Showing posts with label mobile security. Show all posts
Showing posts with label mobile security. Show all posts

Monday, January 9, 2017

Protect your PCs and laptops + Android devices for free: Best free antivirus software

Here are the best free antivirus programs from companies you probably didn't even know offered security software for free.

Wednesday, June 15, 2016

Sophos Mobile Security for Android

Overview

Sophos Mobile Security protects your Android device without compromising performance or battery life. Real-time synchronization with SophosLabs ensures that your mobile device is always protected from the latest malware and online threats – just like with our enterprise products.
Specifically designed for Android, Sophos Mobile Security identifies malicious or potentially unwanted applications that could result in for example data theft, data loss, and excessive network usage costs. If your device is lost or stolen, a remote lock or wipe will shield your personal information from prying eyes.
For an added level of security for your online accounts, the Authenticator makes it easy to manage multi-factor authentication passwords for a multitude of sites like Google, Amazon, and Facebook. The Secure QR Code Scanner will check target URLs for online threats and malicious content, letting you scan QR codes without risk.
Read the reviews to see what users have to say about Sophos Mobile Security.

Features

Anti-malware and antivirus protection

  • Scans apps when you install them
  • Scans previously installed apps both on your device and on storage devices
  • Scans apps either on demand or in set intervals
  • Shows you potentially unwanted apps (PUAs)
  • Protects you from malicious use of USSDs
  • Uses up-to-the-minute threat intelligence from the cloud

Loss and theft protection

  • Send text commands from pre-defined phone numbers to perform various tasks
  • Remote lock or wipe a lost or stolen Android device
  • Trigger a remote alarm to make your phone ring loudly
  • Display a message for the finder
  • Reset your device passcode
  • Locate your device with tracking technology (the device also sends its last location before the battery runs out)
  • Informs you of a SIM change

Spam protection

  • Filters incoming text messages (SMS) according to your rules
  • Places texts with malicious URLs in quarantine
  • Blocks unwanted calls according to the filters you set, e.g., calls with hidden user ID

Privacy protection and security

  • Detects apps accessing personal data such as your address book
  • Allows you to easily identify apps which can involve costs or fees
  • Gives you advice on how to improve your security settings

Authenticator

  • Generate both time-based TOTP (RFC 6238) or counter-based HOTP (RFC 4226) one-time passwords
  • Use with any Google Authenticator-enabled application for multi-factor authentication
  • Manage multiple accounts from the same screen

Secure QR Code Scanner

  • Confirms target URLs are free of malicious content before opening
  • Flags security issues with Wi-Fi settings QR codes
  • Safely add QR code signatures to device contacts
Sophos Mobile Security is also available as an enterprise version you can manage through our Mobile Control EMM solution or through Sophos Central. For more information, go to the Sophos Mobile Control or Sophos Central pages.   

Friday, June 10, 2016

EnGenius' SOHO wireless router

Create your own wireless network with the EnGenius' SOHO wireless router. EnGenius ESR Series will provide you with a low-cost high powered Wi-Fi router that will extends your network's wireless range. Connect the ESR Series to any broadband modem and wirelessly share your high-speed Internet connection. Enjoy surfing the web, checking e-mail, and chatting with family and friends online. Reach the places your previous router would not go with EnGenius ESR Series high powered radio and extended range coverage.

Parents can also use EnShare to remotely monitor Cloud Router usage or disconnect devices connected to the IoT Cloud Router whenever they're away from home via an Internet connection.

Learn more >>>


EnGenius ESR350 802.11b/g/n Router with 4 ...
The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet s... [More]
Price: $81.99
Buy Now

The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet switch, Gigabit Ethernet WAN port and USB port. With the free EnShareT app, families can use their Apple iPhones, iPads or Android-based tablets or smartphones to transfer video, music and other files to and from a router-attached USB hard drive when they are in the home or when they are away from home.

