Showing posts with label Mobile. Show all posts
Showing posts with label Mobile. Show all posts

Thursday, November 2, 2017

Ten Percent of Mobile Subscribers at Serious Risk of ID Theft


Data aggregated from global operators indicates 60% of suspicious domains are linked to phishing
Thursday, November 2nd, 2017
EDISON, New JerseyNov. 2, 2017 /PRNewswire/ Korea IT Times--
Flash Networks, the leading provider of mobile Internet optimization, security, and engagement solutions, today published new market data highlighting the vulnerability of mobile users to ID theft via phishing attacks. Alarmingly, data collected from global operators shows that more than 10% of users are exposed to phishing attempts. Mobile subscribers are being exposed to increasing risk as the volume and sophistication of attacks escalate.
Data from mobile operator deployments reveal that:
  • 3% of all domains visited are classified as suspicious
  • 60% of suspicious domains are linked to phishing
  • The percentage of mobile users exposed to phishing attempts is increasing, with 10% of subscribers visiting suspicious domains at least once a month  
  • Threats are dynamic in terms of intensity, location, and time. While massive phishing attempts may occur at one location, a dramatic shift in the target demographics of phishing attempts may be seen elsewhere at a different time.
"A single click taking an unsuspecting mobile user to a fake website can quickly lead to identity theft," said Dror Shlomo, VP Product at Flash Networks. "Through deep inspection of network traffic, xtraArmor provides subscribers with the strongest possible protection against threats such as viruses, malware, spyware, and phishing before the traffic is delivered to the subscribers' devices."
Flash Networks xtraArmor is a clientless solution for detecting and preventing threats aimed at mobile devices. xtraArmor is powered by industry-leading security technology from Symantec. Integrating seamlessly with mobile operators' networks, the virtualized solution enables operators to protect subscribers and devices from advanced phishing, viruses, malware, spyware, ransomware, and other threats. Using multi-layered detection technologies, such as advanced heuristics, machine learning, and behavior analysis, xtraArmor detects malicious traffic, generates alerts, and prevents such traffic from reaching mobile devices.
About Flash Networks 
Flash Networks is a leading provider of virtual optimization, security and engagement solutions that enable operators to improve RAN spectral efficiency, boost network speed, optimize video and web traffic, generate over-the-top revenues and secure the mobile Internet for subscribers and devices.
With offices in North AmericaEuropeLatin America, and Asia, Flash Networks services hundreds of millions of subscribers daily at leading global carriers. For more information, visit http://www.flashnetworks.com.

Thursday, August 24, 2017

500 Android apps blocked from Play Store due to malware


Through the use of an advertising software development kit contained in 500 apps on the Google Play Store, cybercriminals were able to spy on users and even infect their mobile devices with malware
That's according to security firm Lookout , which discovered that the Android apps in question all had the lgexin ad SDK built into them which gave unauthorised third parties access to user devices.  The apps themselves also managed to be downloaded over 100 million times from the Google Play Store as many of them fell into popular categories such as weather, health and fitness, travel and games. 
However, the app developers were likely not responsible for the malware added by the cybercriminals and this is not the first time that hackers have used an SDK to deliver a malicious payload.    
Lookout researchers offered further details on why the developers were likely unaware that their apps contained malware at all, saying: 
“It is likely many app developers were not aware of the personal information that could be exfiltrated from their customers' devices as a result of embedding Igexin's ad SDK. It required  deep analysis of the apps' and ad SDK's behavior by our researchers to make this discovery. Not only is the functionality not immediately obvious, it could be altered at any time on the remote server.” 
In an attempt to prevent apps from being able to deliver malware to mobile devices, Google recently introduced Google Play Protect which will be built into the latest version of its mobile OS, Android O
Lookout has informed Google of its discover and all of the affected apps have now been removed from the Play Store. 
Image Credit: Andriano.cz / Shutterstock via itproportal

Tuesday, August 4, 2015

3 simple steps to getting smart on mobile security

Mobile devices and apps are how work gets done these days. Employees aren’t tied to their desks, work doesn’t always mean sitting down from 9-5 and meetings can take place anywhere from a coffee shop to the sidelines of a soccer game. However, as the adoption of mobile devices (smartphones and tablets) continues to increase, both employers and employees need to be aware of their company’s security policies.

