Author Archives: Ioana Rijnetu

Google Decided to End Business with Huawei. How This Impacts Users.

Sad and worrying news for Huawei mobile users, like you and me. Google recently announced that it will no longer provide support to the giant Chinese company for many Android hardware and software operations. 

This move is followed by a Trump administration decision to add Huawei Technologies Co Ltd to the trade blacklist and impose restrictions that will affect how the company will do business with other U.S. organizations. 

On top of that, important US chipmakers like Intel, Qualcomm, and others have also joined Google and cut off deals with the Chinese company, Bloomberg reported 

So, the big US tech players decided to comply with this new legislation, but the consequences will surely impact the tech industry, consumers, and each of us, in general.  

While we are aware of the geopolitical implications involved, a trade war between China and US, which will probably lead to an imminent technological cold war, there are also actual real-life implications for those who have (at least) one Huawei device at home. 

All the buzz around the recent Huawei ban has probably sparked confusion and raised some key questions like: 

Is my Huawei device safe? Should I stop using it and switch to another alternative?  What about Android security updates? I want to purchase a new Huawei smartphone, is it safe or not? 

In this article, we’ll try to understand what’s the best approach to dealing with this situation and provide actionable and useful tips you can apply for a better user experience. 

 Here are some key aspects related to the Huawei ban to keep in mind                

The US Government applied new regulations for Huawei Chinese companies, by adding it to the “Entity List” which means it can’t “buy parts of technology from US suppliers without government approval as its equipment is considered potential tools for Chinese espionage”.  

Following this ban, the US Department of Industry and Security, Commerce said Huawei still has a 90-day “temporary general license” which allows the company to continue using the US intel with the license.  

During this limited license available until August 19, 2019, Huawei will work closely with US corporations to maintain business relationships and provide software updates for the existing Huawei devices. Read more details about this temporary license. 

From a positive perspective, ZTE telecom Chinese company went through a similar situation. It was blacklisted by the US government, but it finally lifted the trade ban and allowed the company to continue getting essential hardware parts and software from US companies.      

However, in the case of Huawei, Google decided not to provide software hardware, and technical services to the Chinese phone maker. This means that the giant tech player will control the Chinese company’s access to Android, its core operating system, and parts of it, such as: 

  • Its Play store 
  • Own applications 
  • Google Assistant
  • Gmail email service 
  • Tools that require access to third-party services. 

While the US-based technology companies such as Intel and Qualcomm decided to comply with the latest US government order, it looks like Microsoft remains silent on potential Windows ban which will block Huawei’s access to get Windows licenses. The Verge tried to reach out to Microsoft reps, but no further commend has been given on this situation. However, it appears that the company stopped selling Huawei’s MateBook X Pro, one of the Windows laptops in the US, at its online store. 

In anticipation of this move and current tensions between US government and China, Huawei has worked on a plan B and already started developing a proprietary operating system, for both smartphones and computers, as an alternative to Google’s Android OS. We’ll see how things will evolve going forward. 

“We have prepared our own operating system, if it turns out we can no longer use these systems [Android], we will be ready and have our plan B.”

declared Huawei executive, Richard Yu.

In a recent interview, Huawei’s founder Ren Zhengfei said that the company’s “5G would not be affected and predicted that no other parties would be able to catch up with the company in 5G technology in the next 2-3 years”. He also added that the U.S. authorities are underestimated Huawei’s capabilities. Are they?  

Smartphones sales experienced a decline in the first months of 2019, but Huawei saw a significant increase in shipments by 50% (all running Android OS), and “made a strong statement by growing volume and share despite market headwinds”, according to IDC new report.    

What the current Huawei device owners need to know 

Google declared that consumers who currently have a Huawei device can still use the company’s services such as the Google Play Store, Google Search, Gmail, Google Maps, and security from Google Play Protect. 

 The official statement from Huawei also confirmed that it “will continue to provide security updates and after-sales services to all existing Huawei and Honor smartphone and tablet products.” 

So, this means that all current Huawei devices will work normally, without being affected in any way. In the medium-to-long term, we don’t know exactly what’s going to happen, but it will depend on the relationship between the US and China.    

Yes, you can still perform your daily tasks, download any app from the Google Play and rest assured that all software updates are being delivered at time.  

We all know how essential software patching is and why security experts have taken every opportunity to encourage both regular users and organizations to apply them.    

Thor Foresight makes sure that link is safe!
Your parents and friends will click any suspicious link, so make sure they're protected.
Thor Foresight Home anti malware and ransomware protection heimdal security
Thor Foresight provides: Automatic and silent software updates Smart protection against malware Compatibility with any traditional antivirus.

SECURE YOUR ONLINE BROWSING!

Get Thor Foresight

 How does this situation impact any future Huawei smartphone?  

If you’re going to purchase a new Huawei smartphone in the upcoming months, there will be limitations regarding the access to Google services and other implied restrictions that you need to know about.  

  • First off, all the upcoming Huawei devices will not be certified by Google and they won’t have built-in Google’s most popular applications and programs.  

This decision won’t impact the Chinese consumers, who already can’t access most of Google’s top services, but will be reflected in Europe and other parts of the globe.  

  • Without access to Google Mobile Services, third-party developers won’t be able to use Google’s API on new Huawei handsets. 
  • For future devices, Huawei can no longer benefit from the Google Play services, but it still has access to Android OS, since it is an open source system. 
  • Each new addition Google will be done to Android via the Google Play Services will no longer be available to the Chinese company for its global devices. 
  • New versions of Huawei smartphones outside China will not ship with key Google services such as Google Play, Gmail apps, Maps, or YouTube. Even if you try to install them, they won’t work. 
  • Without access to Google Play store, users will probably try to download their apps and programs from other sources which can pose as real security risks and provide new opportunities for cybercriminals to inject malware thought fake apps. 
  • Also, new Huawei smartphones could not receive future releases of Android OS and be stuck with an old version. This means there will be no access to new improvements and features developed by the company, but we know that Huawei usually changes the standard Android experience by adding its own user interfaces.                                                                                                                                         

 Protection guide for Huawei device users 

 There’s no secret to anyone that Huawei is the largest smartphone vendor in China and a key player on the global market.  

However, the company still relies on the US suppliers to obtain hardware that will make it develop high quality and popular devices all over the world. 

If you have a deep fondness for your Huawei smartphone and you don’t want to give up on it, here are some key security measures you should apply: 

  1. Apply available software updates and consider turning on the “automatic updates” feature, if you have it. Thus, you will avoid seeing your device an easy target for as malware and ransomware which usually target outdated programs and apps. 
  2. Use a specialized security solution like Thor Free to handle software updates, automatically and silently, by allowing users to save time and energy.
  3. If your Huawei device is more vulnerable to cyber attacks, it is recommended to use a multi-layered security solution like Thor Premium Home. Given its proactive and unique threat intel, alongside a next-gen Antivirus, your sensitive information and digital life is secure and protected with a complete and all-in-one security suite. 
  4. Be proactive and stay up to date with the latest news about this debate, if you’re going to invest in a Huawei device. Make sure you follow the company’s latest announcements on this matter and keep an eye on the security updates for your specific device.
  5. Learn about the online dangers and build a strong defense against cyber threats by checking out one of our valuable educational resources that will teach you actionable and applicable security tips.      
Final thoughts 

In the long run, this decision coming from the US Government to crack down the Chinese companies will probably escalate to something even bigger. There’s an ongoing battle between the United States and China which we don’t know exactly how will end, but the future remains unclear for the Chinese company. 

The other day, I heard one of my colleagues in the office saying that Huawei is no longer a viable option. I, for one, will continue to use my current Huawei smartphone and stay informed with the latest news from the company.

What are your thoughts on this subject? Are you still going to invest your money in a Huawei phone or consider other options?  

The post Google Decided to End Business with Huawei. How This Impacts Users. appeared first on Heimdal Security Blog.

How to Secure your PC after a Fresh Windows Installation [Updated 2019]

 

You chose to install Windows operating system on your computer or, maybe, for various technical reasons, you had to reinstall it. No matter your reasons, it’s important to keep in mind various security layers after this procedure, so your computer is safe from threats.

How to secure your PC after a fresh Windows installation

After finishing the Windows installation, whether it’s Windows 7, 10 or another operating system, we encourage you to follow these security measures below to enhance protection:

1. Keep your Windows operating system up to date

Probably the most important step to do is checking for the latest security updates and patches available for your Windows operating system.

To get the security updates automatically, go to “Control Panel” and check if your automatic updating system is enabled or follow these steps:

  1. Access the search box in your Windows operating system, type Windows Update.
  2. Select Advanced options.
  3. Click on Automatically download updates in case it is not already selected/turned on.

After checking for available updates for your Windows operating system, keep the automatic update turned on in order to download and install the important updates that can help protect your PC against new viruses or next-generation malware.

Always remember to keep your OS up to date with the latest security available. Software patching remains an essential key to improve online safety and security experts make a good case of emphasizing its importance. Cybercriminals still try to benefit from security holes found in users’ systems and PCs. That’s one of the reasons why cyber attacks still work and they make a lot of money of it.

 2. Update your software

You don’t have to update only the Windows operating system, but your software as well. Therefore, make sure all the latest updates and security patches for your main programs and apps are installed.

Needless to say that most popular pieces of software (such as Java, Adobe Flash, Adobe Shockwave, Adobe Acrobat Reader), especially the outdated ones, are always under threat from malicious actors who exploit them to get easier access to your sensitive data.

Since these pieces of software are always under threat from criminal minds, don’t just rely on your memory to manually update every program or application you have installed.

A better option would be to start using a dedicated cyber security solution for you and keep your software program up to date.