Features:
  • ESR350 2.4GHz Wireless-N 802.11b/g/n router with 4 port GigE switch.
  • Broadband Frequency Band: 2.4 GHz
  • Data Rate: 300 Mbit/s
  • Frequency Range: 2.412-2.472 GHz
  • WiFi Deployment Type: Standalone / Controller-Based
  • WiFi Standard: 802.11b / 802.11g / 802.11n
  • WiFi Security: WEP / WPA / WPA2
  • Environment: Indoor
  • Temperature Range: 0-40 deg C
  • Data Connectors: 1x Gigabit WAN Port, 4x Gigabit LAN Ports, 1x USB 2.0 Port
  • Power Supply: DC IN, 12V 1.5A
  • Mfg. Warranty: 1 Year

Wednesday, May 11, 2016

7 Important Simple Steps to Protect Your Home


1. Set Strong Passwords
Often times we use basic passwords like Admin or 1234. It takes mere milliseconds to hack such passwords. Use passwords that are at least 12 characters long, have upper & lower case letters, contain symbols and numbers. It will take more than a year to decrypt your new password. Start with changing your computer and router passwords. And change them frequently, at least four times a year.
2. Protect Your Router
Your router is arguably the most vulnerable connected device in your home. If hackers take over the router, they will collect information about you without alerting your anti-virus and anti-malware software. The best way to protect your router is to update your router’s firmware (software) at least quarterly, to set a strong password for the admin console of your router (as described above), and to use a WPA2 network password (the password that you use to connect to your wireless network. 

Here’s a basic guide for Linksys routers (google ‘change router WPA2 password’ for your own brand of routers or call your internet provider): http://www.linksys.com/us/support-article?articleNum=139152

If you have trouble with this step, reply to our email and we will try to help.
3. Use a Secure Browser
Mainstream browsers like Internet Explorer or most often targeted by hackers because of their popularity and reach. Enjoy a much more secure browsing experience with the Tor browser (see https://www.torproject.org). If you want to stick with mainstream browsers, we suggest using Chrome as the safest alternative.
4. Anti-virus is Not Enough
Anti-virus protects you only against the most basic of threats. Install free anti-malware software by Malwarebytes. Make sure to set it so that it runs and updates automatically multiple times a week.
5. Disconnect When Not in Use
Disconnect devices when not in use. This especially applies to baby monitors and other home cameras. Simply unplug them from their power or Internet source. Hackers can take over cameras and record videos or pictures when you least expect. They will even disable the light that indicates when the camera is on. You should never disconnect devices that provide physical home security such as your security cameras.
6. Public Internet Networks
Our credit card security and privacy is most vulnerable when we connect to ‘guest’ networks in public spaces such as coffee shops. We strongly urge you not to enter credit card data or other private information when connected to such networks. Also, don’t log into your bank accounts from such networks.
7. Download our eBOOK
By applying our suggestions above, you will take a strong step towards keeping your home and your information secure. For extended tips, read our eBook here.

Tuesday, August 4, 2015

3 simple steps to getting smart on mobile security

Mobile devices and apps are how work gets done these days. Employees aren’t tied to their desks, work doesn’t always mean sitting down from 9-5 and meetings can take place anywhere from a coffee shop to the sidelines of a soccer game. However, as the adoption of mobile devices (smartphones and tablets) continues to increase, both employers and employees need to be aware of their company’s security policies.

