10 TIPS FOR SECURING YOUR SMARTPHONE
This month is National Cyber Security Awareness Month. Each week within October will take on adifferent theme, with this week's being 'Mobile'. So, with that in mind, we thought we'd prepare some tips to help keep your smartphone safe.
Top 5 threat protection best practices
Trend Micro predicts that there may be as many as a million Android malware threats by the end of the 2014. What's going on here? Make no mistake about it, there are REAL ANDROID MALWARE PROBLEMS. (Credit: Juniper Networks) Part of it is that Android is being targeted because it's extremely popular. The research company Canalys found that Android is running on 59.5 percent of all smart mobile devices that were shipped in the first quarter of 2013.
YES, YOUR SMARTPHONE CAMERA CAN BE USED TO SPY ON YOU...
Yes, smartphone cameras can be used to spy on you - if you're not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the screen is turned off - a pretty handy tool for a spy or a creepy stalker.
Free Security Scans - Find threats your antivirus missed
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data,even on your mobile device and Mac. You can't ignore your the safety of your devices any longer: you need to recognize and stop these threats before they do MORE harm.
MALWARE ATTACKS ON ANDROID DEVICES SEE 600% INCREASE IN 2013 / 2014
Malware targeting the Android platform is exploding, with a 600 percent increase in just the past 12 months. That statistic is among the findings of a new study--Mobile Security Threat Report--unveiled last week at the Mobile World Congress in Barcelona, Spain.
Monday, October 16, 2017
WPA2 security flaw puts almost every Wi-Fi device at risk of hijack, eavesdropping
Here is every patch for KRACK Wi-Fi attack available right now
Monday morning was not a great time to be an IT admin, with the public release of a bug which allowed WPA2 security to be broken.
Tuesday, September 12, 2017
Shadow Brokers Release Windows Malware that can Steal Keystrokes and Record Audio to its Paid Subscriber
The hacking group named SHADOW BROKERS, which was responsible for the NSA leaks earlier. is back with another NSA hacker kit. This time however, the leak is only available for the users with its “monthly subscription”.
In their latest release, SHADOW BROKERS have released a malware dubbed UNITEDRAKE. It is a remote access and control tool with “plug-ins” that can target WINDOWS based systems enabling the hacker with full control over their victim's system.
UNITEDRAKE is compatible with systems running on Microsoft Windows XP, Vista, 7, 8 up to Windows Server 2012. It first came to light in 2014 as a part of NSA's classified documents leaked by its former contractor Edward Snowden.
The Snowden documents suggested the agency used the tool alongside other pieces of malware, including GUMFISH, FOGGYBOTTOM, GROK, and SALVAGERABBIT
The malware's modules including FOGGYBOTTOM and GROK can perform tasks including listening in and monitoring communication, capturing keystrokes and both webcam and microphone usage, impersonating users, stealing diagnostics information and self-destructing once tasks are completed.
These tools were allegedly developed and used by the US National Security Agency (NSA) to perform mass surveillance and bulk hacking worldwide.
Ankush Johar, director at HumanFirewall.io, said: "Remote Administration and surveillance tools are not a new thing in the global cyberspace. These have existed since the beginning of the internet. Although, criminal grade pro malware like these are extremely dangerous as, even the inexperienced chaps now can use them to carry out nation-wide cyber crimes.
"It’s not too difficult to avoid the basic malware. Being aware and staying cautious is the key to your security. Consumers are suggested to make sure that the following points are always kept in mind before hovering around the tech."
* Keep a genuine anti-virus installed and updated.
* Do not click on click on unknown links. Verify the links completely before opening them.
* Never download attachments from untrusted sources.
* Never download pirated software/cracks as they contain malware or backdoors that can give complete access of your system to the hacker.
* Install all software and OS updates available on your device whenever prompted to do so.
* Avoid plugging in unknown USB devices, whether at home or office.
via BusinessWorld
Tuesday, May 9, 2017
Millions of Android phones could be tracked with ultrasonic spying tool
Researchers discovered 234 Android apps that could be spying on users CREDIT: GOOGLE
Hundreds of Android apps could be covertly tracking users via inaudible sounds emitted by nearby devices, researchers have found.
Researchers discovered technology that lets devices talk to one another for tracking purposes using ultrasonic tones on 234 Android apps.
Televisions, billboards, websites and shops can emit the high frequency sounds, which can't be heard by humans but are picked up by the apps. This signals whether a person has engaged with an advert by watching it, or visited a shop, and how long for.
Apps featuring the technology include those from McDonald's and Krispy Kreme. Major companies could be using it to track customers' location and habits, both on and off their mobile devices, without them knowing, the researchers warned.
"An adversary can monitor a user's local TV viewing habits, track their visited locations and deduce their other devices," said the researchers. "They can gain a detailed, comprehensive user profile with a regular mobile application and the device's microphone."
The tracking method has spiked in popularity recently, according to the researchers. Two years ago just five apps in the Google Play store used the technology. Now, it is allegedly present in 234.
As well as tracking customers' habits, the beacon technology can also be used to send them targeted adverts. Given that the tool can connect location and habits with the device, it could also be used to identify anonymous users, such as those of Bitcoin and Tor.
The researchers from the Braunschweig University of Technology warned that millions of users could be under surveillance without knowing after they found that a sample of five of the 234 apps had been downloaded up to 11 million times.
The majority of the apps don't alert users that they are tracking them. All they require to be able to follow users is permission to access the device's microphone.
"The user just needs to install a regular mobile application that is listening to ultrasonic signals through the microphone in the background," said the researchers. "Once the user has installed these applications on their phone, they neither know when the microphone is activated nor are they able to see what information is sent to company servers."
Silverpush, the company that created the listening tool, denied that its technology was still being used. It stopped supporting the software in 2015 following a privacy outcry.
"We respect customer privacy and would not want to build our business foundation where privacy was questionable," Hitesh Chawla, founder of Silverpush, told Ars Technica. "Even when we were live, our software was not present in more than 10 to 12 apps. So there is no chance that our presence in 234 apps is possible.
"Every time a new handset gets activated with our software, we get a ping on our server. We have not received any activation for six months now."
Google said its privacy policy requires apps to disclose how they collect, use and share customer data.
McDonald's said it did not use the technology in the UK for marketing purposes. Krispy Kreme has been contacted for comment.
|
Tuesday, December 6, 2016
Check if you were hit by the massive 'Avalanche' cybercrime ring
Monday, February 22, 2016
GM Bot (Android Malware) Source Code Leaked Online
What is GM Bot and Why Should You Worry about it?
- Spy on victims
- Delete data from the infected device
- Gain boot persistence to help survive device restart
- Send and Read your SMS message
- Make Calls to your contacts
- Read the phone's state
- Plague phone's control keys
- Infect your Chrome browser
- Change phone settings
- Force the phone into sleep mode
- Query the network status
- Access the Internet
- Wipe your device's storage (the most critical capabilities of the malware)
GM Bot Android Malware Source Code for FREE
"Those who received the password, in turn, passed it on to other, unintended users, so the actual distribution of the code went well beyond that discussion board’s member list," IBM cyber security evangelist Limor Kessem wrote in a blog post.
How to Protect Yourself?
- Never open attachments from unknown sources.
- Never click on links in SMS or MMS messages sent to your phone.
- Even if the email looks legit, go directly to the source website and verify any possible updates.
- Go to Settings → Security → Turn OFF "Allow installation of apps from sources other than the Play Store" option.
- Always keep an up-to-date Anti-virus app on your Android devices.
- Avoid unknown and unsecured Wi-Fi hotspots and Keep your Wi-Fi turned OFF when not in use.
Thursday, April 9, 2015
Facts About Remote Access Trojans (RATs) vs AlienSpy
Tuesday, December 16, 2014
TOP 20 MALICIOUS IP - Weekly Threat Report – December 16, 2014
103.41.124.31
198.13.96.59
203.196.162.162
121.127.248.230
222.186.51.140
213.149.0.230
93.89.237.114
38.72.115.193
222.186.51.140
103.41.124.42
61.160.224.128
83.3.193.238
94.214.238.208
47.16.90.49
221.226.35.154
212.7.192.138
62.210.178.42
98.109.76.36
93.174.95.41