According to the International Data Corporation (IDC), smartphone shipments to the Middle East and Africa saw unprecedented year-on-year growth of 83% in Q4 of 2014. Another report by Forrester, found that only 57% of employees are aware of their company’s security policies, which means that 43 percent or more might be actively bypassing company security policies and not even know it.
So what does that mean for businesses? As mobile device adoption grows and the concept of work continues to change, employees are going to use the apps and devices they want to make them feel more productive – with little consideration for company policy. When employees go around policies for email access or they copy sensitive enterprise data to their personal devices and use consumer apps, that’s called Shadow IT.
Company security policies are often seen as too invasive and hard to understand– but this situation has to improve to protect sensitive company data. So, to make it easier on businesses and employees, I’ve outlined a few best practices that will help businesses protect what matters by safeguarding data in use, in transit and at rest to let employees focus on their work. After all, it’s all about user experience!
1. Control access and educate your workforce
Create policies that work for your business. You can do this by getting to know your workforce. Set up regular meetings with business groups to understand their needs – met and unmet. Then, create policies based on those needs and the governance requirements of the business. And don’t forget to encrypt everything!
2. Enforce policies to reduce attack surfaces
Make sure policies don’t lose value over time by enforcing penalties for bypassing them. Reduce attack surfaces for hackers or malicious insiders by securing applications and data through virtualisation, containerisation and secured networking while encrypting data in use, in transit and at rest.
3. Track behavior and learn from it
Monitor activities on the network and within apps to stay aware of what’s going on within your business – who’s accessing data from where and when – and take action as needed. Be consistent in policy enforcement and understand the difference between compliance and security. Just because policies are compliant, doesn’t mean they measure up to today’s threat landscape or risks unique to your business.
Shadow IT can be tough to tackle because companies don’t always know what devices and apps employees are using or how they’re circumventing company policies. Following the steps above will help businesses get processes in place to partner with their employees to keep business information safe and private throughout the security lifecycle.

Mobile malware grows nearly three-fold in Q2 2015

So you’ve got your PC locked down so tight you even battle to get in sometimes, but how much care are you taking when it comes to mobile security? If your answer to that question is something along the lines of “not much”, you might want to step it up a notch.

According to security provider Kaspersky, some 291 800 new mobile malware programmes emerged in Q2, which is 2.8 times greater than in Q1. There were 1-million mobile malware installation packages in Q2, which is seven times greater than in Q1.
The company notes that mobile banking remains a main target for mobile threats. A new version of apreviously existing Trojan for instance is capable of attacking 114 (four times more) banking and financial applications as its previous iteration. Its main goal is to steal the user’s login credentials with which to attack, among others, several popular email applications.
Financial threats still huge on the web
Banking remains the biggest target for malware on the web too. But according to Kaspersky, they are falling. There were 5 900 000 notifications about attempted malware infections to steal money via online access to bank accounts — this is 800 000 lower than in Q1.
In Q2 2015, Singapore became the leader in the number of Kaspersky Lab users who came under web-borne attacks by banking Trojans — 5.3% of all Kaspersky Lab users in Singapore faced this threat over this time period. Next came Switzerland with 4.2%, Brazil (4%), Australia (4%) and Hong Kong (3.7%).
As the security company notes, the countries that come under attack most frequently are technologically advanced and/or have a developed banking system, which attracts the cybercriminals’ attention.
It also says that financial threats are not limited to banking malware programmes which attack the clients of online banking systems. Apart from banking malware (83%), financial threats are posed by Bitcoin miners (9%) — these are malware programmes that use the victim’s computer’s computational resources to generate bitcoins, as well as bitcoin wallet stealers (6%) and keyloggers (2%).
Small businesses under threat
While we’ve grown used to attacks taking on big companies and government agencies, Kaspersky notes that small and medium-sized businesses are increasingly coming under attack. Businesses working in chemical industry, nanotechnologies, education, agriculture, mass media and construction are particularly vulnerable it says.
During the three month period covered by the Kaspersky report an average of 23.9% of internet users’ computers across the world came under a web-borne attack at least once. This is 2.4 percentage points lower than in Q1.