3. Create a restore point

If you already installed the security updates for Windows OS, the next step recommended is to create a restore point in Windows.

You can do this by clicking on the Start button, then select Control Panel -> System and Maintenance (or System and Security) -> System. Then select System protection and click the Create button.

After installing Windows, you can create the Restore Point and name it Clean installation, and continue installing drivers and applications.

If one of the drivers causes issues on the system, you can always go back to the Clean installation restore point.

system_restore

 4. Install a traditional antivirus product

When you consider installing an antivirus program on your PC, make sure you use one from a legitimate company, because there can be fake software programs out there. It is important to have a reliable security solution on your system, which should include real-time scanning, automatic update, and a firewall.

To find the best antivirus that suits your needs, read this ultimate guide that will teach you more about antiviruses, its main features and what should you look for.

If you choose to install a security product that doesn’t have a firewall, make sure you have turned on the Windows firewall.

To turn it on, go to Control Panel, select System and Security, then Windows Defender Firewall and turn it on or off.


Super useful guide on how to secure your PC after a fresh Windows installation:
Click To Tweet


5. Install a proactive security solution for multi-layered protection

On our blog, we explained on many occasions why traditional antivirus is no longer the go-to solution, simply because it cannot keep up with the rise of new and advanced online threats. Financial malware especially is created to steal sensitive data and confidential information and it uses sophisticated methods to do so.

Next-gen malware usually has the ability to evade detection and bypass antivirus software that users have installed on their PCs to keep their data safe. We recommend reading these 12 examples of spam campaigns behind the scenes indicating a low detection rate for AV engines during the first stages of a cyber attack.

With the help of a proactive cybersecurity solution, you get the best protection against financial and data-stealing malware, such as Zeus or Cryptolocker.

To improve the financial control of your online banking account, you can always set banking alerts to track your account activity and apply these simple and effective financial protection tips.

 

6. Back up your system

You updated the operating system and your system applications, you have installed additional security products for your system safe and even created a Clean installation restore point for your Windows.

The steps above are meant to keep you safe from malicious software and online threats, but you may still encounter hardware issues that could endanger your private information.

To make sure your data stays safe, you should be using a twofold strategy, which should include combining an external hard drive usage with an online backup service.

We need to emphasize the importance of having a backup solution which provides stability (look for a big company name), it’s easy to use (so you won’t have a headache backing up from files), allows you to synchronize your files with the online backup servers and provides some sort of security, such as encryption capabilities.

Online Backup

Our guide on how to do a data backup includes more information on most popular backup solutions available and what the best ways to keep your data safe are.

At the same time, you could simply use your Windows Backup system. To set it up, access your Windows Control Panel and then click Backup and Restore to access the location. From this place, you can set an automatic backup, create a schedule and even choose a network location for your backup files.

7. Use a standard user account

Windows provides a certain level of rights and privileges depending on what kind of user account you have. You may use a standard user account or an administrator user account.

To secure your PC, it is recommended to have a standard account to prevent users from making changes that affect everyone who uses the computer, such as deleting important Windows files necessary for the system.

With a Standard user account, you have limited rights and cannot do things like changing system settings, or installing new software apps, hardware or changing the username and passwords. Here’s why you should use an account like this one and how to create it.

If you want to install an application or make security changes, remember that you will need an administrator account.

We also recommend that you set a strong password for your Windows user account.

Use this security guide that will help you set unique and strong passwords and manage them like an expert.

Top Security Tip:
Using a standard account ensures that a piece of malware which infects a limited-user account won’t do much damage as one infecting an administrator account.

Windows account

8. Keep your User Account Control enabled

User Account Control (UAC) is an essential security feature of Windows that prevents unauthorized changes to the operating system. Many users have the tendency to disable it after installing/reinstalling the Windows operating system.

We don’t recommend to turn it off. Instead of disabling the UAC, you can decrease the intensity level using a slider in the Control Panel.

UAC monitors what changes are going to be made to your computer. When important changes appear, such as installing a program or removing an application, the UAC pops up asking for an administrator-level permission.

In case your user account is infected with malware, UAC helps you by keeping suspicious programs and activities from making changes to the system.

 

UAC

 

9. Secure your web browser before going online

Here’s another thing to do after installing Windows: pay attention to browser security. Since our web browser is the main tool used to access the Internet, it is important to keep it safe before going online.

The vulnerabilities in your web browser are like open door invitations to cybercriminals who find creative ways to harvest your most important data. For example, if you are using Adobe Flash, be aware of its security flaws and how it can expose you to attacks.

To stay safe while accessing various web pages, follow these steps:

  1. Choose the latest version for your browser.
  2. Keep it updated.
  3. Choose a private browsing session when you access a website you are not sure about. Choosing this mode will prevent authentication credentials (or cookies) from being stored and steal by attackers.
  4. Since data-stealing malware spreads through malicious code embedded in pop-up windows even in legitimate websites, make sure your web browser can block pop-ups:

And there’s, even more, you can do. Use these step-by-step instructions to enjoy the best secure browsing.


