Sad and worrying news for Huawei mobile users, like you and me. Google recently announced that it will no longer provide support to the giant Chinese company for many Android hardware and software operations.
This move is followed by a Trump administration decision to add Huawei Technologies Co Ltd to the trade blacklist and impose restrictions that will affect how the company will do business with other U.S. organizations.
On top of that, important US chipmakers like Intel, Qualcomm, and others have also joined Google and cut off deals with the Chinese company, Bloombergreported.
So, the big US tech players decided to comply with this new legislation, but the consequences will surely impact the tech industry, consumers, and each of us, in general.
While we are aware of the geopolitical implications involved, a trade war between China and US, which will probably lead to an imminent technological cold war,there are also actual real-life implications for those who have (at least) one Huaweidevice at home.
All the buzz around the recent Huawei ban has probably sparked confusion and raised some key questions like:
Is my Huawei device safe? Should I stop using it and switch to another alternative? What about Android security updates? I want to purchase a new Huawei smartphone, is it safe or not?
In this article, we’ll try to understand what’s the best approach to dealing with this situation and provide actionable and useful tips you can apply for a better user experience.
Here are some key aspects related to the Huawei ban to keep in mind
The US Government applied new regulations for Huawei Chinese companies, by adding it to the “Entity List” which means it can’t “buy parts of technology from US suppliers without government approval as its equipment is considered potential tools for Chinese espionage”.
Following this ban, the US Department of Industry and Security, Commerce saidHuawei still has a 90-day “temporary general license” which allows the company to continue using the US intel with the license.
During this limited license available until August 19, 2019, Huawei will work closely with US corporations to maintain business relationships and provide software updates for the existing Huawei devices. Read more details about this temporary license.
From a positive perspective, ZTE telecom Chinese company went through a similar situation. It was blacklisted by the US government, but it finally lifted the trade ban and allowed the company to continue getting essential hardware parts and software from US companies.
However, in the case of Huawei, Google decided not to provide software hardware, and technical services to the Chinese phone maker. This means that the giant tech player will control the Chinese company’s access to Android, its core operating system, and parts of it, such as:
Its Play store
Gmail email service
Tools that require access to third-party services.
While the US-based technology companies such as Intel and Qualcomm decided to comply with the latest US government order, it looks like Microsoft remains silent on potential Windows ban which will block Huawei’s access to get Windows licenses. The Verge tried to reach out to Microsoft reps, but no further commend has been given on this situation. However, it appears that the company stopped selling Huawei’s MateBook X Pro, one of the Windows laptops in the US, at its online store.
In anticipation of this move and current tensions between US government and China, Huawei has worked on a plan B and already started developing a proprietary operating system, for both smartphones and computers, as an alternative to Google’s Android OS. We’ll see how things will evolve going forward.
“We have prepared our own operating system, if it turns out we can no longer use these systems [Android], we will be ready and have our plan B.”
In a recent interview, Huawei’s founder Ren Zhengfei said that the company’s “5G would not be affected and predicted that no other parties would be able to catch up with the company in 5G technology in the next 2-3 years”. He also added that the U.S. authorities are underestimated Huawei’s capabilities. Are they?
Smartphones sales experienced a decline in the first months of 2019, but Huawei saw a significant increase in shipments by 50% (all running Android OS), and “made a strong statement by growing volume and share despite market headwinds”, according to IDC new report.
What the current Huawei device owners need to know
Google declared that consumers who currently have a Huawei device can still use the company’s services such as the Google Play Store, Google Search, Gmail, Google Maps, and security from Google Play Protect.
For Huawei users’ questions regarding our steps to comply w/ the recent US government actions: We assure you while we are complying with all US gov’t requirements, services like Google Play & security from Google Play Protect will keep functioning on your existing Huawei device.
The official statement from Huawei also confirmed that it “will continue to provide security updates and after-sales services to all existing Huawei and Honor smartphone and tablet products.”
So, this means that all current Huawei devices will work normally, without being affected in any way. In the medium-to-long term, we don’t know exactly what’s going to happen, but it will depend on the relationship between the US and China.
Yes, you can still perform your daily tasks, download any app from the Google Play and rest assured that all software updates are being delivered at time.
We all know how essential software patching is and why security experts have taken every opportunity to encourage both regular users and organizations to apply them.
Thor Foresight makes sure that link is safe!
Your parents and friends will click any suspicious link, so make sure they're protected.
Thor Foresight provides:
Automatic and silent software updatesSmart protection against malwareCompatibility with any traditional antivirus.
How does this situation impact any future Huawei smartphone?
If you’re going to purchase a new Huawei smartphone in the upcoming months, there will be limitations regarding the access to Google servicesand other implied restrictions that you need to know about.
First off, all the upcoming Huawei devices will not be certified by Google and they won’t have built-in Google’s most popular applications and programs.
This decision won’t impact the Chinese consumers, who already can’t access most of Google’s top services, but will be reflected in Europe and other parts of the globe.
Without access to Google Mobile Services, third-party developers won’t be able to use Google’s API on new Huawei handsets.
For future devices, Huawei can no longer benefit from the Google Play services, but it still has access to Android OS, since it is an open source system.
Each new addition Google will be done to Android via the Google Play Services will no longer be available to the Chinese company for its global devices.
New versions of Huawei smartphones outside China will not ship with key Google services such as Google Play, Gmail apps, Maps, or YouTube. Even if you try to install them, they won’t work.
Without access to Google Play store, users will probably try to download their apps and programs from other sources which can pose as real security risks and provide new opportunities for cybercriminals to inject malware thought fake apps.
Also, new Huawei smartphones could not receive future releases of Android OS and be stuck with an old version. This means there will be no access to new improvements and features developed by the company, but we know that Huawei usually changes the standard Android experience by adding its own user interfaces.
Protection guide for Huawei device users
There’s no secret to anyone that Huawei is the largest smartphone vendor in China and a key player on the global market.
However, the company still relies on the US suppliers to obtain hardware that will make it develop high quality and popular devices all over the world.
If you have a deep fondness for your Huawei smartphone and you don’t want to give up on it, here are some key security measures you should apply:
Apply available software updates and consider turning on the “automatic updates” feature, if you have it. Thus, you will avoid seeing your device an easy target for as malware and ransomware which usually target outdated programs and apps.
Use a specialized security solution like Thor Free to handle software updates, automatically and silently, by allowing users to save time and energy.
If your Huawei device is more vulnerable to cyber attacks, it is recommended to use a multi-layered security solution like Thor Premium Home. Given its proactive and unique threat intel, alongside a next-gen Antivirus, your sensitive information and digital life is secure and protected with a complete and all-in-one security suite.
Be proactive and stay up to date with the latest news about this debate, if you’re going to invest in a Huawei device. Make sure you follow the company’s latest announcements on this matter and keep an eye on the security updates for your specific device.
