Okay.. Let’s cast a critical eye..
At the bottom of an article about how, for a few bucks, ANY-one can buy a ‘kit’ and make their own Android Ransomware (see, Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds) we are advised how to ‘stay safe’ from such unhappy things..
How to Protect Your Android Devices from Ransomware Attacks
In order to protect against such threats on mobile devices, you are recommended to:
- Always keep regular backups of your important data.
- Make sure that you run an active anti-virus security suite of tools on your machine.
- Avoid downloading apps from unknown sites and third-party app stores.
- Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store.
- Do not open any email attachments from unknown sources.
- Finally, browse the Internet safely.
And let’s analyze that advice with our critical eye:
- Always keep regular backups of your important data. Because it’s not a question of if you’ll get screwed, it’s a question of when.
- Make sure that you run an active anti-virus security suite of tools on your machine. No arguements. If it connects to the Internet you NEED this. But KNOW THIS: it’s only a semi-effective shield, NOT bulletproof armor.
- Avoid downloading apps from unknown sites and third-party app stores. Or even regular ‘stores’, as we’ve seen them get ‘poisoned’ already (Google Play Store, recently [see https://thehackernews.com/2017/08/android-ddos-botnet.html]). So let’s just change it to: Do NOT download apps.
[edit 9/18: and yet again. See this http://thehackernews.com/2017/09/play-store-malware.html.] - Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store. Utterly pointless to advise this. First of all no one will. Second, were ‘average people’ to start doing this, they’d have no clue what all that ‘tech jargon’ means. And 3rd, most apps don’t offer you any choices with ‘Permissions’ – if you want the app, you have to accept the ads and the spying. So let’s just use my #3 as our guide.
- Do not open any email attachments from unknown sources. Um. People who still do this have never read a tech article in their life. So they aren’t seeing this.Those who do (read articles) KNOW email is still a favorite way for the criminals to infect your machine. MY advice? Unless someone you know has told you, “I’m sending you a document”, don’t open it – period.
- Finally, browse the Internet safely. What? Great advice! Only one problem — there is no such thing. ( Um … I guess that translates to “don’t look at pron”?)
- Do not ‘jailbreak’ or ‘root’ your device. (Okay.. so I had to add one.)
* * *
Today’s quotable quote: “Lighten up, just enjoy life, smile more, laugh more, and don’t get so worked up about things.” ~ Kenneth Branagh
Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Just don’t download any apps..
Guys, I have long told people, if you don’t absolutely need it, don’t install it (and you sure as shooting don’t need five media players..). Well now there’s even more reason to repeat that advice.
* More than 1,000 Spyware Apps Found On Android App Stores
“If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently …” Read More..
Update: 500+ Android apps found containing program that can download spyware plug-in
“More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users’ call histories.. Apps using the ad SDK, a product called Igexin, were downloaded over 100 million times by Android device owners before Google removed these programs from its store..” Read more..
Tell your friends.
Addenda: I have been asked my thoughts on Wikileaks and the (alleged) CIA hacking tools (such as this one, posted today) often enough now that I think I should mention them here.. please don’t think the CIA are the only folks who can do/are doing these ‘exploits’. They basically copied from the hackers. These things are possible because all our devices/technologies are inherently, fundamentally, insecure. (Don’t believe me? Read this.)
* * *
Today’s quote: “I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.'” ~ Elayne Boosler
Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
A few items for your Friday
Here are a few items for your consideration:
First up, yesterday I alerted iPhone users to the fact that Apple is urging all owners to ‘upgrade’ to the latest version of iOS. Here’s more on why that’s a really good idea:
[ NOTE: “zero-day” is Geekspeak for “an attack for which we currently have no defense”.]
* Three zero-days found in iOS, Apple suggests users update their iPhone
“Pegasus is highly advanced in its use of zero-days, obfuscation, encryption and kernel-level exploitation and the malware has been active for some time..” Read more..
And a couple more..
“Whether you’ve got a brand-new Galaxy Note 7 or an older Android phone or tablet you just want to spruce up, these are the apps that matter.” Read more..
* The Best Laptops for College
“Need a light, affordable laptop you can carry all over campus? These 10 affordable picks make the grade.” Read more..
And last but certainly NOT least…
* WhatsApp to Share Your Data with Facebook — You have 30 Days to Stop It
“Nothing comes for Free, as “Free” is just a relative term used by companies to develop a strong user base and then use it for their own benefits. The same has been done by the secure messaging app WhatsApp, which has now made it crystal clear that the popular messaging service will begin sharing … ” Read more..
[ NOTE: that “sharing” includes your phone number.. but sheeze, you don’t think FB doesn’t already know your phone number?? ]
* * *
Today’s quote: “Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition.” ~ Steve Jobs
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
The top 100 Android apps
Folks, PC Magazine has published its “Best of” review for Android apps. Click the link, then choose a category (I suspect many of you will check out the “Games” category.. )
“Whether you’ve got a brand-new Galaxy Note 7 or an older Android phone or tablet you just want to spruce up, these are the apps that matter.” Read more..
