security - PSafe Blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.1 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png security - PSafe Blog 32 32 <![CDATA[What is worm?]]> https://www.psafe.com/en/blog/what-is-worm/ Wed, 11 May 2022 20:29:16 +0000 https://www.psafe.com/en/blog/?p=21274 Digital worms are among the most serious threats in the wild kingdom of the Internet.

O post What is worm? apareceu primeiro em PSafe Blog.

]]>
In computer security terms, do you know what a “worm” is? Well, you probably know we’re not talking about larvae — but we are indeed talking about parasites. Digital worms are among the most serious threats in the wild kingdom of the Internet.

According to our virus dictionary, a worm is one of the most common forms of malware. They exploit network flaws to spread larger threats and build on an operating system that spreads malicious code to other computers.

Worms can also damage connections, slowing down the internet and computer. Worse still, they can delete files from your hard drive and be difficult to defeat once they have penetrated your system (as they can usually get through most firewalls).

In this post, you will learn more about worms — and how to protect yourself from this threat.

What makes a worm?

A worm is a type of malware that, unlike common viruses , can self-replicate without the need to infect legitimate files, thus creating working copies of themselves. This capability enables worms to easily spread across computer networks and USB drives.

Some worms also spread through email messages, creating malicious attachments and sending them to the hacked account’s contact lists, often in the form of phishing.

How Worms Work

After spreading and gaining access to systems, some worms look for patches and security updates to close the holes they use. This prevents other malware from infecting the system using the same flaw – ensuring the worm’s exclusive control of its domain within the system.

These worms can also delete and modify files. Sometimes the point is just to make copies of itself over and over again – using up system resources (like hard drive space or bandwidth, hogging a shared network). In addition to wreaking havoc on a computer’s resources, worms can also steal data, install a backdoor, and allow a hacker to gain control over a computer and all of its system settings.

Worms are back to being used in SPAM

Popular around 2003 with the Bagle family, worms sent via SPAM to email accounts are once again being used by cybercriminals. The technique often uses zipped, password-protected files to distribute malware.

Because it is password protected, many antivirus programs are not able to scan files, and many security suites do not scan zip files, so they easily pass through the email security gateway.

A recent reappearance of this method for stealing data took place in Italy and was aimed at customers of Grupo Bancario Iccrea. The e-mail contained a password-protected HTML file, but with the access code included in the body of the e-mail.

When clicking, the user was invited to enter the code in the email to access the page. By informing the e-mail password, the user was directed to another page where he or she would enter credit card information, giving a false sense of security.

The reuse of this malware can represent a major threat world-wide, as more and more people have access to computers and are spending time in the virtual world, but are unaware of past threats and ways to protect themselves.

How to know if your computer has worms

If you suspect that your devices are infected with a worm, run a threat scan using your security solution immediately. Even if the verification is negative, follow the steps below.

1. Keep an eye on your hard drive space. Remember: when worms replicate themselves over and over again, they start taking up free space on your computer.

2. Monitor your machine’s speed and performance. Is your device slower lately? Are some of your programs crashing or not working like they used to? This could be a sign that a worm is consuming your processing power.

3. Be on the lookout for new or missing files. A common function of worms is to delete and replace files on a computer.

Main types of worms

The list below presents some of the most popular types of worms:

  • Sobig: emerged in 2003 and was reactivated in 2013, Microsoft offered a reward to discover its creator.
  • Conficker: It is most common on personal computers, blocking access to information security sites and spreading quickly over the network or USB devices. The pest is still active, but it can now be more easily removed by advanced security solutions.
  • Mydoom: appeared in 2004 with rapid propagation and was generated by infected computers and through e-mail messages.
  • Doomjuice: Uses a loophole created by Mydoom to infect computers.

How to protect yourself from worms

Worms are just one example of malicious software. To help protect your computer from them and other online threats, read and heed below!

  • As software vulnerabilities are the main infection vectors, make sure your computer’s operating system and applications are updated to the latest versions. Install these updates as soon as they become available, as updates often include patches for security flaws.
  • Phishing is another popular way for hackers to spread worms (and other malware). Always be extremely cautious when opening unsolicited emails, especially those from unknown senders that contain attachments or links. Don’t forget to activate your email service’s SPAM filters.
  • Make sure you invest in a strong security solution that can help block these threats. A good product should have anti-phishing technology as well as include defenses against viruses, spyware , ransomware and other online threats. dfndr enterprise is an excellent choice for you or your company, as it uses advances in artificial intelligence to simulate and predict all types of attacks (including all the latest worms).

O post What is worm? apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Careful With That QR Code! Five Steps For QR Code Safety]]> https://www.psafe.com/en/blog/careful-with-that-qr-code-five-steps-for-qr-code-safety/ Fri, 11 Mar 2022 18:14:35 +0000 https://www.psafe.com/en/blog/?p=21198 Five Steps to Reduce QR Code Risk! Step one? Read this article…

O post Careful With That QR Code! Five Steps For QR Code Safety apareceu primeiro em PSafe Blog.

