When one searches for an app on Apple or Google’s Play store, there will be a list of apps that resemble the original one, but are actually fake copies. Even if Apple – as well as Google – have a tough scrutiny of apps, new malicious apps appear every day.
This month, the biggest fake app scandal on Google Play store happened with the Indian BHIM app, launched to enable citizens to make digital payments. Numerous duplicates soon followed, some of them asking for permissions to review users’ personal information.
If an app is not free, or if it’s a shopping app that requires credit card info, or happens to be any other payment-related app, it is potentially very hazardous for the person who’s downloading a look-alike application.
It has been asserted that while some apps simply have the aim to share ads, there are also many that seek to steal the user’s identity and credit card information. These apps can use malware to steal personal information or can even tinker with the phone and lock it up until the user pays a ransom.
Simple tips about recognizing the fake apps:
1. Incorrect use of language. Since most fake apps are made in haste, often where English is not a native tongue, they might use broken English grammar. Users should pay attention to spelling and grammar in any app descriptions if they have any doubts about its originality.
2. Lack of reviews. Fake apps typically won’t have any user reviews – so that’s a definite sign an app could be a fake.
3. It’s especially important to pay attention to retail apps. Many fake retail apps pop up before major holidays – such as Zappos, Nordstrom, Christian Dior and many others. Retail apps that ask users for their credit card info should be especially monitored.
4. Correct developer’s name. Users need to check for the name of the developer in the corresponding category, and avoid downloading apps that have a wrong or misspelled developers’ name.
5. Website domains in the title. Some apps will feature the website in their title – that might also be a red flag.
6. Variety of Apps. If an app is fake, the developer is likely making all sorts of apps that can cover anything from gardening to games to retail shopping.
7. Leading to the website. If it’s a paid app or if it conducts any transactions and if it does not lead to a company website, something is amiss.
8. Deals. If the app promotes a deal that is too good to be true, be suspicious.
Overall, staying vigilant when downloading apps is just one example of avoiding threats to your personal data. Internet users can also be proactive in ensuring they are taking additional steps to stay private and secure online.
The list of some of the most important privacy and security apps of 2017:
Signal is an encrypted messaging and voice calling app that provides end-to-end encryption to secure all communications. The app can also verify the identity of people one is messaging with and the integrity of the channel they are using. When texting with non-Signal users, one has an option to invite them to an encrypted conversation via Signal.
NordVPN (Virtual Private Network provider) is a must-have encryption app. A VPN encrypts the data shared across the Internet, and is the best security mechanism to ensure the Internet traffic remains confidential. NordVPN has a reputation of focusing on security and having a zero logs policy, is fast and easy to use. The developers at NordVPN have launched a powerful new VPN app for Android, iOS, Mac and Windows devices that is also intuitive and focused on user experience. NordVPN app re-routes and encrypts all Internet traffic making the connection private and secured. For added security, NordVPN offers DoubleVPN servers.
my Secure email is an email app for managing various email accounts from various providers, which puts security first. It offers encryption of sent emails, lock screen, password-protected digital signature and more. In addition, there are a few other good examples of secure email providers, including Tutanota, or the Gmail-like ProtonMail that offer an automatic end-to-end encryption, and no personal information is required to create a secure email account.
DuckDuckGo is for those who want more private browsing experience. It’s a search engine that provides information from hundreds of sources, and keeps the search private.
Besides security and privacy apps, everyone should be extra vigilant when sharing information on their devices, encrypt when using public Wi-Fi, update antivirus software, fire-up the the firewall and always use strong passwords.
Guest Post: Is Your Network Protected? Cyber Crime in the Age of Information
Posted in Commentary with tags IBISWorld on January 28, 2017 by itnerdBy Mallory Weiler
Within the last four years, online security and data breaches have grown increasingly threatening, compromising big name companies such as Target, Home Depot and Sony Corporation. Yahoo became the most recently identified victim of a major hacking in mid- December of 2016, although the breach dates back as far as 2013. The attack compromised 1.5 billion user accounts, which is reportedly the largest of all time. Affected users have been advised to change all passwords associated with their Yahoo accounts, and surveillance technology is reportedly being designed to allow companies to more easily monitor customer accounts. Despite this, Yahoo is currently in negotiations to sell its core businesses to Verizon Communications and change its name to Altaba. However, because the merger discussions were started before the recent discovery of Yahoo’s breach, Verizon has not yet reached full conclusions on closing the deal. As such, they are expected to reevaluate the terms in the second quarter of this year.
