{"id":5628,"date":"2014-08-05T12:30:09","date_gmt":"2014-08-05T16:30:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5628"},"modified":"2022-05-05T04:36:19","modified_gmt":"2022-05-05T08:36:19","slug":"julyroundup2014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/julyroundup2014\/5628\/","title":{"rendered":"July Monthly Roundup"},"content":{"rendered":"<p>In July, Kaspersky Lab published its latest relevant reads and need-to-know security news. From protecting your webcam and your privacy, to keeping kids safe online, we kept you in the loop. If you missed any of our July posts, don\u2019t worry! Our monthly roundup will get you up to speed. <strong>\u00a0<\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/millions-of-smartphones-vulnerable-to-rogue-hotspots-by-default\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Millions of Smartphones Vulnerable to Rouge Hotspots by Default<\/strong><\/a><\/p>\n<p>Fun fact: the mobile service provider AT&amp;T puts default lists of trusted Wireless networks into its customers\u2019 iOS and Android devices. This means that users will conveniently, automatically connect to a variety of Wi-Fi hotspots managed by AT&amp;T. Comcast\u2019s XFININTY is also in the business of disseminating wireless hotspots for its customers. Their Internet service is in the process of rolling out a feature called \u201cXFINITITY WiFi\u201d, which will rely on the modems and routers of its users to fuel the Internet for your home and private network, while simultaneously acting as a public hotspot to others with XFINITY credentials. Despite the convenience of automatic connection to public hotspots, the problem is that once you connect to one of these, it appears your device may automatically connect to any other hotspots you come across that broadcast the same network name and SSID. How do you really know how secure these hotspots are? The increasingly Wi-Fi-enabled world in which we operate is conducive to attackers who could set up rogue or malicious Wi-Fi hotspots in order to monitor Internet communications, pilfer login credentials,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/android-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">infect users with malware<\/a>, or perform other malicious actions. We suggest avoiding public Wi-Fi\u00a0altogether and\u00a0<a href=\"https:\/\/www.kaspersky.com\/android-security\" target=\"_blank\" rel=\"noopener nofollow\">running a solid security product<\/a>\u00a0for protection in the eventthat something goes awry.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/webcam\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Stop Webcam Snoopers Cold<\/strong><\/a><\/p>\n<p>In the last decade webcams have become so commonplace that the phenomenon of seeing someone as you speak with them tens or thousands of miles away has gone from a mere pipedream to an everyday reality that can take place in the palm of your hand, courtesy of your smartphone. The scary truth is that you are not the only one that can access your webcam. Aren\u2019t convinced? Just <a href=\"http:\/\/www.cbsnews.com\/videos\/miss-teen-usa-hacked-with-blackshades-rat-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">ask Miss Teen USA 2013<\/a>, whose webcam was hacked into and used to take nude photos of her.\u00a0 Attackers with programs like\u00a0<a href=\"http:\/\/www.motherjones.com\/politics\/2014\/05\/blackshades-malware-remote-access-webcam-fbi\" target=\"_blank\" rel=\"noopener nofollow\">Blackshades<\/a>, which was cracked down on earlier this year, can essentially hack their way into your computer and use your camera at will. Although this is a serious concern, our poll indicates that more than half of users don\u2019t protect their webcam. Some 40 percent do think to cover their webcams with duct tape, a Band-Aid and so on, but there are better ways to protect your privacy.\u00a0For example, <a href=\"https:\/\/www.kaspersky.com\/blog\/10new-kis2015\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>\u00a0makes it near impossible for invasive malware threats to turn users\u2019 webcams against them by alerting users whenever an application attempts to access the webcam and has permissions setups that allow for certain programs like Skype or Hangouts to have access while denying all others unless expressly granted permission by the user.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/10new-kis2015\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Ten New Security Tricks to Protect You This Year<\/strong><\/a><\/p>\n<p>Criminals are constantly inventing new tricks to steal your money or your data, or even hold it hostage, making it increasingly more complicated to protect your computer or mobile device from online threats. It is no wonder that the security industry must continually innovate. Below is a brief list of new protection technologies that counteract fresh (not to mention, scary) tricks of hackers in 2014, all of which will be implemented in the 2015 version of\u00a0<a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security \u2015Multi-Device<\/a>. The full article will explain the new protection technologies at length.<\/p>\n<ul>\n<ul>\n<ul>\n<ul>\n<li>1. Undo <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">Cryptolocker<\/a><\/li>\n<li>2. Keep banking <a href=\"https:\/\/www.kaspersky.com\/blog\/the-big-four-banking-trojans\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojans<\/a> away<\/li>\n<li>3. Warn of insecure Wi-Fi<\/li>\n<li>4. Prevent <a href=\"https:\/\/www.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/\" target=\"_blank\" rel=\"noopener nofollow\">camera spying<\/a><\/li>\n<li>5. Stay on top of kids\u2019 activities and keep them <a href=\"https:\/\/www.kaspersky.com\/blog\/stop-cyberbullying\/\" target=\"_blank\" rel=\"noopener nofollow\">safe<\/a><\/li>\n<li>6. Protect from <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> even better<\/li>\n<li>7. Seamlessly work with new browsers<\/li>\n<li>8. Keep an owner posted about a protection state<\/li>\n<li>9. Keep important people protected<\/li>\n<li>10. Always up-to-date<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/5-myths-of-antivirus\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>5 Myths of Antivirus<\/strong><\/a><\/p>\n<p>In this day and age of heavy digital reliance, it is critical that we keep our computers and mobile devices safe and running smoothly by using appropriate protection and avoiding threats. Here we combat 5 of the prominent myths and misconceptions of antivirus protection with a heavy dose of reality.<\/p>\n<p>1. Myth: Viruses are only for Windows<\/p>\n<p>Reality: While that may have rung true in years past, as Apple has gained traction both in private and public sectors, attackers have stepped up their attacks on those products as well. And now mobile malware is the next frontier for attackers, and once again they are prioritizing\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/android-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">the dominant platform<\/a>\u00a0\u2014 Android \u2014 but are also targeting iOS devices. That means whether you have a Windows- or iOS-based based computer or mobile device, having a robust antivirus program is a must.