{"id":10531,"date":"2017-04-28T09:00:24","date_gmt":"2017-04-28T14:00:24","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=10531"},"modified":"2017-04-28T12:29:21","modified_gmt":"2017-04-28T17:29:21","slug":"number-one-mobile-malware-threat-2016","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/number-one-mobile-malware-threat-2016\/","title":{"rendered":"This Was the Number One Mobile Malware Threat of 2016"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There are so many different types of malware floating out there in cyberland. New scams and viruses are continuously trying to compromise your smartphone \u2014 and your personal information. You should regularly scan your device to check for the latest security threats, so that you can catch any threats before they cause too much damage. Use DFNDR\u2019s Full Virus Scan to check your phone and your SD card for malware:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_full\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">Further, DFNDR\u2019s Advanced Protection feature will help you to keep your phone protected from security threats even if your phone is stolen or lost. If you do lose your phone, Advanced Protection will make sure that hackers won\u2019t be able to disable DFNDR and gain access to your personal information. Click here to reinforce the security of your phone:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/advancedProtection\" rel=\"attachment wp-att-10532\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-10532\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/reinforce-your-security-300x54.jpg\" alt=\"Profissional de QA\" width=\"300\" height=\"54\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/reinforce-your-security-300x54.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/reinforce-your-security.jpg 435w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/need-know-fileless-malware\/\"><b>What You Need to Know About Fileless Malware<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to malware, there are some types that are more popular at a given time than others. That\u2019s why it\u2019s important to stay up-to-date on the latest scams and viruses so that you\u2019ll be safer online and avoid downloading malware that will infect your device. So, what was the most common malware threat of 2016 for Android devices? It was ransomware.<\/span><\/p>\n<p><b>What is Ransomware?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware is when a user\u2019s computer or phone files are encrypted \u2014 made unreadable \u2014 by a hacker until the user pays a ransom. Hackers like ransomware because it\u2019s so effective: data is encrypted by a nearly unbreakable algorithm. That\u2019s why so many people and businesses end up paying the ransom: they can\u2019t figure any way around it.<\/span><\/p>\n<p><b>How Common Was Ransomware in 2016? <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Last year, ransomware payloads \u2014 or the amount of money users gave to spam-based schemes \u2014 started at about 20% of the total amount in January of 2016. But by November of 2016, ransomware accounted for more than 65% of these payloads.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">North American businesses were faced with over three-fourths of the world\u2019s ransomware attacks on corporations. However, European individuals were targeted in over half of ransomware attacks against individuals.<\/span><\/p>\n<p><b>Why is Ransomware Generally So Common? <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals can find kits to engage ransomware on the Dark Web, a largely-unregulated layer of the Internet. That means that these hackers don\u2019t need much coding skills to attack. Additionally, they don\u2019t have to find users\u2019 personal information. They can just launch the attack, and the target will then pay money directly to where the attacker intends it to go. Three major hacking teams led the attacks, although there were thousands of individual hackers involved in this malware spread.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year, it seems like there are more ways for your phone to be hacked or for you to get scammed. Here, we\u2019ll discuss the most common malware threat of 2016.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[942,4427,195,309,4025,182,9,161],"class_list":["post-10531","post","type-post","status-publish","format-standard","hentry","category-security","tag-app0","tag-app1-app4","tag-app5","tag-app7","tag-dfndr","tag-malware","tag-mobile","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=10531"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10531\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=10531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=10531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=10531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}