While cyber crime often targets companies for immediate financial gain, hacking in the United States is by no means limited to the theft of personal information or card numbers taken from major businesses. According to the US Intelligence Community, Russia sought to influence the 2016 US presidential election in the most daring and direct attack thus far. This release states: “In July 2015, Russian intelligence gained access to Democratic National Committee (DNC) networks and maintained that access until at least June 2016.” By acquiring this information, Russian hackers were able to provide WikiLeaks with key material that fueled negative public perception of presidential candidate Hillary Clinton. Considering the scope of these attacks, it is reasonable to expect that larger-scale threats will only become more commonplace.
A 2016 report by the Ponemon Institute, an independent data security research firm, found that companies that experience a data breach in the US pay an average of $158 per record for recovery, which includes any sensitive, protected or confidential data that has been lost or stolen. Additionally, as the percentage of services conducted online grows, the amount of sensitive information available to hackers also rises, increasing the risk of cyber attacks. In fact, IBISWorld estimates that the share of services conducted online will grow 4.7 percentage points from 2017 to 2020. Fortunately, there are steps businesses can take to help insulate themselves against security breaches, including leveraging network security equipment, security software and IT consulting services.
Network Firewall Security Equipment is an electrical component that typically includes a firewall designed to block unauthorized digital access while simultaneously allowing outgoing communication. Such security equipment also allows users to customize their overall level of protection and network encryption. Specialization of the firewall is specific to individual companies based on how they interact with and use the internet; different functions require various capabilities. Due to the growing threat of online data breaches, demand for network firewall security equipment has been rising, although the availability of substitutes has prevented faster growth. As such, prices have been rising at an annualized rate of about 1.2% in the past three years. IBISWorld forecasts, however, that prices will stagnate from 2017 to 2020 due to declining input costs.
This kind of security equipment is typically ideal for small businesses- especially those that operate retail locations, which experience a high volume of traffic from smartphones and other devices that connect to their wireless network. However, large pieces of network firewall security hardware often require climate-controlled office spaces and significant maintenance work that some small firms may not have the means to provide. In cases such as these, the buyer will have to look to other, less costly security options.
Security Software is another option for small and midsize businesses, and typically provides virtual firewall protection and resistance to intrusion. The software also reports instances of malware detection to the supplier so the software can be updated on other machines, which allows it to better field disturbances on machines that have not yet been infected.
Many of these software products can also purge any intrusive software it discovers. Security software is simple to install and operate on most machines, setup is generally very easy and the software is continuously updated to battle the latest invasions automatically. As a result, small businesses without the resources for large-scale hardware purchases can easily buy and implement software as a cybersecurity solution. Companies like Norton, Avast and AVG also offer complimentary (i.e. open- source) cybersecurity software for businesses and individuals. The intense resultant competition at the production level has been contributing to a 0.9% annualized decrease in the market price of security software over the past three years. IBISWorld also forecasts that despite growing demand, an influx of new software suppliers will contribute to a continued 0.9% annualized decline in prices through 2020.
IT Consulting Services are typically employed to assist in the auditing, development and implementation of proprietary security systems or software. While security software is preferable to smaller companies, IT consultants are typically only used in large-scale projects, so their buyers tend to be large corporations with large budgets. This is because it takes years of providing quality service for these consultants to establish brand equity. Consultants rely on their brand names to win business, which curbs the speed at which new players can enter the market. As a result of these factors, IT consulting is a costlier option in relation to hardware and software solutions.
Michelle Hovanetz, a Lead Business Research Analyst at IBISWorld, states that, “rising technology usage has bolstered demand, leading to growth in prices.” As such, suppliers have raised the price of IT consulting at a rate of about 1.2% per year on average from 2014 to 2017. Hovanetz continues by adding, “Fortunately, an increasing number of suppliers in the market helps to offset the speed at which prices grow.” IBISWorld forecasts that demand for these services will lead to price growth at a slightly slower annualized rate of 1.1% in the three years to 2020.
Keeping Your Business Safe
As businesses’ operations continue to be transformed by innovations in technology and automation, their sensitive data will become increasingly vulnerable to attacks. Without sufficient defensive measures in place, businesses will face a higher risk of incurring massive damages. With the threat that hackers, both domestic and foreign, will only intensify their cyber operations in the coming years, there is no better time to invest in cybersecurity measures. In fact, cybersecurity is the top spending priority for 2017, according to a survey conducted by The National Association of State CIOs. This also includes cybersecurity insurance, which has become increasingly important as more companies work to mitigate financial losses brought on by cyber threats. Although it is unknown what kind of payout Yahoo will incur, past breaches indicate that it is common for companies to be required to compensate affected customers for any inconveniences. Compared to the costs of a potential data breach, IT infrastructure protection and its accompanying insurance are relatively inexpensive. Whatever the size of the business, there are comprehensive, affordable cybersecurity solutions available. Businesses should protect themselves now—can you afford not to?
For a printable Is Your Network Protected? Cyber Crime in the Age of Information, click here.
Leave a comment »