On my next Windows install, I’ll follow these security tips to improve my data safety:
Click To Tweet


10. Use an encryption software tool for your hard drive

Even if you set a password to your Windows account, malicious actors can still get unauthorized access to your private files and documents. They can do this by simply booting into their own operating system – Linux, for example – from a special disc or USB flash drive.

A solution for this case is to encrypt your hard drive and protect all your sensitive files. It is recommended to use this level of security if you have a laptop, which can be very easily stolen. The same thing applies to a computer.

A free encryption tool you can use is BitLocker, which is available on the latest Windows operating systems and you can enable it at any moment. Even after you have enabled the BitLocker protection, you won’t notice any difference because you don’t have to insert anything else but your normal Windows user account password. The benefits of using this encryption tool:

  • It encrypts your entire drive, which makes it impossible for malicious actors stealing your laptop to remove the hard drive and read your files.
  • It’s also a great encryption software if it happens to lose your PC/laptop or get it stolen.
  • Easy to use and already integrated into your Windows OS, so there’s no need to add another encryption software.

If you’d rather want to use another solution, here’s a full list of encryption software tools you can choose to protect your data.

 11. Be careful online and don’t click on suspicious links

To make sure you won’t be infected by clicking on dangerous links, hover the mouse over the link to see if you are directed to a legitimate location. If you were supposed to reach your favorite news website, such as “www.cnn.com”, but the link indicates “hfieo88.net“, then you probably shouldn’t access it. Chances are you’ll be infected with malware and cybercriminals steal your sensitive data.

It’s worth trying shortening services, such as goo.gl or tinyurl. But in some cases, an unknown link may send you to a malicious site that can install malware on the system.

So, how can you know where you’ll arrive if you click it?

To make sure you are going to the right direction, use a free tool such as Redirect Detective that will allow you to see the complete path of a redirected link. Another tool which can provide very helpful in checking suspicious links is the reliable URL checker, VirusTotal.

For more information on how to maximize your financial data protection, check out this article.

 Conclusion

It’s not just about staying safe. 

This guide above is meant to keep you safe online. But, at the same time, following these security measures mean that you also set up your system to work smoothly for online browsing and financial operations, activities you do every day.

Since there are many other solutions to protect a system after a Windows installation, we would like to know your opinion on this.

How do you increase your security after a Windows installation?
Do you have a particular routine?
We’d love to add your tips to the list, so share them in the comments below.

Spend time with your family, not updating their apps!
Thor Foresight Home anti malware and ransomware protection heimdal security
Let THOR FREE Silently and automatically update software Close security gaps Works great with your favorite antivirus

INSTALL IT, FORGET IT AND BE PROTECTED

Download Thor FREE

The post How to Secure your PC after a Fresh Windows Installation [Updated 2019] appeared first on Heimdal Security Blog.

Here are the Top Online Scams You Need to Avoid Today [Updated 2019]

We truly want to believe that the Internet is a safe place where you can’t fall for all types of online scams, but it’s always a good reminder to do a “reality check”. We, humans, can become an easy target for malicious actors who want to steal our most valuable personal data.

Criminal minds can reach these days further than before, into our private lives, our homes and work offices. And there is little we can do about it. Attack tactics and tools vary from traditional attack vectors, which use malicious software and vulnerabilities present in almost all the programs and apps (even in the popular Windows operating systems), to ingenious phishing scams deployed from unexpected regions of the world, where justice can’t easily reach out to catch the eventual perpetrators.

According to a report from the Federal Trade Commission (FTC), millennials are particularly more vulnerable to online scams than seniors, as shocking as it may seem. The research finds that “40 percent of adults age 20-29 who have reported fraud ended up losing money in a fraud case”.

Here are the findings of a report about financial scams

Source: Federal Trade Commision

For this reason, we need to know what are the most popular techniques malicious actors are using to get unauthorized access to our private information and financial data.

Thor Foresight makes sure that link is safe!
Your parents and friends will click any suspicious link, so make sure they're protected.
Thor Foresight Home anti malware and ransomware protection heimdal security
Thor Foresight provides: Automatic and silent software updates Smart protection against malware Compatibility with any traditional antivirus.

SECURE YOUR ONLINE BROWSING!

Get Thor Foresight

We must not forget their final target is always our money and there is nothing they won’t do to accomplish their mission.

Use the links below to quickly navigate the list of online scams you need to stay away from right now.

Phishing email scams
The Nigerian scam
Greeting card scams
Bank loan or credit card scam
Lottery scam
Hitman scam
Romance scams
Fake antivirus software
Facebook impersonation scam (hijacked profile scam)
Make money fast scams (Economic scams)
Travel scams
Bitcoin scams
Fake news scam
Fake shopping websites
Loyalty points phishing scam
Job offer scams
SMS Scaming(Smshing)
Overpayment Online Scam
Tech Support Online Scams

1. Phishing email scams

More than one third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to a new report from F-Secure.

Phishing scams continue to evolve and be a significant online threat for both users and organizations that could see their valuable data in the hands of malicious actors.

The effects of phishing attacks can be daunting, so it is essential to stay safe and learn how to detect and prevent these attacks.

Phishing scams are based on communication made via email or on social networks. In many cases, cyber criminals will send users messages/emails by trying to trick them into providing them valuable and sensitive data ( login credentials – from bank account, social network, work account, cloud storage) that can prove to be valuable for them.

Moreover, these emails will seem to come from an official source (like bank institutions or any other financial authority, legitime companies or social networks representatives for users.)

This way, they’ll use social engineering techniques by convincing you to click on a specific (and) malicious link and access a website that looks legit, but it’s actually controlled by them. You will be redirect to a fake login access page that resembles the real website. If you’re not paying attention, you might end up giving your login credentials and other personal information.

We’ve seen many spam email campaigns in which phishing were the main attack vector for malicious criminals used to spread financial and data stealing malware.

In order for their success rate to grow, scammers create a sense of urgency. They’ll tell you a frightening story of how your bank account is under threat and how you really need to access as soon as possible a site where you must insert your credentials in order to confirm your identity or your account.

After you fill in your online banking credentials, cyber criminals use them to breach your real bank account or to sell them on the dark web to other interested parties.

Here’s an example of a sophisticated email scam making the rounds that you should be very careful.

An example of phishing scam

Source: News.com.au

Use this complete guide on how to detect and prevent phishing attacks (filled with screenshots and actionable tips) to better fight these attacks.

2. The Nigerian scam

Probably one of the oldest and most popular Internet scam used mostly by a member of a Nigerian family with wealth to trick different people. It is also known as “Nigerian 419”, and named after the section of Nigeria’s Criminal Code which banned the practice.

A typical Nigerian scam involves an emotional email, letter, text message or social networking message coming from a scammer (which can be an official government member, a businessman or a member of a very wealthy family member – usually a woman) who asks you to give help in retrieving a large sum of money from a bank, paying initially small fees for papers and legal matters. In exchange for your help, they promise you a very large sum of money.

They will be persistent and ask you to pay more and more money for additional services, such as transactions or transfer costs. You’ll even receive papers that are supposed to make you believe that it’s all for real. In the end, you are left broke and without any of the promised money.

Here’s how a Nigerian scam could look like:

one of the most common online scamsSource: MotherJones.com

3. Greeting card scams

Whether it’s Christmas or Easter, we all get all kind of holiday greeting cards in our email inbox that seem to be coming from a friend or someone we care.

Greeting card scams are another old Internet scams used by malicious actors to inject malware and harvest users’ most valuable data.

If you open such an email and click on the card, you usually end up with malicious software that is being downloaded and installed on your operating system. The malware may be an annoying program that will launch pop-ups with ads, unexpected windows all over the screen.

If your system becomes infected with such dangerous malware, you will become one of the bots which are part of a larger network of affected computers. If this happens, your computer will start sending private data and financial information to a fraudulent server controlled by IT criminals.


I never thought cyber criminals could be so creative! Check out these online scams to stay away from
Click To Tweet


To keep yourself safe from identity theft and data breach, we recommend using a specialized security program against this type of online threats.

To find out more information about financial malware, read this article. And here’s how you can tell if your computer was infected with malware.

Another common Internet scamSource: The Beacon Bulletin

4. Bank loan or credit card scam

People can be easily scammed by “too good to be true” bank offers that might guarantee large amounts of money and have already been pre-approved by the bank. If such an incredible pre-approved loan is offered to you, ask yourself:

“How is it possible for a bank to offer you such a large sum of money without even checking and analyzing your financial situation?”

Though it may seem unlikely for people to get trapped by this scam, there’s still a big number of people who lost money by paying the “mandatory” processing fees required by the scammers.

Here are 9 warning signs and sneaky tactics to watch out and avoid becoming a business loan scam.

As regards to credit card scams, a recent report from the Identity Theft Resources Center said that the number of credit and debit card breaches have been on the rise last year. To better safeguard your data and prevent thieves from getting access to your payment card details, consider:

  • Watching your accounts closely and monitor your online transactions;
  • Taking advantage of free consumer protection services;
  • Signing up for free credit monitoring.

Source: ChaffeurDriven.com

5. Lottery scam

This is another classic Internet scam which doesn’t seem to get old. A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.

Lucky you, right?! It doesn’t even matter that you don’t recall ever purchasing lottery tickets.

Since it addresses some of our wildest fantasies, such as quitting our jobs and living off the fortune for the rest of our lives, without ever having to work again, our imagination falls prey easily to amazing scenarios someone can only dream of.

But the dream ends as soon as you realize you have been just another scam victim. DO NOT fall for this online scam and have a look at this checklist to see if you are getting scammed.

This is an example of a lottery scamSource: Ripandscam.com

6. Hitman scam

One of the most frequent Internet scams you can meet online is the “hitman” extortion attempt. Cyber criminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers.

To create the appearance of a real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.

That’s why it’s not safe to provide any sensitive or personal information about you on social media channels. It might seem like a safe and private place, where you’re only surrounded by friends, but in reality you can never know for sure who’s watching you.

Also,it’s better to be a little bit paranoid and protect all your digital assets like everyone is watching. Here’s how a Hitman scam looks like:

7. Online dating (romance) scams

As the Internet plays an important role in our social lives, with apps like Facebook or Instagram we access everyday, it’s inevitable to use apps to look for love as well.

Online dating apps are very popular these days and they are a great way to meet your future life partners. I have actually an example with a friend of mine who was lucky enough to find her future husband on a dating site.

But not all scenarios have a “happy end” like this one, and you need to be very careful, because you never know who can you meet.

A romance scam usually takes place on social dating networks, like Facebook, or by sending a simple email to the potential target, and affect thousands of victims from all over the world.

The male scammers are often located in West Africa, while the female scammers are mostly from the eastern parts of Europe.

Cyber criminals have abused this scamming method for years by using the online dating services. They improved their approach just by testing the potential victims’ reactions.

According to a research published in the British Journal of Criminology last month, the techniques (and psychological methods) used by scammers in online romance scams are similar with those used in the domestic violence cases.

To avoid becoming a victim of these Internet scams, you need to learn how to better protect yourself.

Knowing that hundreds of women and men from all over the globe are victims of this online scams, we recommend using these security tips for defensive online dating, including warning signs that could help you from becoming an easy target.

I would also recommend reading these real stories and learn from them, so you don’t fall for these online scams:

 

8. Fake antivirus software

We all saw at least once this message on our screens: “You have been infected! Download antivirus X right now to protect your computer!

Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product.

If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. In this case, to get rid of the annoying pop-ups, we recommend scanning your system using a good antivirus product.

If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.

To avoid this situation, we recommend enhancing your online protection with a  specialized security product against financial malware, and complement your traditional antivirus program.

Also, make sure you do not click on pop-up windows that annoyingly warn you’ve been infected with virus. Remember to always apply the existing updates for your software products, and install only legitimate software programs from verified websites.

If you’ve been infected, you can use an antimalware tool such as Malwarebytes to try removing the malware infection or pay attention to these warning signs and learn how to find a doable solution.

9. Facebook impersonation scam (hijacked profile scam)

Facebook. Everyone is talking about it these days, and the scandal about Cambridge Analytica firm harvesting personal data taken from millions of this social media channel without users’ consent.

It’s still the most popular social media network where everyone is active and use it on a daily basis to keep in touch with friends and colleagues. Unfortunately, it has become also the perfect place for online scammers to find their victims.

Just imagine your account being hacked by a cyber criminal and gaining access to your close friends and family. Nobody wants that!

Since it is so important for your privacy and online security, you should be very careful in protecting your personal online accounts just the way you protect your banking or email account.

Facebook security wise, these tips might help you stay away from these online scams:

  • Do not accept friend requests from people you don’t know
  • Do not share your password with others
  • When log in, use two-factor authentication
  • Avoid connecting to public and free Wi-Fi networks
  • Keep your browser and apps updated
  • Add an additional layer of security and use a proactive cyber security software.

To enhance your online privacy, I recommend reading our full guide on Facebook security and privacy.

facebook-scam

10. Make money fast scams (Economic scams)

Cyber criminals will lure you into believing you can make money easy and fast on the internet. They’ll promise you non-existent jobs, including plans and methods of getting rich quickly.

It is a quite simple and effective approach, because it addresses a basic need for money, especially when someone is in a difficult financial situation.

This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non-existent jobs for a variety of positions is part of the online criminals’ arsenal.

Using various job types, such as work-at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well paid job that will bring lots of money in a very short period of time.

Read and apply these ten tips that can help you avoid some of the most common financial scams.

this is how a financial scam looks likeSource: Makerealmoneyonlinefree.com

11. Travel scams

These scams are commonly used during hot summer months or before the short winter vacations, for Christmas or New Year’s Day.

Here’s how it happens: you receive an email containing an amazing offer for an exceptional and hard to refuse destination (usually an exotic place) that expires in a short period of time which you can’t miss. If it sounds too good to be true, it might look like a travel scam, so don’t fall for it!

The problem is that some of these offers actually hide some necessary costs until you pay for the initial offer. Others just take your money without sending you anywhere.

In such cases, we suggest that you study carefully the travel offer and look for hidden costs, such as: airport taxes, tickets that you need to pay to access a local attraction, check if the meals are included or not, other local transportation fees between your airport and the hotel or between the hotel and the main attractions mentioned in the initial offer, etc.

