scammers

  • Shortened or masked links: Attackers use shortened URLs or complex domain names to obscure the true destination, making it difficult to spot a dangerous link before clicking.

  • Deceptive promises and urgency: Phishing messages often promise sweepstakes winnings, flash sales, package deliveries, or urgent bank notifications to lure users into clicking quickly without thinking.

  • Fake websites and data entry forms: Clicking a malicious link may redirect you to a convincing fake website where you’re asked to input sensitive details—like banking data, Social Security numbers, or passwords—or may silently trigger a malware download.

  • Impersonation tactics: Scammers frequently impersonate trusted organizations—such as banks, government agencies (e.g., IRS), or online retailers—to legitimize their claims and increase the likelihood of success.

  • Social media exploits: On platforms like Facebook, Instagram, and LinkedIn, fake profiles or posts lure users with job offers, urgent security warnings, or giveaway announcements, often prompting users to click malicious links or divulge private information.

Real-world impact

  • Financial loss and data theft: These attacks can result in financial fraud, identity theft, and corporate data breaches.

  • Malware and ransomware: Malicious links can install viruses or ransomware on personal or work devices, sometimes encrypting files and demanding a ransom in return for data restoration.

Tips to Protect Yourself

  • Preview before clicking: On a desktop, hover your mouse over a link to reveal its destination. On mobile, press and hold the link for a preview. Avoid clicking if the destination looks suspicious or is unfamiliar.

  • Beware of unknown senders: Avoid clicking on links from unknown or unsolicited sources, whether by email, text, or direct message.

  • Look for signs of deception: Watch for URL misspellings, extra symbols or hyphens, unrecognized domain names, and urgent language or threats of account suspension.

  • Use security solutions: Consider security tools like URL defenses or anti-phishing filters offered by major security providers and popular email services.

  • Be skeptical of official requests: U.S. government agencies like the IRS or USPS will not demand personal data or payment over email or text. Always verify through official channels if in doubt.

  • Report suspicious messages: You can report phishing attempts to authorities like the Federal Trade Commission (FTC) or, in the case of IRS-related scams, to phishing@irs.gov.

Ready to take your mobile security to the next level?

Discover how dfndr security can help protect your devices and data. 

]]>
<![CDATA[Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept]]> https://www.psafe.com/en/blog/zero-trust-what-it-is-why-it-matters-and-how-dfndr-security-protects-your-phone-with-this-concept/ Thu, 03 Jul 2025 18:17:58 +0000 https://www.psafe.com/en/blog/?p=21359 Have you heard of Zero Trust? The term is one of the most  important trends in cybersecurity today—and is increasingly present in mobile device protection. Explore the concept, understand its importance, and see how dfndr security puts Zero Trust into action to protect both you and your smartphone.

What is Zero Trust?

Zero Trust is a cybersecurity model based on the principle that no network, user, or device should be trusted by default, even if it is “inside” the protected environment. In other words, every access attempt must be verified and authenticated, regardless of its origin. The concept emerged to address the rise in digital threats, user mobility, and the popularity of remote work and cloud computing, which have eliminated traditional security boundaries.

In the Zero Trust model, the rule is clear: never trust, always verify. This means every connection, access, and action is continuously monitored and validated, drastically reducing the chances of attackers exploiting vulnerabilities or moving freely within a system.

Why is Zero Trust important?

With the growth of digital threats and the digitization of personal and professional life, relying solely on traditional security barriers (such as firewalls or standalone antivirus) is no longer enough. Zero Trust offers key benefits:

  • Holistic protection: Covers users, devices, applications, and data, reducing security gaps. 
  • Risk mitigation: Prevents threats from spreading laterally in case of a breach; each access is isolated and monitored. 
  • Fast detection and response: Greater visibility into activities, making it easier to identify and respond to suspicious behavior. 
  • Sensitive data protection: Ensures only authorized users and devices have access to confidential information. 
  • Adaptation to mobile and remote environments: Essential for scenarios where access occurs from any location and device. 

