angle-leftangle-rightangle-uparrow-circle-leftarrow-circle-rightarrow-downarrow-downarrow-rightbarscheck-orangecheck-whitecheckchevron-circle-leftchevron-circle-rightchevron-leftchevron-rightclock-invertclockenvelopefacebook-squarefacebookflaggithub-altgithub-squaregoogle-plus-squaregoogle-plusheadsetheadset_psexportinstagramlinkedin-squarelinkedinlocation-pinlocation-pin_psexportnav-arrowpinterest-ppinterest-squareplus-blueplus-grayright-arrowrss-squarersssearch-whitesearchtimes-circle-otwitter-squaretwitterup-angleyoutube-squareyoutube

New Threat to Android Phones

Jackie here. If you have an Android phone, keep reading to learn about a new online attack that uses online videos to install spyware on your phone. Here’s what you need to know:

This attack is a concerning one, as you all you need to do to fall victim is visit the wrong website. If you visit a website with an infected video file, the spyware is automatically loaded on your device, no permission needed. It can happen in just 10 seconds.

Is My Phone at Risk?

Experts estimate that about 275 million Android phones are at risk for this attack. To find out if your phone is vulnerable, you need to know what version of Android you are using. This information can be found in the “Settings” area of your phone, often under “About Phone”. If your phone is a version 2.2, 4.0, 5.0, or 5.1, it’s at risk.

How Do I Protect Myself?

If you have an Android phone you can protect yourself from this attack by avoiding dodgy websites. Be careful about the sites you visit and don’t click any links that seem suspicious.

Hackers aren’t going to advertise their dirty links, so you may find them carefully hidden on social media, sent through email, etc.

Learn more about this threat here.

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent News

Identity Protection Tips: Email Safety

Identity Protection Tips: Email Safety

Protection Tips online safety

Email is a common target for malicious hackers. Two of the more common techniques they use to compromise email are business email compromise and malicious document attachments. Business Email Compromise  The FBI describes Business Email Compromise, or BEC, as a financially-motivated and often sophisticated scam carried out by organized crime organizations. The technique involves impersonating […]