вторник, 3 декабря 2019 г.

Эксперты по кибербезопасности: Android - самая уязвимая для слежки операционная система



Как следить за человеком через телефон, как прослушать чужой телефон, как читать чужие смс, как читать ВК, как следить за женой (мужем) через смартфон, как взломать телефон, как мошенники воруют данные, как подглядывают через камеры телефона, какой мессенджер самый безопасный, взлом Wi-Fi и многие другие вопросы рассматривают сотрудники компании GROUP-IB. Эта российская компания специализируется на кибербезопасности и кибер-расследованиях https://www.group-ib.ru
Телеграмм канал компании Group-IB: https://t.me/Group_IB
Новости про хакеров, расследование кибератак, анализ мошеннических схем - кибербойцы из Group-IB знают о киберпреступности всё, но рассказывают только самое интересное.

Cybersecurity experts: Android is the most vulnerable operating system for snooping

How to follow a person through a phone, how to listen to someone else’s phone, how to read someone else’s SMS, how to read VK, how to follow a wife (husband) through a smartphone, how to hack a phone, how scammers steal data, how to peek through phone’s cameras, which messenger is the safest , hacking Wi-Fi and many other issues are considered by the employees of GROUP-IB. This Russian company specializes in cyber security and cyber investigations: https://www.group-ib.ru
Telegram channel of the Group-IB company: https://t.me/Group_IB
News about hackers, investigation of cyberattacks, analysis of fraudulent schemes - cyber-fighters from Group-IB know everything about cybercrime, but tell only the most interesting.
Group-IB is one of the leading providers of solutions aimed at detection and prevention of cyberattacks, online fraud, and IP protection. Group-IB Threat Intelligence system was named one of the best in class by Gartner, Forrester, and IDC.
Group-IB’s technological leadership is built on company’s 16 years of experience in cybercrime investigations all over the world and 60 000 hours of incident response accumulated in the largest forensic laboratory and a 24/7 CERT-GIB.
Group-IB is a partner of INTERPOL, Europol, and a cybersecurity solutions provider, recommended by SWIFT and OSCE. Group-IB is a member of the World Economic Forum.

How Do I Know if My Smartphone Is Infected With Malware?

Mobile malware is being developed, refined and distributed at an extraordinary rate. Unfortunately, it can be difficult to determine if you have been infected and, if you have, what should be done to remediate the issue. If you are at all suspicious that you have downloaded malware, you should trust your instincts and take action, but there are certain signs you can look for that signal a malware infection on your smartphone.

What Is Malware?

Criminal organizations with significant expertise and resources are finding lucrative targets in small and large businesses, ensnaring them in intricate schemes that can include a combination of malicious code, false identities that take advantage of trusted relationships and simple human error.
Programs, apps, application programming interfaces (APIs) and websites can all carry malicious pieces of code that can not only “infect” a host device, but can also do less noticeable things like capture inputs, scrape information from contact lists, share location and mine cryptocurrencies — all of which can eventually result in stolen credentials, stolen identity, stolen resources or a ransomware attack.

Security Awareness and Suspicion

The biggest reason for the rise in security breaches and exploits is that most of us have a trusting nature, even though we know that some free apps can be fishy. There are two simple things we all can do to prevent a malware infection: Maintain a higher level of skepticism and suspicion around our technology, and put software or services in place to monitor for a breach.

Signs of Infection

Some types of infection, called “exploits” by the security community, have a noticeable effect on the performance, reliability or function of a computer or mobile device — others do not. The most talented hackers will attempt to make their exploits act silently and without raising alarms from the unsuspecting users.
Statistically, there is a high likelihood that you will encounter an infection many times during your life. Many of them won’t have an immediate or drastic effect, but that doesn’t mean you shouldn’t do everything you can to avoid them.

Sign #1: Speed Reduction

There are types of exploits that are interested mostly in using the computing power in your device. Modern smartphones and tablets have processing power and storage that rival what we would have called a supercomputer just a few years ago, and unless you are an avid gamer or heavy multitasker, you probably don’t use very much of that power during an average day.
You may notice that apps take longer to load, or web pages pause before responding to clicks. There can, of course, be a lot of causes for this, and unsuspecting users usually just ignore it and blame the carrier or Wi-Fi — but keep in mind that speed reduction can be a symptom of a malware attack.

Sign #2: Battery Life Reduction

If your device is the target of an infection, quite often this will manifest as a noticeable degradation in the life of your battery. As is the case with speed reduction, most users have adapted to the idea that batteries become less efficient over time, making you all the more susceptible if you use an older device, when in fact it could be a malicious strain attacking your battery’s performance.

Sign #3: Device Temperature

An unmistakable sign of an active phone is heat. Especially while idle, your device shouldn’t be particularly warm to touch. Both the processors and the power being consumed by active antennae generate significant heat when they are busy for extended periods of time, and suggest computation and communication are happening beyond the typical background alerts and updates.

Modern Antivirus

Rather than hope that intuition is enough to identify the presence of malware before it does damage, you can install a modern antivirus tool that applies artificial intelligence (AI) and machine learning to identify threats at the code level.
Early antivirus software would use scans of your storage to see if a virus could be spotted. This method, however, is no longer terribly effective. As new viruses were created, software updates became necessary to identify viruses, which delayed discovery by days or even weeks and often slowed down other operations.
Modern antivirus software does a great deal more in an intelligent and adaptive fashion. It is so different, in fact, that some professionals classify it as endpoint protection or endpoint detection software. Modern antivirus software doesn’t need constant updates to find new threats. Using built-in AI algorithms, the software identifies suspicious code before it runs, and then quarantines any malicious programs. Every computer running these protections can contribute information to the AI, so the algorithm becomes smarter on its own.

How Do I Remove Malware?

The range of malware types makes it difficult to identify a single set of steps or processes for removing all types of exploits. Some organizations with employees that regularly travel to high-risk countries, such as Stanford University, ask that employees leave all of their computing devices at home or destroy them upon return.

Short of pulverizing your smartphone, there are a few things you can try:

* Delete your browser cache
* Uninstall any unused apps
* Install a modern antivirus that can quarantine infected files and apps
* Reset your device to factory settings
* Ensure that the latest OS and security updates are installed

When it comes to onboard security protections, some mobile device manufacturers set higher standards than others. Samsung’s devices with Samsung Knox have a hardware-protected core that can help ward off exploits.
Malware today can develop just as quickly as traditional antivirus software cycles updates, with diabolical sophistication and broad variety. If you are going to prevent infection on your device, a modern antivirus solution is strongly recommended.

More info: LINK

Комментариев нет:

Отправить комментарий