How do hackers steal money through a smartphone? Can Robot Vacuum Cleaner Hack? 16 popular questions for a computer security expert
How do hackers steal money through a smartphone? Can Robot Vacuum Cleaner Hack? 16 popular questions for a computer security expert
Anonim

Promo

It seems that in 2021, everyone knows about the need for protection on the Internet. Nevertheless, many at least once in their lives lost data, access to social networks, and sometimes even money. Together with the company, “one” from in‌ ensuring‌ ‌security, ‌ confidentiality‌ ‌and‌ performance‌ of ‌digital‌ ‌ecosystems, we answer the most common questions about Internet protection so that more people stop falling for cybercriminals' tricks.

How do hackers steal money through a smartphone? Can Robot Vacuum Cleaner Hack? 16 popular questions for a computer security expert
How do hackers steal money through a smartphone? Can Robot Vacuum Cleaner Hack? 16 popular questions for a computer security expert

1. Many users believe that antivirus software is no longer needed in 2021. On the one hand, we have become skilled enough to recognize threats. On the other hand, if hackers want to steal our data, the antivirus will not stop them. And Windows even has a built-in security solution. As a result, do we need antiviruses now?

People often think that hackers are young hooligans who infect computers for the hype. But these times are already in the distant past. Cybercrime is a big criminal business. Attackers have become much more creative in their attempts to steal users' money and personal data. Many attacks are carried out through spyware on computers and smartphones, so only antivirus can save your data.

Windows built-in security does a pretty good job of dealing with major threats. But third-party antiviruses offer comprehensive protection. For example, in addition to blocking all types of cyber threats, an antivirus can protect you from going to fake sites, ensure the security of passwords stored in your browser and the operation of your webcam, and also save your personal files from ransomware and spyware. Antivirus has a permanent data destruction function and a sandbox mode that allows you to safely open suspicious files in an isolated environment. It also scans your Wi-Fi network for vulnerabilities and rogue devices.

If there was only one security solution or antivirus in the world, attackers would sooner or later find a way to bypass it. The more security we have, the more difficult it is for cybercriminals to deal with them.

2. What about macOS? It seems that most of the virus infections occur on Windows. Is it possible to live with Apple technology without antiviruses?

No. Any computer can get infected with malware. Moreover, each of us can be targeted for online scams and ransomware attacks - no matter which device we use. Users are threatened by phishing and malware-infected sites, as well as vulnerable Wi-Fi networks.

3. Browsers Chrome, Firefox, Edge and others warn when we try to open a hacked, phishing or untrustworthy site. Why, then, is additional internet protection needed?

Browsers use special filters to protect the device. When you visit a site, the browser checks it against a list of permissions before loading it, which contains thousands of pages that have already been reviewed and approved. Any resource that is not in this list of permissions is subject to rigorous analysis using Google's automated tools. If the site does not pass verification, then you will not be able to open it. But this method needs constant updating and monitoring: when a new malicious or phishing site appears on the Internet, the list of permissions will not block it. That is why it is worthwhile to additionally insure yourself with an antivirus.

Those who are especially concerned about their security and privacy can opt for specialized browsers, for example. It provides a secure browsing experience and protects the online shopping process.

4. Can hackers really eavesdrop on us and spy on us through a computer? Should you glue cameras on your laptop and smartphone?

Computer security: is it worth sticking a camera on a laptop and smartphone?
Computer security: is it worth sticking a camera on a laptop and smartphone?

Cybercriminals can use viruses and special programs to gain access to your laptop's camera. Simple ways to get infected with them are to follow links from dubious emails or download content from an unreliable source (including the way Trojans are purchased that disguise themselves as official programs), use outdated software, or use the services of a third-party support service.

To stay safe:

  • Check all active cameras. It is important to know how many of them are online. We usually remember about cameras on laptops and smartphones, but forget about game consoles, smart TVs, baby monitors. They are also worth checking out.
  • Use strong passwords. This rule is ignored by most users. Never leave the default password. Change it to complex: more than 15 characters, consists of numbers, uppercase and lowercase letters.
  • Update your software regularly. Developers often release new versions and updates for programs. They must be installed immediately. The automatic software update function will help you with this, which will remind you which programs have the latest versions.
  • Make sure your router is secure. Antivirus will scan your home network to prevent attacks on your device.
  • Don't click on suspicious links. Think before you open a letter from an unknown sender: mistakes, requests to urgently transfer money, a strange address - all this should alert you.
  • Use a separate network for IoT devices. If other gadgets, such as a laptop, are hacked, do not use the network to which it is connected.

5. It happens that you talk next to a switched on laptop, for example, about a new food for cats, and after 5-10 minutes the search engine and social networks are actively showing advertisements for such products. Are they listening to us?

