بهترین مدیران رمز عبور سال 2024: تست شده توسط کارشناسان

1Password به طور کلی بهترین مدیر رمز عبور است، با رابط کاربر پسند و ویژگی های عالی. شما می توانید اعتبار خود را برای حساب های آنلاین و اطلاعات کارت اعتباری ذخیره کنید و بهتر از همه، فقط باید یک رمز عبور را به خاطر بسپارید.

این برنامه به شما کمک می کند تا رمزهای عبور منحصر به فردی ایجاد کنید که ادعا می کند کمتر در معرض خطر هکرها هستند و آنها را برای شما ذخیره می کند تا مجبور نباشید رمزهای عبور پیچیده را برای چندین حساب به خاطر بسپارید. با ویژگی تکمیل خودکار، 1Password می تواند به طور خودکار اطلاعاتی مانند نام کاربری، رمز عبور یا شماره کارت اعتباری شما را پر کند. همچنین در صورت لزوم می توانید اطلاعات خود را با اعضای خانواده یا دوستان قابل اعتماد به اشتراک بگذارید.

این برنامه در تمام دستگاه های مورد علاقه شما قابل دسترسی است و دسترسی را آسان و ایمن می کند. 1Password با ویندوز، مک، iOS و اندروید سازگار است. افزونه‌های مرورگر برای Chrome، Edge، Brave و Firefox نیز موجود است.

خداحافظ: 1 رمز عبور

سایر ویژگی‌های قابل توجه عبارتند از یک صندوق دیجیتال امن برای ذخیره اسناد و یادداشت‌های حساس، و همچنین ویژگی‌ای که به شما هشدار می‌دهد در مورد رمزهای عبور ضعیف، در معرض خطر یا تکراری. احراز هویت بدون رمز عبور، از جمله ذخیره سازی رمز عبور، اکنون در دسترس است. علاوه بر این، کاربران برج مراقبت می توانند خطرات امنیتی کلید SSH را با به روز رسانی اخیر نظارت کنند.

تنها نقطه ضعف این است که 1Password یک طرح رایگان ارائه نمی دهد، اما برنامه یک دوره آزمایشی رایگان 30 روزه را بدون نیاز به اطلاعات کارت اعتباری شما ارائه می دهد – و شرکت هر زمانی که از صورتحساب فعلی شما باقی مانده باشد، در صورت تمایل، بازپرداخت می کند. به دنبال تغییر (به اعتبار). از زمان نوشتن این مقاله، مدیر رمز عبور 2.99 دلار در ماه هزینه دارد، صورتحساب سالانه یا 4.99 دلار برای بسته خانوادگی. گزینه های تجاری نیز موجود است.

به طور کلی، اگر به دنبال یک مدیر رمز عبور قابل اعتماد و با استفاده آسان با ویژگی های عالی و ابزارهای محافظت از حساب هستید، 1Password یک انتخاب برتر است. کاربران می گویند رویکرد این شرکت به امنیت داده ها، با پشتیبانی عالی از مشتری، عالی است.

1 رمز عبور fخوردن: اطلاعات کاربری را ایمن ذخیره کنید | تولید کننده رمز عبور | سازگاری بین پلتفرم | سازمان دهنده برچسب و پوشه | احراز هویت دو مرحله ای | عملکرد برج مراقبت برای شناسایی رمزهای عبور ضعیف، استفاده مجدد یا در معرض خطر | گاوصندوق دیجیتال امن | امتیاز Trustpilot 4.7 | ذخیره سازی رمز عبور

منبع: https://www.zdnet.com/article/best-password-manager/#ftag=RSSbaffb68

The best VPN trials of 2024

Protecting your privacy online is a necessity and not an option in today’s world, and a virtual private network (VPN) is an excellent way to begin. 

VPNs provide tunnels that mask your online communication by encrypting data transmissions, packets, and your activities. They make it harder for third parties to track you, making you less likely to become a victim of eavesdropping or a data breach. 

The choices out there for VPNs are endless — but some are more trustworthy than others. The easiest way to see if a particular VPN is the right option for you is to sign up for a free trial. Many VPN companies now allow potential customers to test them out for free for a set amount of time. In most cases, we recommend you choose a trial over a free VPN service, as many free offerings require you to agree to data collection and targeted advertising. However, you will have to sign up, so take note of the money-back guarantee period and cancel before you are charged.

Also: The best VPN services you can buy

What is the best VPN trial right now?

Our top pick is ProtonVPN, as it is one of the few VPN providers that still provides a free option. Though limited, the VPN is user-friendly and has an attractive user interface, giving you all the time you need to figure out how VPNs work and whether one suits your needs. Paid plans are also currently on sale.