]]>
For 20 million people, the temptation proved too hard to resist. For a full minute, a simple QR code ping-ponged back and forth on their television screens during a break in the action at the Super Bowl. Cryptocurrency company Coinbase reportedly paid 14 million dollars for that ad – but clearly, they got their money’s worth: 20 million people were redirected via QR code to their landing page, specially designed for the ad. 

Caution Flags 

The radical simplicity and irresistible pull of the Coinbase spot was the talk of the post-game ad reviews. But out of the din of this discussion came another message — this one from the Federal Bureau of Investigation (FBI). Inc Magazine’s Jason Aten pointed to a warning they had issued a month prior to the big game – the first lines lay out the situation quite clearly:

The FBI is issuing this announcement to raise awareness of malicious Quick Response (QR) codes. Cybercriminals are tampering with QR codes to redirect victims to malicious sites that steal login and financial information.

QR Codes Are Back, And Bigger Than Ever

Once again, it seems that bad actors have seized on a popular trend to help them do their dirty work. A simple technology dating back to the 90’s, QR Codes are on the rise lately – as they’ve become a very effective digital tool for marketers who want to quickly convert mobile phone readers into shoppers and buyers. The Wikipedia entry on QR codes gives you a quick grasp of just how powerful they can be when scanned on a mobile phone:

QR codes may be used to display text to the user, to open a webpage on the user’s device, to add a Card contact to the user’s device, to open a Uniform Resource Identifier (URI), to connect to a wireless network, or to compose an email or text message.

All you have to do is think about how hackers might use that kind of power, and you can quickly see that indiscriminate scanning of QR codes could lead you into some serious trouble. 

Two Primary Sources of QR Code Danger

The first danger with malicious QR codes is the fact that they can transport you seamlessly to a fake website. As with most hacks, the first layer of the transaction seems to be legitimate: the QR code works! The user arrives at a site that has the offer or information they were seeking. 

And this is when many users will let their guard down, and fail to notice telltale signs that the site isn’t legitimate. Super-sweetened offers can also play a role in softening up otherwise careful users. The bad website can be a collection point for private information and financial data, and the path to financial losses and ID Theft is paved.

The second danger is QR codes that include malware themselves. Once again, let’s turn to the FBI for — “just the facts”:

Malicious QR codes may also contain embedded malware, allowing a criminal to gain access to the victim’s mobile device and steal the victim’s location as well as personal and financial information. The cybercriminal can leverage the stolen financial information to withdraw funds from victim accounts.

That’s about as bad as it can get. So, short of forsaking the use of all QR codes — how do you defend yourself?

What Can You Do?

Here are the five steps you can take – we discuss each below in more detail:

  1. Get informed about what QR codes are and what they can do.
  2. Make sure your device has good security software.
  3. Use that security software regularly!
  4. Before scanning any QR code, scan “the situation.” 
  5. Make sure you land where you expected to!

You’ll be glad to know that you’re well on your way to completing the first step. We hope this article has helped in this regard, and if you want to get even more up-to-date on potential threats to you and your mobile device, we highly recommend these two companion articles:

Six Ways That Cybercriminals Try To Take Over Your Device – QR codes are covered here along with several other traps, like WiFi Honeypots, Fake Apps, and even Subtitles in Streaming Apps. Do give it a careful read – lots to learn here.

Can a QR Code Be Used In A Phishing Attack? – If you’ve followed us so far, you know the answer to this question is YES! But hit the link to get more information on how QR codes can bait the hook for hackers’ big Phishing expeditions.

Security Help

If you’re using dfndr security, make sure you activate the anti-hacking feature to protect you from scams and malware. dfndr security PRO plan also has a dedicated Safe App function to help sniff out apps that contain malware, and also provides complete Identity Theft reports should you suspect trouble.

Eyes Up!

But your awareness is always going to be your first line of defense. Remember that QR codes primary benefit is to help you connect to a specific spot on the web without your having to type in a URL. The “fun” of seeing this work is no doubt a major part of the success of that Coinbase ad. 

If you decide you do want to scan a QR code – make sure you can verify it’s from a trusted source, and take a good close look at the surroundings: the copy and design, the context of use. Is the code stuck on a wall outside a club? Or did it come to you via a traceable source like a mass mailing? If you can verify that the code is from a trustworthy source – make sure the landing spot is what you expected it to be.  

Just remember what your friends in the FBI told you: a QR code isn’t a game to be taken lightly — or a Pokemon type game where you have to capture and collect. They serve a very specific function, and they’re more powerful than they look. Treat QR codes with the same caution you’d give to any unknown app or web address.