Friday, August 8, 2014

How to increase security and privacy on your Android or iOS device


phone security privacy

If you’re concerned about your privacy and security while using a mobile device, here are a few tips.
Privacy, in this age, seems to be a flight of fancy. Even separating the awarenessEdward Snowden raised of the level of government surveillance, we live in a connected world. Almost every action we take online can be reviewed by someone.
I don’t think I’m alone in saying there are times I’d rather not have my actions scrutinized. It might be as simple as trying to make sure a gift I’m buying doesn’t show up in my history. Or, I could be fact-checking a Breaking Bad episode.
The reality is that we have devices with GPS chips that have near-constant connections to the internet. Simply put, if you want to go on a crime spree, a smartphone is a poor companion.
What I will attempt to do in this article is go over some ways you can keep your Android or iOS device a little more safe from prying eyes.

Physical security

Losing physical control of your device is obviously a gigantic problem. But it happens. If it does and the device is not secured a thief could have access to almost all your personal accounts and information. Therefore, the most basic security steps you can take is to enable a password lock and be able to track your device.
It also should be stated that if you are at all interested in privacy or security, do not root or jailbreak your phone. This will weaken your device’s security. That process often takes advantage of bugs in the system to gain elevated privileges, and who knows what pieces of code have been injected.
Android tips
On an Android device, you can set this from the Security page under your device’s Settings. Also, you should download and install the Android Device Manager on your tablet or phone. If the device is lost you can go to the web and remotely erase the device. Also, if you have more than one Android device all hooked into the same Google account, you can install the app on all your devices and track and erase them from there.
You can also encrypt your Android device from the Security setting as well. This will encrypt accounts, settings, downloaded apps and their data and other files. You will need to enter a PIN to decrypt the device every time you power it on.
iOS tips
On an iOS device, you can set a Passcode under Passcode on the main Settings page. To enable Find my iPhone (or iPad), go to your iCloud settings on the device and turn Find my iPhone on. If your device is lost you can either go to iCloud or download the Find my iPhone app for your other iOS devices and track it from there.
One other nice thing with iOS is how it handles trusted computers. Every time you connect your iOS device to an untrusted computer you will need to accept a prompt on the device to trust this device. If your device is password-protected, you will need to enter it before accepting the trusted connection. This will stop miscreants from accessing your data if they get their hands on your device.

Location Awareness

While it’s nice to be able track your phone if it goes missing, is also makes it easier for people to find you. Our cell phones have GPS chips and even without those, the cell towers can let the authorities know where we are. This article isn’t about how to go completely off the grid, but rather how to minimize what data apps broadcast about you.
When it comes to location services my general rule of thumb is to keep them enabled on a device level but turn them off on apps I don’t want enabled.
Android tips
One nice thing about Android is when you install an app, it’s very clear what permissions – like location services – it will need. The downside is sometimes changing or revoking those permissions can be a pain.
There are two overall locations settings to an Android device. They are under Location on the main page of Settings. Tap there and go to Google Location Settings. There are two options: Location Reporting and Location History. Location Reporting lets any Google product (like Maps) turn store and use your device’s most recent location data in connection with your Google account. The second one allows Google to store a history of your location data. What I cannot find is an easy way to tell which apps are using Locations.
If you turn off the Location Reporting and History, apps like Maps and Android Device Manager will not work anymore. It’s your call if you want to keep them enabled.
iOS tips
iOS is a little better about handling this sort of thing. Under the Privacy settings, you will find Location Services. If you want, you can just shut down all location services from there. You will also be able to see all the apps that use Locations and can disable their access from there. Also, when you launch an app that uses Locations, it will ask your permission to use this data.
If you go to the bottom of the list and go to System Services, you will see Frequent Locations. This is where you can view areas you’ve visited and clear the history.
App tips
While I generally don’t mind if Apple (and to a certain degree Google) has device-level access to my locations, there are apps where I draw the line. For instance, while I’ll allow this level of access to a weather app, Facebook and Twitter are apps where I don’t want this information attached to my posts.
On iOS, this is easy to do. Just go to Locations, see what apps use this information and you can either tell it to never access Location or Always (some apps have a While Using this App setting).
On Android, you can view the permissions of each app on its page on Settings, but if you want to disable Location access for that specific app, you’ll have to launch the app and hope you can change the permissions there.

