I fell for it the first time I answered a call. A friendly female voice hesitated, then giggled the line, “Can you hear me?” After I answered, “Yes”, it took me a few seconds to realize I had been fooled. It wasn’t a silly girl with a bad connection calling me on behalf of Disney Vacations – I had just been targeted by a robocaller. By then it was too late.
Ever answered your mobile phone only to find silence? Or that a machine has called you? Or even that it’s a completely unexpected call from someone claiming to be from the Internal Revenue Service (IRS)?
After years of using hotspots, many of us who connect our PCs via Wi-Fi away from home have learned the difference between secured and unsecured networks – and are now smarter and safer when we get online at the café or airport. But our connection habits are changing. In 2016, average smartphone usage grew 38 percent, and more mobile phone traffic – nearly 60 percent – was handled by Wi-Fi hotspots than by cellular networks, putting our phones at risk, too. Add the proliferation of Internet of Things (IoT) devices, and today’s Wi-Fi threats can outpace even the tech-savviest among us. Because we have greater mobility and connectivity, hackers are motivated to take advantage of our need for both.
Mobile threats are on a rise, becoming more sophisticated and difficult to detect. We expect that in 2018 it will reach the same magnitude as PC malware.
Ghost Push is a malware family that exploits vulnerabilities to gain root access to Android devices to then download and review other apps in the background. Using social engineering, users are tricked into downloading Ghost Push from third party app stores or via links sent in text messages. Once installed, Ghost Push tries to gain root access. As the name suggests, Ghost Push acts in a ghostly fashion once it has root access, meaning infected users don’t notice anything – everything happens in the background. Recently, a new variant of the Ghost Push malware, Gooligan, was detected spreading in the wild. The Gooligan variant steals email addresses and authentication tokens stored on the infected devices, gaining access to users’ Google account data, including Gmail and Google Play. More than one million users’ Google Play accounts were affected.
We are excited to announce the winners of Avast’s #LoveYourInternet giveaway. Eilish K. from London, England and Ryan B. from Maryland, USA, won a new Google Pixel phone for sharing why they love the Internet.
Our Q3 2016 report looks at this summer’s most power draining apps and the hottestapp and smartphone trends.
Unwanted calendar invitations have invaded the calendars of iOS and Mac users for the past week. These messages seem to be targeted to everyone with an iCloud email account via invitations on the calendar. There have also been reports th…
Truecaller, CM Security, and Sync.ME, three popular caller blocking and ID apps used by millions of customers, have just been outed for storing the contact details of three billion people in publicly searchable databases. According to Digital Journal, research published earlier this week by Factwire, a group of investigative journalists in Hong Kong, said that the mobile phone numbers of politicians, celebrities, and billions of other people, can be found via searches on the app publisher’s websites.