!!

Welcome Guest

You are viewing this forum as a guest therefore You are Not Allowed to Post and Reply and You are not allowed to view links. Register or Login

collapse

* Search


* Recent Replies

How To Get Web Traffic From Social Media by [Not Shown, Login to View]
[Oct 15, 2018]


Site contributor click in Google Ads by [Not Shown, Login to View]
[Oct 14, 2018]


my first website online by [Not Shown, Login to View]
[Sep 30, 2018]


Website Showcase - Drop Your Website Link(s) Here by [Not Shown, Login to View]
[Sep 19, 2018]


How to Apply for Payoneer Card and US Payment Service to Receive Amazon & others by [Not Shown, Login to View]
[Sep 19, 2018]


Ads plugins by [Not Shown, Login to View]
[Sep 14, 2018]


European Union laws by [Not Shown, Login to View]
[Sep 14, 2018]


price for a web design project by [Not Shown, Login to View]
[Sep 12, 2018]


WordPress on whogohost by [Not Shown, Login to View]
[Sep 07, 2018]


User ID Pageviews Plugin by [Not Shown, Login to View]
[Sep 07, 2018]


facebook ads by [Not Shown, Login to View]
[Sep 07, 2018]


How to Start Amazon affiliate marketing by [Not Shown, Login to View]
[Sep 07, 2018]


Possibility of Monetizing YouTube using a Nigerian postal address,etc ? by [Not Shown, Login to View]
[Sep 07, 2018]


Can I Build an Ecommerce Site Using Blogger? by [Not Shown, Login to View]
[Sep 04, 2018]


Creating public opinion poll on a website by [Not Shown, Login to View]
[Aug 17, 2018]


Add A Second Admin To Word press Site by [Not Shown, Login to View]
[Aug 17, 2018]


Google page ranking discontinued. by [Not Shown, Login to View]
[Aug 17, 2018]


Amazon registration in becoming an affiliate 2016 by [Not Shown, Login to View]
[Aug 17, 2018]


How to become a money maker agent by [Not Shown, Login to View]
[Aug 10, 2018]


Adding Widget to Feedburner by [Not Shown, Login to View]
[Aug 02, 2018]


Am sorry for my long break,am happy am back by [Not Shown, Login to View]
[Jul 18, 2018]


Another Course Update - Introducing Fast Track M.O.B by [Not Shown, Login to View]
[Jul 17, 2018]


Pop up ads wordpress plugin by [Not Shown, Login to View]
[Jul 14, 2018]


Information on Google Adwords by [Not Shown, Login to View]
[Jul 13, 2018]


Can I embed Images in my Blog Along With Adsense? by [Not Shown, Login to View]
[Jul 13, 2018]


Amount of Disc Space for A News Site by [Not Shown, Login to View]
[Jul 13, 2018]


Which Chamber, 1, 2 or 5? by [Not Shown, Login to View]
[Jul 13, 2018]


Amazon Identity Verification by [Not Shown, Login to View]
[Jul 13, 2018]


Building With WordPress: Can't find some plugins by [Not Shown, Login to View]
[Jul 13, 2018]


New Facebook page for every new business idea you want to promote? by [Not Shown, Login to View]
[Jul 13, 2018]

Author Topic: malware threats hold your smartphone to ransom  (Read 446 times)

0 Members and 1 Guest are viewing this topic.

Offline [Not Shown, Login to View]

  • Level 3 (Regular)
  • ***
  • Posts: 216
  • Respect: +28
  • Gender: Male
  • Location: abuja
  • My Rank: 22
A new range of malware applications collectively known as
ransomware is targeting smartphones as cyber criminals look for creative
ways to extract money from people.
According to security company Fortinet, the threat of ransomware should
oblige smartphone owners to take extra precautions when downloading
applications.
"Ransomware threats have been big on mobile phones this year, from the
emergence of the first variant targeting iOS devices to the first Android
variant that encrypts phone data", said Ruchna Nigam, a security
researcher at FortiGuard Labs, a division of Fortinet.
Fake copies of popular apps can open the door of your smartphone to
malware applications. (Duncan Alfreds, Fin24)
This malicious software is able to lock down smartphones and criminals
usually demand payment on the promise that the devices will be unlocked.
However, most security experts do not advise paying up, as there is no
guarantee that the device will be unlocked, or, even if the smartphone is
unlocked, whether the crooks can simply send multiple locking instructions.
Targets
Cyber criminals often use major events or news stories to scam people into
downloading a malicious application.
For example the Soccer World Cup in Brazil saw a number of malware
applications being hawked on the internet. Where Google and others
blocked apps on online platforms, hackers used social engineering tricks to
get smartphones owners to install malware.
Security company Kaspersky Lab recently unveiled an Android malware
called Svpeng that has turned its attention to English speakers.
Once activated, the malware is able to lock people out of their mobile
devices and demand payment through accounts that are difficult to trace.
"It is impossible to repel an attack of American Svpeng if a mobile device
doesn't have a security solution, the malware will block the device
completely, not separate files as Cryptolocker did. If it happens to you, you
can do almost nothing", said Roman Unuchek, senior malware analyst at
Kaspersky Lab.
Here are the top malware applications currently prowling for mobile
devices, according to Fortinet:
Simplocker , discovered in June 2014
- It hides in other applications and targets Android devices by encrypting
common user files (with extensions jpeg, jpg, png, bmp, gif, pdf, doc, docx,
txt, avi, mkv, 3gp and mp4). It demands payment via a lock screen and
even after the application is deleted, the files are still unreadable.
Cryptolocker for mobile, discovered in May 2014
- Disguises itself as a video downloader and doesn't do any damage to the
device. However, is launches a nag screen every five seconds that
purports to be a message from the local police, making use of the smart
device near impossible.
iCloud 'Oleg Pliss' , discovered in May 2014
- Targets iCloud accounts and could potentially allow hackers to delete all
information on an iPhone. However, if you have a password on your iPhone,
you can block the attack.
FakeDefend, discovered in July 2013
- This fake antivirus runs a scan of the mobile device and 'discovers'
multiple infected files. It presses the user to buy the full version and sends
the credit card details to the cyber criminals. These details can be later
recycled for further financial crimes.
Nigam said that cyber criminals will follow technology. As people migrate
from the PC to smartphones (particularly Android) hackers have adapted
strategies to target them.
"As mobile device adoption continues to gain pace, hackers have found a
new lucrative target in handsets, in addition to traditional PCs."


moving to greater height

 

Related Topics

  Subject / Started by Replies Last post
Malware Attack

Started by [Not Shown, Login to View] Online Businesses

17 Replies
1707 Views
Last post Jan 28, 2014
by [Not Shown, Login to View]

TinyPortal © 2005-2011
SimplePortal 2.3.5 © 2008-2012, SimplePortal