Private browsing

One area I do care about is keeping my search and browsing history private and hopefully un-trackable. Some of it’s just to prevent companies from monetizing my searches, but I also am working on writing some thriller-style fiction and the research for that story can yield some unique search results.
The Onion Router (TOR) is a great way to anonymize your browsing. According to their website: “Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.”
Simply put: TOR makes it hard for your internet activity to be tracked back to you. I first heard about it when Wired’s Evan Ratliff tried to vanish as part of an article he was researching.. Keep in mind, that TOR is not a 100 percent guarantee your browsing cannot be tracked back to you. However, for most of us, it’s good enough. What I have also found is that TOR is a great way around corporate and education firewalls. One thing to keep in mind, is that because of how your information is anonymized and hopped around the Internet, you will find that using TOR will be slower than a standard browser.
There are two apps I use for TOR: On Android, I use Orbot. On iOS, I use Red Browser.

Final Thoughts

Privacy (and security) are constantly at odds with convenience. Trying to balance the two is a struggle. Because of my internet freelance work, when you Google my name a decent amount of the first page of results are links about me. I’m active on Gigaom, Twitter and my personal site. As a result, I tend to self-censor myself on social media. You can find out that I like Apple, the Red Sox and guitars, but not much else about me (hopefully).
I’m lucky too that I’m not someone who needs to hide my internet activities. There are reasons people need to, and I hope this post is helpful to those of you who want to increase your security and privacy.
via gigaom

Thursday, August 7, 2014

10 tips for securing your smartphone

Each week within October will take on adifferent theme, with this week's being 'Mobile'.
So, with that in mind, we thought we'd prepare some tips to help keep your smartphone safe.
1. Always secure your smartphone with a password
One of the most basic security tips, but one which is sometimes completely overlooked! Having no access protection at all is just foolish. Swipe patterns are ok, but greasy finger-trails could reveal too much.
A four-digit PIN is an improvement but using a strong passcode is the idealphone protection.
2. Ensure that your device locks itself automatically
If you set up password-protection on your phone but then leave it unlocked on your desk for 15 minutes, you won't have achieved very much. Most smartphones allow you to set them up to automatically lock themselves after a period of inactivity.
Make sure you choose the shortest timeout you are comfortable with. Two to five minutes is better than ten to thirty, even if it does feel slightly inconvenient.



3. Install security software
Your smartphone is a computing device and should be protected accordingly. Look for an app like Sophos Mobile Security that includes malware prevention, remote data wipe, privacy review of apps and an automatic security advisor to alert you to potential risks when you change a device setting.
If you're in charge of securing your organisation's phones and tablets, then choose a mobile device management solution like Sophos Mobile Control.
4. Only download apps from approved sources
The Google Play Store and Apple's App Store take security pretty seriously. They are very careful about what apps they make available and will withdraw apps that raise concerns after release.
Read user reviews of apps before installing them - if there are any security concerns then someone else may well have mentioned them.
5. Check your apps' permissions
Apps. Image courtesy of Shutterstock.Many apps require more than the basic default permissions. For instance, you can reasonably expect an SMS app to send and receive text messages just as a mapping app will request your GPS location.
But something like a calculator that needs network access or an alarm clock that wants to read your contact database should be treated with extreme caution!
6. Don't miss operating system updates
Updates to your OS often include system vulnerability patches, so it's important to install them.
You might want to be advised of updates rather than having them automatically installed, as early adopters sometimes experience teethingproblems - but the forgetful among you may prefer that to missing updates altogether.
7. Be wary of any links you receive via email or text message
Now you can pick up email on your phone, exercise caution when clicking on links. And phishing scams are not limited to email - a text message can incite you to click on a dodgy link or ask for personal information.
Even simply replying to unknown SMS or email senders can raise the crooks' interest in you, leading to more pressure to respond.
8. Encrypt your smartphone
Even if you've secured your smartphone with a password, a thief could still plug your device into a computer and gain access to all of your personal information. Using encryption on your smartphone can help to prevent such data theft.
9. Turn off automatic Wi-Fi connection
WiFi. Image courtesy of ShutterstockOne of the great things about modern mobile phones is their ability to connect to the internet in many ways, but continually probing for wireless networks gives away information about your identity and location, and blindly connecting to unencrypted access points can let your phone leak all sorts of useful things for malicious actors to intercept and act upon.
So tell your phone to forget networks you no longer use, so as to minimise the amount of data leakage and configure your phone to automatically turn on/off wireless in certain places using a location-aware smartphone app.
10. Turn off Bluetooth and NFC when not in use
Bluetooth and NFC (near field communication) are great in terms of connectivity, allowing you to use accessories such as wireless keyboards and headsets or make payments with a wave of your smartphone.
But it does open a door for the bad guys to gain access to your device and access your data, so you should either switch these features off or put your device into "not discoverable" mode whenever possible. Also, be careful when pairing devices – never accept requests from unknown devices.
If you're responsible for mobile security at work, you might like to read ourpractical advice for handling smartphones in the workplace.
And if you're interested in reading other stories related to National Cyber Security Awareness Month, read the 3 essential security tasks you can do for your family today and our 10 topical security tales.