Learn about the online dangers and build a strong defense against cyber threats by checking out one of our valuable educational resources that will teach you actionable and applicable security tips.
In the long run, this decision coming from the US Government to crack down the Chinese companies will probably escalate to something even bigger. There’s an ongoing battle between the United States and China which we don’t know exactly how will end, but the future remains unclear for the Chinese company.
The other day, I heard one of my colleagues in the office saying that Huawei is no longer a viable option. I, for one, will continue to use my current Huawei smartphone and stay informed with the latest news from the company.
What are your thoughts on this subject? Are you still going to invest your money in a Huawei phone or consider other options?
You chose to install Windows operating system on your computer or, maybe, for various technical reasons, you had to reinstall it. No matter your reasons, it’s important to keep in mind various security layers after this procedure, so your computer is safe from threats.
How to secure your PC after a fresh Windows installation
After finishing the Windows installation, whether it’s Windows 7, 10 or another operating system, we encourage you to follow these security measures below to enhance protection:
1. Keep your Windows operating system up to date
Probably the most important step to do is checking for the latest security updates and patches available for your Windows operating system.
To get the security updates automatically, go to “Control Panel” and check if your automatic updating system is enabled or follow these steps:
Access the search box in your Windows operating system, type Windows Update.
Select Advanced options.
Click on Automatically download updates in case it is not already selected/turned on.
After checking for available updates for your Windows operating system, keep the automatic update turned on in order to download and install the important updates that can help protect your PC against new viruses or next-generation malware.
Always remember to keep your OS up to date with the latest security available. Software patching remains an essential key to improve online safety and security experts make a good case of emphasizing its importance. Cybercriminals still try to benefit from security holes found in users’ systems and PCs. That’s one of the reasons why cyber attacks still work and they make a lot of money of it.
2. Update your software
You don’t have to update only the Windows operating system, but your software as well. Therefore, make sure all the latest updates and security patches for your main programs and apps are installed.
Needless to say that most popular pieces of software (such as Java, Adobe Flash, Adobe Shockwave, Adobe Acrobat Reader), especially the outdated ones, are always under threat from malicious actors who exploit them to get easier access to your sensitive data.
Since these pieces of software are always under threat from criminal minds, don’t just rely on your memory to manually update every program or application you have installed.
If you already installed the security updates for Windows OS, the next step recommended is to create a restore point in Windows.
You can do this by clicking on the Start button, then select Control Panel -> System and Maintenance (or System and Security) -> System. Then select System protection and click the Create button.
After installing Windows, you can create the Restore Point and name it Clean installation, and continue installing drivers and applications.
If one of the drivers causes issues on the system, you can always go back to the Clean installation restore point.
4. Install a traditional antivirus product
When you consider installing an antivirus program on your PC, make sure you use one from a legitimate company, because there can be fake software programs out there. It is important to have a reliable security solution on your system, which should include real-time scanning, automatic update, and a firewall.
To find the best antivirus that suits your needs, read this ultimate guide that will teach you more about antiviruses, its main features and what should you look for.
If you choose to install a security product that doesn’t have a firewall, make sure you have turned on the Windows firewall.
To turn it on, go to Control Panel, select System and Security, then Windows Defender Firewall andturn it on or off.
Super useful guide on how to secure your PC after a fresh Windows installation: Click To Tweet
5. Install a proactive security solution for multi-layered protection
On our blog, we explained on many occasions why traditional antivirus is no longer the go-to solution, simply because it cannot keep up with the rise of new and advanced online threats. Financial malware especially is created to steal sensitive data and confidential information and it uses sophisticated methods to do so.
Next-gen malware usually has the ability to evade detection and bypass antivirus software that users have installed on their PCs to keep their data safe. We recommend reading these 12 examples of spam campaigns behind the scenes indicating a low detection rate for AV engines during the first stages of a cyber attack.
With the help of a proactive cybersecurity solution, you get the best protection against financial and data-stealing malware, such as Zeus or Cryptolocker.
You updated the operating system and your system applications, you have installed additional security products for your system safe and even created a Clean installation restore point for your Windows.
The steps above are meant to keep you safe from malicious software and online threats, but you may still encounter hardware issues that could endanger your private information.
To make sure your data stays safe, you should be using a twofold strategy, which should include combining an external hard drive usage with an online backup service.
We need to emphasize the importance of having a backup solution which provides stability (look for a big company name), it’s easy to use (so you won’t have a headache backing up from files), allows you to synchronize your files with the online backup servers and provides some sort of security, such as encryption capabilities.
At the same time, you could simply use your Windows Backup system. To set it up, access your Windows Control Panel and then click Backup and Restore to access the location. From this place, you can set an automatic backup, create a schedule and even choose a network location for your backup files.
7. Use a standard user account
Windows provides a certain level of rights and privileges depending on what kind of user account you have. You may use a standard user account or an administrator user account.
To secure your PC, it is recommended to have a standard account to prevent users from making changes that affect everyone who uses the computer, such as deleting important Windows files necessary for the system.
With a Standard user account, you have limited rights and cannot do things like changing system settings, or installing new software apps, hardware or changing the username and passwords. Here’s why you should use an account like this one and how to create it.
If you want to install an application or make security changes, remember that you will need an administrator account.
We also recommend that you set a strong password for your Windows user account.
Use this security guide that will help you set unique and strong passwords and manage them like an expert.
Top Security Tip:
Using a standard account ensures that a piece of malware which infects a limited-user account won’t do much damage as one infecting an administrator account.
8. Keep your User Account Control enabled
User Account Control (UAC) is an essential security feature of Windows that prevents unauthorized changes to the operating system. Many users have the tendency to disable it after installing/reinstalling the Windows operating system.
We don’t recommend to turn it off. Instead of disabling the UAC, you can decrease the intensity level using a slider in the Control Panel.
UAC monitors what changes are going to be made to your computer. When important changes appear, such as installing a program or removing an application, the UAC pops up asking for an administrator-level permission.
In case your user account is infected with malware, UAC helps you by keeping suspicious programs and activities from making changes to the system.
9. Secure your web browser before going online
Here’s another thing to do after installing Windows: pay attention to browser security. Since our web browser is the main tool used to access the Internet, it is important to keep it safe before going online.
And there’s, even more, you can do. Use these step-by-step instructions to enjoy the best secure browsing.
On my next Windows install, I’ll follow these security tips to improve my data safety: Click To Tweet
10. Use an encryption software tool for your hard drive
Even if you set a password to your Windows account, malicious actors can still get unauthorized access to your private files and documents. They can do this by simply booting into their own operating system – Linux, for example – from a special disc or USB flash drive.
A solution for this case is to encrypt your hard drive and protect all your sensitive files. It is recommended to use this level of security if you have a laptop, which can be very easily stolen. The same thing applies to a computer.
