Protect yourself from mobile scams
Authored by a Symantec employee
With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Social media spam
If you’re on Twitter you’ll know how annoying it is to be followed by a garbled name with zero followers, and to then receive a tweet with little more than a link. And Facebook is full of fake profiles, some of which have innocent intentions, but most are there to provide fake Likes on demand – or to spam genuine users with phishing links. However convincing a message may be, never click on a link sent by a stranger. Even if it seems harmless enough at the time, you could end up either giving your valuable personal details to a criminal, or – worse – have malware inserted onto your mobile. Security software can be a big help in preventing infection.
In addition to utilizing security software, familiarize yourself with the most common types of social media scams:
- "Friends" urgently requesting money
- Requests to click on links supposedly containing “wild” party photos of you
- Quizzes asking for your name and phone number that end up charging you monthly
- Requests to click on shortened URLs that install malware on your device
- Chain letters
The same applies to old-fashioned SMS, with messages arriving from unknown numbers urging you to reply to a number or to click on a link and open it in your phone’s browser. Again, doing so may be harmless, but will more likely insert malware onto your phone – or at least alert scammers to the fact that your number is active and worth targeting again.
Common SMS phishing, or smishing, examples include:
(Name of well-known online bank) confirms you have purchased a laptop from (name of well-known computer company). Visit [this URL] if you did not make this online purchase."
"We confirm that you have signed up for our food delivery service. You will be charged $5 a day unless you cancel your order on this URL now: [URL]".
"(Name of banking institution): Your account has been suspended. Call [this number] now to reactivate."
Voice phishing – or vishing – has a human element, and it takes many forms. A scammer might call pretending to be your bank, ask for your security details and PIN number, and inform you that your card has been compromised and a courier will be arriving soon with a replacement. Of course, the replacement is a fake, and the scammer gets away with your genuine card and security details. Even without the physical element, simple voice phishing for login details is common, and surprisingly effective. Your bank will never ask for your PIN, so never give it to anyone that does ask. If you do receive an unexpected call from your bank, tell them you’ll call them back before giving any security details. Legitimate correspondence between you and your bank generally comes in the form of letters.
The same is true of the IRS. Anyone calling you and saying they’re an IRS agent and you must pay on back taxes is a scam. The agency will always send you a letter regarding audits, back tax issues, or similar problems.
More Tips For Protecting Yourself
- If it sounds too good to be true, it is.
- Look for poor grammar and misspellings in messages.
- Avoid monetary promises for little to no effort.
- Call your financial institutions about supposed account suspensions and closings.
- Keep up with privacy settings on all social media accounts.
- Refrain from using social media sites on public WiFi networks.
- Change passwords regularly.
- Delete links on social media walls you do not recognize.
Isn’t it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 3 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2019 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.