Google's Android security chief: Don't bother with anti-virus. Is he serious?


android-antivirus-170Just before the recent Google I/O developer conference, Google's chief security engineer for Android, Adrian Ludwig, told journalists that most users shouldn't bother with anti-virus.
Ludwig said "99%" of Android users wouldn't benefit from a mobile anti-virus and declared that the risk from Android malware is "overstated."
Moreover, Ludwig accused security software companies of distorting the facts about the exploding volume of Android malware, according to the Sydney Morning Herald's tech reporter Ben Grubb.
It's quite a statement coming from someone so high up the food chain - and a security engineer no less - to dismiss the value of anti-virus for the vast majority of users.
Ludwig reportedly said:
I don't think 99% plus users even get a benefit from [anti-virus]. There’s certainly no reason that they need to install something in addition to [the security we provide].
If I were to be in a line of work where I need that type of protection it would make sense for me to do that. [But] do I think the average user on Android needs to install [anti-virus]? Absolutely not.
It's understandable that Ludwig would want to downplay security threats to Android at a time when Google is expanding its Android ecosystem to include wearables like smartwatches, televisions, and even cars.
Ludwig seems to take for granted that - despite surging numbers of malicious Android applications - the risk is low for any individual user.
Truthfully, the risk of downloading Android malware is low compared to PCs, but there is still every reason to have an anti-virus.
Android has a pretty poor reputation for security - and not all of it's because of some bad marketing hype.

Bad apps in Google Play - how many have been bitten?

There are several problems with Ludwig's assertions that users don't need or won't benefit from an anti-virus.
First and foremost, Google's automated process for vetting apps in its Play Store is not ironclad, even though Ludwig said Google's review process is the best "possible" for security purposes.
Although Google's review process is undoubtedly stopping some malware, bad apps have made it into Google Play many times, where they've snagged thousands of victims.
The total number of malicious apps isn't the only thing that matters either - the amount of malware that gets downloaded depends on how popular those bad apps are.
A malicious app that slips through the net has the potential to snag thousands of users - many of whom likely believe, as does Ludwig, that Play Store's review of its apps is an adequate defense.
Recently, a malicious app called Virus Shield made it through Google's review process and shot to the top of Play Store's "Top New Paid Android Apps" page where thousands bought it - even though Virus Shield was a fake with no anti-virus functions at all.
In one day between 10,000 and 50,000 people bought Virus Shield from Play Store - at a cost of $4 a download - before Google caught on and removed it (Google refunded the people who downloaded it  - and threw in a $5 Play Store voucher on top).
It's not just malicious apps in Play that Android users should be concerned about - non-Google app markets are much more susceptible to malware.
Millions of Android users in China use third-party app markets such asMobogenie, a market with a history of problems with automatic downloads without permissions.
Android isn't totally defenseless against malware - Google's own rudimentary scanner does what many free anti-virus apps do (there is an anti-virus built into Android 4.2 Jelly Bean and higher).

android-security-ostrich-head-in-sand-170

Back in 2011, another Google employee - open source program manager Chris DiBona - famously blasted security vendors for hyping up malware to sell more software.
Ludwig's rhetoric doesn't rise to same level of smugness as DiBona's epic rant on Google+, but he still points the finger at security companies for trying to offer more malware protection.
That's unfortunate - because the consequences are serious for anyone whose mobile device is hacked by a bad guy, as victims of banking malware,ransomware and spyware might attest.
Even Ludwig acknowledges that some more security conscious people or those with jobs that demand data protection will want anti-virus - so why not the rest of us?
Sorry Googlers, we think everyone ought to have anti-virus on their Androids for some pretty good reasons.
Sophos Free Anti-Virus and Security for Android is a free and simple way for Android users to protect their devices with the same sort of preventive security software they expect on desktops or laptops.
There's a threat scanner that automatically vets apps when you download them, before you run them for the first time; web and message filtering; a privacy and security advisor tool; and much more.

