Skip to content
Odotonline
  • Sustainability
  • Artificial intelligence
  • Technology
  • About
  • Contact
They have access to the bank account

They have access to the bank account

March 2, 2025

The growth of mobile applications has facilitated the daily life of millions of users, allowing new forms of communication, entertainment and financial management. However, this advance has also brought with it Increased cyber risks. In particular, a new modality of scam -based artificial intelligence (AI) is affecting users without being aware.

Recently, cybersecurity experts have identified an increase in the Malicious applications proliferation which are passed through virtual private network services (VPN). Instead of protecting user privacy, these apps are designed to intercept and steal access to emails, bank data and other sensitive information.

According to a report by the Kaspersky security company, six VPN applications that appear to be safe have been detected with spy programs that expose users to serious risks. These applications are: Maskvpn, Dewvpn, Paladinvpn, Proxygate, Shieldvpn and Shinevpn.

Licy VPN applications have the function of Stap the Internet connection and hide the IP address of the user, guaranteeing their privacy and allowing access to restricted content in certain regions. On the other hand, fraudulent versions intercept the information transmitted between the user and network device, sending it to malicious actors without the victim perceiving it.

This data filtration can lead to various threats, such as:

  • Identity theft: Cybercriminals can use stolen personal information to supplant the identity of the victim and commit fraud.
  • Access to bank accounts: When obtaining financial credentials, criminals can make unauthorized transfers and empty bank accounts.
  • Sale of data in the black market: The stolen information is marketed in the ‘Dark Web’, exposing users to new scams.
  • Malware installation: These fraudulent apps can be an entrance door for other malicious programs.

Protection measures

To avoid being a victim of these scams, cybersecurity experts recommend:

  • Use Play Protect: This Google tool scarves applications installed on the phone and detects possible threats.
  • Download Apps Only Official Stores: It is essential to install applications exclusively from the Google Play Store or the Apple App Store.
  • Check the reviews: Before installing an app, it is advisable to verify the opinions of other users to detect possible fraud.
  • Use safe passwords: It is recommended to use combinations of letters, numbers and symbols, in addition to activating authentication in two steps.
  • Stay informed: Being up to date with the last security alerts allows you to anticipate new threats.
Categories Technology
This is the result of today’s draw, Sunday, March 2, 2025
“When the sea reaches us”: Key to understand the future of the coasts in Puerto Rico
Recent posts
  • YoConecto teaches older people for free how to use technology in their daily lives
  • What would a microscopic black hole do to your body? A mathematician has done the calculation
  • autonomous guidance, evasive maneuvers and swarming capacity at 8,600 km/h
  • NASA publishes a video of the flight of the X-59, from the cockpit
  • China urgently launches a rescue mission to the Tiangong space station to bring back three astronauts

@ 2025 Odotonline - Odotonline@aol.com

  • Sustainability
  • Artificial intelligence
  • Technology
  • About
  • Contact