Such stories are very popular, although experts have not found any convincing evidence that corporations are eavesdropping on conversations through devices. The rumors spawned by such frightening coincidences once again show how far the technology of creating targeted advertising has come.

Targeting platforms receive information from a variety of sources - often in real time. This is why it sometimes seems like advertisers are eavesdropping on us. They collect information from communication programs, track user activity on the platform, and track advertisements and cookies from third-party resources. All of these sources are legitimate and require at least the indirect consent of users to transfer data. To leave less information about yourself, use a browser that blocks cookies.

Any site we visit, search terms and likes are analyzed using Big Data technology to give companies like Google or Facebook more accurate information about our interests and preferences. The results of these evaluations are then used to tailor the ad. Some companies may even get ahead of your immediate circle: there was a story in the United States of how a major brand found out about a teenage girl's pregnancy before her own father.

Therefore, yes, companies collect data about us in order to use it for advertising purposes or to improve their services. But this happens with our consent to the terms of use. From a legal point of view, there is little that can be done about this. Adjust your privacy settings to minimize the amount of information you transmit. Revoke unnecessary app permissions, disable location tracking. If you want to get rid of annoying or unnecessary content, you can trick the algorithms by clicking likes and browsing pages that you are not interested in.

6. In 2017, suspicious attachments in the mailbox provoked a whole epidemic of Petya / NotPetya virus infection. How to protect yourself from such threats?

Petya is one of the ransomware programs. Usually such viruses try to get to your personal files (documents or photos), but Petya locks the entire hard drive. It encrypts the files your computer needs to work until you pay.

NotPetya works in a similar way, but unlike its decryptable predecessor, it encrypts every computer it comes into contact with. It is impossible to fix this even if the ransom is paid.

To catch such a virus is very unpleasant. Sometimes it cannot be fixed and only buying a new hard drive will help. To protect you need:

  • Limit the list of programs with administrator rights. Never grant such rights to a program if you are not sure that it is legal.
  • Be skeptical about emails. If you don't download the attachment or click the link in the suspicious email, the ransomware won't be able to get to your device.
  • Update software regularly. Malware exploits software vulnerabilities that companies fix in fresh versions. Install patches and updates as soon as they appear.
  • Use antivirus software. They will detect and block malware.
  • Ignore online ads. Malicious ads, especially pop-ups, are a common source of infection.
  • Make regular backups. This will minimize your future losses. Cloud services and physical disks are great backup options, so use them as often as possible.

Those using the latest versions of antivirus are protected from Petya ransomware. If your computer is infected with Petya, the antivirus will detect it, quarantine it and destroy it. And ransomware protection adds an extra layer of security by keeping selected files and folders safe from unauthorized access.

7. Is it possible to steal data from a banking application on a smartphone using malware and / or following a malicious link?

Such programs exist. As a rule, these are banking Trojans - they disguise themselves as legitimate applications in order to gain access to the details of your card or account. After receiving the necessary login information, the virus can share this information with malware developers, which will allow them to use your money.

To protect your bank card from cybercriminals:

  • Download banking apps only from official sources. Better if they are from the list recommended by the bank.
  • Do not use rooted smartphones.
  • Do not share your personal data with anyone - whether by phone, in person, via email or social media.
  • Track accounts in banking apps. Check your account regularly for strange payments and report suspicious activity as soon as you notice it.
  • Do not connect to free Wi-Fi hotspots. Attackers can create a fake network or gain access to unprotected Wi-Fi space and steal your data.
  • Beware of phishing attempts. Do not follow the links in emails, otherwise you risk infecting your device with malware or voluntarily giving your card number to a scammer. Instead, enter the URL and open the site directly from your browser.

8. Malware is regularly found in official app stores, and hundreds of users manage to download infected versions before Google, Apple or another company removes them. Will antivirus help in such a situation?

You can protect yourself from this. For example, Android can detect malware and potentially unwanted programs. Our researchers have repeatedly found banking Trojans, adware and even spyware on the Google Play store. They also found fleeceware on Google Play and the App Store. In such cases, we report them to Google and Apple, which usually remove them from the store immediately.

For protection before downloading the app:

  • Checkif there are any typos in the title and description of the application.
  • Read the reviews. If they look too good (not a single bad word, only high marks), then this should be alarming. Also copy the name and add the words “review” or “scam” to it in the search engine - you can find out a lot of interesting things.
  • Check your download statistics. If a popular app has almost no downloads, then it might be fake.
  • Look at the permissions. Before installing, click "View details" in the application permissions section to find out which sections and data on your device the application requires access to. Be wary if an application asks for information that it does not need to work (for example, a flashlight application claims access to geolocation, and a new game claims access to contacts).
  • Learn more about the developer. If he only released one app, you might be better off looking for another option.

