After get into the smartphone or tablet, the Simplocker is malware that analyzes the SD card looking for certain types of files, encrypts them and demands a ransom to decrypt them.
In addition to encrypting files, the Simplocker also contacts a server command and send some important information like IMEI of the device, among other data.
To avoid risk taking the advice of ESET undergo:
- Install all applications from Google Play or other known stores
- not assume you’re safe in Android
- If possible, do not use very old versions of Android
- Make sure you have the latest updates installed
- the basics – Lock your phone
- Create backups
- applications that can give direct access to your data ??b>
- Check the permissions of each application before installation
- Use Google’s defenses to the maximum
- Never pay the creator of a ransomware
There are good reasons to install applications that do not come from Google Play (or any other big brand stores such as Amazon), but if this is not the case, always use the official stores.
The alternative shops, especially those that offer paid apps for free, are usually loaded with malware, and download applications from them is a good way to infect.
If you need to install a file from an unknown source, ensure that your device is subsequently configured to automatically block such installations.
Stay tuned and do not fall on the most common social engineering tricks. Open links, downloads and attachments on Android can be as risky as doing it on the PC. But the vast majority of users assume that the opening of attachments is dangerous only when you are using a computer.
operating system
In an ideal world, users should always have access to a new phone that would run the latest version of Android – KitKat. The issue is that the older versions are also less secure – and its operator can not issue an update for your device, even if Google does.
The updates are available from Google should “over the air” (OTA) where the newer phones, should be able to activate the automatic update (with the restriction that it be taken only via Wi-Fi rather than by mobile networks) .
The area of ??the settings where you can change these parameters varies by manufacturer, but the menu option that is looking for “Software Update”. Select the first option to check if you are running the latest version, and if not install it immediately.
Write
If you have the latest and top of Samsung or HTC models, has the luxury of being able to lock your phone, using up to three fingerprints. But even if not, there is no excuse not to lock your phone using a PIN or password.
All this is very easy to do and just go to the Settings option> Security> Lock screen and pick the lock method you want to use. Normally one uses a pattern, a pin or a password. But keep in mind that a standard is less secure than a PIN and a password is the best choice.
If you have a backup of the contents of your devices, Android, Windows or any other operating system, the Trojans that encrypt files will not be more than a minor inconvenience may be easily solved. For this reason make copies of the contents of your phone, wherever possible, either manually or by connecting it to a computer and using the tools provided by the manufacturer.
Use applications like Google Drive or Dropbox to ensure that files such as photographs, are not only stored on your device.
Take care
Applications like Dropbox can provide very useful information to cybercriminals – a scan of a passport or a photograph of a credit card, for example. There are several options to hide and block applications like free app App Locker.
When you install an Android application, a list of “permissions” – or put another way, the functions that the application can access.
Permissions as “full network access” or the ability to send and receive SMSs should serve as an alert to a user. However, by itself, is not a guarantee that the application is malicious and everything depends on the program you are installing.
If for example, the Facebook application is asking for multiple accesses totally normal. Now in the case, for example, a screen saver who wants to have access to the list of calls and to send and receive SMS, should be suspicious.
Google offers very interesting tools of protection, including a locator that can help recover a lost device. Visit the management of Android devices available on https://www.google.com/android/devicemanager for more information alluding to your smartphone or tablet. You can make the phone ring (even if it is in silent mode), lock it or view its location on a map.
Although the latest malware has the functionality to repair the harm that may have caused, it is strongly recommended not to pay criminals, because this will only motivate other malware authors to continue with this type of operations.
Written under Orthographic new agreement
No comments:
Post a Comment