How dfndr security applies Zero Trust to protect your phone

dfndr security incorporates the main pillars of Zero Trust to protect your smartphone from digital threats, scams, and data leaks. Here’s how:

  • Continuous monitoring and constant verification: the app performs automatic and real-time scans, detecting and removing viruses, malware, spyware, and other threats as soon as they appear. No app, file, or link is considered safe without a rigorous analysis. 
  • Protection against scams and phishing attempts: dfndr security identifies and blocks malicious links, fake websites, and phishing scams—even if the threat comes from known contacts or trusted networks. Anti-phishing is a highlighted feature in the English blog, with the app using machine learning and AI to detect phishing in SMS, WhatsApp, and Facebook Messenger, among others (see https://www.psafe.com/en/blog/new-cyber-threats-targeting-android-phones/ ). 
  • Identity and credential monitoring: The 24/7 credential monitoring feature alerts you immediately if your email, password, or personal data leaks online, allowing quick action to prevent harm.  
  • App access control: Allows you to lock access to sensitive apps with a password, preventing curious people or attackers from accessing your personal information even if they have your device. 
  • Alerts against WhatsApp cloning and fraud: dfndr security monitors for cloning attempts and scams on WhatsApp, sending real-time alerts and reinforcing protection against fraud that exploits user trust. 
  • Safe app installation: Before installing any app, dfndr security checks if it’s safe, preventing malicious apps from accessing your device. 

Zero Trust in the palm of your hand

dfndr security translates the Zero Trust concept to the mobile universe, applying the logic of “never trust, always verify” to every action, access, and connection on your phone. Thus, even in a scenario of growing threats—including those driven by artificial intelligence—your device remains protected and you stay in control of your digital security.

 

Ready to defend your Android device against these and other emerging threats?

Discover dfndr security, your trusted antivirus for Android.

]]>
<![CDATA[New Cyber Threats Targeting Android Phones]]> https://www.psafe.com/en/blog/new-cyber-threats-targeting-android-phones/ Thu, 15 May 2025 13:11:23 +0000 https://www.psafe.com/en/blog/?p=21346 The mobile threat landscape in the United States is evolving rapidly, with Android devices facing an unprecedented wave of sophisticated cyberattacks. As smartphones become central to daily life and business, cybercriminals are leveraging new tactics and technologies to exploit vulnerabilities, steal data, and disrupt operations. Here’s an overview of the most pressing threats Android users in the U.S. should be aware of this year, and how DFNDR Security, an effective antivirus for Android, can help.

  1. Ransomware Resurgence

Ransomware attacks on Android devices have surged, fueled by the rise of Ransomware-as-a-Service (RaaS) platforms. Attackers deploy advanced malware that encrypts user data and demands payment for its release. These attacks are increasingly targeting not just individuals but also businesses, with devastating consequences for those who lack regular backups or robust mobile security measures. DFNDR Security offers protection against these threats.

  1. AI-Driven Phishing and Social Engineering

Artificial intelligence is now being used to craft highly convincing phishing messages, emails, and even voice calls. These AI-powered attacks can mimic trusted contacts or institutions with alarming accuracy, making it difficult for users to distinguish between legitimate and fraudulent communications. SMS phishing (smishing) and voice phishing (vishing) are on the rise, often bypassing traditional security filters. DFNDR Security, a leading antivirus for Android, can help identify and block these phishing attempts.

  1. Exploitation of Zero-Day Vulnerabilities

Cybercriminals are increasingly exploiting zero-day vulnerabilities—security flaws that are unknown to device manufacturers and unpatched. Attackers move quickly to take advantage of these weaknesses before security updates are released, putting millions of Android devices at risk. The March 2025 Android Security Bulletin addressed 44 vulnerabilities, including two that were actively exploited in the wild, highlighting the urgency of timely updates. Keeping DFNDR Security, your antivirus for Android, updated is crucial.