O post Careful With That QR Code! Five Steps For QR Code Safety apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Pharming: Phishing’s Nasty Big Brother]]> https://www.psafe.com/en/blog/pharming-phishings-nasty-big-brother/ Tue, 08 Mar 2022 17:31:21 +0000 https://www.psafe.com/en/blog/?p=21190 Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming accidents!

O post Pharming: Phishing’s Nasty Big Brother apareceu primeiro em PSafe Blog.

]]>
Pharming is somewhat less familiar than the term “phishing,” but both are methods employed by hackers to perpetrate fraud and gain illegal access to your private information. 

The ph prefix means that both are…well…phake.

But despite the cute names, the damage that can be wrought with either method is considerable. Identity Theft is the end game for many of these swindles, and as you may know, the long tail effects of ID theft can be personally devastating (and if you’ve never really experienced or read-about just how hard ID Theft can be for individuals, we highly recommend reading through that linked article. Not fun, but essential information).

While phishing attacks are made through phishy emails, pharming is the term applied when the hacker sets a trap in the form of a malevolent website: frequently, an impostor-site posing as a well-known and trusted company site. 

Pharming: Individual User Attacks

Phishing and pharming often go together – and the phishy email lures a single user to a malicious website, where the user enters their private information and the pharmer makes off with it, using it later to sow havoc by deploying it on the real site.  

Sometimes these sites are simply set up like traps on the web – you may have encountered one or more of these by simply misspelling the name of a popular site. The result may be a jarringly different site than what you expected. 

In truth these situations are relatively easy to avoid.  But sometimes the site you’re delivered to can be very close to what you expected, and that’s where real pharming trouble can begin.

Malware can drive pharming too – redirecting you to the substitute site without your awareness or permission. It’s important to remember that hackers are increasingly fond of using techniques of misdirection. You may inherit malware through a new app you download, but the consequences arrive later, when you first log on to your bank-site or try to pay your credit card bill, and the malware takes you to an impostor site to steal that information from you.

DNS Switching  

DNS switching takes the whole pharming idea to a more dangerous height. Whereas the malware or phishing-driven pharming operates at an individual user level, DNS Switching redirects all traffic to a given website to a pharmed-out impostor. 

The malware works within the DNS server and redirects requests to reach the authentic site to the pharming site. These more sophisticated attacks often involve more sophisticated fakery, and the pharming sites can be very convincing.

How To Protect Yourself, Down on The Pharm

As always, there are a few different layers of protection you can enlist to keep yourself from pharming — and the more of them you employ, the safer you’ll be:

Mindset: Your mindset as a user is one of the best defenses you have against hackers. Remember that hackers are fond of using social engineering – which some might refer to as “good old psychology” — to lure users into interactions with iffy emails, sketchy sites, and strange-people on well-known platforms. Keep your guard up, and if somebody, something, or some site asks you for information that your bank or health club or grocery-delivery (etc.) already should have, let that alarm bell go off loudly in your head. Then take three giant steps away from your keyboard. 

If your spider-sense has even an inkling that an email from a friend or a site isn’t the real deal: slow down and check it out. In general: try not to confer the trust you have in a person or company onto any representation made for them on the web. The web is…the web. And it should always be treated with caution.

Unprotected?: Public, unsecured wifi networks really are the devil’s playground.

The upshot is that public networks have chinks in their armour, and hackers use those chinks to “eavesdrop” on your conversations. Information they steal through this technical kind of listening can lead to direct attacks, or…down the road, a phishing or pharming attack tailored just for you. 

S matters: There’s a big difference between http:// and https:// — the difference is that “s,” which stands for secure. When you see the full https://, it means that information on both ends of the website transaction is encrypted and secure. When you don’t – that may not be the case. This is such a widely accepted standard now that the absence of that s should put you on high alert.  

Phishy?: If it looks or sounds phishy, it probably is. It might also be pharmy. Here’s an example of what we mean: in one of the biggest pharming attacks ever launched, a DNS Switching attack on more than 50 financial institutions, the affected users were presented with an error screen that asked them to switch off their anti-malware and any firewall protection they might be running. Many users simply complied, and provided access to the pharming malware to do the rest of the work. 

This obviously relates to our mindset discussion as well, but we wanted to emphasize that even very sophisticated pharming attacks will sometimes rely on users turning off systems of defense: whether it be their own mindset, or settings in place on their computer designed to protect them!

Speaking of Defense…  

Of course one of the essential bits of protective equipment is a good security software solution. dfndr Pro provides several excellent tools to help you protect not only your private information but your physical phone as well. Having that combination of protections is important. 

Pro also offers a Safe App function that enables you to screen any app you might want to try before downloading it, and that can be an excellent first line of protection from malware of all types – including those that are designed expressly to uh, ”take you down on the pharm.” 