A free encryption tool you can use is BitLocker, which is available on the latest Windows operating systemsand you can enable it at any moment. Even after you have enabled the BitLocker protection, you won’t notice any difference because you don’t have to insert anything else but your normal Windows user account password. The benefits of using this encryption tool:
It encrypts your entire drive, which makes it impossible for malicious actors stealing your laptop to remove the hard drive and read your files.
It’s also a great encryption software if it happens to lose your PC/laptop or get it stolen.
Easy to use and already integrated into your Windows OS, so there’s no need to add another encryption software.
If you’d rather want to use another solution, here’s a full list of encryption software tools you can choose to protect your data.
11. Be careful online and don’t click on suspicious links
To make sure you won’t be infected by clicking on dangerous links, hover the mouse over the link to see if you are directed to a legitimate location. If you were supposed to reach your favorite news website, such as “www.cnn.com”, but the link indicates “hfieo88.net“, then you probably shouldn’t access it. Chances are you’ll be infected with malware and cybercriminals steal your sensitive data.
It’s worth trying shortening services, such as goo.gl or tinyurl. But in some cases, an unknown link may send you to a malicious site that can install malware on the system.
So, how can you know where you’ll arrive if you click it?
To make sure you are going to the right direction, use a free tool such as Redirect Detective that will allow you to see the complete path of a redirected link. Another tool which can provide very helpful in checking suspicious links is the reliable URL checker, VirusTotal.
For more information on how to maximize your financial data protection, check out this article.
It’s not just about staying safe.
This guide above is meant to keep you safe online. But, at the same time, following these security measures mean that you also set up your system to work smoothly for online browsing and financial operations, activities you do every day.
Since there are many other solutions to protect a system after a Windows installation, we would like to know your opinion on this.
How do you increase your security after a Windows installation?
Do you have a particular routine? We’d love to add your tips to the list, so share them in the comments below.
Spend time with your family, not updating their apps!
Let THOR FREE
Silently and automatically update softwareClose security gapsWorks great with your favorite antivirus
We truly want to believe that the Internet is a safe place where you can’t fall for all types of online scams, but it’s always a good reminder to do a “reality check”. We, humans, can become an easy target for malicious actors who want to steal our most valuable personal data.
Criminal minds can reach these days further than before, into our private lives, our homes and work offices. And there is little we can do about it. Attack tactics and tools vary from traditional attack vectors, which use malicious software and vulnerabilities present in almost all the programs and apps (even in the popular Windows operating systems), to ingenious phishing scams deployed from unexpected regions of the world, where justice can’t easily reach out to catch the eventual perpetrators.
According to a report from the Federal Trade Commission (FTC), millennials are particularly more vulnerable to online scams than seniors, as shocking as it may seem. The research finds that “40 percent of adults age 20-29 who have reported fraud ended up losing money in a fraud case”.
More than one third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to a new report from F-Secure.
Phishing scams continue to evolve and be a significant online threat for both users and organizations that could see their valuable data in the hands of malicious actors.
The effects of phishing attacks can be daunting, so it is essential to stay safe and learn how to detect and prevent these attacks.
Phishing scams are based on communication made via email or on social networks. In many cases, cyber criminals will send users messages/emails by trying to trick them into providing them valuable and sensitive data ( login credentials – from bank account, social network, work account, cloud storage) that can prove to be valuable for them.
Moreover, these emails will seem to come from an official source (like bank institutions or any other financial authority, legitime companies or social networks representatives for users.)
This way, they’ll use social engineering techniques by convincing you to click on a specific (and) malicious link and access a website that looks legit, but it’s actually controlled by them. You will be redirect to a fake login access page that resembles the real website. If you’re not paying attention, you might end up giving your login credentials and other personal information.
We’ve seen many spam email campaigns in which phishing were the main attack vector for malicious criminals used to spread financial and data stealing malware.
In order for their success rate to grow, scammers create a sense of urgency. They’ll tell you a frightening story of how your bank account is under threat and how you really need to access as soon as possible a site where you must insert your credentials in order to confirm your identity or your account.
After you fill in your online banking credentials, cyber criminals use them to breach your real bank account or to sell them on the dark web to other interested parties.
Here’s an example of a sophisticated email scam making the rounds that you should be very careful.
Probably one of the oldest and most popular Internet scam used mostly by a member of a Nigerian family with wealth to trick different people. It is also known as “Nigerian 419”, and named after the section of Nigeria’s Criminal Code which banned the practice.
A typical Nigerian scam involves an emotional email, letter, text message or social networking message coming from a scammer (which can be an official government member, a businessman or a member of a very wealthy family member – usually a woman) who asks you to give help in retrieving a large sum of money from a bank, paying initially small fees for papers and legal matters. In exchange for your help, they promise you a very large sum of money.
They will be persistent and ask you to pay more and more money for additional services, such as transactions or transfer costs. You’ll even receive papers that are supposed to make you believe that it’s all for real. In the end, you are left broke and without any of the promised money.
Whether it’s Christmas or Easter, we all get all kind of holiday greeting cards in our email inbox that seem to be coming from a friend or someone we care.
Greeting card scams are another old Internet scams used by malicious actors to inject malware and harvest users’ most valuable data.
If you open such an email and click on the card, you usually end up with malicious software that is being downloaded and installed on your operating system. The malware may be an annoying program that will launch pop-ups with ads, unexpected windows all over the screen.
People can be easily scammed by “too good to be true” bank offers that might guarantee large amounts of money and have already been pre-approved by the bank. If such an incredible pre-approved loan is offered to you, ask yourself:
“How is it possible for a bank to offer you such a large sum of money without even checking and analyzing your financial situation?”
Though it may seem unlikely for people to get trapped by this scam, there’s still a big number of people who lost money by paying the “mandatory” processing fees required by the scammers.
Here are 9 warning signs and sneaky tactics to watch out and avoid becoming a business loan scam.
As regards to credit card scams, a recent report from the Identity Theft Resources Center said that the number of credit and debit card breaches have been on the rise last year. To better safeguard your data and prevent thieves from getting access to your payment card details, consider:
Watching your accounts closely and monitor your online transactions;
Taking advantage of free consumer protection services;
This is another classic Internet scam which doesn’t seem to get old. A lottery scam comes as an email message informing you that you won a huge amount of money and, in order to claim your prize or winnings, you need to pay some small fees.
Lucky you, right?! It doesn’t even matter that you don’t recall ever purchasing lottery tickets.
Since it addresses some of our wildest fantasies, such as quitting our jobs and living off the fortune for the rest of our lives, without ever having to work again, our imagination falls prey easily to amazing scenarios someone can only dream of.
But the dream ends as soon as you realize you have been just another scam victim. DO NOT fall for this online scam and have a look at this checklist to see if you are getting scammed.
