LETTERS TO THE EDITOR

LETTERS/COLUMNS: SEND LETTERS TO THE EDITOR FOR PUBLISHING TO FRONTPAGENEWS1@YAHOO.COM. PLEASE INCLUDE DAY/EVENING/ CELL NUMBER, HOME NUMBER, AND EMAIL. CONTACT VAN STONE: FRONTPAGENEWS1@YAHOO.COM OR (215) 821-9147 TO SUBMIT A REQUEST FOR ANY WRITER. PLEASE DO NOT CONTACT THE WRITER DIRECTLY! ALL APPEARANCE REQUEST WILL GO THROUGH THE MANAGING EDITOR'S OFFICE. COPYRIGHT: THE USE OF ANY SUBMISSIONS APPEARING ON THIS SITE FOR MONETARY GAINS IS STRICTLY PROHIBITED. TO LEARN MORE: PHILADELPHIA FRONT PAGE NEWS WWW.FPNNEWS.ORG. YOUR TOP STORIES OF THE DAY (215) 821-9147.

Wednesday, August 21, 2013

Scammers Getting Better at Hacking Your Smartphone

As smartphone viruses creep closer to U.S. shores, malicious programmers behind them have become more ingenious, according to a report issued Tuesday by computer security firm McAfee. Predictably, it’s all about the money — that is, hackers are learning how to turn your smartphone into cash for them.

One year ago, state-of-the-art smartphone viruses tricked the gadgets into dialing pricey international phone numbers or sending premium texts routed through accounts controlled by hackers, not unlike old-fashioned 1-900 toll call scams. But a new crop of sophisticated mobile phone viruses are worming their way into consumers’ handset software and enabling criminals to send themselves cash directly without a phone ever leaving your pocket.

“The type of threat is really evolving,” said Adam Wosotowsky, a threat researcher for McAfee Labs who helped prepare the McAfee Threats Report. For example, a new crop of mobile viruses intercept two-factor authentication codes sent as text messages by banks, cracking a system that has long been considered safe. Some phone viruses are smart enough to collect passwords and launch mobile bank apps, the report says.

Researchers are also discovering much more sophisticated infection ploys from mobile virus writers, said Wosotowsky. Rather than shoe-horning malicious code into existing apps, some are even writing mobile malware from scratch. In one instance, McAfee found an online dating app that was completely fake, and designed only to infect a users’ phone.

“Even if the apps don’t really work, most users don’t bother uninstalling apps after they go on a download binge, so it works (for the virus writer),” he said.

‘This Is a Robbery!’

The McAfee report also found an explosion of “ransomware” viruses, both on PCs and mobile phones. With ransomware, a computer criminal infects a users’ gadget and makes it lock up, then demands the user pay $50 or $100 for software that allegedly cleans the infection. Often, users who pay up find their machines are still infected. McAfee said it found 320,000 different ransomware programs last quarter, double the amount from last year. That must mean ransomware is working for criminals; warnings issued by Scotland Yard, the FBI and other international agencies also show the extent of the ransomware problem.

The Android platform remains the most attractive target for mobile phone hackers, Wosotowsky said. The firm uncovered more than 17,000 Android viruses in the second quarter of this year, and expects 2013 to bring twice as many such viruses as 2012.

Google’s Android platform is more “open,” than Apple’s iPhone — Android users can download and install new apps from anywhere, while iPhone users must use Apple’s App Store — making Android a better platform for hackers. The target is bigger, too. Worldwide, Android’s new shipment market share is now 80 percent, compared to iPhone’s 13 percent, according to IDC.

Non-English speaking Android users, particularly in Asia, are the easiest targets for mobile virus writers, because they are much more likely to use third-party app sites instead of Google’s Play store. But American users shouldn’t take much comfort in that. Virus writers have upped their game in delivery mechanisms designed to hit Americans. Earlier this year, a mobile virus named NotCompatible attacked 10,000 U.S. phones daily, according to security firm Lookout. Its trick: Using clever spam that appeared to come from a friend to fool recipients into clicking on a link and agreeing to download a malicious app.

In most attacks, hackers download a legitimate phone app, edit it to include a dangerous payload, and then upload it to an app store. What appears to be an innocent game for kids can be turned into a Trojan horse that intercepts every phone keystroke, and can now even initiate banking transfers without user intervention.

Such attacks can be lucrative. A malicious program named Eurograbber is blamed for stealing $47 million from 30,000 bank accounts this way, according to a report by security firm F-Secure.

And even if smartphone users avoid clicking on booby-trapped spam e-mails and downloading apps from rogue locations, they’re not entirely in the clear. Another disturbing trend: so-called cross-platform hacking, in which computer criminals infect a user’s PC with a virus, then use that PC to leap onto a victim’s smartphone the next time it’s attached via USB cable. Because the phone has a trust relationship with the PC, it allows installation of the bogus app.

“Keep in mind your online identity involves all your machines,” Wosotowsky said. “When you connect them together, they can infect each other. … We’re going to start seeing cross-over there.”

You can spot a possible hack by monitoring your credit regularly. You can pay for a monitoring service, or you can use the free Credit Report Card to watch your credit.

Red Tape Wrestling Tips
Stick with app stores you know. Google’s Play store and Apple’s App Store aren’t fool-proof, but they are close. Don’t be tempted to try apps you find other places online, even if the invitation comes from a friend. Having your phone hacked can be a lot more devastating than having your PC hacked; it’s not worth tempting fate.Don’t allow an app you download to trigger a download of another app that’s outside the standard app stores. Even if you trust the first app, such escalation is a new trick from virus writers, Wosotowsky said.If you are infected by ransomware, don’t pay! That probably won’t fix your computer. Go to another computer and find fix-it tools from reputable antivirus firms. (Don’t fall for “fixes” posted by other hackers.)
“Every aspect of our day to day life is online now, with mobile phones,” Wosotowsky said. “We are going to see lot more of malware targeted in that direction.”

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID
Click on the logo to learn about the non-profit status

BECOME OUR VLOGGER OF THE MONTH: VIDEO NEWS CONTENT PUBLISHED ON ANY TOPIC BELOW

Latest edition of Talk Live Philly With Van Stone

VAN STONE PERFORMANCE PROMOTION VIDEO AT WEST PHILADELPHIA HS 1999 - BELOW

FPN NEWS “TAKE TIME FOR WINNERS IN ANY COMMUNITY!”

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection
Family Modeling -modelado de la familia

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

WE'RE #1

WE'RE #1

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones
Family Modeling -modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud
Family Modeling -Modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Child Images -Van Stones Niño hermoso Imágenes

WE'RE #1

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre
Family Modeling -modelado de la familia

Like Us On Facebook

We"re Looking For Volunteers

News, and more about youth, education, political analyst, schools, anti-violence, social justice, grass roots democracy, ecological protection, seniors, Historic Preservation & Restoration, (Black, Latinos, Asian, Pakistani, Italian, and other)Arts, Books, Super Heroes, Trading Cards, Youth, College, and Pro Sports, Nonprofits and Real-estate.

Blog Archive

About Us

  • FPN can reach out to Representatives from your side of: The Village, The Township, or The City
  • FPN features
    Sports
    Cars
    Family Entertainment
    Neighborhood News
    Scholastic News
    Regional News
    National News
    Citywide News
    Legal News
    Alternative Green Energy Education News
    Superhero & Comic Strip News
  • Teen Stars
  • Humanitarian/Ministers/Political
  • Community Services
  • Women & Men & Kids

  • You acknowledge and agree that you may not copy, distribute, sell, resell or exploit for any commercial purposes, any portion of the Newspaper or Services. Unless otherwise expressly provided in our Newspaper, you may not copy, display or use any trademark without prior written permission of the trademark owner.

    FPN/VSP® is in no way responsible for the content of any site owned by a third party that may be listed on our Website and/or linked to our Website via hyperlink. VSP/FPN® makes no judgment or warranty with respect to the accuracy, timeliness or suitability of the content of any site to which the Website may refer and/or link, and FPN/VSP® takes no responsibility therefor. By providing access to other websites, FPN/VSP® is not endorsing the goods or services provided by any such websites or their sponsoring organizations, nor does such reference or link mean that any third party websites or their owners are endorsing FPN/VSP® or any of the Services. Such references and links are for informational purposes only and as a convenience to you.

    FPN/VSP® reserves the right at any time to modify or discontinue, temporarily or permanently, the Website and/or Services (or any part thereof) with or without notice to you. You agree that neither FPN/VSP® nor its affiliates shall be liable to you or to any third party for any modification, suspension or discontinuance of the Website and/or Services.

    You agree to indemnify and hold harmless FPN/VSP®, its subsidiaries, and affiliates, and their respective officers, directors, employees, shareholders, legal representatives, agents, successors and assigns, from and against any and all claims, actions, demands, causes of action and other proceedings arising from or concerning your use of the Services (collectively, "Claims") and to reimburse them on demand for any losses, costs, judgments, fees, fines and other expenses they incur (including attorneys' fees and litigation costs) as a result of any Claims.

    The Website is © 2009 by VSP®, or its designers. All rights reserved. Your rights with respect to use of the Website and Services are governed by the Terms and all applicable laws, including but not limited to intellectual property laws.

    Any contact information for troops overseas and/or soldiers at home provided to you by FPN/VSP® is specifically and solely for your individual use in connection with the services provide by Van Stone Productions Foundation VSP.

    FPN/VSP® soldiers contact information for any other purpose whatsoever, including, but not limited to, copying and/or storing by any means (manually, electronically, mechanically, or otherwise) not expressly authorized by FPN/VSP is strictly prohibited. Additionally, use of FPN/VSP® contact information for any solicitation or recruiting purpose, or any other private, commercial, political, or religious mailing, or any other form of communication not expressly authorized by FPN/VSP® is strictly prohibited.