According to the International Data Corporation (IDC), smartphone shipments to the Middle East and Africa saw unprecedented year-on-year growth of 83% in Q4 of 2014. Another report by Forrester, found that only 57% of employees are aware of their company’s security policies, which means that 43 percent or more might be actively bypassing company security policies and not even know it.
So what does that mean for businesses? As mobile device adoption grows and the concept of work continues to change, employees are going to use the apps and devices they want to make them feel more productive – with little consideration for company policy. When employees go around policies for email access or they copy sensitive enterprise data to their personal devices and use consumer apps, that’s called Shadow IT.
Company security policies are often seen as too invasive and hard to understand– but this situation has to improve to protect sensitive company data. So, to make it easier on businesses and employees, I’ve outlined a few best practices that will help businesses protect what matters by safeguarding data in use, in transit and at rest to let employees focus on their work. After all, it’s all about user experience!
1. Control access and educate your workforce
Create policies that work for your business. You can do this by getting to know your workforce. Set up regular meetings with business groups to understand their needs – met and unmet. Then, create policies based on those needs and the governance requirements of the business. And don’t forget to encrypt everything!
2. Enforce policies to reduce attack surfaces
Make sure policies don’t lose value over time by enforcing penalties for bypassing them. Reduce attack surfaces for hackers or malicious insiders by securing applications and data through virtualisation, containerisation and secured networking while encrypting data in use, in transit and at rest.
3. Track behavior and learn from it
Monitor activities on the network and within apps to stay aware of what’s going on within your business – who’s accessing data from where and when – and take action as needed. Be consistent in policy enforcement and understand the difference between compliance and security. Just because policies are compliant, doesn’t mean they measure up to today’s threat landscape or risks unique to your business.
Shadow IT can be tough to tackle because companies don’t always know what devices and apps employees are using or how they’re circumventing company policies. Following the steps above will help businesses get processes in place to partner with their employees to keep business information safe and private throughout the security lifecycle.

Mobile malware grows nearly three-fold in Q2 2015

So you’ve got your PC locked down so tight you even battle to get in sometimes, but how much care are you taking when it comes to mobile security? If your answer to that question is something along the lines of “not much”, you might want to step it up a notch.

According to security provider Kaspersky, some 291 800 new mobile malware programmes emerged in Q2, which is 2.8 times greater than in Q1. There were 1-million mobile malware installation packages in Q2, which is seven times greater than in Q1.
The company notes that mobile banking remains a main target for mobile threats. A new version of apreviously existing Trojan for instance is capable of attacking 114 (four times more) banking and financial applications as its previous iteration. Its main goal is to steal the user’s login credentials with which to attack, among others, several popular email applications.
Financial threats still huge on the web
Banking remains the biggest target for malware on the web too. But according to Kaspersky, they are falling. There were 5 900 000 notifications about attempted malware infections to steal money via online access to bank accounts — this is 800 000 lower than in Q1.
In Q2 2015, Singapore became the leader in the number of Kaspersky Lab users who came under web-borne attacks by banking Trojans — 5.3% of all Kaspersky Lab users in Singapore faced this threat over this time period. Next came Switzerland with 4.2%, Brazil (4%), Australia (4%) and Hong Kong (3.7%).
As the security company notes, the countries that come under attack most frequently are technologically advanced and/or have a developed banking system, which attracts the cybercriminals’ attention.
It also says that financial threats are not limited to banking malware programmes which attack the clients of online banking systems. Apart from banking malware (83%), financial threats are posed by Bitcoin miners (9%) — these are malware programmes that use the victim’s computer’s computational resources to generate bitcoins, as well as bitcoin wallet stealers (6%) and keyloggers (2%).
Small businesses under threat
While we’ve grown used to attacks taking on big companies and government agencies, Kaspersky notes that small and medium-sized businesses are increasingly coming under attack. Businesses working in chemical industry, nanotechnologies, education, agriculture, mass media and construction are particularly vulnerable it says.
During the three month period covered by the Kaspersky report an average of 23.9% of internet users’ computers across the world came under a web-borne attack at least once. This is 2.4 percentage points lower than in Q1.