As a general rule, we suggest that you go with the trustworthy, well known travel agencies. You can also check if by paying individually for plane tickets and for accommodation you receive the same results as in the received offer.

If you love to travel, you can easily fall prey to airline scams by simply looking for free airline tickets. Airline scams are some of the most popular travel scams, and we recommend applying these valuable tips.

travel

12. Bitcoin scams

If you (want to) invest in Bitcoin technology, we advise you to be aware of online scams. Digital wallets can be open to hacking and scammers take advantage of this new technology to steal sensitive data.

Bitcoin transactions should be safe, but these five examples of Bitcoin scams show how they happen and how you can lose your money.

The most common online scams to watch out for:

  • Fake Bitcoin exchanges
  • Ponzi schemes
  • Everyday scam attempts
  • Malware

Here’s how you can spot a Bitcoin scam and how to stay safe online.

Source: Express.co.uk

13. Fake news scam

The spread of fake news on the Internet is a danger to all of us, because it has an impact on the way we filter all the information we found and read on social media. It’s a serious problem that should concern our society, mostly for the misleading resources and content found online, making it impossible for people to distinguish between what’s real and what is not.

We recommend accessing/reading only reliable sources of information coming from friends or people you know read regular feeds from trusted sources: bloggers, industry experts, in order to avoid fake news.


If it seems too good to be true, it’s most likely a scam. Take a look over these online scams
Click To Tweet


This type of scam could come in the form of a trustworthy website you know and often visit, but being a fake one created by scammers with the main purpose to rip you off. It could be a spoofing attack which is also involved in fake news, and refers to fake websites that might link you to a buy page for a specific product, where you can place an order using your credit card.

To avoid becoming a victim of online scams, you can use tech tools such as Fact Check from Google or Facebook’s tool aimed at detecting whether a site is legitimate or not, analyzing its reputation and data.

Cyber security experts believe that these Internet scams represent a threat for both organizations and employees, exposing and infecting their computers with potential malware.

Source: Opportunitychecker.com

14. Fake shopping websites

We all love shopping and it’s easier and more convenient to do it on the Internet with a few clicks. But for your online safety, be cautious about the sites you visit. There are thousands of websites out there that provide false information, and might redirect you to malicious links, giving hackers access to your most valuable data.

If you spot a great online offer which is “too good to be true”, you might be tempting to say “yes” instantly, but you need to learn how to spot a fake shopping site so you don’t get scammed.

We strongly recommend reading these online shopping security tips to keep yourself safe from data breaches, phishing attacks or other online threats.

Source: Originalo.de

15. Loyalty points phishing scam

Many websites have a loyalty program to reward their customers for making different purchases, by offering points or coupons. This is subject to another online scam, because cyber criminals can target them and steal your sensitive data. If you think anyone wouldn’t want to access them, think again.

The most common attack is a phishing scam that looks like a real email coming from your loyalty program, but it’s not. Malicious hackers are everywhere, and it takes only one click for malware to be installed on your PC and for hackers to have access to your data.

As it might be difficult to detect these phishing scams, you may find useful this example of a current phishing campaign targets holders of Payback couponing cards, as well as some useful tips and tricks to avoid being phished.

Source: G Data Security Blog

16. Job offer scams

Sadly, there are scammers everywhere – even when you are looking for a job – posing as recruiters or employers. They use fake and “attractive” job opportunities to trick people.

It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you. Whether you’ve applied or not, the offer might be very appealing, but don’t fall into this trap.

To protect yourself from job offer scams, it’s very important to:

  • Do a thorough research about the company and see what information you can find about it;
  • Check the person who’s been contacted you on social media channels;
  • Ask for many details and references and check them out;
  • Ask your friends or trustworthy people if they know or interacted with the potential employer.

To avoid these types of online job scams, check this article.

Source: Drexel.edu

17. SMS Scaming (Smshing)

Smartphones. You can’t live without them in the era of Internet. They’ve become essential for communication, online shopping, banking or any other online activity.

Needless to say the amount of data we store on our personal devices which make them vulnerable to cyber criminals, always prepared to steal our online identities or empty our bank accounts.

Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims.

How this happens? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information, or other online banking information.

Be careful about these SMS you receive and don’t click on suspicious links that could redirect to malicious sites trying to steal your valuable data. These useful tips can help you easily spot these types of online scams.

Source: Malwarebytes Labs

18. Overpayment Online Scam

If you are considering selling different items on specialized online sites, we strongly recommend watching out for overpayment scam.

A typically overpayment online scam like this works by getting the potential victim “to refund” the scammer an extra amount of money because he/she send too much money. The offer will often be quite generous and bigger than the agreed price. The overpay (extra money) is to cover the costs of shipping or certain custom fees.

One such story can unfold right now and can happen to each of you. This happened to one of our Heimdal Security team members. After smiling a bit and seeing the method, we did realize that’s a common online scam and we had to share it with you. Also, we included a few security tips and actionable advice to prevent falling prey to overpayment online scam.