One of the most frequent Internet scams you can meet online is the “hitman” extortion attempt. Cyber criminals will send you an email threatening to extort money from you. This type of online scam may come in various forms, such as the one threatening that they will kidnap a family member unless a ransom is paid in a time frame provided by the scammers.
To create the appearance of a real danger, the message is filled with details from the victim’s life, collected from an online account, a personal blog or from a social network account.
That’s why it’s not safe to provide any sensitive or personal information about you on social media channels. It might seem like a safe and private place, where you’re only surrounded by friends, but in reality you can never know for sure who’s watching you.
As the Internet plays an important role in our social lives, with apps like Facebook or Instagram we access everyday, it’s inevitable to use apps to look for love as well.
Online dating apps are very popular these days and they are a great way to meet your future life partners. I have actually an example with a friend of mine who was lucky enough to find her future husband on a dating site.
But not all scenarios have a “happy end” like this one, and you need to be very careful, because you never know who can you meet.
A romance scam usually takes place on social dating networks, like Facebook, or by sending a simple email to the potential target, and affect thousands of victims from all over the world.
The male scammers are often located in West Africa, while the female scammers are mostly from the eastern parts of Europe.
Cyber criminals have abused this scamming method for years by using the online dating services. They improved their approach just by testing the potential victims’ reactions.
According to a research published in the British Journal of Criminology last month, the techniques (and psychological methods) used by scammers in online romance scams are similar with those used in the domestic violence cases.
To avoid becoming a victim of these Internet scams, you need to learn how to better protect yourself.
Knowing that hundreds of women and men from all over the globe are victims of this online scams, we recommend using these security tips for defensive online dating, including warning signs that could help you from becoming an easy target.
I would also recommend reading these real stories and learn from them, so you don’t fall for these online scams:
We all saw at least once this message on our screens: “You have been infected! Download antivirus X right now to protect your computer!”
Many of these pop-ups were very well created to look like legitimate messages that you might get from Windows or any other security product.
If you are lucky, there is nothing more than an innocent hoax that will bother you by displaying unwanted pop-ups on your screen while you browse online. In this case, to get rid of the annoying pop-ups, we recommend scanning your system usinga good antivirus product.
If you are not so lucky, your system can end up getting infected with malware, such as a Trojan or a keylogger. This kind of message could also come from one of the most dangerous ransomware threats around, such as CryptoLocker, which is capable of blocking and encrypting your operating system and requesting you a sum of money in exchange for the decryption key.
To avoid this situation, we recommend enhancing your online protection with a specialized security product against financial malware, and complement your traditional antivirus program.
Also, make sure you do not click on pop-up windows that annoyingly warn you’ve been infected with virus. Remember to always apply the existing updates for your software products, and install only legitimate software programs from verified websites.
If you’ve been infected, you can use an antimalware tool such as Malwarebytes to try removing the malware infection or pay attention to these warning signs and learn how to find a doable solution.
Facebook. Everyone is talking about it these days, and the scandal about Cambridge Analytica firm harvesting personal data taken from millions of this social media channel without users’ consent.
It’s still the most popular social media network where everyone is active and use it on a daily basis to keep in touch with friends and colleagues. Unfortunately, it has become also the perfect place for online scammers to find their victims.
Just imagine your account being hacked by a cyber criminal and gaining access to your close friends and family. Nobody wants that!
Since it is so important for your privacy and online security, you should be very careful in protecting your personal online accounts just the way you protect your banking or email account.
Facebook security wise, these tips might help you stay away from these online scams:
Do not accept friend requests from people you don’t know
Do not share your password with others
When log in, use two-factor authentication
Avoid connecting to public and free Wi-Fi networks
Cyber criminals will lure you into believing you can make money easy and fast on the internet. They’ll promise you non-existent jobs, including plans and methods of getting rich quickly.
It is a quite simple and effective approach, because it addresses a basic need for money, especially when someone is in a difficult financial situation.
This scamming method is similar to the romance scam mentioned above, where the cyber attackers address the emotional side of victims. The fraudulent posting of non-existent jobs for a variety of positions is part of the online criminals’ arsenal.
Using various job types, such as work-at-home scams, the victim is lured into giving away personal information and financial data with the promise of a well paid job that will bring lots of money in a very short period of time.
Read and apply these ten tips that can help you avoid some of the most common financial scams.
These scams are commonly used during hot summer months or before the short winter vacations, for Christmas or New Year’s Day.
Here’s how it happens: you receive an email containing an amazing offer for an exceptional and hard to refuse destination (usually an exotic place) that expires in a short period of time which you can’t miss. If it sounds too good to be true, it might look like a travel scam, so don’t fall for it!
The problem is that some of these offers actually hide some necessary costs until you pay for the initial offer. Others just take your money without sending you anywhere.
In such cases, we suggest that you study carefully the travel offer and look for hidden costs, such as: airport taxes, tickets that you need to pay to access a local attraction, check if the meals are included or not, other local transportation fees between your airport and the hotel or between the hotel and the main attractions mentioned in the initial offer, etc.
As a general rule, we suggest that you go with the trustworthy, well known travel agencies. You can also check if by paying individually for plane tickets and for accommodation you receive the same results as in the received offer.
If you love to travel, you can easily fall prey to airline scams by simply looking for free airline tickets. Airline scams are some of the most popular travel scams, and we recommend applying these valuable tips.
12. Bitcoin scams
If you (want to) invest in Bitcoin technology, we advise you to be aware of online scams. Digital wallets can be open to hacking and scammers take advantage of this new technology to steal sensitive data.
Bitcoin transactions should be safe, but these five examples of Bitcoin scams show how they happen and how you can lose your money.
The most common online scams to watch out for:
Fake Bitcoin exchanges
Everyday scam attempts
Here’s how you can spot a Bitcoin scam and how to stay safe online.
The spread of fake news on the Internet is a danger to all of us, because it has an impact on the way we filter all the information we found and read on social media. It’s a serious problem that should concern our society, mostly for the misleading resources and content found online, making it impossible for people to distinguish between what’s real and what is not.
We recommend accessing/reading only reliable sources of information coming from friends or people you know read regular feeds from trusted sources: bloggers, industry experts, in order to avoid fake news.
If it seems too good to be true, it’s most likely a scam. Take a look over these online scams Click To Tweet
This type of scam could come in the form of a trustworthy website you know and often visit, but being a fake one created by scammers with the main purpose to rip you off. It could be a spoofing attack which is also involved in fake news, and refers to fake websites that might link you to a buy page for a specific product, where you can place an order using your credit card.
To avoid becoming a victim of online scams, you can use tech tools such asFact Check from Google orFacebook’s tool aimed at detecting whether a site is legitimate or not, analyzing its reputation and data.
Cyber security experts believe that these Internet scams represent a threat for both organizations and employees, exposing and infecting their computers with potential malware.
We all love shopping and it’s easier and more convenient to do it on the Internet with a few clicks. But for your online safety, be cautious about the sites you visit. There are thousands of websites out there that provide false information, and might redirect you to malicious links, giving hackers access to your most valuable data.
If you spot a great online offer which is “too good to be true”, you might be tempting to say “yes” instantly, but you need to learnhow to spot a fake shopping siteso you don’t get scammed.
We strongly recommend reading these online shopping security tips to keep yourself safe from data breaches, phishing attacks or other online threats.
Many websites have a loyalty program to reward their customers for making different purchases, by offering points or coupons. This is subject to another online scam, because cyber criminals can target them and steal your sensitive data. If you think anyone wouldn’t want to access them, think again.
The most common attack is a phishing scam that looks like a real email coming from your loyalty program, but it’s not. Malicious hackers are everywhere, and it takes only one click for malware to be installed on your PC and for hackers to have access to your data.
As it might be difficult to detect these phishing scams, you may find useful this example of acurrent phishing campaign targets holders of Payback couponing cards, as well as some useful tips and tricks to avoid being phished.
Sadly, there are scammers everywhere – even when you are looking for a job – posing as recruiters or employers. They use fake and “attractive” job opportunities to trick people.
It starts with a phone call (or a direct message on LinkedIn) from someone claiming to be a recruiter from a well-known company who saw your CV and saying they are interested in hiring you. Whether you’ve applied or not, the offer might be very appealing, but don’t fall into this trap.
To protect yourself from job offer scams, it’s very important to:
Do a thorough research about the company and see what information you can find about it;
Check the person who’s been contacted you on social media channels;
Ask for many details and references and check them out;
Ask your friends or trustworthy people if they know or interacted with the potential employer.
To avoid these types of online job scams, check thisarticle.
Smartphones. You can’t live without them in the era of Internet. They’ve become essential for communication, online shopping, banking or any other online activity.
Needless to say the amount of data we store on our personal devices which make them vulnerable to cyber criminals, always prepared to steal our online identities or empty our bank accounts.
Smishing (using SMS text messages) is a similar technique to phishing, but, instead of sending emails, malicious hackers send text messages to their potential victims.
How this happens? You receive an urgent text message on your smartphone with a link attached saying that it’s from your bank and you need to access it in order to update your bank information, or other online banking information.
Be careful about these SMS you receive and don’t click on suspicious links that could redirect to malicious sites trying to steal your valuable data. These useful tips can help you easily spot these types of online scams.
If you are considering selling different items on specialized online sites, we strongly recommend watching out for overpayment scam.
A typically overpayment online scam like this works by getting the potential victim “to refund” the scammer an extra amount of money because he/she send too much money. The offer will often be quite generous and bigger than the agreed price. The overpay (extra money) is to cover the costs of shipping or certain custom fees.
One such story can unfold right now and can happen to each of you. This happened to one of our Heimdal Security team members. After smiling a bit and seeing the method, we did realize that’s a common online scam and we had to share it with you. Also, we included a few security tips and actionable advice to prevent falling prey to overpayment online scam.
Our colleague posted a sofa for sale on a Danish site called dba.dk which is a sort of a flea market online. After a few days, he received a message from a person claiming to be interested in the item and willing to pay more than the price offered, via PayPal account.
Here’s how a scam email looks like in which the malicious person asks for personal information to transfer the money.
Also, here’s the confirmation email coming from the scammer which shows that he paid an extra amount for the sofa, including extra shipping fees and MoneyGram charges the extra fee for transportation.
After that, he also got another email saying that he needs to refund the extra amount of money, including the shipping and transportation charges to a certain shipping agent via MoneyGram transfer.
Here’s how the phishing email looks like that you should be very careful and don’t fall for it:
Follow these security tips to protect yourself from overpayment online scam:
If you notice a suspicious email coming from untrusted source or something out of ordinary, you should report it as soon as possible.
If you receive a similar email like the one our colleague got, do not transfer extra money to someone you don’t know, especially if he/she wants to overpay. A legitimate buyer won’t do that.
Also, do not transfer money to a fake shipping company or some private shipping agent, because it’s part of scam and you need to be very careful.
Do not provide personal information to people who don’t show a genuine interest in buying your item.
Do not send the product to the buyer until the payment was completed and received in your bank account.
19. Tech Support Online Scams
Here’s another online scam that is common and you need to be extra careful. The next time your smartphone rings and you don’t know the number, think twice before answering. Maybe it’s not your friend on the other end of the phone, maybe it’s the scammer!
According to a recent report “nearly half of all cellphone calls next year will come from scammers”, so we need to learn how to better detect and prevent such malicious actions coming from skilled persons.
Tech support scams are very common and widespread these days. Scammers use various social engineering techniques to trick potential victims into giving their sensitive information. Even worst, they try to convince potential victims to pay for unnecessary technical support services.
These tech “experts” pretend to know everything about your computer, how it got hacked and many other details that help them gain your trust and convince victims to fall prey for their scams.
A scenario like this can happen as we write this, and one of our Heimdal Security team members recently got a phone scam call. While we got amused by the conversation he had with the person pretending to work for an Indian tech support company, we realized it can happen to anyone which can become an easy target.
The person, pretending to be the representative of a software company and experienced one, is informing our colleague that his computer got hacked by cybercriminals, and offers to guide him and solve this urgent problem.
With poor English skills, he gives details about the serial number of the computer, and provide guidance to access the unique computer ID, trying to misrepresent normal system as having serious issues. After a few minutes, the call is transferred to another tech representative who informs our colleague that they detected unusual activity going through his computer. He’s been told that multiple attempts have been seen on the PC in which hackers tried to get unauthorized access to his computer.
Our colleague detected this as being scam and didn’t go along with it, but for someone without technical knowledge, it may not be so easy to spot.
You can listen to this call here:
If someone else would have fallen prey for this online scam, things would have gone even further. The so-called tech scammers could persuade the potential victim to give them remote access to the system. To “help” the victim, scammers mention about additional software that are required to be installed and victims need to pay for these software victims, hence, provide credit card details. You can find out more info here
How to avoid getting scammed by tech support “specialists”
To avoid becoming an easy target of these sneaky tech support scammers, we strongly recommend following these basic rules:
Do not trust phone calls coming from people pretending to come from tech “experts”, especially if they are requesting for personal or financial information;
DO NOT PROVIDE sensitive data to them or purchase any software services scammers may suggest you as a solution to fix your tech problem.