Thursday, April 9, 2015

Facts About Remote Access Trojans (RATs) vs AlienSpy

AlienSpy is the latest in a family of RATs which target both consumers and enterprises in a bid to steal valuable data and compromise systems.
Remote Access Trojans (RATs) never fully vanish; instead, they are often recycled and redeveloped in the changing cybersecurity landscape. These kinds of Trojans, often deployed through phishing campaigns which use spoof emails and malicious files to deliver malware payloads, can be tailored to target particular industries -- such as banking or manufacturing -- or be used indiscriminately against both consumers and businesses.
In a security advisory (.PDF) posted Thursday, security firm Fidelis said the newly-discovered AlienSpy Trojan is currently being used in international phishing campaigns against both consumers and the enterprise, although generally has been detected in campaigns based in the technology, finance, government and energy sectors.
Joining the likes of njRAT, njWorm and Houdini, the RAT's development focuses on delivery rather than core functions. However, AlienSpy does differ from its predecessors. While also similar to Frutas, Adwind and Unrecom, the security firm believes the new RAT has benefited from "unified," collaborative development. As a result, the Trojan is more sophisticated and has expanded functionality.
AlienSpy currently supports infections on Windows, Linux, Mac OSX and the Android mobile operating system. However, the Trojan also demonstrates new evasion techniques not present in past RATs.
Once deployed, the Java-based Trojan grants an attacker access and control over a compromised system. The malware is able to collect system information including OS version, RAM data and computer name, upload and deploy additional malware packages, capture webcam and microphone streams without consent, and remotely watch device activity. In addition, the Trojan includes a keylogger.
AlienSpy's additional features include a sandbox detection tool, the detection and disabling of antivirus software, and the use of Transport Layer Security (TLS) cryptographic protocols to secure its connection to the command and control (C&C) server.




"Applying this technique makes it very difficult for network defenders to detect the malicious activity from infected nodes in the enterprise. To prevent various security tools from running, this version of AlienSpy performs various registry key changes," the advisory notes. "Infected systems could end up with botnet malware downloaded through AlienSpy RAT (e.g. Citadel) as it was observed by our security researchers during one of the infections."
In the same manner as its predecessors, AlienSpy is available through various subscription models and receives continual updates from its developers. According to Fidelis, AlienSpy can be purchased for between $19.90 and $219.99.
"Enterprises should ensure that they are capable of detecting inbound malware as well as active infections involving this RAT," Fidelis says.
The security firm has also published a Yara rule to help developers identify and classify the AlienSpy malware strain.
via ZDNet

Thursday, February 19, 2015

Wednesday, February 4, 2015

5 Ways to Stay Away from Malware on a Smartphone

A malware is some software specially designed to harm your computer or smartphone, or to get your personal information for various anti-social purposes (let’s say spying on you). It may be a virus, a spyware, worm, or a Trojan, but their sole purpose is to harm you. Nowadays, since smartphones are more in use, these malwares are aimed mostly at them. So here are some precautions that you can adopt to stay away from them:

1. Download Stuff From Trusted Sources

While you download stuff (songs, pictures etc.) into your mobile, be sure that you don’t download anything but what you want to download. Sometimes, rather most of the times, a file that you want to download is accompanied with a malicious software, that drains out your personal information out of your phones and can be used for anything, and the worst part is that you’d never know. One such unwanted application is Mobogenie that automatically gets downloaded onto Android phones and can cause serious troubles. Don’t believe messages on your browsers that say anything about your phone slowing down or those that offer you “hot pics”.
IMG-20150203-WA002

2. Don’t Cache Passwords

Well, it must be very annoying to type your password again and again onto your device, but this is the key area where most of the spywares attack. They phish out the cache from browsers and hence, can gain access to your private accounts. So the only foolproof method to avoid this is to not save these passwords. Oh, and while you’re at it, turn on the 2-step verification to be extra safe. Click here to know more about two-step verification.
dont_tap_on_yes

3. Don’t Fall Into Traps Of Spams

You might have come across emails claiming that you’ve won a billion dollars in some lottery you never signed up for, or something like this:spam_mail
Never click on these links, unless you’ve subscribed or signed up for them as they may contain software that can get installed on your smartphones without your consent.

4. Be Extra Cautious If You’ve Got Root Access

This point is exclusive for Android devices.When you root your smartphone, you allow the apps to gain ‘root access,’ and once a malware gets this access, it has the rights to do almost anything on your device, without your knowledge. That doesn’t mean you shouldn’t root your phones. Just be careful while you grant Superuser privileges, and don’t grant these permissions to non-trusted software downloaded from non-trusted sources. Though we recommend not to download such softwares, but even if you do, don’t grant them Superuser permissions.
superuser

5. Install An Anti-Malware Program

Though these apps aren’t enough for keeping the malwares away, they do help to some extent. There are a plenty of such applications out there, most of them free. The best rated ones include Lookout, AVG, or Avast. Mostly, they check installed apps, and watch out for malicious codes.
download

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes