The Mobile phones They are undoubtedly the technological invention of the 21st century. It accompanies us everywhere and we can use it at any time, and we even work from it. In recent years, with digitalization we have access to everything that concerns our lives from our mobile phone, From the books we read to our own bank accounts.
Spain is one of the European countries with the highest number of cyber attack victims And the economic impact of the actions of cybercriminals in our country is estimated at 30,000 million euros each year, according to a last report by the Secretary of State for Budgets and Expenses of the Ministry of Finance.
To deal with these cyber attacks there are a series of general recommendations such as Do not open strange emails, Download antivirus programs either do good password management. Now, there are a number of applications that can help cybercounts enter our mobile phones and do with our bank data.
What are the applications that I have to uninstall?
In recent years there have been numerous cybethafs through applications with which scammers enter directly into our bank accounts and can be done with all our money. Company’s cybersecurity specialists Karpesky They explain the importance of knowing this type of applications so as not to be victims of scams. These are the Six applications that, under the appearance of virtual private network service (VPN) They work to steal personal and financial information to users:
- Maskvpn
- DEWVPN
- Paladinvpn
- Proxygate
- Shieldvpn
- Shinevpn
As reported, the main function of these applications was to provide users with navigation protection, but the opposite has happened, These have been the tools through which bank accounts have been accessed.
VPNs are tools that help protect online privacybut some turn out to be false and take advantage of this advantage as intermediaries between user and network and intercept the data sent and received by the user.
Recommendations to avoid threats and navigate safely
Now, Kaspersky’s experts also offer a series of recommendations to avoid this type of scams and navigate in the most effective and safe way possible:
- Use a VPN: It is a tool that allows you
- Do not download free versions of doubtful origin.
- Protect your devices with a comprehensive safety solution: As antivirus programs.
How to identify a fraudulent application
The cybersecurity agency itself explains How to detect a fraudulent application. First they clarify that it is important Read the reviews. If an application has a low rating and many user complaints, be careful. But be careful with the falsification of reviews, that if an application has too many good reviews it may be for this.
On the other hand, it is recommended Check the amount of downloadslegitimate applications can have millions or even billions of downloads. If you see a popular application with several thousand downloads, it could be false. Similarly, these fraudulent applications can contain Grammatical errors. Legitimate application developers will be responsible for avoiding typographic errors in the descriptions of their applications.
Finally, there are another series of recommendations such as investigate the developer or the company that has promoted it, Check the release date, Check the permissions agreement that nobody reviews and Check the update frequency. These are some recommendations that involve investigating a little more in the product you are downloading, but that will protect you from being a cyber attack victim.