Saturday, October 5, 2024

iPhone owners told to use two-second trick to thwart invisible cyberattack

Must read

A TWO-SECOND trick can help smartphone owners thwart invisible cyberattacks and help prevent hackers from spying on them.

The little-known tip helps stop so-called ‘zero click’ attacks, which can download spyware onto a device without the owner clicking a link or installing a dodgy app.

1

Hackers prey on a software or network vulnerability to execute zero-click attacks

These invisible attacks let hackers snoop on your phone from a remote location.

They often result in bank fraud after hackers steal a victim’s credentials.

But the US National Security Agency (NSA) has revealed that switching your smartphone off can prevent this.

Doing so allows the device to clear out background data that is stored by apps or the victim’s internet browser.

It also automatically logs them out of their banking app and social media accounts.

KEEP SAFE

Hackers prey on a software or network vulnerability to execute zero-click attacks.

This can be anything from a iOS flaw to a dodgy public Wi-Fi or Bluetooth network.

To avoid this, it’s advised your iPhone or Android is updated to the latest software.

Fraud website run in UK used to fleece up to 70,000 Brits taken down by cops in huge operation at 37 arrested

Both the NSA and the FBI warn against the use of public Wi-Fi networks because of their security concerns.

A lot of people use banking apps or enter financial information into their smartphones while on public Wi-Fi.

This behaviour puts that information at risk if people are accidentally using a hacker network.

Cybercriminals have been known to set up fake Wi-Fi hotspots in public spaces with names similar to those of an official network.

You may spot this in an airport, cafe, or another spot where there is legitimate public Wi-Fi that can be taken advantage of.

The FBI says on its website: “Be careful when connecting to a public Wi-Fi network and do not conduct any sensitive transactions, including purchases, when on a public network.”

However, hackers can also lure victims into installing bank-raiding spyware through fake apps.

How to spot a dodgy app

Detecting a malicious app before you hit the ‘Download’ button is easy when you know the signs.

Follow this eight-point checklist when you’re downloading an app you’re unsure about:

  1. Check the reviews – be wary of both complaints and uniformly positive reviews by fake accounts.
  2. Look out for grammar mistakes – legitimate app developers won’t have typos or errors in their app descriptions.
  3. Check the number of downloads – avoid apps with only several thousand downloads, as it could be fake.
  4. Research the developer – do they have a good reputation? Or, are totally fake?
  5. Check the release date – a recent release date paired with a high number of downloads is usually bad news.
  6. Review the permission agreement – this agreement gives permission for the app to take bits of your data, and fake apps often ask for additional data that is not necessary.
  7. Check the update frequency – an app that is updated too frequently is usually indicative of security vulnerabilities.
  8. Check the icon – look closely, and don’t be deceived by distorted, lower-quality versions the icons from legitimate apps.

All of this information will available in both Apple’s App Store and the Google Play Store.

Latest article