Our colleague posted a sofa for sale on a Danish site called dba.dk which is a sort of a flea market online. After a few days, he received a message from a person claiming to be interested in the item and willing to pay more than the price offered, via PayPal account.

Here’s how a scam email looks like in which the malicious person asks for personal information to transfer the money.

Also, here’s the confirmation email coming from the scammer which shows that he paid an extra amount for the sofa, including extra shipping fees and MoneyGram charges the extra fee for transportation.

After that, he also got another email saying that he needs to refund the extra amount of money, including the shipping and transportation charges to a certain shipping agent via MoneyGram transfer.

Here’s how the phishing email looks like that you should be very careful and don’t fall for it:

Follow these security tips to protect yourself from overpayment online scam:

  • If you notice a suspicious email coming from untrusted source or something out of ordinary, you should report it as soon as possible.
  • If you receive a similar email like the one our colleague got, do not transfer extra money to someone you don’t know, especially if he/she wants to overpay. A legitimate buyer won’t do that.
  • Also, do not transfer money to a fake shipping company or some private shipping agent, because it’s part of scam and you need to be very careful.
  • Do not provide personal information to people who don’t show a genuine interest in buying your item.
  • Do not send the product to the buyer until the payment was completed and received in your bank account.

19. Tech Support Online Scams

Here’s another online scam that is common and you need to be extra careful. The next time your smartphone rings and you don’t know the number, think twice before answering. Maybe it’s not your friend on the other end of the phone, maybe it’s the scammer!

According to a recent report “nearly half of all cellphone calls next year will come from scammers”, so we need to learn how to better detect and prevent such malicious actions coming from skilled persons.

Tech support scams are very common and widespread these days. Scammers use various social engineering techniques to trick potential victims into giving their sensitive information. Even worst, they try to convince potential victims to pay for unnecessary technical support services.

These tech “experts” pretend to know everything about your computer, how it got hacked and many other details that help them gain your trust and convince victims to fall prey for their scams.

A scenario like this can happen as we write this, and one of our Heimdal Security team members recently got a phone scam call. While we got amused by the conversation he had with the person pretending to work for an Indian tech support company, we realized it can happen to anyone which can become an easy target.

What happened?

The person, pretending to be the representative of a software company and experienced one, is informing our colleague that his computer got hacked by cybercriminals, and offers to guide him and solve this urgent problem.

With poor English skills, he gives details about the serial number of the computer, and provide guidance to access the unique computer ID, trying to misrepresent normal system as having serious issues. After a few minutes, the call is transferred to another tech representative who informs our colleague that they detected unusual activity going through his computer. He’s been told that multiple attempts have been seen on the PC in which hackers tried to get unauthorized access to his computer.

Our colleague detected this as being scam and didn’t go along with it, but for someone without technical knowledge, it may not be so easy to spot.

You can listen to this call here:

If someone else would have fallen prey for this online scam, things would have gone even further. The so-called tech scammers could persuade the potential victim to give them remote access to the system. To “help” the victim, scammers mention about additional software that are required to be installed and victims need to pay for these software victims, hence, provide credit card details. You can find out more info here

How to avoid getting scammed by tech support “specialists”

To avoid becoming an easy target of these sneaky tech support scammers, we strongly recommend following these basic rules:

  • Do not trust phone calls coming from people pretending to come from tech “experts”, especially if they are requesting for personal or financial information;
  • DO NOT PROVIDE sensitive data to them or purchase any software services scammers may suggest you as a solution to fix your tech problem.
  • DO NOT allow strangers to remotely access your computer and potentially install malicious software;
  • Make sure you download software apps and services only from official vendor sites;
  • Don’t take it for granted when a stranger calls you out of the blue, pretending to have a technical solution for your issues. Make sure you ask for proof of their identity and do a quick research about the company they are calling you from;
  • Always have an antivirus program installed on your computer, and for more protection, consider adding multiple layers of security with a proactive security solution like our Thor Premium Home, which will stop any type of online threats.
  • Have a security-first mindset and be suspicious about everything around you. Also, consider investing in education and learn as much as possible about cyber security. Here’s how you can reduce spam phone calls.

 Conclusion

Since some scams are so well organized and really convincing, and people behind them so difficult to catch, we need to always keep our guard up. Stay informed about the latest scamming strategies.

Have you met some of the above scams while browsing or in your email inbox? What were the most convincing ones?

*This article was initially published by Andra Zaharia in January 2016.”

Spend time with your family, not updating their apps!
Thor Foresight Home anti malware and ransomware protection heimdal security
Let THOR FREE Silently and automatically update software Close security gaps Works great with your favorite antivirus

INSTALL IT, FORGET IT AND BE PROTECTED

Download Thor FREE

The post Here are the Top Online Scams You Need to Avoid Today [Updated 2019] appeared first on Heimdal Security Blog.