Below are ZDNET’s top picks for the best VPN trials on the market right now. 

The best VPN trials of 2024

Show less

Proton VPN

Best VPN trial overall

Proton VPN features: Open source | 85 countries, 3,400+ servers | No-logs policy | Security audits | Free option | Credit card not required for a free trial | VPN accelerator | 30-day money-back guarantee | Anti-censorship features

Since coming to the market, Proton VPN — the open-source virtual private network from the minds of ProtonMail — has made its mark. It has garnered support because the company is transparent about software security practices and implements secure technologies, including two-factor authentication, Wireguard, forward security encryption keys, and a ، switch. 

Review: Proton VPN

Proton VPN doesn’t have a trial but does provide a free option with some of the same features as paid subscriptions. Alternatively, you can sign up for a subscription and cancel within 30 days.

At ZDNET, we like ProtonVPN’s free offering and view it as a ‘trial’, especially if you are new to the world of VPNs and want to learn how to use the software before signing up for a paid plan. 

The caveat is that you can only have one connection to three countries (US, NL, JP) with the trial — but there are no data limits. If you opt for a paid subscription, you can access over 3,400 servers in 85 countries. 

A bonus is that the VPN provider is backed by Swiss privacy laws, some of the strongest worldwide.

Paid plans, too, are currently on sale. In an end-of-year deal, you will pay only $10 for a month of access, or you could opt for 24 months of access at $4.99/month, or a 12-month plan with a monthly fee of $5.99.

ProtonVPN Web

Show Expert Take Show less

Show less

Surfshark

Best VPN for affordability

Surfshark features: Unlimited devices | Ad-blocker | Two-factor authentication | Kill switch | Credit card required for a free trial | 3,200+ servers, 100 countries | 30-day money-back guarantee

Surfshark VPN, which includes a mobile trial, has many additional features such as cookie blockers, an IP rotator, and the option to connect to two servers simultaneously. Our past tests found connections reliable and secure, albeit with download speeds that can be slower than other VPN services. 

A bonus to consider is the massive server network — with over 3200 servers available in over 100 countries. Not to mention that Surfshark is a very affordable VPN.

Review: Surfshark VPN

A seven-day free VPN trial is available for Android, iOS, and macOS platforms, but you need to sign up for it by downloading the app from the Google Play Store and Apple App Store.

You can also test out Surfshark by signing up for a plan. But don’t forget to cancel within 30 days for a refund if you’re unsatisfied. The subscription options include a two-year subscription at $2.29 per month (plus two months free), a 12-month subscription at $3.99 per month, or one month of access for $10.99.

Surfshark VPN Web

Show Expert Take Show less

Show less

Privado VPN

Best for free simultaneous device support

Privado VPN features: Supports unlimited devices simultaneously, 10 on a free plan | 47 countries | Kill switch | No-log policy | Credit card not required for a free plan | 30-day money-back guarantee 

Another choice you should consider is Privado VPN. This Swiss VPN offers a comprehensive free plan with support for up to ten devices and 10GB of traffic per month. 

During testing, we considered the user interface clean and easy to use, with a handy button to enable or disable the ، switch. However, it does lack the advanced features of many other VPNs on the market. 

Prices begin at $1.99 per month for two years of access (with three months free) and $2.99 monthly for an annual plan, rising to $10.99 if you just want to try out the software for a single month.

Privado has a clear privacy policy. However, at the time of writing, there is no evidence of third-party auditing, an area the company should tackle if it wants to build more trust in the brand as a solid, secure VPN.

privado vpn

Show Expert Take Show less

Show less

ExpressVPN

Best VPN trial for user-friendliness

ExpressVPN features: Content streaming | 105 countries | Kill switch | Up to eight device connections | No-logs policy | Password | Credit card required for a free trial

ExpressVPN is a widely used and popular VPN. While expensive, the service is best suited for individuals who want to adopt a reliable VPN that can be used both at home and abroad. Advanced features include content streaming and torrenting availability, split tunneling, and a threat manager designed to stop tracking. 

The VPN is straightforward: install, choose a smart location or your preferred country, and connect.

You can connect up to eight devices simultaneously. A router app is also available to install the VPN directly and open access to every household device. 

Review: ExpressVPN

ExpressVPN has adopted the same stance as many other VPN providers and does not offer a standalone trial. Instead, you can sign up for a short-term service — either one month, six months, or a year — and then cancel within 30 days to take advantage of a money-back guarantee. There are no functionality, speed, or server restrictions. 

ExpressVPN subscriptions are priced as follows: $12.95 for one month of access, $9.99 for six months, or $6.67 monthly if you sign up for one year. Three months of free access have also been added to the yearly subscription, together with a free year of Backblaze cloud backup.