DO NOT allow strangers to remotely access your computer and potentially install malicious software;
Make sure you download software apps and services only from official vendor sites;
Don’t take it for granted when a stranger calls you out of the blue, pretending to have a technical solution for your issues. Make sure you ask for proof of their identity and do a quick research about the company they are calling you from;
Always have an antivirus program installed on your computer, and for more protection, consider adding multiple layers of security with a proactive security solution like our Thor Premium Home, which will stop any type of online threats.
Have a security-first mindset and be suspicious about everything around you. Also, consider investing in education and learn as much as possible about cyber security. Here’s how you can reduce spam phone calls.
Since some scams are so well organized and really convincing, and people behind them so difficult to catch, we need to always keep our guard up. Stay informed about the latest scamming strategies.
Have you met some of the above scams while browsing or in your email inbox? What were the most convincing ones?
*This article was initially published by Andra Zaharia in January 2016.”
Spend time with your family, not updating their apps!
Let THOR FREE
Silently and automatically update softwareClose security gapsWorks great with your favorite antivirus
The idea that we should create a gargantuan list of cyber security tools started running through our minds a while ago because, in our journey into the cyber security and data protection world, we ran into lots of useful tools.
When we decided to work on this list, we had no idea how and where to begin.
What tools should we include? What should we not? How do we tell if one is worthy and the other one is not?
Do we mention ultra-known products?
Should we stick to what’s free or should we also add paid products?
Eventually, we came up with what we’re about to read. But first here’s a quick guideline that you should read before we jump right to the subject:
We don’t claim this is the ultimate list. It’s not complete and it’s definitely not final. It probably never will be. We are aware that we missed lots of essential, important tools – by mistake or just because we can’t know them all. So please feel free to jump in with more useful tools that you feel they should be mentioned.
We stayed away from recommending antivirus, VPN or firewall products. There are independent industry experts who only do that. Instead, we prefer to list those experts or websites that will help you compare such services, in order to choose what’s best for you
We tried to test them all before recommending them. And we only included tools that have free versions.
Here’s our list :
50+ free security tools you can use for your online protection
A unique and strong password is key to our online safety. We keep recommending this in our articles (and we’ll keep doing it) so people can realize the importance of setting passwords that hackers can’t reach.
First of all, here’s why it should be unique:
We never use the same key for our house and car, right? Then why would we use the same password for our accounts?
Our online accounts are interconnected. If one of those passwords is breached, the cyber criminal will have access to the rest of your accounts.
And no matter how careful you are not to give out your password, sometimes you might not be responsible for the breach. Companies have plenty of vulnerabilities. Their employees can have poor security habits. Their ex-employees might want to get vengeance this way. Your online connection might not be secure and your traffic unencrypted. There are tons of flaws out there that could expose your credentials.
Second of all, here’s why it should be strong (and what does “strong” mean):
Most people have weak passwords. They use family or pets names, favorite songs, birth dates and so on. This type of information nowadays is readily available online – usually posted directly by us, on social networks or blogs or forum comments.
If a cyber criminal really wants to hack your account and you use such a password, all they’ll have to do is spend some time finding out more information about you.
They also have the technical skills to test out millions of passwords combinations in a short period of time. So there’s that.
SplashData released its annual list of top worst passwords of 2017, where we see that people continue using the classic”123456″.
Constantly coming up with strong, unique passwords is hard. We get it.
It’s hard to remember to change them, and it’s even harder to remember them. Especially since it’s not recommended to write them down – not in a document on your desktop, not in an email draft, not in your phone or written on a paper that stays under your mouse pad. No, no, no, no.
And since not all of us have an elephant memory, some smart guys created tools that make it easier for us to manage passwords.
Passwords managers are easy to use. You install them as browsers plug-ins and they help us save passwords and keep them encrypted. When we log in to a new account, the password manager will ask us if we want to save the password.
All we have to do is remember the password that we use for the password manager tool account.
Here are some of the most popular apps for password management:
LastPass – it’s one of the oldest and most known password managers.
1Password – not exactly free, but offers a free trial that lasts 30 days
Activate two-factor authentication
Ok, so this is plan B. If passwords fail and a cybercriminal somehow manages to find out your beautiful, strong, unique and completely random password, the second-factor authenticator will work as an extra shield.
Two-factor authentication adds an extra layer of protection. This way, the password will not be enough to access your account, you’ll also have to prove your identity using the second method. This usually consists of a unique, time-sensitive code, that you receive using your mobile phone.
In order not to do this every time you log into your account, you can choose to remember the devices you use and only require the second way of authentication when you want to log in from a new device (laptop, PC, tablet, browser, whatever that may be).
I always wonder why the companies don’t enable this option by default. It would help avoid a lot of accounts that end up compromised because of poor passwords habits.
If you want to check what services offer users the possibility to activate two-factor authentication, use this tool:
There are several projects out there that store a huge database of leaked, stolen or compromised passwords. Other projects gather all the past data breaches. You can use them to confront with your passwords or accounts and check their databases. If someone ever used a password that’s the same with yours and was leaked in a past breach, you’ll have to change it.
You can also check if you have any accounts that were compromised in any of those data breaches.
It’s highly recommended that you avoid checking in from your social accounts – especially from your home.
Something so common and apparently innocent as a social media check-in can turn into a nightmare. You can never control who can access your social network posts. You never know who else benefits from the information you shared.
There have been many cases of people who checked in while on vacation, bragged about the wonderful places they visited, only to come back home and find out that they were robbed. Burglars were tipped off thanks to the posts on social media.
However, if it’s already too late and you already have plenty of check-ins made online, you can remove your previous ones.
For Facebook, you’ll have to do that manually for each post you published and then turn off location for future posts. However, for Instagram, there’s an easier batch solution that you can use.
Instagram is constantly updating its network and has changed the geo-map feature for mobile that let you control geotag location. Now you have the option to save photos you see and like on Instagram, save and add them to your photos collections.
Revoke access to third-party apps
You probably logged in with your social accounts to any third-party apps – games, other social networks, streaming services and so on.
For privacy matters, it’s recommended that you only allow access to trustworthy apps. Those apps have access to your profiles and personal information.
From time to time, make sure you check every single app that you allowed to access your account and remove the ones that you don’t use anymore.
Here’s how you can remove access to external apps from every major social network:
Google and Facebook are among the networks that offer the possibility to do a security check-up. They will take you through the steps you need to check or activate in order to enhance your account’s protection.
Safe Pad – an online notepad that is encrypted end-to-end.
Keeping malicious software under control
There are some major software apps that are buggy and expose you to global cyber attacks. “Software” and “buggy” might just be pleonasms for the moment, as all software have bugs and vulnerabilities.
What you should bear in mind is that you can reduce your odds of being infected just by keeping those buggy apps up to date. Or disabled until you really need them and activate them punctually. Or uninstalled, if they aren’t vital to your work.
By “apps” we mean browsers, plug-ins, add-ons. Chrome, Firefox, Flash Player, Java, and Adobe Reader, just to name a few of them, but you should take a look over the infographic published here to find out more about the top most vulnerable apps.
Here’s how you can reduce your odds of getting infected:
1. Keep those vital apps up to date. You can use an automated patching tool that will take care of that for you, silently (Thor FREE does that).
2. Use a tool that will scan your traffic and restrict your access to infected web pages (our product also does that, and also makes sure that none of your data goes out to the bad guys).
3. No clicking on suspicious links or attachments, short links that you don’t know where they’ll lead you, nothing that you never requested or sounds fishy (even if it’s coming from your online buddies). Staying away from dangerous web locations also is vital (that means no websites that host illegal content, such as torrents).
If you want extra anonymity, here is a list of tools that are focused on encryption and privacy:
Tor Project – we’re sure you already know about this one. You can use Tor to browse the web while staying anonymous.
Comparison VPN – the name is pretty much self-explanatory, right? “VPN” comes from “Virtual Private Network” and it’s used to encrypt your outgoing and ongoing traffic. This tool will help you compare between different VPN services.
Duck Duck Go – it’s a free search engine but, unlike others, it doesn’t track you, doesn’t collect or share any of your personal information.
Disconnect – the basic version will block trackers from websites.
uBlock – a lightweight free and open source browser extension that will help you filter our annoying or unwanted content, such as tracking cookies and ads (available for Mozilla, Chrome, Safari and even Microsoft Edge).
Ghostery – a free browser extension that lets you control trackers from the websites that you visit.
If you want to avoid any phishing or malware attacks, it’s best that you don’t click on any links that you don’t know where they’ll lead you. They might be links shortened using services such as Bit.ly or Unshorten or links that look similar to perfectly legitimate ones but use a variation in spelling or domain.
Use one of these services to check where a link will redirect you:
As an alternative to remotely check where a short link will take you, you can also use a service that remotely takes screenshots of a given website.
This kind of services are usually used by developers, to see how a website will look on different resolutions and browsers used by users, but they can also come in handy when it comes to Internet security.
This way, you’ll see how a website looks like and where you’ll end up if you click on that link, without actually visiting it.
How valuable are the work documents that you keep on your desktop, your email or in the cloud?
What about your collection of photos or private conversations? Would you miss them if they were ever deleted or lost?
What if they were stolen? Or, even worse, encrypted in a ransomware attack?
Stop telling yourself “it can’t happen to me”. The odds for ending up with malware attacks are against you.
And most of these attacks are automated, nobody hand picks you as a victim. It’s enough for you to have files and outdated browsers, plugins or apps. You don’t even have to click or download anything to end up infected – nowadays you can be compromised even on perfectly legit websites.
Bad news is that even if you pay the ransom, there’s no guarantee that you’ll receive the encryption key to gain back access to your files. Or the encryption might have gone wrong and corrupted the files. It’s one of the reasons why the FBI advises against paying the ransom.
Let’s not forget about the recent cyber attacks (WannaCry, Petya ransomware) impacting big organizations and institutions (Telefonica, Renault, FedEx, the National Health Service (NHS) in England and Scotland, Maersk, Government of Ukraine, and many more) that saw their computers compromised and lost access to valuable information.
No matter how many Internet security layers you have in place, always have a backup. Set in place at least two automatic backups. If everything else fails, at least you’ll be covered.
And here are two more tools that will help you out:
Best Backup – helps you choose the backup solutions suited to your needs
Spider Oak – backup solution focused on encryption and Internet security
Although ignored by most people, this step is also important to cyber security. Take your time and file a report if you run into anything that looks fishy.
If you have a hunch that something is wrong and you might have fallen into a trap, immediately contact your bank or credit card institution and close the accounts you believe they may have been compromised.
If this is not the case and you simply ran into spam, scams or phishing attempts, it’s best that you report them to government organizations or even cyber security companies.
Here are some of the places where you can do that:
Found this super useful list of free #cybersecurity tools, check it out: Click To Tweet
In the cyber security game, the good guys and the bad ones constantly try to outrun each other. That’s why you should always remember that no tool is bulletproof. Don’t rely exclusively on a software or an app to keep you safe, as they all have flaws and vulnerabilities.
Instead, try to think and act like a journalist. Question everything that you receive or run into in the digital world, even if it only looks slightly suspicious. Triple check it before you act on it, be sure that you don’t throw yourself into anything fishy.
Continue to improve your cyber education. In time, you’ll train your intuition and it will become increasingly easier to spot potential compromises.
It’s essential that you never give up on healthy Internet security habits. Add as many security layers as possible – onion style – in order to decrease the impact of a potential attack.
Hope for the best and prepare for the worst, right?
This article was initially published by Cristina Chipurici in May 2016 and it was republished in July 2017.
The easy way to protect yourself against malware
Here's 1 month of Thor Foresight Home, on the house!
Use it to:
Block malicious websites and servers from infecting your PCAuto-update your software and close security gapsKeep your financial and other confidential details safe
Do you want to know which is the best encrypted messaging app out there and how it can protect your valuable data? This guide might be exactly what you’re looking for.
We compiled a list of useful encrypted apps because the struggle for keeping our data secure is fiercer than ever. Governments crave for it, companies seek access to it, and cyber criminals probably want it the most.
Many of you could believe that all the confidential data shared is safe via Facebook Messenger, Skype or Snapchat, but sometimes it’s just an illusion. The recent events in which Facebook shared users’ private information with Cambridge Analytica in what seems to be one of the social network’s largest data breaches, should make us more aware of the importance of data privacy.
Check out this list of the best #encrypted messaging apps to protect your privacy & security: Click To Tweet
End-to-end encryption means encrypting communications in order to make information unavailable to third parties. So when two or more devices communicate via an app that features this level of encryption, the information will be transmitted using a secret code rather than insecure plain text.
As a result, only the people communicating can read the messages and no other person. Not even Internet service providers, the app maker, the government or anyone else.
The data is protected against tampering, surveillance, cyber criminals while it’s transmitted and stored. The encryption key is stored locally, for improved protection.
Martin Kleppmann, former Rapportive co-founder, and LinkedIn engineer sums up the value of end-to-end encryption in a great blogpost:
Although encryption in transit is widely used, it has serious security problems.
For example, the service provider could be hacked by an adversary, or compromised by an insider, causing sensitive information to be leaked. A fault in the service provider could cause data to be corrupted.
For these reasons, security experts are pushing towards widespread use of end-to-end encryption, which reduces the exposure to such attacks.
His comparison between different types of data encryption is also useful to explain the difference between the widely used encryption in transit and the more secure end-to-end encryption process:
Since 2016, WhatsApp has enabled and implemented end-to-end encryption, so users can enjoy a more secure communication. With more than 1.5 billion users, the platform has been acquired by Facebook and offers a free app to small-to-medium sized and enterprise businesses alike.
