{"id":21079,"date":"2021-06-30T22:23:13","date_gmt":"2021-07-01T02:23:13","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=21079"},"modified":"2022-04-27T14:01:07","modified_gmt":"2022-04-27T18:01:07","slug":"more-fake-apps-are-causing-real-losses","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/more-fake-apps-are-causing-real-losses\/","title":{"rendered":"More fake apps are causing real losses"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Rogue apps remain the biggest security threat for mobile phone users, with hundreds of thousands of new malware apps being generated on a daily basis. Malicious apps are not only abundant, but also especially devious and greedy when it comes to stealing and using your personal data.<\/span><\/p>\n<h3><b>Phones are a prime target<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cHackers target smartphones because they are so rich with data,\u201d advises <\/span><b>Emilio Simoni, Research Director at the dfndr lab,<\/b><span style=\"font-weight: 400;\"> \u201cour lives are tied to our phones in so many ways: our work, our families, our buying habits, our financial tools, and of course we\u2019re physically tied to them as well.\u201d Simoni continues: \u201cWith accelerometer and GPS functions becoming standard \u201calways on\u201d functions, our phones literally follow our every move.\u201d<\/span><\/p>\n<h3><b>What are the risks?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The variety of uses made of personal data are almost as numerous as the types of malicious apps generated. Many apps simply steal personal information and resell it to companies who are eager to gobble up masses of personal data. Browser histories, GPS information, accelerometer data, and network information can be gathered and exported without your permission when an app has been given (or taken) the right permissions. Of course, logins, personal security and financial information can also be more directly leveraged. Ransomware is another common technique, where an app locks up a phone and demands payment to release it back to the user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWe see increasingly sophisticated scams taking place,\u201d Simoni warns, \u201cwhere gathering data is simply the first step in the process. This information then used to leverage the subject or to perpetrate fraud or crimes involving phishing or identity theft.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Simoni concludes: \u201cThe costs can be significant,\u201d which is why you have to protect yourself &#8212; both with knowledge, and with a good software solution.\u201d<\/span><\/p>\n<h3><b>How to identify malicious apps?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This is getting harder to do all the time, as hackers have become more sophisticated \u2014 which is why we suggest employing a software solution like dfndr security pro. (dfndr security, in premium version, features a SafeApp checking function designed expressly for this purpose). But your own wary eye can also provide a first-line of defense.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are a few key guidelines:<\/span><\/p>\n<ul>\n<li><b>Get your apps from a reputable source.<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> Google\u2019s Play Store isn\u2019t able to immediately catch every malicious app that comes down the pike: but they are on the lookout, and apps that are offered to you through alternative channels are much more likely to be malicious.<\/span><\/span><\/li>\n<li aria-level=\"1\"><b>Check permissions. <\/b><span style=\"font-weight: 400;\">If a simple app is asking for a lengthy list of permissions, you may be signing up for more than you bargained for.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Find out who made the app.<\/b><span style=\"font-weight: 400;\"> Check to see the developer\u2019s name and click on the link to their page and all their other apps. Does everything look legitimate? Or are the apps sketchy and the presentation of their features incomplete?<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Google it.<\/b><span style=\"font-weight: 400;\"> Find out what you can find out about the developer. You may find a conversation already underway that can save you a heap of trouble!<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Examine their language.<\/b><span style=\"font-weight: 400;\"> Does the developer sound like they wrote their description while thinking about something else \u2014 like maybe the next malicious app they\u2019re going to create? Not a good sign. In fact, a common sign that you\u2019re dealing with malicious software.<\/span><\/li>\n<\/ul>\n<h3><b>Use a reputable security app, like dfndr security\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cWe would recommend that everyone employ a good security app on their devices these days, especially their mobile phones,\u201d Emilio Simoni urges, \u201cthe risks are just too numerous and the potential losses can be steep.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the good news is that a focused security capability can spot malicious apps with great accuracy and reliability. <\/span><b>dfndr security Pro offers a<\/b> <b>Safe App feature, <\/b><span style=\"font-weight: 400;\">which checks-for, and warns you about malicious code, before you download any application. It also provides historical insight \u2014 warning you if the app has had its data breached and leaked to unauthorized users. \u201cOur team is on the case around the clock, making sure our security solutions are the most complete on the market,\u201d Simoni concludes: \u201cit\u2019s the kind of job you definitely want to entrust to experts!\u201d<\/span><\/p>\n<h3 id=\"block-8a6e0d2e-0a4a-4987-9461-b4cb3b89d1dc\" class=\"block-editor-rich-text__editable block-editor-block-list__block wp-block is-selected rich-text\" tabindex=\"0\" role=\"group\" contenteditable=\"true\" aria-multiline=\"true\" aria-label=\"Bloco: T\u00edtulo\" data-block=\"8a6e0d2e-0a4a-4987-9461-b4cb3b89d1dc\" data-type=\"core\/heading\" data-title=\"T\u00edtulo\"><strong data-rich-text-format-boundary=\"true\">What to do if you have downloaded a mailicious app?<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The free version of dfndr security offers a full antivirus capability that can remove viruses from your phone. This version also enables you to schedule an auto virus-scan to run periodically, which will search-for and identify any new digital threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prevention is the best way to go, and that\u2019s why we encourage you to get a good security solution for your devices as soon as possible.<\/span><\/p>\n<h3><b>More about dfndr security<\/b><\/h3>\n<p><b>dfndr security<\/b><span style=\"font-weight: 400;\"> is a free app that can help you manage the storage, battery life, and wifi security of your digital device, while also offering protection via a url checker, and anti hacker and phishing protections. <\/span><b>You can try dfndr security PRO for 3-days free, <\/b><span style=\"font-weight: 400;\">and upgrade if you like the protection it provides. dfndr security Pro offers:<\/span><\/p>\n<p><b>Safe App installer<\/b><span style=\"font-weight: 400;\"> \u2014 checks for malicious apps before you install them<\/span><\/p>\n<p><b>Identity Theft Reports<\/b><span style=\"font-weight: 400;\"> \u2014 So you know if your online credentials have leaked<\/span><\/p>\n<p><b>App Privacy Protection<\/b><span style=\"font-weight: 400;\"> \u2014 Offers notifications about issues with apps you\u2019re using; app data breaches, permissions you\u2019ve granted to various apps, and info about where your data may be used.<\/span><\/p>\n<p><b>Anti-Theft Protection<\/b><span style=\"font-weight: 400;\"> \u2014 Protects your phone from thieves with an alarm, remote lock-out, and a picture of the thief.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">dfndr security Pro is a full suite of protection for users who recognize that they must take an active role in their own digital security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can <a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_BR&amp;amp;c=more-fake-apps-are-causing-real-losses\">download dfndr security Pro<\/a> and start your free trial right away.<\/span><\/p>\n<p><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_BR&amp;amp;c=more-fake-apps-are-causing-real-losses\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20273 size-medium\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN-300x55.png\" alt=\"\" width=\"300\" height=\"55\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN-300x55.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN.png 344w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rogue apps remain the biggest security threat for mobile phone users, with hundreds of thousands of new malware apps being generated on a daily basis. Malicious apps are [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":21081,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-21079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/21079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=21079"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/21079\/revisions"}],"predecessor-version":[{"id":21085,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/21079\/revisions\/21085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/21081"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=21079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=21079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=21079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}