Monday, June 2, 2014

Malware authors target Android phones - CNET

Researchers report the number of malicious apps available on the Google Play store continues to grow. Your best defense is a security app, a cautious approach to downloads, and a close eye on your bank and credit card statements

Most of us do whatever we can to avoid coming into contact with malware. Andrew Brandt spends his workdays attracting the stuff.
As Blue Coat Systems Director of Threat Research, Brandt uses a "honey pot" Internet server intended to catch malware purveyors in the act. While Brandt was demonstrating the honey pot to me, I told him it was as if he were living on the edge of a volcano.
"It's more like watching a bank of video security cameras focused on a high-crime area," he said. Brandt's surveillance server is completely sandboxed, which allows his team of security analysts to keep tabs on the doings of the Internet's bad guys without any risk to real data or systems.
Brandt described a recent encounter he had with a malicious app that found its way onto his Android phone. "I had downloaded an unrelated app a few hours earlier. [Out of nowhere], I get a text message on the phone thanking me for subscribing [to a $4-a-month service]." The malware had managed to sign Brandt up for the subscription from his phone without requiring any permissions.
"If it hadn't been for that message, I would have had no notice of the unauthorized charge until I saw it on my credit card bill," Brandt explained. This highlights two of the things phone users need to do to protect themselves: keep a close watch on their bank and credit card statements, and respond right away to challenge illegitimate charges.

Without a security app, your phone is exposed

The convergence of phone malware and workers connecting their phones to organizations' internal networks is causing IT managers to lose sleep, according to Brandt. "BYOD [Bring Your Own Device] makes it nearly impossible for IT to prevent their networks from being exposed," he explains.
According to security firm RiskIQ's recent study, the number of malicious apps on the Google Play store increased by 388 percent from 2011 to 2013. Meanwhile the percentage of malware apps removed by Google each year went from 60 percent in 2011, to just 23 percent in 2013. The percentage of malware apps on the Google Play store jumped from 3 percent in 2011 to 9 percent in 2012, and to almost 13 percent in 2013, according to RiskIQ's research.
The Norton Mobile Security support page lists the nefarious activities an Android malware app may attempt. It may collect your call and text logs, contacts, account info, and SIM card details. It could place ads in the notification bar and SMS inbox, or change your browser home page. Some malware apps play audio ads when you call a number in your contact list, according to Norton.
In my April 10 post "Protect your device from malicious ads," I described the Android version of the free Lookout Mobile Security app that features a real-time malware scanner. On thePhandroid site, Joe Fedewa covers a half-dozen Android security programs.
Fedewa also explains Google's seven layers of security for the apps developers upload to Google Play, and he points out the importance of avoiding security-app scams by sticking with brand names you know, such as 360 Mobile Security and Avast!, in addition to Lookout.

Phone security starts with you

Installing a security app on your phone is just the first step. Sometimes your own actions can override the protections of the device's antimalware program.
Blue Coat's Brandt repeatedly circled back to the importance of phone users being cautious when downloading apps. Wired UK's Dan Goodin explains how the Android-Trojan.Koler.A malware tricks visitors of a porn site into thinking they're downloading a video player. In fact, they're downloading a program that will lock the person out of their phone until they pay a ransom.
A more pernicious piece of Windows-based ransomware called CryptoLocker now threatens Android phones. CryptoLocker uses social-engineering techniques similar to those relied on by Android-Trojan.Koler.A. Once the malware is installed, it encrypts all the files on the phone, as Dennis Fisher reports on ThreatPost.

Keep a close watch on your monthly statements

One of the tips in my November 2011 post on how to shop safely online, was to sign up for a temporary credit card number before you make any Web purchases. As that post points out, not all credit card issuers provide temporary numbers.
When you discover a fraudulent charge on your account, you have two days to report it under theElectronic Funds Transfer Act to avoid more than $50 in liability -- and perhaps $0, depending on your bank's policies. My May 2011 post about how to avoid sharing personal info online explains that the protections apply only to credit cards, not to ATM/debit cards, which you should avoid using for online purchases.
It makes sense that as we rely increasingly on our devices, they become a bigger target for the bad guys. Keeping Internet crooks at bay requires a multilayer approach to security: the prevention of a security app, trustworthy download sources, and close attention to monthly statements.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes