New Mobile Security App for Android Smartphones

Consumers with smartphones understand they are carrying around the functions of a computer, but most users are unaware that smartphones are susceptible to the same security threats that plague laptops and desktops.

As more online retailers introduce mobile e-commerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application.

Malicious software (malware) can invade a device when consumers click a malicious link in a text message or email, surf a risky website or download a potentially unsafe app.  Once the device is infected, malware allows the collection of data from the device such as a location information, financial information, and login credentials.

Verizon Wireless has always protected devices on its network using sophisticated network intrusion and data analysis tools.  Now they will extend their network security to customers with the introduction of Verizon Mobile Security, an application that helps secure and protect Android smartphones against digital and physical threats.

The new offering covers concerns such as device infection, misplacement or loss, reaffirming Verizon Wireless’ commitment to protect its customers, devices and network by providing resources with robust security capabilities. Representing the next level of protection, Verizon Mobile Security, co-developed by Asurion and McAfee, is available on Android smartphones running Android 2.1 or higher.

To help protect yourself, I also recommend:

Refrain from clicking links in text messages, emails, especially if they are from someone you don’t know

Set your smartphone to lock automatically and unlock only when you enter a PIN

Keep your phone’s operating system updated with the latest patches

Invest in mobile security protection, which includes antivirus, for your smartphone

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)

4 Best Practices for BYOD Policies

People love their mobile devices and don’t want to leave home without them. When they bring their digital device to work we call this Bring Your Own Device or BYOD.  The day after you get your new mobile phone or iPad, you’ll probably take it to work and have the IT department set it up with your email and access to the company IT network. And as more and more companies agree to this, they are also requiring you to agree to their BYOD policies as well.

  1.     There should be an acceptable mobile usage policy. These are set up by the companies CIO and telling you what you can and can’t do on your mobile device.Read the BYOD policy carefully because once you sign it your job will be on the line if you don’t abide by it.
  2.     For IT security purposes, an application will run on the mobile device that needs to be downloaded and installed. This security application will have a certificate authenticating the device with terms and conditions to connect to the company network and run yours and the companies programs.
  3.     The mobile management application will provide the enterprise the ability to remotely control your mobile and wipe data. Don’t do this if you don’t plan on agreeing to the BYOD policies
  4.     Expect the security application to have the ability to locate your mobile if it’s lost or stolen via the phones GPS, lock your phone locally within 1-5 minutes.  It will also wipe your mobile, having encryption, antivirus and a firewall to protect company data.

Bringing your own device is not a right but a privilege. If your employer doesn’t allow it there is generally a good reason. Data breaches cost thousands and in some cases millions. So if you are lucky enough to be privileged, protect that mobile device with the guidance of the IT department.

Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

Celebrities Are Lures For Scammers

“Just Google it.” You’ve probably heard this phrase a thousand times before, and for good reason—search is one of the top activities we do online[1]. But while you are searching online for information and content, keep in mind that scammers are also searching for victims.

Scammers have been very productive in creating fake or infected websites, which are designed to do harm to your computer, your finances or your identity. The bait that lures us to these infected websites may be the latest Twitter trend, a breaking news story, a significant world event, downloads, and even celebrity pictures or gossip. And, the more popular the search, the more likely you are to run into dangerous results.

For the 6th year in a row, McAfee researched popular culture’s most famous people to reveal which ones are the riskiest to search for online. Emma Watson has taken over the #1 spot from Heidi Klum as the Most Dangerous Celebrity to search for on the Web (#riskyceleb). This year also marks the first time that the entire Top 10 list is comprised of all women. The top 10 celebrities from this year’s study with the highest percentages of risk are:

Cybercriminals often use the names of popular celebrities to tempt viewers to visit websites that are actually laden with malicious software. Anyone looking for the latest videos or pictures could end up with a malware-ridden computer instead of the trendy content they were expecting.

And beware of “free” things. Scammers know that this is a word that can get a lot of attention and will use this as a way to get to you. This year, when searching for “Emma Watson and ‘free’ downloads,” and “Emma Watson and hot pictures” and “Emma Watson and videos” you run the risk of running into online threats designed to steal your personal information.

Here’s some tips to help you stay safe while searching online (whether it be from your PC or mobile device):

Use common sense: if it sounds too good to be true, it probably is.

Always double-check the web address (URL) that you are going to. For example, if you are searching for Amazon.com and get a result for “Amazzon.cn”, you should know not to click.

Use a safe search plug-in, such as McAfee® SiteAdvisor® software that displays a red, yellow, or green ratings in search results, warning you to potential risky sites before you click on them.

Use comprehensive security software to protect against the latest threats.

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)

Travel Safety – Part 2: How to Protect your Luggage in Airports

Unfortunately, more and more airport security reports are coming in that the baggage handlers themselves are actually slicing open your luggage with razor blades and removing your valuables. For your travel safety, follow these security tips to protect your luggage in airports:

  1.  Follow FAA guidelines for what to pack, what you can’t pack and how much you can pack. What a passenger can and cannot take on a plane is listed on www.FAA.gov and no exceptions are made.
  2.  If you must check your luggage, wait to see it go into the “chute” after it is taken from you.
  3. When riding in a shuttle bus, don’t let your luggage leave your side no matter what. The rear compartment can be opened while the bus is stopped at a traffic light. People are constantly getting on and off the bus at different stops just to steal luggage.
  4. Because tags fall off or get ripped off, put photocopies of your passport, ID, and itinerary in your luggage. In case a bag gets lost, someone who recovers it will be able to forward it to you.
  5. Place any baggage, laptops, or briefcases on the counter in front of you when you stand at rental car, hotel, and airport ticket counters. If you put these at your feet to the left, right, or behind you, you become a prime target for distraction thieves. For example: a very emotional person walks up to you while you are waiting for the clerk at the counter, asks you how to get to the Alamo, and then starts to cry. In the confusion, an accomplice sneaks up behind you and removes the laptop that you placed on the floor next to you.
  6. Don’t take your eyes off your belongings while they are going through security or screening checkpoints. This is a prime location for distraction thieves to steal laptops, pocketbooks, and briefcases. Once you put your belongings on the movable belt, one thief distracts you from immediately going through the metal detector by either dropping a handful of change, causing a scene, clipping a metal object to the back of your coat that will cause a delay, or saying, “Hey, don’t I know you?”— anything to keep you from going through the metal detector for 30 seconds while the accomplice walks through clean and picks up your belongings. If you become distracted for an instant your valuables are gone! With security as tight as it is and all the security camera systems, this crime is harder to commit but still being done.
  7.  Never leave your bags unattended. They can be stolen. It happens every day. Do not overstuff your luggage. It can pop open easily. In addition, stuffed luggage looks to a thief as if there might be something of value in it.
  8.  Don’t use fancy, expensive luggage. It’s a red flag to a thief.
  9.  Put all electronics, cash, jewelry, medicine, and important papers in your carry-on luggage.
  10.  Trust your gut. Instincts play a huge role in your personal security.

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Mobile Device Security in a BYOD World

In the real world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what you can or cannot do on the device. For IT security reasons, the employer may have remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

Mobile device security policies” are for the BYOD or “Bring Your Own Device” employees. The employee may pay for the device and its monthly plan and has also imposed security restrictions and limitations on employees who use their personal devices at work.  If you choose to use your personal device for employment purposes at any time for any reason then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

A recent study shows less than 10% of people BYOD employees auto lock their tablets and people were more security-savvy about their smartphones, with 25% locking.

Most employee issued mobile management software will require the device to be locked and the password to be changed quarterly. These mobile device security programs tell you in the terms and conditions that the contents on the device is subject to being monitored and at any time the device can be wiped by the employer.

The employer is liable for potentially lost data on your mobile. So, to maintain security in a BYOD world, plan on giving up some liberties.

Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

IT Security – Get a BYOD Policy Now!

Your companies IT person is tasked with managing numerous digital devices like mobile phones, tablets and any other portable device that communicates. Small businesses and IT managers must have IT security policies to manage devices attached to the network. Start looking at security vendors who provide solutions to keep track of, lock down, and secure your small business devices.

Consumers have at best a basic knowledge of IT. Consumers like gadgets and want to know how they work and at work they need to use technology to use it. This process is how the majority gets up to speed on technology and learn personal technologies they acquired for home use to make their work lives better than even the technology their workplace provides them. This is the consumerization of IT.

The issues of “BYOD” or Bring Your Own Device to work is a huge problem for IT managers at small businesses everywhere. Most IT managers have a pretty good handle on the company laptops desktops, and mobiles, but they are quickly losing control when employees bring their new Android mobile device and connect it to the corporate network.  Now they have to worry if that last application that was downloaded is infected and will infect the network when plugged you into a company PC to update or sync something.

Help the IT manager protect your small business network by:

  • Check to see if your business has a BYOD policy
  • Lock down your mobile device in case it’s lost or stolen
  • Install a “lost/locate/wipe” software on your device
  • Never leave your device exposed/unattended in an automobile.

 Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

 

Travel Safety – Part 1: Top Airport Security Tips

Airports are another haven for criminals. In the parking lot lurks the car thief and the mugger. Throughout the terminal are the scam artists and the pickpockets. In the baggage claim area are the baggage thieves. The 9-11 tragedy was a humbling event that has made all passengers much more accommodating to security personnel and their screening methods.Follow these top airport security tips to keep your travel experience simple:

  1.  Follow FAA guidelines. Dos and don’ts for travel safety and airport security have been implemented and revised since the 9-11 tragedy. There is no flexibility in these rules.
  2. During security screening be alert to anyone around you who is nervous, perspiring, impatient, or argumentative. With the new FAA orders in place, it’s common knowledge that screening will take a while. So anyone not complying with the new rules to any degree should raise a red flag.
  3. If you must check your luggage, wait to see it go into the “chute” after it is taken from you.
  4.  When booking your reservation, get a seat at the front of the plane so you can get to baggage claim quickly. That’s because luggage is either carried on, lost, or stolen, or—if you are lucky—waiting at baggage claim.
  5. Never accept anything from strangers and watch your luggage. Someone may be looking for the opportunity could hide bombs or drugs in your bags. Terrorists can conceal plastic explosives or other lethal weapons in articles that someone would ordinarily purchase at the terminal newsstand, such as a book, soda can, candy bar, or magazine. Such devices can be wired with components from cell phones, and when called from the ground moments after takeoff can trigger an explosion.
  6.  Ignore other people arguing and strangers who are overly friendly. These could be staged distractions to make it easier for a thief or pickpocket to rob you.
  7. Be alert to anyone in the baggage claim area paying undue attention to you.
  8. Don’t let anyone help you with your airport locker (if you can even find one nowadays). Someone might insert quarters for you to appear helpful but then give you a different key without your knowledge.
  9. Be aware of any contact with others, even if it is a good deed they are doing. They could be setting you up.
  10. Trust your gut. Instincts play a huge role in your personal safety.

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Household Safety: It’s Mold Awareness Month!

House mold is no joke. Mold makes you sick, makes your house sick and ruins properties if left untreated. Keeping mold under control is critical for household safety.

The Department of Health in New York defines mold as “Molds are microscopic organisms that live on plant or animal matter. They aid in the breakdown of dead material and recycle nutrients in the environment. Present virtually everywhere, they can be found growing on organic material such as soil, foods, and plant matter. In order to reproduce, molds produce spores, which spread through air, water, or by insects. These spores act like seeds and can form new mold growth if the conditions are right.”

Mold gets into your house as a result of moisture. That moisture can come from a flood, leaky roof, plumbing leaks, cooking steam, heating steam, humidifiers, wet clothes drying inside a home, or condensation accumulating inside crawlspaces from any of the above.

For your family safety, here are the most important things you should know about mold, according to the Environmental Protection Agency.

Ten Things You Should Know About House Mold

  • Potential health effects and symptoms associated with mold exposures include allergic reactions, asthma, and other respiratory complaints.
  • There is no practical way to eliminate all molds and mold spores in the indoor environment; the way to control indoor mold growth is to control moisture.
  • If mold is a problem in your home or school, you must clean up the mold and eliminate sources of moisture.
  • Fix the source of the water problem or install a water leak detector to prevent mold growth.
  • Reduce indoor humidity (to 30-60%) to decrease mold growth by: venting bathrooms, dryers, and other moisture-generating sources to the outside; using air conditioners and de-humidifiers; increasing ventilation; and using exhaust fans whenever cooking, dishwashing, and cleaning.
  • Clean and dry any damp or wet building materials and furnishings within 24-48 hours to prevent mold growth.
  • Clean mold off hard surfaces with water and detergent, and dry completely. Absorbent materials such as ceiling tiles, that are moldy, may need to be replaced.
  • Prevent condensation: Reduce the potential for condensation on cold surfaces (i.e., windows, piping, exterior walls, roof, or floors) by adding insulation.
  • In areas where there is a perpetual moisture problem, do not install carpeting (i.e., by drinking fountains, by classroom sinks, or on concrete floors with leaks or frequent condensation).
  • Molds can be found almost anywhere; they can grow on virtually any substance, providing moisture is present. There are molds that can grow on wood, paper, carpet, and foods.

 

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Investment Fraud: How to Avoid Ponzi Schemes

In response to National Fraud Awareness Week it’s important to bring attention to the biggest and worst investment fraud of all: the Ponzi Scheme.

Wikipedia defines a Ponzi scheme as fraudulent investment operation that pays returns to its investors from their own money or the money paid by subsequent investors, rather than from profit earned by the individual or organization running the operation. Ponzi schemes usually entice new investors by offering higher returns than other investments, in the form of short-term returns that are either abnormally high or unusually consistent. Perpetuation of the high returns requires an ever-increasing flow of money from new investors to keep the scheme going.”

The SEC has some advice for those concerned they might get hooked into a Ponzi scheme: Whether you’re a first-time investor or have been investing for many years, there are some basic questions you should always ask before you commit your hard-earned money to an investment.

The SEC sees too many investors who might have avoided trouble and losses if they had asked questions from the start and verified the answers with information from independent sources.

Whether you are concerned with identity theft or considering your next investment opportunity, start with these five questions:

Is the seller licensed?

Is the investment registered?

How do the risks compare with the potential rewards?

Do I understand the investment?

Where can I turn for help?

For more information, read Investing Smart from the Start: Five Questions to Ask Before You Invest

Robert Siciliano personal and home security specialist to Home Security Source discussing ADT Pulse on Fox News. Disclosures