Don't download one of these scammy apps pretending to be an authenticator

A slew of phony authenticator apps is currently making waves, inspired by Twitter’s recent decision to make account two-factor authentication (2FA) a premium-only feature. Unsuspecting users are reporting problems. But not with the platform itself.

Authenticator apps take 2FA to the next level in terms of security. Here’s how these security tools work.

After users reported several nearly-identical authenticator apps with misleading descriptions, app stores are urged to take action. Read on for the sketchy details.

Why you should never trust an unverified 2FA app

Apple’s App Store is receiving criticism for holes in its App Review process. At least a dozen fake authenticator apps have been spotted, tricking users into unauthorized purchases and data fraud.

These apps are modified versions of the same generic shell, as a few iOS developers pointed out on Twitter. Many feature ads that you can’t click out of without accidentally “approving” payment to the developers. Some can even steal your 2FA altogether, putting your accounts at risk while you use it.

One big thing these fraudulent apps have in common? They claim to be free, but you cannot utilize the services advertised without opting into deceptive in-app purchases or subscriptions.

The family of apps and their presence in the App Store ad space is raising eyebrows. These apps should be vetted thoroughly before being allowed to advertise to users directly.

The bottom line: There are so many better ways to secure your data. Never download apps you can’t find important information about online, including the publisher and developer and the app itself should never appear out of nowhere. Checking app reviews before downloading is critical to staying protected.

RELATED: Security warning: How to spot fake ChatGPT apps hiding malware

Why the right 2FA is worth the wait

Two-factor authentication (2FA) might be the only thing between your data and hackers (such as the threat actors described above). Microsoft Authenticator and Google’s 2-step verification program are industry-standard options that we use.

Continue reading

4 vital steps to protect your online accounts from hackers and scammers

You can never be too safe from cybercriminals, and you need all the help you can get to avoid becoming another victim among countless others.

Run a small business? You’re even more exposed to cybercrime. Imagine your hard work being held at ransom by a hacker or your data falling into the hands of the competition. Tap or click here for three security steps every small business needs to take.

Continue reading

Small biz tip: How to set up an authenticator to protect your work accounts

Your business accounts have tons of private data you don’t want hackers to see. Although two-step verification (2FA) keeps hackers out, you can’t rely on texts to prove your identity. Hackers can intercept your messages.

Continue reading

10 tips to secure your accounts with strong passwords

Two decades ago, you had a single password to keep in mind, maybe two. But these days the list of sites and accounts you might want to sign up for is nearly endless. What’s worse is hackers prey on people who reuse passwords, so it’s important to use strong, unique passwords for every site. 

Continue reading

8 signs that your computer has been hacked

If your device is connected to the internet, it’s vulnerable to hacks. It’s as simple as that. Cybercriminals are always coming up with new tricks to get into your gadgets and you should be aware of that.

Fortunately, there are usually signs that your device has been compromised. When it comes to smartphones, this can include spikes in data usage, battery drainage and changes to your home screen, among other indicators. Tap or click here for information on diagnosing and solving phone hacks.

Continue reading

3 ways to fight SIM-swapping - Follow this cybersecurity checklist to protect yourself

Every cybersecurity threat has the potential to snowball into an avalanche of issues — but some are more dangerous from the jump. Experts say you should watch out for impending cyberattacks, thanks to the Russia-Ukraine war. SIM swapping is an especially dire threat since it takes over your smartphone, rendering it useless.

Continue reading

How to set up one of the most powerful security features on your iPhone

Remember when your password could be just four letters? Well, those days are long gone. Tap or click here for five tips to create better passwords and secure your accounts. Technology has brought about great wins for society and plenty of pitfalls.

Continue reading