With your mindset on high-alert, and your phone protected with a well-designed, and multi-layered security capability, you can move about confidently. Just be careful out there, and try not to get any mud on your shoes!

 

O post Pharming: Phishing’s Nasty Big Brother apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Avoid the Tinder Swindler: how to date online safely]]> https://www.psafe.com/en/blog/avoid-the-tinder-swindler-how-to-date-online-safely/ Tue, 22 Feb 2022 14:18:16 +0000 https://www.psafe.com/en/blog/?p=21174 Tinder Swindler: A Scammer By Any Name How To Protect Yourself on Tinder and Online

O post Avoid the Tinder Swindler: how to date online safely apareceu primeiro em PSafe Blog.

]]>
Good con artists have a strange relationship with emotion: many of them demonstrate an almost uncanny ability to manipulate and elicit emotions in others, yet they’re often detached from their own emotions. This frightening combination is in evidence throughout the recent independent film sensation The Tinder Swindler.

The film tells the story of a conman who uses the Tinder app to insinuate himself into the lives of three female victims. In the film, Simon Leviev sets up elaborate romantic cons to appear as a wealthy diamond heir, then uses the trust he has gained to steal information, then money – only to use that money to fund the con for his next victim.

It’s a taut and dramatically told story, but without a clear moral or ending. (The New York Post has reported that Leviev has signed with a Hollywood agent, and “wants his own dating show.”)   

How To Stay Safe: Five Scammer Prevention Keys

But the moral for users of Tinder — and social media in general — are still the same: proceed with caution!  Below are a Five Keys to help you stay safe as you navigate dating apps like Tinder — they’re also useful guidelines for people you might meet on any other social app like Facebook:

  • Do some research — and take your time. Before meeting in real life with anyone you’ve met online, take the time to do a little background research and find out if the person you’re speaking to is who they say they are. 
  • Consider bringing a friend for the first date(s), and meet in public. Yes, this will keep you safer, and it might also help provide a more casual atmosphere where you can learn a little bit more about your new friend.
  • Be sensitive about peculiar information requests. Spoiler alert: The Tinder Swindler orchestrated reasons to get Passport information, and then quickly put it to nefarious use. Whatever the reason given, a quick pivot to requests for detailed personal data is always a sure warning sign, especially in a new relationship.
  • Keep your purse, phone, and ID’s close. Don’t overlook simple physical sources of data like these. Don’t leave them unattended. 
  • If you have any suspicions, check in to things. If anything seems odd in terms of your interactions, don’t bury your head in the sand. A good security solution like dfndr security can help you track where your data is going and also protect your physical phone from theft. Stay on top of your bank and credit card accounts.

Remember: Most Scammers Don’t Do A Lot of Romancing

The Tinder Swindler is also a healthy reminder that most scams are not quite as elaborate as those cooked up by Simon Leviev.  But most scams operate on the same human emotions of romance and self-interest. 

Set some clear rules for yourself in the dating world – and also for when you’re answering emails and text messages — or when you’re looking for work on a job site.  If it looks too good to be true – it probably is! 

    

O post Avoid the Tinder Swindler: how to date online safely apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Joker Malware is Back (And It’s No Joke)]]> https://www.psafe.com/en/blog/joker-malware-is-back-and-its-no-joke/ Mon, 20 Sep 2021 22:17:38 +0000 https://www.psafe.com/en/blog/?p=20978 During the past few months, Joker has become one of the most active Android malware infections.

O post Joker Malware is Back (And It’s No Joke) apareceu primeiro em PSafe Blog.

]]>
Old malware never dies — it just morphs into something more devious and dangerous — and this pattern is playing out with “Joker” malware, which was first identified in 2016. In 2021, it’s back and more diverse and devious than ever.

During the past few months, Joker has become one of the most active Android malware infections. Joker rides on the coat-tails of seemingly legitimate apps, then covertly signs up users for pricey subscription services. It can also steal SMS messages, contact lists, and device information. 

Joker variations seem to arrive in batches, with a fresh batch leeching onto dozens of apps as recently as September. 

Joker Infiltrates The App Store

“One of the best ways to avoid malware and trojan apps is to use Google’s sanctioned app store,” says Emilio Simoni, PSafe’s dfndr lab Research Director, “but unfortunately, Joker has managed to disguise itself and mutate so profusely, that it has found its way on to several apps within the official Google Play marketplace. Of course third party app stores are also offering Joker-tainted apps — so the best protection is going to be a strong security app that sniffs out malware-tainted apps immediately, like our dfndr security Pro.”

Google removes the offending apps as soon as they’re reported — but the high rate of variation and concealment with this particular trojan keeps bringing new specimens on board.

Delay Tactics

“Part of what makes Joker so effective is that it waits to take effect,” Simoni remarks. “After the trojan-app is downloaded (many of these are knockoffs of better-known apps) it waits to drop a very small packet of code, it then reaches out to the server that loads the malware that does all the dirty work.” 