9. With the growing popularity of bitcoins, miners have become more active, including those who mine coins on the computers of ordinary users. Do antiviruses protect against such unforeseen mining?

Yes, we protect users from fraudulent cryptocurrency mining programs. There is cryptomining malware that infects your computer. We also saw virus programs embedded in the code of the page in the browser in the form of mining scripts: if you go there, the script will start using the computing power of the victim's device.

The main consequences of such attacks are reduced productivity and efficiency of equipment, as well as an overall reduction in the life of computers, smartphones and smart TVs.

10. It seems that virus writers are always one step ahead of antivirus developers. How does your software help prevent threats you don't already know about?

We have a dedicated team of engineers, cybersecurity experts and malware analysts. These people are constantly researching and uncovering the tactics, methods and schemes of the attackers. The CyberCapture function, built into our antiviruses, with the user's permission, sends suspicious files to the investigation of a potential threat, and the behavioral analysis tool helps to find hidden malicious code in a program that is seemingly safe at first glance.

also applies next-generation technologies to combat cyberattacks in real time. The cloud-based machine learning engine is constantly receiving a stream of data from hundreds of millions of our users. This makes our artificial intelligence smarter and faster.

11. Do I need to install an antivirus on my child's device or are there enough parental control services?

Computer security: is it necessary to install an antivirus on a child's device?
Computer security: is it necessary to install an antivirus on a child's device?

Parental control solutions mainly focus on restricting children's access to certain content or controlling the amount of time they spend on the Internet. They do not protect against viruses, so it is better to additionally install an antivirus on the child's device.

12. Is it possible to determine without antivirus that something is wrong with a computer or smartphone? For example, if it suddenly began to slow down, is it necessary to immediately buy an antivirus, or can the problem be solved differently?

It is often difficult to understand that a computer is infected with something. Sometimes you can immediately suspect something is wrong: the battery is quickly discharged, the case of the device heats up very much, programs open on their own, a lot of annoying ads appear. In this case, the problem cannot be solved by yourself - you need to install an antivirus, and in difficult cases contact a specialist.

13. I have a smart device: I connected it to my home Wi-Fi and synchronized with my smartphone. Can I somehow suffer from this? Are intruders able to reach me, for example, through a robot vacuum cleaner?

Computer security: can attackers hack a robot vacuum cleaner?
Computer security: can attackers hack a robot vacuum cleaner?

It depends on how well you protect this smart device. To mitigate the risks, change the default password and use the latest software from a reputable vendor.

Do not forget about the router: you also need to change the password and install updates on it. Your home is protected only as much as its most important point is protected.

By hacking into your home network, attackers can gain access to personal information, your security system data, and shopping information. You may even be monitored through a baby monitor. The worst part is that it is almost impossible to immediately know about a hack. Hackers can watch your life for a long time without revealing themselves.

14. Sometimes messengers receive letters from unknown senders, and it seems that something is wrong with them. Looks like phishing. Can antivirus recognize it in messengers and SMS?

Phishing is a common type of scam. Its purpose is to "extract" the victim's confidential data. You receive emails or SMS on behalf of popular brands, private messages from various services (banks, applications, social networks).

Typically, in phishing emails, scammers scare the user or promise implausible discounts, often focusing on a time limit to unsettle the victim. When you click on the links from such messages, you run the risk of getting to a fake site similar to the authorization page on the service. If an inattentive user enters his login details on a phishing resource, they will end up in the hands of cybercriminals. Antiviruses, such as, for example, detect and block such URLs, even in instant messengers.

15. I received a letter stating that the intruders have my photos and correspondence and, if the ransom is not paid, all my friends will see them. It seems to me that this is true, because the letter contains my real password. What to do in such a situation?

In most cases, this is a deception and, most likely, the attackers do not have your data. They usually use the same method: they send out massive emails claiming they have private messages, photos or user notes during intimate moments, and threaten to post them if the victim does not pay a certain amount.

Keep calm and just ignore such emails. The attacker uses social engineering techniques to scare you and make you pay. Sometimes, to make the threats more convincing, scammers may mention your old data: databases with email addresses and passwords are leaked from hacked services from time to time and then sold on specialized forums. In this case, be sure to change the current password to a more complex one.

16. I have nothing to hide and I am unpopular. Why would anyone hack me?

Scammers usually do not engage in pinpoint attacks, but hack users en masse.

For example, you could enter your username and password on a fake site, or a virus stole them. Then such accounts are sold on the darknet. They can be used, for example, to deceive friends. You probably received messages asking you to lend money, which turned out to be the tricks of the burglars. You can be stolen from the bank details that you sent to your mom in the messenger. Or intercept a personal photo and start blackmailing you. Therefore, it is advisable to think about defense in advance and always be ready for an attack.

Recommended: