!!

Welcome Guest

You are viewing this forum as a guest therefore You are Not Allowed to Post and Reply and You are not allowed to view links. Register or Login

collapse

* Search


* Recent Replies

How to Apply for Payoneer Card and US Payment Service to Receive Amazon & others by [Not Shown, Login to View]
[Dec 16, 2017]


Website design issUe by [Not Shown, Login to View]
[Dec 16, 2017]


Joint venture on a single site by [Not Shown, Login to View]
[Dec 16, 2017]


don't have a website but still wants to run the online marketin by [Not Shown, Login to View]
[Dec 09, 2017]


Webhost purchase by [Not Shown, Login to View]
[Dec 09, 2017]


Payoneer Application by [Not Shown, Login to View]
[Dec 09, 2017]


Bing Ads And Google Adwords Payment Methods by [Not Shown, Login to View]
[Dec 07, 2017]


Selling Ebooks At Amazon by [Not Shown, Login to View]
[Nov 26, 2017]


facebook fan page by [Not Shown, Login to View]
[Nov 26, 2017]


Pay Per Click Fraud. by [Not Shown, Login to View]
[Nov 20, 2017]


Amazon Images/Images from Amazon by [Not Shown, Login to View]
[Nov 19, 2017]


Amazon Tracking of associate IDs Faulty by [Not Shown, Login to View]
[Nov 18, 2017]


Facebook Ads Payment by [Not Shown, Login to View]
[Nov 18, 2017]


how can i put html text and html tag into the notepad by [Not Shown, Login to View]
[Nov 17, 2017]


Direct log in to blogger by [Not Shown, Login to View]
[Nov 15, 2017]


facebook ads by [Not Shown, Login to View]
[Nov 03, 2017]


How to make a 3D E-book Cover (E-Cover)? by [Not Shown, Login to View]
[Nov 01, 2017]


How Can I Change Or Beautify My New YouTube Page by [Not Shown, Login to View]
[Oct 31, 2017]


Any Free Wordpress Theme For uni/poly Portals? by [Not Shown, Login to View]
[Oct 31, 2017]


How long by [Not Shown, Login to View]
[Oct 30, 2017]


How do I continue? by [Not Shown, Login to View]
[Oct 30, 2017]


E-commerce Site by [Not Shown, Login to View]
[Oct 22, 2017]


Confused by Namecheap renewal fees by [Not Shown, Login to View]
[Oct 21, 2017]


Effective Paid Traffic Channel by [Not Shown, Login to View]
[Oct 20, 2017]


WordPress font by [Not Shown, Login to View]
[Oct 20, 2017]


pdf (ebook) from laptop to gmail acoun by [Not Shown, Login to View]
[Oct 18, 2017]


Website Traffic Season 12 - Amazing all-in-one tool for Google, Youtube, Amazon. by [Not Shown, Login to View]
[Oct 15, 2017]


Show/Hide Widgets in Blogspot Mobile Template by [Not Shown, Login to View]
[Oct 15, 2017]


How to Get Original Image For My Local News Blog by [Not Shown, Login to View]
[Oct 15, 2017]


how to create ebook covers by [Not Shown, Login to View]
[Oct 15, 2017]

Author Topic: malware threats hold your smartphone to ransom  (Read 273 times)

0 Members and 1 Guest are viewing this topic.

Offline [Not Shown, Login to View]

  • Level 3 (Regular)
  • ***
  • Posts: 216
  • Respect: +28
  • Gender: Male
  • Location: abuja
  • My Rank: 22
A new range of malware applications collectively known as
ransomware is targeting smartphones as cyber criminals look for creative
ways to extract money from people.
According to security company Fortinet, the threat of ransomware should
oblige smartphone owners to take extra precautions when downloading
applications.
"Ransomware threats have been big on mobile phones this year, from the
emergence of the first variant targeting iOS devices to the first Android
variant that encrypts phone data", said Ruchna Nigam, a security
researcher at FortiGuard Labs, a division of Fortinet.
Fake copies of popular apps can open the door of your smartphone to
malware applications. (Duncan Alfreds, Fin24)
This malicious software is able to lock down smartphones and criminals
usually demand payment on the promise that the devices will be unlocked.
However, most security experts do not advise paying up, as there is no
guarantee that the device will be unlocked, or, even if the smartphone is
unlocked, whether the crooks can simply send multiple locking instructions.
Targets
Cyber criminals often use major events or news stories to scam people into
downloading a malicious application.
For example the Soccer World Cup in Brazil saw a number of malware
applications being hawked on the internet. Where Google and others
blocked apps on online platforms, hackers used social engineering tricks to
get smartphones owners to install malware.
Security company Kaspersky Lab recently unveiled an Android malware
called Svpeng that has turned its attention to English speakers.
Once activated, the malware is able to lock people out of their mobile
devices and demand payment through accounts that are difficult to trace.
"It is impossible to repel an attack of American Svpeng if a mobile device
doesn't have a security solution, the malware will block the device
completely, not separate files as Cryptolocker did. If it happens to you, you
can do almost nothing", said Roman Unuchek, senior malware analyst at
Kaspersky Lab.
Here are the top malware applications currently prowling for mobile
devices, according to Fortinet:
Simplocker , discovered in June 2014
- It hides in other applications and targets Android devices by encrypting
common user files (with extensions jpeg, jpg, png, bmp, gif, pdf, doc, docx,
txt, avi, mkv, 3gp and mp4). It demands payment via a lock screen and
even after the application is deleted, the files are still unreadable.
Cryptolocker for mobile, discovered in May 2014
- Disguises itself as a video downloader and doesn't do any damage to the
device. However, is launches a nag screen every five seconds that
purports to be a message from the local police, making use of the smart
device near impossible.
iCloud 'Oleg Pliss' , discovered in May 2014
- Targets iCloud accounts and could potentially allow hackers to delete all
information on an iPhone. However, if you have a password on your iPhone,
you can block the attack.
FakeDefend, discovered in July 2013
- This fake antivirus runs a scan of the mobile device and 'discovers'
multiple infected files. It presses the user to buy the full version and sends
the credit card details to the cyber criminals. These details can be later
recycled for further financial crimes.
Nigam said that cyber criminals will follow technology. As people migrate
from the PC to smartphones (particularly Android) hackers have adapted
strategies to target them.
"As mobile device adoption continues to gain pace, hackers have found a
new lucrative target in handsets, in addition to traditional PCs."


moving to greater height

 

Related Topics

  Subject / Started by Replies Last post
Malware Attack

Started by [Not Shown, Login to View] Online Businesses

17 Replies
1128 Views
Last post Jan 28, 2014
by [Not Shown, Login to View]

TinyPortal © 2005-2011
SimplePortal 2.3.5 © 2008-2012, SimplePortal