Today’s quote: “Never be bullied into silence. Never allow yourself to be made a victim. Accept no one’s definition of your life; define yourself.” ~ Harvey Fierstein
… that’s a nice one. But, it’s the nail that sticks up which gets hammered down… So I would (try to) choose my battles wisely.
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
More happy news for your Friday
(I hope you didn’t eat at a Wendy’s recently..)
Absolutely none of this should surprise you.
First up:
* Hackers Can Steal Your ATM PIN from Your Smartwatch Or Fitness Tracker
“As your day-to-day apparel and accessories are turning into networked mobile electronic devices that attach to your body like smartwatch or fitness band, the threat to our personal data these devices collect has risen exponentially.” Read more..
(There are Privacy concerns with those dang things too, BTW.)
And..
* Flaw Allows Attackers to Remotely Tamper with BMW’s In-Car Infotainment System
“The Internet of things or connected devices are the next big concerns, as more Internet connectivity means more access points which mean more opportunities for hackers. When it comes to the threat to Internet of Things, Car Hacking is a hot topic. Since many automobiles companies are offering..” Read more..
* This Android Hacking Group is making $500,000 per day
“The bad news for affected Android users is that Hummer is extremely difficult if not impossible to get rid of, because the Trojan takes control of the phone at admin level, making it impossible for traditional antivirus tools to uninstall Hummer.
The dangerous part: It is impossible to delete the Trojan through a factory reset due to the fact Hummer comes equipped with up to 18 different separate rooting exploits that allow it to root itself on a phone..” Read more..
( Infecting a million phones each day…!!! )
And last but not least..
* Over 1000 Wendy’s Restaurants Hit by Credit Card Hackers
“The Popular fast-food restaurant chain Wendy’s on Thursday admitted that a massive cyber attack had hit more than 1,000 of its restaurants across the country. The burger chain did not speculate how many people may have been affected, though it did confirm that the hackers were able to steal its …” Read more..
So.. let’s see if I can come up with a good quote after all that news..
Today’s quote: “Life is a mirror and will reflect back to the thinker what he thinks into it.” ~ Ernest Holmes
(And I’m thinkin’ it’s time to Just Say No to our current tech… All of us.)
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Tips for the Android ‘Battery Drain’ problem
A few of you might find the following very helpful:
* How to fix the Android battery drain issue with these quick tricks
“If your Android device battery is draining faster than it should, Jack Wallen offers up advice that might save the day.” Read more..
* * *
Today’s quote: “Never complain and never explain.” ~ Benjamin Disraeli
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Headlines of note
Interesting ‘news’ items today.
* PayPal Vulnerability Allows Hackers to Steal All Your Money
* Supercookies are back, and they’re as unappealing as ever
“Supercookies are back in force. But if supercookies are so great for consumers, why aren’t mobile carriers bragging about using them?” Read more..
* Scanner identifies thousands of malicious Android apps on Google Play, other markets
“A team of researchers have created an app vetting scanner referred to as “MassVet,” and they used it to identify more than 127,000 potentially harmful applications (PHA) in more than 30 Android markets – including Google Play.” Read more..
* The Internet of Things is a safety issue, and therefore a business risk
“When you merge the physical and the digital, it’s not just about InfoSec any more. People’s lives could be at risk.” Read more..
* Adobe Flash steadily heading toward demise
“After multiple malvertising campaigns on major ad networks, including Yahoo and AdSpirit.de, as well as the disclosure of major vulnerabilities, companies have begun banning Adobe Flash ads on their websites.” Read more..
[ Well.. that’s about 5 years too late.. But, better late than blah blah. ]
* Here’s How Iranian Hackers Can Hack Your Gmail Accounts
“Hackers are getting smarter in fooling us all, and now they are using sophisticated hacking schemes to get into your Gmail. Yes, Iranian hackers have now discovered a new way to fool Gmail’s tight security system by bypassing its two-step verification – a security process that requires a security code (generally sent via SMS) along with the password in order to log into Gmail account.” Read more..
* Warning! How Hackers Could Hijack Your Facebook Fan Page With This Trick
“Facebook bounty hunter Laxman Muthiyah from India has recently discovered his third bug of this year in the widely popular social network website that just made a new record by touching 1 Billion users in a single day. At the beginning of the year, Laxman discovered a serious flaw in Facebook graphs that allowed him to view or probably delete others photo album on Facebook, even without …” Read more..
Oh, yes, there’s more, but…
Today’s quote: “It is not fair to ask of others what you are not willing to do yourself.” ~ Eleanor Roosevelt
Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.