Recent reports show that tablets are overtaking laptops in number of units shipped. With more and more tablet users out there, they become a much more attractive target for cyber criminals.
As Daniel Mellinger writes for IT Toolbox, most tablets must be linked to an email account and some even hook to mobile phone accounts. They’re used to access bank accounts, credit cards and do online shopping. This means they are home to an abundance of valuable data.
Much like the lack of security on smartphones, many tablet users decline to even have a password required to unlock the device. Not only should you set up a more secure way to unlock your tablet, but you should also consider downloading one of the numerous biometrics apps that will add a finger print scan or additional level of security.
There’s also the question of what happens if your tablet is lost or stolen. Whoever finds it will have access to all the sensitive data you’ve stored on it. Consider signing up for a remote wipe service. There are a number of easy to set-up third party apps. If you have an Apple or Android device, there are native options to use, as well. The idea is to be able to erase anything stored on the device so that whoever now has it can’t access any of your data.
Another security concern is malware. Tablet specific attacks will be more common with the tablet audience growing rapidly. This means you need security software in place. You run the risk of malware when you click on a link, download an email attachment or visit a malicious website. Most users aren’t aware that they’ve downloaded malware until it begins to affect their device’s performance. Malware is capable of harvesting data, monitoring activity and even hijacking some functions of your device.
Malware infections lead to hacked email and social media accounts, stolen identities and compromised bank and credit card accounts. That’s why it’s important to practice safe surfing and have robust security apps in place.
For help upgrading the security on your tablet, smartphone or any device, contact the experts at Geek Rescue by calling 918-369-4335.
A new form of malware attack on Android phones has security experts on the look-out. This form of scareware infects your computer through a phishing email and malicious link.
Chris Brook, of ThreatPost, reports that the emails will appear to be from the United States Postal Service.
The message informs you that the USPS was unable to deliver your package because the postal code contains an error. You’re then prompted to print a label. When you follow the “Print The Label” link included in the email, a malicious Android Package File, or .apk, is downloaded to your device.
This particular scam seems poorly constructed. After all, most of us know when we’ve sent a package recently and understand that printing a label for a package that isn’t in our possession wouldn’t do much good. However, there are plenty of users who will click the link to try to gain more information, even if they haven’t sent a package in months. Hackers play on our curiosity and even thin attacks like this one will claim victims.
This form of malware has been used before. Security experts note that a previous scam using it in a scam that asks users to pay a subscription fee to keep their devices clear of malware. What’s noteworthy is the way the malware is being distributed. Cyber criminals are adjusting to the number of users who access their email on their Android devices and are attempting to exploit that fact.
This malware is reportedly even capable of intercepting both incoming and outgoing calls. It also is capable of changing file names to look more innocent. Instead of a suspicious .apk file, it will appear as a .zip file with a tantalizing name like vacationphotos.zip.
Android users should go into the settings on their device and disable the option to “allow installation of apps from unknown sources”. Users will also be able to enable a “Verify Apps” option, which will warn them before any potentially malicious app is downloaded.
These two options help keep your device safe, but you’ll also want dedicated security apps as well. To upgrade the security on any of your devices, or to rid them of existing infections, come by or contact Geek Rescue at 918-369-4335.
For users of the web browser Google Chrome, a new malware threat has emerged. This threat looks a lot like Candy Crush and Super Mario.
Eric Johnson, of All Things Digital, describes the “wild west” atmosphere of the Chrome Web App store. Unlike Google Play, the app store for Android mobile devices, Chrome’s Web App store is much less regulated.
This lack of regulation has lead to a number of knock-off apps. Mostly, these apps are recreations of famous games like Super Mario, Candy Crush Saga, Fruit Ninja, Doodle Jump and Sonic the Hedgehog. These games aren’t licensed by their original creators and many are suspected to contain malware.
It’s not hard to understand why malware is included in these recognizable games. Users see a game they played in their youth, or a game they’ve heard is popular now, and want to try it out. It’s a naturally attractive app for what seems like no obligation. However, the apps are usually poor quality and infect your computer with malware.
