Categories: Security

Why You Should Be Worried About Password Phishing on Android

Like ransomware, phishing scams and social engineering attacks are on the rise this year. The recent scams are becoming far more clever, with hackers learning more about their victims before they strike. This helps them to carry out a far more effective attack. Still, some of the most common and effective password phishing scams include spoofing a bank’s website or an email login page. To stay protected from phishing attacks while online, activate Anti-Hacking:

DFNDR’s Anti-Hacking feature will keep you safe online. It will block you from malicious websites and phishing attempts designed to steal your account information or money. Once this feature is activated, you’ll also receive warnings about deceptive websites so that you never enter your account information on an unsafe site. With Anti-Hacking you’ll be fully protected against password phishing on your Android.

Read More: The 7 Password Mistakes You Might Be Making

How Common is Password Phishing on Android?
Think about the progress that app developers have made over the years, and how advertisers are no longer having trouble displaying ads on smartphones. Malware and malicious attacks have made progress, too. It was only a matter of time before password phishing increased on Androids — and it will likely continue to do so.

Take, for example, the recent Google Docs phishing scam. In this phishing scam, Gmail users would receive a link to a Google Doc from one of their contacts or a seemingly legitimate person. After clicking the link, they would then be sent to a real Google page, where they’d be tricked into giving access to a third-party “Google Docs” app that would request access to all of their account information. Google has since responded to the attack and has issued an update for their Android app to make the app more secure. Unfortunately, Gmail is still vulnerable to future phishing attacks of a similar nature. The attack was so successful because it used real Google pages. This is why it’s important to use Anti-Hacking to ensure you’re always protected — such as when a phishing attempt goes undetected by Google.

Another common password phishing scheme involves the Cloak & Dagger malware. This malware is downloaded onto an Android when you download a malicious app from the Play store. Once it has infected your device, it can then spoof your Android’s appearance in order to carry out phishing attacks. This malware has been able to infect older Android operating systems in addition to the latest operating system, Nougat. As a reminder, you should always pay attention to the language, design, and reviews of an app before downloading it. In order to ensure that your device is free of hidden malware, use Full Virus Scan to check your phone and SD card for threats:

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago