{"id":3709,"date":"2014-07-02T10:00:58","date_gmt":"2014-07-02T14:00:58","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=3709"},"modified":"2020-02-26T20:28:10","modified_gmt":"2020-02-26T14:58:10","slug":"juneroundup2014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/juneroundup2014\/3709\/","title":{"rendered":"June Monthly Roundup"},"content":{"rendered":"<p>In June, Kaspersky Lab made sure you were in the know when it came to the latest security news. From tips to keeping your smartphone protected to the breakdown of trending topics, we kept you covered. So if you missed any of our posts, make sure you catch up now with our monthly roundup!<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/07\/05093710\/monthly.min_.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5299\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/07\/05093710\/monthly.min_.png\" alt=\"monthly.min\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/iphone-spyware\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Is Your iPhone Already Hacked?<\/strong><\/a><\/p>\n<p>These days, <a href=\"https:\/\/www.securelist.com\/en\/analysis\/204792326\/Mobile_Malware_Evolution_2013\" target=\"_blank\" rel=\"noopener nofollow\">98% of smartphone<\/a>\u00a0malware targets Android, given Apple\u2019s strictly monitored App store. However, Apple\u2019s focus is on mass malware, and not on the possibility of someone spying on you personally. The problem with this comes from the fact that nowadays, \u201clegal\u201d spyware exists, and there are international companies that are officially developing and selling this kind of software, like the Italian firm, HackingTeam, which developed Remote Control System (RCS) software known as Galileo. Kaspersky Lab has monitored RCS infrastructure for some time and encountered Windows malware \u201cimplants\u201d from RCS before, but recently, in partnership with Morgan Marquis-Boire from Citizen Lab, new variants of malware were discovered. These new samples are smartphone Trojans that work on both Android and iOS and are capable of performing all kinds of spying that you\u2019d expect from such a tool, including location reporting, taking photos, spying on SMS, WhatsApp and other messengers, stealing contacts and so on. To avoid infection risks, Kaspersky Lab\u2019s experts recommend that you, first of all, don\u2019t jailbreak your iPhone, and secondly constantly update the iOS on your device to the latest version. In addition, running\u00a0<a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">a robust security software<\/a>\u00a0on your computer will greatly reduce the risk of getting infected.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/chrome_ext_encrypt_data_leaving_browser\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Chrome Extension To Encrypt All Data Leaving Browser<\/strong><\/a><\/p>\n<p>Google released a new report that stated more than thirty percent of global Gmail traffic becomes unencrypted at some point in transit between the email sender and its recipient. As a fix, Google developed a tool that will encrypt all data traveling out of its Chrome Browser for any user who has installed its End-to-End extension. As you probably remember, until a few months ago, Google was not encrypting the links between servers in their own data centers.\u00a0Now when you send an email with Gmail, that email is encrypted from your computer, through your browser, onto Google\u2019s servers, and between and out of Google\u2019s servers. Once your data passes out of Google\u2019s control it is then up to whomever has your data to ensure that it remains encrypted. The aim of this End-to-End new tool is to put simple and easy to use encryption tools in the hands of everyday users. In this way, the user can ensure his or her data is encrypted in transit.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-outbreak\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Cyber-extorters Encrypt Both PCs and Smartphones<\/strong><\/a><\/p>\n<p>Ransomware has become increasingly convenient for cybercriminals, and a new scheme, similar to <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptoLocker ransomware<\/a>, is now gaining traction on smartphones. iOS-based devices\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware_targets_ios_osx\/\" target=\"_blank\" rel=\"noopener nofollow\">are blocked with the help of the Apple\u2019s Find My iPhone service<\/a>, while Android smartphones are dealing with culprits who have coded a mobile version of Cryptolocker,\u00a0<a href=\"http:\/\/www.securelist.com\/en\/blog\/8225\/The_first_mobile_encryptor_Trojan\" target=\"_blank\" rel=\"noopener nofollow\">Pletor.a<\/a>.\u00a0There are numerous steps you can take to protect both your PC and Smartphone from this scheme though. When it comes to your PC, use <a href=\"http:\/\/support.kaspersky.com\/viruses\/disinfection\/5350#block1\" target=\"_blank\" rel=\"noopener\">the free Kaspersky Lab utility<\/a>, which scans your system and deletes malware. Also be sure to install a\u00a0<a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">strong Internet security solution<\/a> and create\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/call-for-backup\/\" target=\"_blank\" rel=\"noopener nofollow\">an online backup copy of your data<\/a>.\u00a0For Smartphone safety, install\u00a0<a href=\"http:\/\/kas.pr\/kmsf\" target=\"_blank\" rel=\"noopener\">a robust antivirus app<\/a>\u00a0from Google Play or another trusted app store like Yandex.Store. You should also disable third-party app installation support, only download apps from trusted sources, and upon installation of those apps, keep an eye on the access rights the app is asking for. Finally, use Google Drive, Dropbox and other cloud storage and backup solutions to backup your photos and other documents.