The key to spotting these knock-off, malicious apps is simple. First, understand that Nintendo, Sega and other giant game companies aren’t making officially licensed apps for Chrome. If you have any further questions, look at the website associated with the app. In the case of a Candy Crush Saga knock-off, the website was listed as candycrushsaga.blogspot.com, which is not associated with King, the game’s developer.
If you have added one of these apps or another app you think contained malware, run your fully updated virus scan after you remove the app from Chrome.
For additional security on any of your devices, contact Geek Rescue at 918-369-4335. We offer security solutions to keep you safe from malware, spam email, viruses and more.
Would you call your passwords to the various accounts you have online secure? It depends on how many characters your password is, if you use upper and lower case letters, symbols and numbers, if you use full words, recognizable names or places from your life and whether you reuse passwords on multiple sites.
Ping Identity’s Christine Bevilacqua published a blog along with the included infographic that speaks to the problem with password security.
Many of us have experienced a compromised online account and a broken password is often to blame. There is software readily available that is capable of breaking even incredibly long passwords. Sometimes, the strength of your password isn’t even the issue.
In the case of the latest attack on the New York Times, a spear phishing scam resulted in an employee giving out their password. Cyber criminals have become increasing intelligent about creating ways to hack into your accounts.
If you aren’t scammed into giving out your password outright, you may be guilty of clicking a link or downloading an attachment you shouldn’t have. This could infect your computer with malware capable of monitoring your activity, stealing passwords and infiltrating your accounts.
Some online accounts are moving to require a log-in with social media accounts, but what protects your social media accounts? A password does.
One of the latest innovations on the new iPhone is the use of biometrics. In order to unlock the phone, users will use their fingerprint. This seems like a foolproof plan. Afterall, no one will be able to hack into your phone unless they have your fingerprint. However, the problem becomes the unreliability of biometrics. For example, what happens if an error occurs and your phone won’t recognize your fingerprint? For most similar systems, the fall back is simple password protection, which brings us back to square one in terms of security.
The key to avoiding a hacker cracking your password is to practice safe surfing techniques and to have the latest security software in place.
To make any of your devices more secure, contact Geek Rescue at 918-369-4335.
Apple plans to announce their newest models of the iPhone on September 10, which has millions eager to see their newest offering. Among those millions are cyber criminals looking to take advantage of the latest trend.
As Merianne Polintan writes for TrendMicro, phishing emails promising free, new iPhones have already begun to show up in some users inboxes. Most of these early occurrences were spotted in SouthEast Asia, but users in the US should also be on the lookout.
The iPhone phishing email looks like it’s sent to you from the Apple Store. The message tells you that your email has won in a drawing and you’re entitled to a new iPhone 5S. You’re then asked to log in at the link provided to claim your prize.
If you look closely at these emails, you’ll notice the tell-tale signs of a scam. For example, there are a number of spelling or grammatical errors. You’ll also likely find that although the sender is identified as “Apple Store”, the actual email address is probably not “@Apple.com”.
So, unfortunately, you didn’t win a new iPhone. By avoiding this scam, however, you will at least keep your identity from being stolen.
To improve the spam filter on your email or improve the security on any of your devices, contact Geek Rescue at 918-369-4335. We keep you safe from malware, viruses, phishing scams and spam emails.
Google Chrome, Microsoft’s Internet Explorer and Mozilla Firefox are the three most popular browsers for PC users. One of the reasons for this is that each offers users security tools to keep them safer while surfing the web.
Kim LaChance Shandrow reports for Entrepreneur that 31-percent of internet attacks target businesses with fewer than 250 employees. This means that regardless of who you are, or how big or small your company is, you have a significant chance of being the victim of a cyber attack. You can’t afford to browse the internet without the proper security in place. With that in mind, here’s a rundown of the security each of the top three browsers offer users.
This browser’s maker, Mozilla, is a non-profit foundation and is mostly funded by Google, who pays to have their site incorporated into the browser. It is also considered by many to have the best security features of any of the most popular browsers. “Undercover” mode and the “Do Not Track” tool both help keep your activity online invisible to others, including website who would normally track you. Firefox also warns you when you encounter a potentially malicious site. Malware, phishing scams and dummy sites are all recognized and you are given advance warning.
Google’s browser is the most used in the US and boasts the fastest performance. Privacy settings are highly customizable and the “Incognito” mode works just like Firefox’s “Undercover” to keep your activity hidden. There’s also a “Do Not Track” tool but it’s not as user friendly as Firefox’s. While Chrome does a good job protecting users from malware and dummy sites, a big flaw is that information saved, like passwords, contact and credit card information, isn’t encrypted.
Microsoft boosted their security offering in the latest version of their browser. “Enhanced Protected Mode” safeguards against malware, tracking and hacking. Internet Explorer specifically protects against cross-scripting attacks and offers “Do Not Track” and “InPrivate” modes, much like Chrome and Firefox. One security gap exists in ActiveX, which is included to make rich media like video and animations run smoother. Cyber criminals are able to use ActiveX as a hacking tool when it’s allowed to run. IE10 does allow users to disable ActiveX, however, and only use it on trustworthy sites.
Browser security is certainly improving with each new version, but a browser’s protection will likely never be enough to keep you fully secure. Antivirus and anti-malware software should be installed and regularly updated on your machine and firewalls should be in place. The idea is to make it as difficult as possible for hackers to infiltrate your device.
For help improving your security at home or the office, call Geek Rescue at 918-369-4335. We offer a variety of security solutions to keep your data safe.
You’ve likely heard how cyber criminals can hack your smartphone and gain access to your accounts, or even take over functions of your phone. But do you understand why your smartphone is such a coveted target?
Marshall Honorof, of TechNews Daily, writes that “your smartphone contains as much sensitive information as your wallet” and is always on, connected to the internet and vulnerable.
Your smartphone has a number of vulnerabilities, which makes it a challenge to protect. You’re probably always logged into social media and email accounts on your phone. This means that anyone who gains access to your phone also gains access to all of these accounts. With the information gained from social media and email, an intelligent hacker is able to gain access to almost any account you have online.
Smartphones also present the unique problem of text messaging vulnerability. A text message is practically impossible to block since phones open them as soon as they’re connected to a network. This means text messages containing malware are a near-perfect weapon.
There have even been demonstrations of infecting iPhone’s with malware through charging. Once a phone is infected with malware, any number of bad outcomes is possible. Your data could be collected, activity monitored, accounts hacked and phone functions hijacked.
When Bluetooth, Wi-Fi and GPS are activated, phones broadcast a shocking amount of information. Your location and the model number of your phone are available to anyone who cares enough to look for it. Retailers are actually beginning to use this information to tailor ads to you.
Turning off functionality like GPS and Wi-Fi when you’re not using it not only grants you more privacy, it also saves your battery. Experts also suggest uninstalling social media and email apps from phones. These apps are less secure than the websites they represent and keep you logged in at all times.
In addition to better usage habits, you’ll need robust security software to keep your phone safe. Contact Geek Rescue at 918-369-4335 to find out how to improve the security on any of your devices.
Explore more infographics like this one on the web’s largest information design community – Visually.
Phishing scams are producing some unbelievable statistics. 500-million phishing emails are sent every day. 250 computers are hacked each minute. These statistics are why it’s important to protect yourself not only with the latest security software, but also with an understanding of how to avoid the scams.
Phishing emails are attempts to gain access to your accounts or steal some information a hacker deems valuable. They often appear to be from reputable businesses and will ask you to respond with your account information or personal identifiable information. The best thing to do is not respond. Mark the email as spam and delete it.
Many phishing emails will end up in your spam folder. So, the first step in avoiding these scams is to trust your spam folder. Unless you find an email you were expecting to receive in the spam folder, it’s best to leave them alone. Even emails from your contacts could be malicious. There are numerous cases of an individual’s email being hacked and a malicious email being sent to their entire address book.
If a phishing email does end up in your inbox, be aware of the sender’s usual behavior. For example, your bank probably only sends out emails for specific reasons and never asks for your account information over email. If you receive a message that seems out of the ordinary from a company you do business with, it’s always better to call them to find out what’s going on. Be sure to look up the number for yourself also. Many times, a false number will be included in the phishing email.
Links and attachments are a popular way to attempt to infect your computer with malware, which then allows hackers to gain access to your accounts. Be wary of any links and attachments sent to you from unknown sources. If you’re expecting a file to be sent to you by a friend or coworker, it’s probably safe. But, if someone you don’t know sends you an email with an attachment, or even a friend sends you a link you don’t recognize, it’s better not to open them.
For help keeping phishing scams out of your inbox, call Geek Rescue at 918-369-4335. We offer state of the art spam filters and the latest in security software to keep you safe.
The growing trend of BYOD, Bring Your Own Device, means that more and more employees are using their personal smartphones on company networks. The initial concern surrounding BYOD is that sensitive and valuable information will be stored on personal devices and potentially lost or stolen. But, as Sam Narisi points out for IT Manager Daily, there’s another significant threat to consider.
A security researcher for Tripwire recently demonstrated how a single compromised Android device could be used to hack into a company’s IT infrastructure. This is possible through Google apps, which many companies use for cloud computing and email.
Android uses a “single sign-on” feature, which means that users aren’t asked to continuously authenticate their Google account with a password. Instead, the Android device stores a cookie the first time you authenticate your account and remembers that your device and your account are linked.
The problem is similar to forgetting to log-out of your email or social media account on a shared computer. For example, if you’ve ever checked your Facebook page at a computer lab or library and forgotten to sign-out when you left, you probably ended up with some joke statuses on your account. College students know exactly what we’re talking about.
For this Android flaw, when an employees device is lost or stolen, their accounts remain active. Whoever holds that device has access to everything stored in Google apps, including the employee’s email account.
An intelligent hacker, however, doesn’t even need to physically hold the Android to access Google apps. If they are able to infect the device with malware, they could also gain similar access to Google accounts.
The simplest fix for this security flaw is to keep anyone from accessing corporate Google apps with their Android device. Failing that, keep from downloading any extraneous apps, especially outside of the Play Store. That will go a long way in keeping malware off your smartphone.
For more help keeping your smartphone or other device safe and secure, contact Geek Rescue ta 918-369-4335. We offer a variety of security solutions for both home and business.
If you own a computer, or any device really, you’re likely to encounter problems from time to time. But, as Ben Kim of CIO points out, some of the more common problems have easy fixes that you can handle yourself.
Regardless of the problem and before you try anything else, restart your computer. There’s a reason this is cliched advice. For many issues, a restart will put everything right.
Your system will slow down when your hard drive gets too full. If you’ve noticed a sluggish performance, try clearing some space. Windows users will also want to use Microsoft’s System Configuration tool to trim down the number of applications that open automatically on start-up. To access it, press Windows-R, type “msconfig” and hit Enter.
If your downloads are taking longer than they should, test your connection speed. You can do this on a number of websites. Resetting your modem and router is also a good idea before contacting your Internet Service Provider.
If you’re seeing a high number of pop-ups ads, you’ll want to make sure you have a pop-up blocker enabled in your browser. If they appear when you aren’t even surfing the internet, you’ve got adware. This usually stems from you installing a program that had adware hidden in it. To remove it, try running any security software you may have, or installing new adware-specific programs.
If you’re sitting in range of your wireless router, but you still get a weak signal or constant disconnects, there are a couple of fixes. First, try resetting the modem and router. Then, let Windows troubleshoot the problem for you by right-clicking on the Wi-Fi icon in the taskbar and selecting ‘Diagnose Problem” or “Troubleshoot Problems”.
Printer doesn’t print
We’ve all had our share of printer-related headaches. Check to make sure there’s enough ink, toner and paper and the notification light isn’t blinking. Turn the printer off, then back on. You can even completely unplug the power supply and wait a few seconds before plugging it back in. If you still can’t print, check to see if the “Use Printer Offline” option is enabled. Windows will switch this automatically in some circumstances so make sure to uncheck it.
If these fixes don’t work or you have a more serious issue, call Geek Rescue at 918-369-4335. Our team of techs fix any problem your device may have. Give us a call, or bring your device to one of our convenient locations.