Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
You've Got Malware, We've Got Help
Facebook   X   LinkedIn   Email

You've Got Malware, We've Got Help

December 15, 2024

The world of mobile viruses can be a bit confusing, right? Don't worry, we’ve got you. While your phone can fall victim to malware, it's highly unlikely that it’s going to result in an unrecoverable situation. What you may encounter are things like adware, bloatware, or those pesky pop-ups that drive you nuts. There is no shortage of those these days. These all can hitch a ride from third-party websites, apps, or even those suspicious email and text messages you receive all the time. But here we are to help!

Now, how can you tell if your phone is infected? Well, there are some telltale signs. If your phone starts performing at a snail's pace or consuming data like there's no tomorrow, it might be harboring some malware. However, sometimes these issues can be caused by faulty hardware or other bugs. It's a detective game and we love a good mystery.

Let's talk about malware for a moment. It's an umbrella term for any malicious program or software that sneaks into your device without your consent, wreaks havoc on its normal functioning, and can even steal sensitive information. A virus is one type of malware, but adware is another.

Let's take a look at a few examples of malware that have attacked phones in the past:

  • OpFake: A tricky Trojan horse that silently sends multiple text messages to premium rate services.
  • Android/Filecoder.C: This ransomware, discovered in 2019, locks your files and demands payment to unlock them.
  • Loki Bot spyware: A crafty Trojan horse that specializes in stealing information from the device.

Now that you're aware of the dangers, let's talk about prevention and remedies.

To remove malware, you can start by uninstalling suspicious apps. Each device has its own process. If you're not sure which one is causing the trouble, delete them one by one, restarting your phone after each removal. That way, you can pinpoint the culprit and avoid deleting innocent apps unnecessarily. Just be ready to spend some time on this.

Some infected apps may give you a hard time when trying to uninstall them. You might encounter a message saying they're a device administrator. Those admin apps have the power to erase data, lock your phone, and mess with your security settings. Not all apps require such power, so it's worth checking to see if you've accidentally granted this permission. Most apps don't need it, so be cautious.

Clearing your browser's cache is also a good move. It won't fix existing issues, but it helps sever any connections between your phone and those malicious websites. You can clear the app cache or delve into the app settings to clear cached data.

As far as websites go, be wary of suspicious ones and untrusted sources for apps and links. Stick to official app stores, check reviews and ratings, and use your common sense. If something seems fishy, it probably deserves extra attention.

Another tip is to enable Google Play Protect. It also performs regular security checks on your phone. If it detects any malicious apps, it either notifies you to uninstall them or automatically removes them for you.

Don't forget to update your phone's operating system regularly. Updates not only improve functionality and compatibility with apps but also patch up any vulnerabilities that could lead to malware mischief. Keep an eye out for notifications, but if you don't receive any, check for software updates in your settings.

Now, here's a seriously last-ditch effort: a factory reset. If all else fails, this is your option. It wipes your phone clean, erasing every setting, file, and app, taking it back to its pristine, out-of-the-box state. But before you hit that reset button, make sure you have a backup of your data. There's a small chance that some files might be corrupted and get uploaded to the cloud. If you restore them later, you'll be back at square one. So, proceed with caution.

If you’re not comfortable performing these tasks, take your device to a tech support representative for help.

Now, let's talk about good antivirus practices to protect your phone in the long run. These are solid guidelines for avoidance:

  • Avoid sketchy websites, apps, and links from untrusted sources.
  • Change your passwords regularly and make them strong.
  • Reset your network settings if you've shared a connection with a suspicious device.
  • Keep your device permissions and access in check. Don't give apps more than they need, and definitely don't grant them admin rights.
  • Back up your data regularly. Cloud storage and hardware devices can be your best buddies.

So, keep in mind that it's essential to take precautions as you venture through the vastness of the web. Stay safe, stay informed, and happy exploring!


Keeping Your Mobile Device Apps Virus Free

Mobile Security

Keeping Your Mobile Device Apps Virus Free

It’s no secret that cybercriminals take advantage of anxiety-filled times and the current coronavirus pandemic (COVID-19) is most certainly one of those moments. The latest cybersecurity news reports that Android smartphones are being targeted with apps claiming to have up-to-date data on COVID-19. These infected apps promise the latest updates, but to unsuspecting users who download them, they also promise malware will surely be installed on your mobile device. READ FULL STORY

Bootleg Apple Software Hides Cryptomining Malware On Macs

Your Security

Bootleg Apple Software Hides Cryptomining Malware On Macs

For those keeping up with technology news, it’s not often Macs make hacking headlines. And for those who are simply Mac lovers, it’s not wise to think hacks happen only to Androids since both are vulnerable. A recent finding linking bootleg Apple software, malware, and cryptomining is a lesson all users can learn from. After all, a successful attack on Macs can end up targeting Androids, too. Security researchers at Jamf Threat Labs found a bootleg version of Final Cut Pro Apple software hiding cryptomining malware. READ FULL STORY

Is Sideloading Worth The Risk Of Downloading Malware?

Your Security

Is Sideloading Worth The Risk Of Downloading Malware?

It’s been well-known that sideloading apps is a risky proposition. Just ask the 20 million Aptoide users who recently learned their personally identifiable information (PII) was posted online by a hacker. Aptoide, a popular third-party app “discovery platform” had its database hacked earlier this month. The cybercriminal behind the hack claims that in addition to the 20 million exposed data files, there’s an additional 19 million files in their possession. Whether that’s true or not remains a mystery for now, but the Aptoide incident shows (in a huge way) why app sideloading is risky at best and is not recommended by security professionals. READ FULL STORY

Smartphone Malware Alert – Androids And iPhones Infected With Hermit Spyware

Mobile Security

Smartphone Malware Alert – Androids And iPhones Infected With Hermit Spyware

No one likes the idea of their smartphone spying on them, so this latest spyware find is sure to go over like a lead balloon. Named “Hermit” by Lookout Research, the company announced this spyware is infecting both Android and iPhone users. Aside from the damage Hermit can do, Lookout Research suspects a telecom company, Tykelab Srl, may be hiding and using the spyware for their own gain. Researchers traced Hermit to Italian developer, RCS Labs. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...