What Can You Do To Stay Safe?

Good hygiene with your digital devices includes:

  • Installing only the apps that you need and use. Loading up your device with as many apps as you can imagine using is a hazardous path. 
  • Being wary. Look for apps from developers you know and trust.  Do a little background checking and make sure that cool new app is coming from a known and trusted provider.
  • Cleaning house periodically. To keep the number of apps you use to a minimum, do a periodic review of the apps on your phone and delete the ones you’re not using. 

“Good security habits are always the first step,” Simoni observes, “but we can see that with truly devious malware like Joker, personal vigilance may not be enough.  When a piece of malware is mutating on a monthly basis, you need a dedicated security solution to help keep you safe.” 

The Best Defense Begins BEFORE Dangerous Apps Are Downloaded

An excellent way to protect yourself is to use a security application like dfndr security Pro, which has a dedicated Safe App Installer that can tell you if the app you’re about to install has been identified as malware.  This is exactly what the Safe App Installer does: it AUTOMATICALLY protects you from malware and apps known to compromise your data — before you even install them.

More Protection for Your Digital Life

Safe App Installer is only one of the key features dfndr security Pro offers.  It also comes with a full suite of security capabilities that can protect you not only from digital threats, but from thieves “IRL” as well.

Beyond Safe App, there are four additional features dfndr security Pro offers to protect you and make your digital life easier:

Anti-theft protection: Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock  it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.

Privacy Protection: You can locate on a map where your app data is going and how it might be used by third-parties.

Unlimited Identity Theft Reports: These reports provide “perimeter defense,”looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 10 billion compromised credentials. 

Ad-Free: As an extra bonus, Pro is totally ad-free.

Get The Protection You Need Today

Click here to download dfndr security and free trial dfndr security Pro to put all of these features to work securing your phone, your data, and your digital life. dfndr security Pro offers a full suite of protection, constantly updated, to make sure “you’re safe out there.”

O post Joker Malware is Back (And It’s No Joke) apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Be Careful: There’s A Malware Pandemic Underway Too…]]> https://www.psafe.com/en/blog/be-careful-theres-a-malware-pandemic-underway-too/ Wed, 15 Apr 2020 17:31:06 +0000 https://www.psafe.com/en/blog/?p=20588 During the Coronavirus pandemic, one group of people is carrying on as they always have: hackers. 

O post Be Careful: There’s A Malware Pandemic Underway Too… apareceu primeiro em PSafe Blog.

]]>
The Coronavirus pandemic has turned the world upside down in a matter of weeks. But one group of people is carrying on as they always have: hackers. 

If anything, they’ve only grown more brazen and active. “Overnight, the pandemic has become the number one subject on everyone’s mind,” explains Emilio Simoni, Research Director at dfndr lab, “and that’s irresistible to hackers and scammers.”

Simoni continues: “The first job of any scammer is to get your attention: to stop you on your path and pull your interest toward their offer or message.  The coronavirus pandemic has created a topic that everyone is intensely interested in, all over the world. This has made the scammer’s job much, much easier. And they’re making use of both the intensity of interest and the global breadth of exposure.” 

An Explosion of Coronavirus Malware

Under Simoni’s direction, the experts at the dfndr lab have found more than 227 different Coronavirus-content scams. Most of them offer a dashboard which falsely promises users access to a real-time map for global or local surveillance of COVID-19 cases. As soon as they’re downloaded, they act as ransomware. Typically, they lock the home screen and blackmail the victim into paying a specified amount of money to “unlock” the phone. The ransomware messages are often intimidating, claiming access to photos and private information, like this one:

SuperVPN: 100 Million Users, Finally Deleted From The Google Store

But coronavirus scams aren’t the only vulnerability out there. As Emilio Simoni explains: “You need security solutions that look out for more than scams and hackers. Even apps that aren’t clearly malware or ransomware can totally compromise your security. SuperVPN is a perfect case in point: it’s security problems have been known for over a year, but the app has been removed from the Google Play store very recently.”

SuperVPN offered users the ability to browse the internet as if they were coming from a different country, providing access to sites and functions that they wouldn’t normally be able to reach. For the app to work, an exchange of information between the device and the app was required. That process of exchange was loaded with serious vulnerabilities, and resulted in the theft of data like passwords and credit card numbers. Beyond its security issues, SuperVPN also appeared to violate Google Play’s algorithm in order to get more installs. They were very successful, racking up more than 100 million users before finally being removed.

“If you know anyone who has downloaded and installed SuperVPN,” Simoni remarks, “make sure they remove the app as soon as possible.”

Above is an illustration of how SuperVPN compromised user’s secure data.  (Image: VPNPro)

Protect Yourself From Hackers AND Vulnerabilities

One of the best ways to protect your information now is to upgrade your dfndr app (if you haven’t already) to dfndr Pro.  (Here’s a link where you can learn more, and download Pro if you decide it’s right for you.)

As apps with hidden “cracks” in security like SuperVPN illustrate, you have to be not only informed enough to resist the hackers and scams, you also have to have proven technical tools to keep your devices safe.

As Emilio Simoni explains it: “As we publicize these cases of hackers and scams, we want to be cautious and let people know that all data breaches or “malware” won’t always follow a specific pattern. Lots of data breaches happen with very reputable software makers or business transactions. There are many ways your data can be compromised. To be safe, you need more than your own human intelligence at work.” 

This is why dfndr Pro offers a full suite of security capabilities:

Unlimited Identity Theft Reports: These provide your “outer-perimeter” defense, looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 4 billion compromised credentials. 

Anti-theft protection: Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock  it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.

Safe App Installer: Protects you from apps known to have had data breaches — before you install them.

App Privacy Scan: You can locate on a map where your app data is going and how it might be used by third-parties.

Ad-Free: As an extra bonus, Pro is totally ad-free.

Stay Vigilant!

With dfndr Pro in your toolbox, the rest is a matter of staying as aware as you can and protecting yourself and your family.  Consider adopting these rules for use of digital devices in your home:

  • Take extra care with any link or article about coronavirus. Use reliable sources, such as legitimate government websites, to get real, fact-checked stories and information on COVID-19.
  • Don’t click on links sent to you via email from unknown people. 
  • Look very closely at email addresses and names: If the source looks or sounds like someone you know but the name or email address seems even slightly off…stay away! If the name is right but the message is brief or confused, or not at all like the person you know…your friend could be the victim of a hack themselves.
  • Only download or install software from trusted sources. Make sure you double check url’s! 

Stay safe! We will keep you up to date on all the latest we hear about scams of all kinds: coronavirus-related, and otherwise. Until then, stay safe and keep your loved ones safe and informed too. 

Finally,  if you or someone you know is a healthcare worker, please accept (or pass on) our grateful thanks.  

O post Be Careful: There’s A Malware Pandemic Underway Too… apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Is iOS safe? Discover Some Secrets About your iPhone]]> https://www.psafe.com/en/blog/is-ios-safe/ Wed, 11 Mar 2020 20:00:58 +0000 https://www.psafe.com/en/blog/?p=20523 Ever wondered if iOS is safe? Learn how to recognize and preventing problems with your iPhone.

O post Is iOS safe? Discover Some Secrets About your iPhone apareceu primeiro em PSafe Blog.

]]>
You have probably noticed that smartphones are dominating the market – and of course, everyday life. Although Android had nearly outrun Apple, iOS has gained popularity again in recent times. Getting the most expensive and desired model of the moment may imply better security and a higher quality phone, but what many do not know is that cybercriminals are constantly refining their strategies to create and spread increasingly sophisticated attacks. Which begs the question: Is iOS safe?

Is iOS Safe?

Every mobile operating system has its irregularities and flaws. However, many people still believe that iOS is 100% secure and its technology is not affected by scams or malware.

According to Emilio Simoni, director of dfndr lab, PSafe’s digital security lab, says that having an iOS doesn’t mean you can ignore all threats and risks on the internet, such as phishing, malware, and ramsonware. It’s important to know how to protect your iPhone from viruses, circumvent vulnerabilities, and watch over the privacy and security of your data.

According to a Forbes report, a survey revealed that 38% of all iOS apps contain critical vulnerabilities, the vast majority due to inaccuracies found in the early stages of app development. These types of flaws can give opportunities to hackers who are facilitating scams and consequently compromising the protection of Apple users. The number may be shocking, but that’s just the tip of the iceberg.

Symptoms of a Broken iOS

As the popular phrase says, “Prevention is better than the cure.” We’ve listed 5 characteristics of a broken iOS that are easy to spot:

Your Battery Doesn’t Last Long
When it is noticeable that battery life has shortened significantly with recent use or your iPhone takes longer to fully charge, malware could be a possibility. Another indicator may be if your phone feels unusually warm, which almost always points to software problems. If your device is warming up even without being used, it may mean that a virus is acting in the background.

Phone Performance Diminishes
The presence of malware on any system makes it operate poorly. It’s important to pay attention to any performance issues with your iPhone. Unusual slowdowns, apps that suddenly close or crash excessively are some indications that something is not right.

Your Data Runs Out
If you notice a spike in your data charges, it may be that there are malicious apps that run even with the screen locked, draining data sneakily from your phone.

There’s Non-User Activity
Links, messages, posts, likes, and shares that you did not perform may point to an identity theft case. If a hacker has access to your device, they also have access to all the accounts linked to it.

Phone Makes Strange Sounds
During a call, a compromised iPhone may make strange background noises, often described as echoes, squeaks, or clicks. These sounds can be caused by a weak signal, interference, or the worst scenario possible: someone is listening to your microphone. Be aware of any odd sounds your iPhone makes when not in use.

How to Protect my iOS from Scams

The dfndr lab experts have put together key measures to keep your iPhone safe: 

Choose a Strong Password
Always, always create good passwords for your accounts. They should be alphanumeric (composed of letters, numbers, and symbols). Also, it’s important that you have a different password for each online account. Avoid sequences like “1234abc” or important dates. Security experts also recommend changing your password every 30 days.

Keep Your Operating System Current
It’s essential that iOS is always the latest version, as hackers occasionally encounter exploitable coding flaws, making it easier to access personal data. Apple offers periodic updates as a way to correct these inconsistencies, so in addition to protecting your iPhone from viruses, it also improves performance overall.

Don’t Click on Suspicious Links
Be wary of links that offer great deals and discounts, especially if they are advertised in messaging apps such as WhatsApp. In addition, fake news also presents a certain risk that goes well beyond misinformation. Always research the information to make sure it’s from credible sources. When in doubt, do a link analysis, such as the offered by dfndr lab. The link checker lets you know if a site is dangerous without having to access it.

Use Trusted Antivirus
There is controversy about using security applications for the iPhone. But, according to Simoni, there will always be cybercriminals looking for vulnerabilities, whether on the Android or iOS system. It’s vital to keep a good security system installed on your phone to keep it secure. dfndr security is available for Android and iOS provides several tools to protect you against identity theft, malicious links, scams, and fake websites. You can download dfndr security for free here.

O post Is iOS safe? Discover Some Secrets About your iPhone apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Nutty Malware Can Wipe Out Two-Factor Authentication]]> https://www.psafe.com/en/blog/two-factor-authentication-malware-linkedin-phishing-scam/ Mon, 10 Sep 2018 20:29:32 +0000 https://www.psafe.com/en/blog/?p=19360 This once tried and true security method is under fire by hackers.

O post Nutty Malware Can Wipe Out Two-Factor Authentication apareceu primeiro em PSafe Blog.

]]>
Two-factor authentication has garnered plenty of praise as one of the most secure ways to sign into an online or mobile account without getting hacked. However, cybercriminals have now developed a piece of malware that can wipe out two-factor authentication and steal your data through a phishing email.

Read More: 5 Tips to Determine if an Email is Actually a Phishing Scam

While you should still implement this type of authentication on all your accounts, protect yourself further with an antiphishing app that adds another layer of security to your device and data. With dfndr security, your phone will have an anti -hacking feature that protects your device and warns you of malicious links, blocks them, and prevents you from falling for phishing emails.

Here’s what you should know about the malware that can wipe two-factor authentication.

Not as Powerful as it Looks
Security researchers released a video that shows how easy it is to take over an account or someone’s personal information, even with this type of authentication. The video revealed a phishing email with a bit of code that can steal or compromise the login information of a user by placing the code into a login box.

Fraudulent LinkedIn Email
The phishing scam sends what appears to be a legitimate LinkedIn email showing that someone is trying to connect with them through the social media site. The researchers showed that if you look closely, the return address of the email is not correct as it’s actually a spoofed version of LinkedIn.

What Happens Next?
If the target falls for the phishing email and clicks the “interested” button, the malware will then be downloaded onto the victim’s device. The email then takes the victim to the real LinkedIn site where they log in their information to complete the connection process, including having the site send an access code to the account holder’s phone.

While this is going on, the malware in the background has gained control of the email and password linked with the victim’s account, along with the session cookie. The criminal can then use the victim’s information to log into their account, even without two-factor authentication and without the victim’s device.

Scary Stuff! What Should I Do?
Naturally, two-factor authentication will not help you at this stage, so the best thing you can do is download an antivirus app like dfndr security that has antiphishing technology, but don’t just leave it up to a security app, be sure to always check emails closely. The sender address, how the email is composed (language and punctuation), and the urgency level are some clues to whether or not an email is legitimate.

O post Nutty Malware Can Wipe Out Two-Factor Authentication apareceu primeiro em PSafe Blog.

]]>
<![CDATA[Is Facebook’s New Phishing Tool Effective?]]> https://www.psafe.com/en/blog/is-facebooks-new-phishing-tool-effective/ Mon, 23 Jul 2018 23:00:12 +0000 https://www.psafe.com/en/blog/?p=18789 Facebook has a new phishing tool, but does it really help you fight against hacker threats?

O post Is Facebook’s New Phishing Tool Effective? apareceu primeiro em PSafe Blog.

]]>
With phishing scams continuing to rise in volume, Facebook is taking a stand and getting into the hacker fighting game by introducing a new tool that cracks down on malicious look-alike websites. The tool could be useful for stopping you from opening fake websites, but it may not do everything.

