Don't download one of these scammy apps pretending to be an authenticator
A slew of phony authenticator apps is currently making waves, inspired by Twitter’s recent decision to make account two-factor authentication (2FA) a premium-only feature. Unsuspecting users are reporting problems. But not with the platform itself.
Authenticator apps take 2FA to the next level in terms of security. Here’s how these security tools work.
After users reported several nearly-identical authenticator apps with misleading descriptions, app stores are urged to take action. Read on for the sketchy details.
Why you should never trust an unverified 2FA app
Apple’s App Store is receiving criticism for holes in its App Review process. At least a dozen fake authenticator apps have been spotted, tricking users into unauthorized purchases and data fraud.
These apps are modified versions of the same generic shell, as a few iOS developers pointed out on Twitter. Many feature ads that you can’t click out of without accidentally “approving” payment to the developers. Some can even steal your 2FA altogether, putting your accounts at risk while you use it.
One big thing these fraudulent apps have in common? They claim to be free, but you cannot utilize the services advertised without opting into deceptive in-app purchases or subscriptions.
The family of apps and their presence in the App Store ad space is raising eyebrows. These apps should be vetted thoroughly before being allowed to advertise to users directly.
The bottom line: There are so many better ways to secure your data. Never download apps you can’t find important information about online, including the publisher and developer and the app itself should never appear out of nowhere. Checking app reviews before downloading is critical to staying protected.
RELATED: Security warning: How to spot fake ChatGPT apps hiding malware
Why the right 2FA is worth the wait
Two-factor authentication (2FA) might be the only thing between your data and hackers (such as the threat actors described above). Microsoft Authenticator and Google’s 2-step verification program are industry-standard options that we use.
This tricky ransomware uses your insurance company against you
Cybercriminals have a new twist on ransomware that takes a strange turn. They infect victims’ devices with HardBit 2.0 malware that encrypts critical files. To get access back to those files, you must pay a fee. Here’s the twist. They try getting information from you that would make your insurance company pay the ransom.
Take this important security step with your Apple account now
Did you know that someone can intercept your text messages without you even knowing it? You may think that the danger only comes from hackers and scammers, but it could be someone closer to home. Here’s how to spot the clues that someone is snooping on you.
4 vital steps to protect your online accounts from hackers and scammers
You can never be too safe from cybercriminals, and you need all the help you can get to avoid becoming another victim among countless others.
Run a small business? You’re even more exposed to cybercrime. Imagine your hard work being held at ransom by a hacker or your data falling into the hands of the competition. Tap or click here for three security steps every small business needs to take.
See this in a URL? Don't click!
Platforms such as Wix and Squarespace are hugely popular, as you can quickly design a website in a few clicks with no technical knowledge. Did you know that Google offers a free website creator? It’s not well known but is gaining popularity. It’s called Google Sites. The problem is criminals are using the platform to create spoofed sites, trying to rip you off.
Buying new smart home tech? Take this step to keep creeps out
Whenever you buy a new smart device, the first thing to do is change the default password. Without this critical step, hackers could break into your doorbells, thermostats or security cameras. They could turn up the home’s temperature until it’s boiling — or scream death threats over a microphone.
Crooks are jamming security cameras — Protect yours now!
Security cameras work in two ways. First, they act as a deterrent to thieves. If that doesn’t work, it captures them in the act of stealing your things or breaking into your home.
Your surveillance system is only as good as what your cameras can see. Placement is critical — you don’t want a tree blocking the view of your backyard. You also don’t want cameras to send a notification whenever a squirrel runs across the lawn. Tap or click here for four mistakes you’re making with your home security system.
7 things to do after a hacker breaks into your computer
I always feel sympathy when I hear about hackers breaking into someone’s computer. I felt terrible when Phillis from Orlando Beach, FL, called the show and said hackers stole $150,000 from her brother’s PC. If you’ve ever been hacked, you know how scary it is.
How to spot Super Bowl betting scams
Crooks never sleep, and they’re incredibly aggressive during busy times of the year when the victim pool is deep. Tax season is here, and we already see an uptick in scams. Here’s how to spot one and avoid sending your hard-earned money to a criminal.
Ever run a background check? 20 mil Truth Finder and Instant Checkmate accounts leaked
Have you ever done a background check on yourself or someone else? It’s a good way for employers to determine if a potential worker is trustworthy. Some people even do background checks on potential dates in online dating. Tap or click here to learn how to do a free background check.
The high-tech way to protect your logins that’s better than 2FA
Two-factor authentication (2FA) is becoming standard across all your devices and accounts, and for good reason. It’s easy to use and one of four ways to protect yourself from hackers and scammers.
2FA usually consists of two things: something you know (like a password) and something you have (like a smartphone). It can even involve who you are (a thumbprint or facial scan).
Can you spot the giveaway in this scam email?
Sometimes, you get a well-designed scam email that you’re unsure if it’s a phony. Below, you will see a screenshot of a fraud email that nearly had us fooled.
Read on for details on a devious email making the rounds and ways to outwith these scams.
Tax season: Scams to watch for so you don't get taken
Don’t be so quick to accept the help of strangers if they offer to make filing taxes less stressful. Tap or click here for more information on the tax prep software that was sending data back to Meta. Now, tax scams are making the rounds looking to rip you off.
Criminals are going after password manager logins - What to watch out for
Password managers are a great way to keep track of all your online account credentials. But they are also a treasure trove of information for cybercriminals if they gain access. And that is exactly what hackers are after.
Update your iPhone! iOS 16.3 fixes bugs and adds these new features
With iOS 16.2, Apple rolled out Freeform, a whiteboard app that lets you collaborate on journals, mood boards, games, notes and more with others. Tap or click here for more information about this inspiring app.
Apple released iOS 16.3 this week, adding security features and cosmetic options. Here’s what’s new.
The real danger of those seemingly harmless online quizzes
Social media is an excellent way to stay connected, but sometimes you inadvertently share more than you should. They might seem innocent, but hundreds of quizzes are going around that can expose sensitive information. It’s best to opt for an auditory illusion like this one, which doesn’t require personal answers.
37 million customers exposed in T-Mobile data breach
Hackers go after big companies for all the juicy customer data they can provide, and no organization is safe.
Just last month, DraftKings suffered a data breach. Here’s what to do if you have an account with the online sports betting service.
Are you a victim of screen hacking? Here's how this cyberattack works
Anybody who connects to the internet is at risk of cyberattacks, hacking and scams that want to rip you off. Everybody knows it’s an inherent risk, but it’s not always easy to spot a hacking attempt. Millions of routers are at risk of hacking thanks to this bug.
Norton customer breach: Were your passwords stolen?
No companies appear to be safe when it comes to cybersecurity. Online sports betting service DraftKings recently suffered a data breach, while a healthcare system exposed the details of over 3 million users.
Things just got more frightening as we found out a popular cybersecurity company suffered a massive data breach. When a service in charge of protecting your digital life is breached, it’s time to take action.
This copycat Zoom download is hiding malware
Video conferencing apps like Zoom became extremely popular during the pandemic. Even though many companies are back to working in the office, tons of people still rely on these programs to communicate daily. Tap or click here for Zoom tricks you’ll use all the time.