<\/p>\n<p>2. Myth: Process errors or poor computer performance means my computer has a virus<\/p>\n<p>Reality: While those can certainly be signs that your computer has a virus, they may also be indicative of a system with too many background processes in action.<\/p>\n<p>3. Myth: You can get all the antivirus protection you need from free programs downloaded from the web.<\/p>\n<p>Reality: These free programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.<\/p>\n<p>4. Myth: Viruses are written by AV companies<\/p>\n<p>Reality: Cyber attackers are the ones creating the latest malware in a never-ending attempt to stay one step ahead of antivirus programs as they try to steal sensitive data and money from users.<\/p>\n<p>5. Myth: Viruses can infect humans.<\/p>\n<p>Reality: It takes a diehard conspiracy theorist to believe computer viruses can infect humans. But anyone who has seen \u201cIndependence Day\u201d knows it is a fact that viruses can be written to sabotage alien spaceships \u2014 that\u2019s just science.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/android-l-security\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Android \u201cL\u201d Will Improve System\u2019s Security<\/strong><\/a><\/p>\n<p>Smartphones became an integral part of our lives so quickly that many people still haven\u2019t realized which threats came along with these smart pocketable helpers. For example malicious programs for smartphones are able to\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/an-android-that-robbed-your-bank-account\/\" target=\"_blank\" rel=\"noopener nofollow\">steal money<\/a>, while the risk of <a href=\"https:\/\/business.kaspersky.com\/mobile-device-management-mobile-protection-on-a-short-leash\/\" target=\"_blank\" rel=\"noopener nofollow\">data leakage<\/a> is a constant. These risks are so significant that even those outside of the security industry have joined the fight. For example Google developers will be releasing the Android codenamed L, which will greatly improve the security landscape for this OS, which leads today in terms of\u00a0<a href=\"https:\/\/www.securelist.com\/en\/analysis\/204792326\/Mobile_Malware_Evolution_2013\" target=\"_blank\" rel=\"noopener nofollow\">mobile threats presence<\/a>. For example, Android L-based devices will be less desirable and more difficult to steal with a factory reset option only available with legitimate credentials. Google will deliver most security updates directly to end users via its own Google Play services and applying those updates without a complete firmware update. The new Android for Work solution (which incorporates Samsung KNOX features) will address data leakage issues by creating an encrypted storage and a virtual environment, basically, a smartphone inside a smartphone allowing you to separate work functions and personal usage. Addressing privacy concerns, Google aims to render passwords obsolete by identifying a legitimate owner by other means, if it\u2019s possible. For example, a lock screen could be disabled, if an owner\u2019s smart watch is nearby, indicating that owner himself is close as well.\u00a0 Lastly, Google developers plan to make for more privacy using Universal Data Controls, a centralized tool helping a user identify items like which apps, what kind of his\/her personal data, and what should be blocked for an individual\u2019s smartphone.<\/p>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/kids-free-av\/\" target=\"_blank\" rel=\"noopener nofollow\">\u00a0Kids and Computers- What Protection is Needed?<\/a><\/strong><\/p>\n<p>Raising kids in the digital age is no easy feat. Suddenly it becomes a parent\u2019s responsibility to protect not only the computer, but also the child from various cyber threats. Here comes the paradox \u2013 kids are often more tech-savvy than their parents and it becomes tempting to trust the child with selection of proper protection measures. However, kids often advocate for basic or no security, claiming that some free malware protection is all they need. This is a classic mistake, because malware is just one of many existing online threats and others are more dangerous for kids. Other less-than-favorable content your teen might encounter surfing the Net includes:<\/p>\n<ul>\n<ul>\n<ul>\n<ul>\n<li>Fradulent offers to earn money or get free stuff;<\/li>\n<li>Predators trying to earn a child\u2019s trust online and then setup a real life meeting;<\/li>\n<li>Fake (phishing) letters trying to swindle kid\u2019s personal data or even parent\u2019s financial data;<\/li>\n<li>Sites with inappropriate content ranging from weird pornography to hate speech;<\/li>\n<li>And the last, but not least \u2013 classmates trying to find a target for bullying or even a mate to visit a drug dealer together.<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ul>\n<p>If you use an Internet Security product equipped with parental control tools, and you spent some time to set it up properly, you can prevent these things from happening. An additional security concern\u2014kids may turn off an antivirus solution for one reason or another. However, an active malware can be \u201ckilled\u201d by a powerful security solution such as <a href=\"https:\/\/www.kaspersky.com\/multi-device-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Read highlights from our top #security news posts in July.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FZMc5&amp;text=Read+highlights+from+our+top+%23security+news+posts+in+July.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Read highlights from our top posts in July.<\/p>\n","protected":false},"author":2706,"featured_media":5630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,215,492],"class_list":{"0":"post-5628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-internet-security","10":"tag-security-news"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/julyroundup2014\/5628\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/julyroundup2014\/3866\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/julyroundup2014\/3772\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/julyroundup2014\/4256\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/julyroundup2014\/4511\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/julyroundup2014\/4822\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/julyroundup2014\/4425\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/julyroundup2014\/4822\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/julyroundup2014\/5628\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/julyroundup2014\/5628\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5628"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5628\/revisions"}],"predecessor-version":[{"id":33273,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5628\/revisions\/33273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}