Authored by a Symantec employee

 

With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.

Social media spam

If you’re on Twitter you’ll know how annoying it is to be followed by a garbled name with zero followers, and to then receive a tweet with little more than a link. And Facebook is full of fake profiles, some of which have innocent intentions, but most are there to provide fake Likes on demand – or to spam genuine users with phishing links. However convincing a message may be, never click on a link sent by a stranger. Even if it seems harmless enough at the time, you could end up either giving your valuable personal details to a criminal, or – worse – have malware inserted onto your mobile. Security software can be a big help in preventing infection.

In addition to utilizing security software, familiarize yourself with the most common types of social media scams:

  • "Friends" urgently requesting money
  • Requests to click on links supposedly containing “wild” party photos of you
  • Quizzes asking for your name and phone number that end up charging you monthly
  • Requests to click on shortened URLs that install malware on your device
  • Chain letters

SMS phishing

The same applies to old-fashioned SMS, with messages arriving from unknown numbers urging you to reply to a number or to click on a link and open it in your phone’s browser. Again, doing so may be harmless, but will more likely insert malware onto your phone – or at least alert scammers to the fact that your number is active and worth targeting again.

Common SMS phishing, or smishing, examples include:

(Name of well-known online bank) confirms you have purchased a laptop from (name of well-known computer company). Visit [this URL] if you did not make this online purchase."

"We confirm that you have signed up for our food delivery service. You will be charged $5 a day unless you cancel your order on this URL now: [URL]".

"(Name of banking institution): Your account has been suspended. Call [this number] now to reactivate."

Vishing

Voice phishing – or vishing – has a human element, and it takes many forms. A scammer might call pretending to be your bank, ask for your security details and PIN number, and inform you that your card has been compromised and a courier will be arriving soon with a replacement. Of course, the replacement is a fake, and the scammer gets away with your genuine card and security details. Even without the physical element, simple voice phishing for login details is common, and surprisingly effective. Your bank will never ask for your PIN, so never give it to anyone that does ask. If you do receive an unexpected call from your bank, tell them you’ll call them back before giving any security details. Legitimate correspondence between you and your bank generally comes in the form of letters.

The same is true of the IRS. Anyone calling you and saying they’re an IRS agent and you must pay on back taxes is a scam. The agency will always send you a letter regarding audits, back tax issues, or similar problems.

More Tips For Protecting Yourself

  • If it sounds too good to be true, it is.
  • Look for poor grammar and misspellings in messages.
  • Avoid monetary promises for little to no effort.
  • Call your financial institutions about supposed account suspensions and closings.
  • Keep up with privacy settings on all social media accounts.
  • Refrain from using social media sites on public WiFi networks.
  • Change passwords regularly.
  • Delete links on social media walls you do not recognize.


Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.

© 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome is a trademark of Google, Inc. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.