  1. Malicious and Counterfeit Apps

Even official app stores are not immune to infiltration by malicious or counterfeit applications. These apps can harvest personal data, activate device sensors (like microphones and cameras), or install additional malware. The risk is even higher when users sideload apps from unofficial sources. Fake banking and utility apps are particularly prevalent, often designed to steal credentials and financial information. DFNDR Security, a reliable antivirus for Android, can detect and remove these malicious apps.

  1. Mobile Banking Trojans

Mobile banking Trojans are becoming the most significant threat to Android users in the U.S. These sophisticated malware variants disguise themselves as legitimate apps, intercepting SMS messages, stealing login credentials, and even bypassing two-factor authentication. Their ability to remain undetected while siphoning off sensitive data makes them especially dangerous. DFNDR Security, your partner in mobile security, offers protection against these Trojans.

  1. Rogue Wi-Fi Hotspots and IoT Integration Risks

Cybercriminals are setting up rogue Wi-Fi hotspots in public places, tricking users into connecting and then intercepting their data. The growing integration of Android devices with IoT (Internet of Things) gadgets further expands the attack surface, allowing attackers to compromise multiple devices simultaneously. DFNDR Security, the antivirus for Android you need, helps protect your connection.

  1. Advanced Spyware and Surveillance Tools

Spyware and surveillance malware are increasingly targeting Android devices, capable of tracking location, recording conversations, accessing cameras, and stealing stored data. These tools are often used in targeted attacks against individuals and organizations, sometimes backed by state actors. With DFNDR Security, your mobile security is enhanced.

The threat landscape for Android users in the United States in 2025 is more complex and dangerous than ever. Staying protected requires vigilance, regular software updates, cautious app installation, and the use of trusted mobile security solutions like DFNDR Security, the best antivirus for Android.

Ready to defend your Android device against these and other emerging threats?

Discover dfndr security, your trusted antivirus for Android.

]]>
<![CDATA[What is worm?]]> https://www.psafe.com/en/blog/what-is-worm/ Wed, 11 May 2022 20:29:16 +0000 https://www.psafe.com/en/blog/?p=21274 In computer security terms, do you know what a “worm” is? Well, you probably know we’re not talking about larvae — but we are indeed talking about parasites. Digital worms are among the most serious threats in the wild kingdom of the Internet.

According to our virus dictionary, a worm is one of the most common forms of malware. They exploit network flaws to spread larger threats and build on an operating system that spreads malicious code to other computers.

Worms can also damage connections, slowing down the internet and computer. Worse still, they can delete files from your hard drive and be difficult to defeat once they have penetrated your system (as they can usually get through most firewalls).

In this post, you will learn more about worms — and how to protect yourself from this threat.

What makes a worm?

A worm is a type of malware that, unlike common viruses , can self-replicate without the need to infect legitimate files, thus creating working copies of themselves. This capability enables worms to easily spread across computer networks and USB drives.

Some worms also spread through email messages, creating malicious attachments and sending them to the hacked account’s contact lists, often in the form of phishing.

How Worms Work

After spreading and gaining access to systems, some worms look for patches and security updates to close the holes they use. This prevents other malware from infecting the system using the same flaw – ensuring the worm’s exclusive control of its domain within the system.

These worms can also delete and modify files. Sometimes the point is just to make copies of itself over and over again – using up system resources (like hard drive space or bandwidth, hogging a shared network). In addition to wreaking havoc on a computer’s resources, worms can also steal data, install a backdoor, and allow a hacker to gain control over a computer and all of its system settings.

Worms are back to being used in SPAM

Popular around 2003 with the Bagle family, worms sent via SPAM to email accounts are once again being used by cybercriminals. The technique often uses zipped, password-protected files to distribute malware.

Because it is password protected, many antivirus programs are not able to scan files, and many security suites do not scan zip files, so they easily pass through the email security gateway.

A recent reappearance of this method for stealing data took place in Italy and was aimed at customers of Grupo Bancario Iccrea. The e-mail contained a password-protected HTML file, but with the access code included in the body of the e-mail.

When clicking, the user was invited to enter the code in the email to access the page. By informing the e-mail password, the user was directed to another page where he or she would enter credit card information, giving a false sense of security.

The reuse of this malware can represent a major threat world-wide, as more and more people have access to computers and are spending time in the virtual world, but are unaware of past threats and ways to protect themselves.

How to know if your computer has worms

If you suspect that your devices are infected with a worm, run a threat scan using your security solution immediately. Even if the verification is negative, follow the steps below.

1. Keep an eye on your hard drive space. Remember: when worms replicate themselves over and over again, they start taking up free space on your computer.

2. Monitor your machine’s speed and performance. Is your device slower lately? Are some of your programs crashing or not working like they used to? This could be a sign that a worm is consuming your processing power.

3. Be on the lookout for new or missing files. A common function of worms is to delete and replace files on a computer.

Main types of worms

The list below presents some of the most popular types of worms:

  • Sobig: emerged in 2003 and was reactivated in 2013, Microsoft offered a reward to discover its creator.
  • Conficker: It is most common on personal computers, blocking access to information security sites and spreading quickly over the network or USB devices. The pest is still active, but it can now be more easily removed by advanced security solutions.
  • Mydoom: appeared in 2004 with rapid propagation and was generated by infected computers and through e-mail messages.
  • Doomjuice: Uses a loophole created by Mydoom to infect computers.

How to protect yourself from worms

Worms are just one example of malicious software. To help protect your computer from them and other online threats, read and heed below!

  • As software vulnerabilities are the main infection vectors, make sure your computer’s operating system and applications are updated to the latest versions. Install these updates as soon as they become available, as updates often include patches for security flaws.
  • Phishing is another popular way for hackers to spread worms (and other malware). Always be extremely cautious when opening unsolicited emails, especially those from unknown senders that contain attachments or links. Don’t forget to activate your email service’s SPAM filters.
  • Make sure you invest in a strong security solution that can help block these threats. A good product should have anti-phishing technology as well as include defenses against viruses, spyware , ransomware and other online threats. dfndr enterprise is an excellent choice for you or your company, as it uses advances in artificial intelligence to simulate and predict all types of attacks (including all the latest worms).
]]>
<![CDATA[Careful With That QR Code! Five Steps For QR Code Safety]]> https://www.psafe.com/en/blog/careful-with-that-qr-code-five-steps-for-qr-code-safety/ Fri, 11 Mar 2022 18:14:35 +0000 https://www.psafe.com/en/blog/?p=21198 For 20 million people, the temptation proved too hard to resist. For a full minute, a simple QR code ping-ponged back and forth on their television screens during a break in the action at the Super Bowl. Cryptocurrency company Coinbase reportedly paid 14 million dollars for that ad – but clearly, they got their money’s worth: 20 million people were redirected via QR code to their landing page, specially designed for the ad. 

Caution Flags 

The radical simplicity and irresistible pull of the Coinbase spot was the talk of the post-game ad reviews. But out of the din of this discussion came another message — this one from the Federal Bureau of Investigation (FBI). Inc Magazine’s Jason Aten pointed to a warning they had issued a month prior to the big game – the first lines lay out the situation quite clearly:

The FBI is issuing this announcement to raise awareness of malicious Quick Response (QR) codes. Cybercriminals are tampering with QR codes to redirect victims to malicious sites that steal login and financial information.

QR Codes Are Back, And Bigger Than Ever

Once again, it seems that bad actors have seized on a popular trend to help them do their dirty work. A simple technology dating back to the 90’s, QR Codes are on the rise lately – as they’ve become a very effective digital tool for marketers who want to quickly convert mobile phone readers into shoppers and buyers. The Wikipedia entry on QR codes gives you a quick grasp of just how powerful they can be when scanned on a mobile phone:

QR codes may be used to display text to the user, to open a webpage on the user’s device, to add a Card contact to the user’s device, to open a Uniform Resource Identifier (URI), to connect to a wireless network, or to compose an email or text message.

All you have to do is think about how hackers might use that kind of power, and you can quickly see that indiscriminate scanning of QR codes could lead you into some serious trouble. 

Two Primary Sources of QR Code Danger

The first danger with malicious QR codes is the fact that they can transport you seamlessly to a fake website. As with most hacks, the first layer of the transaction seems to be legitimate: the QR code works! The user arrives at a site that has the offer or information they were seeking. 

And this is when many users will let their guard down, and fail to notice telltale signs that the site isn’t legitimate. Super-sweetened offers can also play a role in softening up otherwise careful users. The bad website can be a collection point for private information and financial data, and the path to financial losses and ID Theft is paved.

The second danger is QR codes that include malware themselves. Once again, let’s turn to the FBI for — “just the facts”:

Malicious QR codes may also contain embedded malware, allowing a criminal to gain access to the victim’s mobile device and steal the victim’s location as well as personal and financial information. The cybercriminal can leverage the stolen financial information to withdraw funds from victim accounts.

That’s about as bad as it can get. So, short of forsaking the use of all QR codes — how do you defend yourself?

What Can You Do?

Here are the five steps you can take – we discuss each below in more detail:

  1. Get informed about what QR codes are and what they can do.
  2. Make sure your device has good security software.
  3. Use that security software regularly!
  4. Before scanning any QR code, scan “the situation.” 
  5. Make sure you land where you expected to!

You’ll be glad to know that you’re well on your way to completing the first step. We hope this article has helped in this regard, and if you want to get even more up-to-date on potential threats to you and your mobile device, we highly recommend these two companion articles:

Six Ways That Cybercriminals Try To Take Over Your Device – QR codes are covered here along with several other traps, like WiFi Honeypots, Fake Apps, and even Subtitles in Streaming Apps. Do give it a careful read – lots to learn here.

Can a QR Code Be Used In A Phishing Attack? – If you’ve followed us so far, you know the answer to this question is YES! But hit the link to get more information on how QR codes can bait the hook for hackers’ big Phishing expeditions.

Security Help

If you’re using dfndr security, make sure you activate the anti-hacking feature to protect you from scams and malware. dfndr security PRO plan also has a dedicated Safe App function to help sniff out apps that contain malware, and also provides complete Identity Theft reports should you suspect trouble.

Eyes Up!

But your awareness is always going to be your first line of defense. Remember that QR codes primary benefit is to help you connect to a specific spot on the web without your having to type in a URL. The “fun” of seeing this work is no doubt a major part of the success of that Coinbase ad. 

If you decide you do want to scan a QR code – make sure you can verify it’s from a trusted source, and take a good close look at the surroundings: the copy and design, the context of use. Is the code stuck on a wall outside a club? Or did it come to you via a traceable source like a mass mailing? If you can verify that the code is from a trustworthy source – make sure the landing spot is what you expected it to be.  

Just remember what your friends in the FBI told you: a QR code isn’t a game to be taken lightly — or a Pokemon type game where you have to capture and collect. They serve a very specific function, and they’re more powerful than they look. Treat QR codes with the same caution you’d give to any unknown app or web address.

]]>
<![CDATA[Pharming: Phishing’s Nasty Big Brother]]> https://www.psafe.com/en/blog/pharming-phishings-nasty-big-brother/ Tue, 08 Mar 2022 17:31:21 +0000 https://www.psafe.com/en/blog/?p=21190 Pharming is somewhat less familiar than the term “phishing,” but both are methods employed by hackers to perpetrate fraud and gain illegal access to your private information. 

The ph prefix means that both are…well…phake.

But despite the cute names, the damage that can be wrought with either method is considerable. Identity Theft is the end game for many of these swindles, and as you may know, the long tail effects of ID theft can be personally devastating (and if you’ve never really experienced or read-about just how hard ID Theft can be for individuals, we highly recommend reading through that linked article. Not fun, but essential information).