Read More: Google Introduces Over 20 New Security Features to Protect Users

You still need a security app on your device to fully protect yourself from phishing scams. Download dfndr security and you can block phishing attempts by activating the anti-hacking feature. With advanced AI built in — this feature can block attacks coming from your web browser, SMS, or chat apps.

Get dfndr security now

The Facebook phishing tool has some advantages, particularly in identifying homograph attacks. Uh, what are those you might ask?  

Homograph Attacks
Some phishing attacks come in the form of a homograph attack. Hackers create websites with domain names that are almost identical to a brand name site, with the sole purpose of fooling someone and getting them to unknowingly input login credentials.

The only way to tell a site is fake is by examining the name of the site. A fake one usually has a letter or a punctuation mark out of place. Unless you’re watching closely, you could easily be fooled. This is where the Facebook tool comes in.

What the Tool Does
Named Certificate Transparency Monitoring, the tool is a Facebook-hosted application that any webpage owner can access for free with a Facebook account. The tool has been around since 2016 but it was recently updated it, allowing webmasters to detect homograph domains that are spoofs of their websites.

Webmasters add their domain to the tool’s dashboard which will scan the public Certificate Transparency (CT) logs. The logs have information about new domains that recently got an SSL certificate. The tool will then warn website owners about fake sites in the CT logs that use a similar name to theirs.

Will the Tool Help You Really?
As someone concerned about your security, the Facebook tool can help you identify phony websites, but in the end, it’s really for domain owners to suss out imposters. While the tool is useful, it will not actively block phishing scams lurking out there.

Once again, it’s wise to take security into your own hands, and have an antivirus app downloaded and ready to be your eyes and ears against hacking attempts.

O post Is Facebook’s New Phishing Tool Effective? apareceu primeiro em PSafe Blog.

]]>
<![CDATA[How to Hide Private Files on Your Computer or Smartphone]]> https://www.psafe.com/en/blog/how-to-hide-private-files-on-your-computer-or-smartphone/ Mon, 23 Jul 2018 22:00:15 +0000 https://www.psafe.com/en/blog/?p=18701 We all have information that we’d rather keep hidden, but what’s the best way to store your data from wandering eyes?

O post How to Hide Private Files on Your Computer or Smartphone apareceu primeiro em PSafe Blog.

]]>
Organizing data is sometimes the last thing we want to deal with, but if you have critical financial documents or collections of embarrassing party photos lingering around, these are the types of files you should keep private in case of snoops or hackers (it does happen!). Having a passcode on your device is smart, but it’s not always enough if you share your computer or phone with friends and family. Be even smarter and limit access to your hidden world with the following tips.

Windows
A simple trick for Windows is to merely place your sensitive information within a folder and then mark the folder as ‘hidden,’ which will hide it within the file explorer. To hide a folder, right click on the folder and select the properties option. Once the properties dialogue is open, ensure there is a checkmark next to the hidden label – that’s all there is to this method! When you want to view that hidden folder, simply select the view tab within the file explorer and check the option to display hidden items.

Read More: 3 Private Messenger Apps That’ll Keep It Confidential

MacOS
The process isn’t as easy on Mac and does involve a bit of time in the Terminal application. If you’re unfamiliar with using Terminal, we suggest checking out a quick tutorial first. Start by opening the Terminal app from your Applications folder and navigate to the directory in which your folder is placed. Once you are within the proper directory type the following command, followed by the enter key,’ to hide the folder: “chflags hidden [name of folder].” For example, if we have a folder named ‘photos’ which we want to keep hidden, we would type: “chflags hidden photos.”

Android
Due to the open nature of the Android platform, one of the best options for hiding sensitive data is a third-party solution. One such option is dfndr vault, an app that easily allows you to create a hidden gallery of photos and videos; it even offers a feature known as applock, which can prevent access to certain apps by letting you add a secure passcode. No need to worry anymore about friends snooping around your Tinder profile or co-workers discovering embarrassing snapshots. Android users can also take advantage of dfndr performance, which has a ‘quick cleaner’ feature to remove any private information that might be in your device’s temporary files.

iOS
If you’re an iPhone or iPad user, you can choose to add your private photos or videos to a ‘hidden gallery’ built into the device. Simply visit your Photo app and navigate to the media you wish to hide, once there tap the share button (the square with the upward facing arrow), and select hide from the menu. The photo you just chose to hide will no longer be viewable from the main camera roll or any of the adjacent photo features. To view the private collection, head to your albums and locate the folder named Hidden. Sadly this option won’t keep the most curious of individuals out, but it will prevent any private images from popping up while scrolling through your camera roll.

O post How to Hide Private Files on Your Computer or Smartphone apareceu primeiro em PSafe Blog.

]]>