Security-wise, encryption enhances communication privacy and protects users’ messages from impostors or malicious actors. While security flaws may appear, if cyber criminals were to breach WhatsApp today, they couldn’t decrypt your conversations. That’s due to the encryption and to the fact that WhatsApp doesn’t store your messages on its servers.
When it launched its 6.0 version, Viber also rolled out end-to-end encryption, providing more safety for its users. The app maker even created aViber Encryption Overview which serves as a great guide for those who want to learn in-depth information on this security enhancement.
Since 2017 its corporate name has been Rakuten Viber and is currently based in Luxembourg.
This private chat app has plenty of useful features in order to offer users high-quality calling experience and all of them are secured, so the information shared is protected along the way with the end-to-end encryption system.
As long as you make sure to use the sharing method pointed out by Viber, your data will remain encrypted from your end all the way up the recipient.
Another secure texting app that you can use to This app has quite an unusual story. It was originally built by a team of Japanese engineers as a solution to communicate after the devastating Tōhoku earthquake which happened in 2011. The calamity damaged the telecommunications infrastructure all over the country, so the only way to communicate was based on Internet-connected platforms.
The same year, LINE added end-to-end encryption to its platform. This featured is called “Letter Sealing” and it’s available to all its users. They just have to turn it on to benefit from it.
Similar to other messaging apps, Telegram offers end-to-end encryption as well, being considered one of the most secure messaging platforms. For users who want more privacy, they can turn on “Secret Chats” from the app’s advanced settings. Read more details about this feature:
“And when you delete messages on your side of the conversation, the app on the other side of the secret chat will be ordered to delete them as well.
You can order your messages, photos, videos and files to self-destruct in a set amount of time after they have been read or opened by the recipient. The message will then disappear from both your and your friend’s devices.”
All secret chats in Telegram are device-specific and are not part of the Telegram cloud, meaning that you can only access messages in a secret chat from their device of origin. If your device is safe, your secret chats are safe as well.
Similar to other private chat apps listed above, KakaoTalk is a Korea-based messaging app that fully encrypts our conversations since 2014! To benefit from this feature, you have to use the “Secret Chat” feature, which is inspired by Telegram.
This feature offers users the option of securing messages with end-to-end encrypted chatting option. However, KakaoTalk’s default chat mode is not end-to-end encrypted, so you’ll have to enable it.
The app makers boast that KakaoTalk is used by over 90% of smartphone users in South Korea, for which privacy and data security are main concerns.
Here’s another secure messaging app that uses encryption system and can keep your messages safe.
Whisper Systems created Signal as a successor to two separate apps dedicated to encrypted voice calling and encrypted texting.
Encryption was always at the core of the company’s products. When Twitter acquired it in 2011, the goal was to improve the security in the microblogging platform.
Its encryption engine is open source, which means is available for everyone to inspect.
Signal is used by leading figures in cyber security and data privacy, such as Edward Snowden and Bruce Schneier! That’s because in Signal all communication is encrypted end-to-end by default.
Recently, the app received a $50 million investment from the WhatsApp co-founder Brian Acton which is supporting the non-profit Signal Foundation’s mission of “making private communication accessible and ubiquitous”.
Signal is also WIRED’s secure messagingrecommendation to use it because “it’s free, it works on every mobile platform, and the developers are committed to keeping it simple and fast by not mucking up the experience with ads, web-tracking, stickers, or animated poop emoji.”
Formerly known as Cyber Dust, it’s another private messaging app that uses end-to-end encryption as the main security and privacy feature. You may think of Snapchat when you’ll read about its way of functioning, as it says on the website:
“You can erase your messages off other people’s phones. No messages are permanently stored on phones or servers. Messages are heavilyencrypted and not accessible to anyone, even us.”
What Dust is trying to create is a social communication platform with enhanced security and privacy, by using a combination of AES 128 and RSA 248 encryption.
Here’s another secure texting app that we suggest giving a try. Everything you communicate while using Threema is encrypted end-to-end: not only messages but also group chats, voice calls, media files and even status messages. Your messages can be read only the intended recipient, so nobody else can interfere and have access to them.
The app makers also boast that they delete the messages you send from their servers once they’ve been delivered.
Threema app has a “Private Chats” feature that can help users protect individual chats with a PIN code. This way, confidential chats are protected from malicious actors.
Another great thing about this app is the QR code and key fingerprint available for user verifications to prevent man-in-the-middle attacks.
CoverMe is another secure chat app that uses end-to-end encryption technology for better securing your messages and files sent from intruders who try to get access to them.
By using it, you can also make encrypted voice calls, without any records on your phone bill. The app also includes a private vault feature for extra security so you can use to store your files in and hide videos, photos, passwords and any files.
Is another messaging app that focuses on keeping your messages safe, using encryption for text messages over the air and on your phone. Similar with Signal and Wickr Me apps, it is open source and free.
Formerly known as SMSecure, Silence app has a simple and friendly interface and uses encrypted SMS messages with no Internet connection required.
Whether you are an Android or iOS user, you can freely start chatting and messaging with Pryvate app.
In 2015 it won the award for “Best Business – Best Mobile App” and ensures your communications are encrypted and fully secured.
This messaging app offers world-class RSA 4096-bit encryption technology and involves NO servers or middleman for communications, so users can enjoy direct communications with their colleagues, friends or family.
It includes a “Self Destruct” feature which lets you delete all your messages sent on recipients device at any time.
Here’s another great encrypted messaging app that is worth a try. Unlike other services out there, it offers end-to-end encryption by default to secure your conversations, files and images, text files and more.
It is open source and collaborative platform, and has plenty of useful features: fully encrypted video calls, secure file sharing, synced between devices and others. Wire has a free version for personal use ( after creating an account) and paid one for organizations (large enterprises).
It works on all popular platforms: Windows, Android, iOS, macOS, Linux, and different browsers (Chrome, Firefox, Edge, Opera).
More to come
This list isn’t complete, so we believe we’ll update it soon.
If you have any encrypted messaging apps that should be on this list to add, do let us know, or leave a comment below, and we’ll be happy to include them.
Until then, remember that popular apps like Twitter, Instagram, Snapchat or Facebook Messanger don’t use end-to-end encryption, so your conversations and files may not be fully secured. If you are a Skype user like me, you should know that the company has introduced end-to-end encryption at the beginning of 2018.
If you want to explore more data encryption methods, we have a dedicated guide you’ll find helpful.
We’re living in a digital world where security and privacy matter more than ever. If you are concern about your data and value privacy, then it’s a must to use one of these encryption messaging apps to better secure them from spies, hackers or any other malicious actors.
Spend time with your family, not updating their apps!
Let THOR FREE
Silently and automatically update softwareClose security gapsWorks great with your favorite antivirus