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/gameover_botnet_takedown\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Gameover Zeus botnet \u2018taken down\u2019 \u2013 so what now?<\/strong><\/a><\/p>\n<p>Following the exposure and takedown of GameOver Zeus (what the FBI are calling \u2018the most sophisticated and damaging botnet we have ever encountered\u2019), Senior Security Researcher David Emm explained that the cybercriminals behind the Gameover Zeus attack used two malicious programs \u2013 ZeuS and Cryptolocker, which have hundreds of thousands of variants. What makes this case different is that police managed to take over the Command and Control (C&amp;C) server that controls the botnet and temporarily disable it.\u00a0To combat this attack, Emm recommends backing up data regularly to avoid the need to pay ransom if you do get infected with Cryptolocker.To keep your financial information safe (from Zeus, and from other malware designed to steal your money), just follow these simple rules: don\u2019t click on links you receive from unknown senders,\u00a0don\u2019t download, open and keep unknown files on your device, don\u2019t use open unsecured (public) Wi-Fi networks for any transactions, double-check webpages before entering any of your credentials or confidential information, work only with websites with the \u2018https\u2019 prefix, have up-to-date anti-malware protection installed and use the same protection when using your mobile\/tablet device for any transactions.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/app-store-golden-rules\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>3 Golden Rules to Enjoy App Stores Safely<\/strong><\/a><\/p>\n<p>Although app stores offer what seems like limitless options for games and tools, they are also full of bad apps, ballooning costs, and malicious apps, particularly for Android devices.<\/p>\n<p>Follow these three golden rules to safely enjoy app stores regardless of your operating platform.<\/p>\n<ol>\n<li>Use community knowledge to assess the reliability of apps. Stay away from brand-new apps, as well as those that have either no reviews or negative reviews. Also avoid apps that haven\u2019t been downloaded before.<\/li>\n<li>Set up password or biometric protection for every purchase. Apple and Android both offer password protection for purchases from their respective app stores, as well as\u00a0in-app purchases\u00a0and both offer some form of biometric protection as well \u2013 either native or through an app.<\/li>\n<li>Limit the number of apps on a device \u2013 the more apps you have, the more inefficient navigating and operating your smartphone becomes, not to mention that the more apps you have, the fewer you use.<\/li>\n<\/ol>\n<p>A bonus Android tip: Because the Android platform has been so beset by malicious apps, Android users should take extra precautions. Be sure to closely check the permissions granted to each app, and avoid apps that clearly take more information than needed. Use a mobile antivirus system \u2013\u00a0Kaspersky Lab has one\u00a0it can offer \u2013 that checks the safety of new apps and protect your device against the latest mobile malware threats.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>What is Two-Factor Authentication? Where Should You Use It?<\/strong><\/a><\/p>\n<p>Two-factor authentication is a feature offered by a number of online service providers that adds an additional layer of security to the account login process by requiring that a user provide two forms of authentication. The first form \u2013 in general \u2013 is your password. The second factor can be any number of things, the most popular being the SMS or email code. Two-factor won\u2019t prevent all account hijacks, but it\u2019s a great barrier. So <strong>which accounts should have two-factor authentication enabled? <\/strong>The simple rule regarding when and where you should enable two-factor is this: If the service in question offers it and you deem that account valuable, then enable it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read highlights from our top posts in June.<\/p>\n","protected":false},"author":189,"featured_media":3712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,215,454],"class_list":{"0":"post-3709","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-internet-security","10":"tag-security-news"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/juneroundup2014\/3709\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/juneroundup2014\/3612\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/juneroundup2014\/4075\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/juneroundup2014\/4329\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/juneroundup2014\/5298\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/juneroundup2014\/4146\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/juneroundup2014\/5298\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/juneroundup2014\/5298\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=3709"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3709\/revisions"}],"predecessor-version":[{"id":19110,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3709\/revisions\/19110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/3712"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=3709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=3709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=3709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}