While phishing attacks are made through phishy emails, pharming is the term applied when the hacker sets a trap in the form of a malevolent website: frequently, an impostor-site posing as a well-known and trusted company site. 

Pharming: Individual User Attacks

Phishing and pharming often go together – and the phishy email lures a single user to a malicious website, where the user enters their private information and the pharmer makes off with it, using it later to sow havoc by deploying it on the real site.  

Sometimes these sites are simply set up like traps on the web – you may have encountered one or more of these by simply misspelling the name of a popular site. The result may be a jarringly different site than what you expected. 

In truth these situations are relatively easy to avoid.  But sometimes the site you’re delivered to can be very close to what you expected, and that’s where real pharming trouble can begin.

Malware can drive pharming too – redirecting you to the substitute site without your awareness or permission. It’s important to remember that hackers are increasingly fond of using techniques of misdirection. You may inherit malware through a new app you download, but the consequences arrive later, when you first log on to your bank-site or try to pay your credit card bill, and the malware takes you to an impostor site to steal that information from you.

DNS Switching  

DNS switching takes the whole pharming idea to a more dangerous height. Whereas the malware or phishing-driven pharming operates at an individual user level, DNS Switching redirects all traffic to a given website to a pharmed-out impostor. 

The malware works within the DNS server and redirects requests to reach the authentic site to the pharming site. These more sophisticated attacks often involve more sophisticated fakery, and the pharming sites can be very convincing.

How To Protect Yourself, Down on The Pharm

As always, there are a few different layers of protection you can enlist to keep yourself from pharming — and the more of them you employ, the safer you’ll be:

Mindset: Your mindset as a user is one of the best defenses you have against hackers. Remember that hackers are fond of using social engineering – which some might refer to as “good old psychology” — to lure users into interactions with iffy emails, sketchy sites, and strange-people on well-known platforms. Keep your guard up, and if somebody, something, or some site asks you for information that your bank or health club or grocery-delivery (etc.) already should have, let that alarm bell go off loudly in your head. Then take three giant steps away from your keyboard. 

If your spider-sense has even an inkling that an email from a friend or a site isn’t the real deal: slow down and check it out. In general: try not to confer the trust you have in a person or company onto any representation made for them on the web. The web is…the web. And it should always be treated with caution.

Unprotected?: Public, unsecured wifi networks really are the devil’s playground.

The upshot is that public networks have chinks in their armour, and hackers use those chinks to “eavesdrop” on your conversations. Information they steal through this technical kind of listening can lead to direct attacks, or…down the road, a phishing or pharming attack tailored just for you. 

S matters: There’s a big difference between http:// and https:// — the difference is that “s,” which stands for secure. When you see the full https://, it means that information on both ends of the website transaction is encrypted and secure. When you don’t – that may not be the case. This is such a widely accepted standard now that the absence of that s should put you on high alert.  

Phishy?: If it looks or sounds phishy, it probably is. It might also be pharmy. Here’s an example of what we mean: in one of the biggest pharming attacks ever launched, a DNS Switching attack on more than 50 financial institutions, the affected users were presented with an error screen that asked them to switch off their anti-malware and any firewall protection they might be running. Many users simply complied, and provided access to the pharming malware to do the rest of the work. 

This obviously relates to our mindset discussion as well, but we wanted to emphasize that even very sophisticated pharming attacks will sometimes rely on users turning off systems of defense: whether it be their own mindset, or settings in place on their computer designed to protect them!

Speaking of Defense…  

Of course one of the essential bits of protective equipment is a good security software solution. dfndr Pro provides several excellent tools to help you protect not only your private information but your physical phone as well. Having that combination of protections is important. 

Pro also offers a Safe App function that enables you to screen any app you might want to try before downloading it, and that can be an excellent first line of protection from malware of all types – including those that are designed expressly to uh, ”take you down on the pharm.” 

With your mindset on high-alert, and your phone protected with a well-designed, and multi-layered security capability, you can move about confidently. Just be careful out there, and try not to get any mud on your shoes!

 

]]>