There is also 24/7 chat support if you have queries or trouble setting up the VPN. 

ExpressVPN Web

Show Expert Take Show less

Show less

NordVPN

Best VPN for speed

NordVPN features: No-logs policy | Threat protection | Dark Web monitor | Rapid speeds | Ad blocking | Credit card required for a free trial | 5,000+ servers, 60 countries

Although NordVPN doesn’t offer a free trial, you can take advantage of a 30-day money-back guarantee to test the service and cancel within 30 days if you’re unsatisfied or want to test other VPNs. Subscriptions start at $3.99 per month on a Standard, two-year plan, with three months of access thrown in for free (via coupon).

Review: NordVPN review

Given NordVPN’s popularity, accounting for millions of downloads, the service is worth considering, even though you have to jump through a few hoops to test it out. It’s very fast and reliable, and the developers are constantly monitoring and working toward improving the VPN’s security and features.

As we found in our own review, NordVPN offers consistent, impressive speeds with an impressive array of country servers. Plus, it’s compatible with many operating systems and devices. 

Also: NordVPN vs. Surfshark: Which is better for you?

Nord VPN Web

Show Expert Take Show less

Our top pick is ProtonVPN, as it is one of the few VPN providers that still provides a free option. While it is limited, the VPN is still user-friendly and has an attractive user interface, giving you all the time you need to work out how VPNs work and whether one suits your needs. Once you’ve gained more experience, you can then choose to adopt a paid plan or try out other providers. 

Not every VPN provider offers a free trial, but the best VPN providers offer an alternative: sign up, provide your credit card details, and if you aren’t satisfied, you can request your money back. Plus, most offer you 30 days to test the software. 

Money-back guarantees are becoming an industry standard, so it really depends if you’re willing to go through the sign-up process. Some VPN providers offer limited plans for free instead.

VPN trial

Starting price

Open source

Number of countries and servers

Logging policy

Credit card required

Separate free trial or money-back guarantee

Length/limits of trial

ProtonVPN

Free

Yes

85 countries, 3,400+ servers

No-logs policy

No

Free version

Free plan, limited

Surfshark

$2.29 per month

No

100 countries, 3,200+ servers

No-logs policy

Yes

Money-back guarantee

Seven days, sign-up

Privado VPN

Free/$1.99 per month

No

47 countries

No-logs policy

No

Free version

Free plan, limited

ExpressVPN

$6.67 per month

No

105 countries, 3,000+ servers

No-logs policy

Yes

Money-back guarantee

Sign up, 30-day cancellation

NordVPN

$3.99 per month

No

60 countries, 5,000+ servers

No-logs policy

Yes

Money-back guarantee

Sign up, 30-day cancellation

While deciding on the best use cases for each VPN, we considered trial features, levels of security, and affordability. We recommend testing different VPNs to find the right fit for your budget and needs. However, the recommendations below can make the decision easier if you already know your priorities.

These recommendations are updated as the VPN market shifts. 

Choose this VPN if…

If you want…

ProtonVPN

ProtonVPN is a security-first option with a free plan that strongly emphasizes transparency and open-source technology. It offers advanced security features like a no-logs policy, security audits, and support for the Tor network. This is our favorite way to try out a VPN.

SurfShark

An affordable VPN subscription and a seven-day iOS, macOS, and Android trial. With pricing starting at just a few dollars per month, SurfShark is inexpensive and still provides a wide range of features, including ad-blocking and two-factor authentication.

Privado VPN

A generous free plan. While there may be questions surrounding its lack of auditing, the VPN is subject to strict Swiss privacy laws and offers users a clean, barebones service.

ExpressVPN

A full-featured, easy-to-use trial that is not restricted on functionality, speed, or server connections. ExpressVPN offers advanced features like content streaming and torrenting availability, split tunneling, and a threat manager designed to stop tracking.

NordVPN

With over 5,000 servers in 60 countries, NordVPN is a long-term, reliable solution for those who want a VPN they can depend on. NordVPN offers advanced features like a no-logs policy, threat protection, and a dark web monitor.

While you are considering trying out a new VPN or two, there are numerous factors and conditions to think about, the most important of which are outlined below:

  • Trial length: VPN trials vary in length. For example, you may have 30 days on your PC, whereas iOS or Android-based trials may only last seven days. The latter can be useful but may not be enough time to properly test out a VPN before purchase.
  • Limits: VPN trials are often limited, and this may impact the devices you can use your VPN on, the number of devices, speed, or server access. Furthermore, there may be speed caps imposed on free VPN plans or during trial periods, so they may not reflect the true capabilities of the VPN service. 
  • Payment details: Some VPNs will require payment card details before you can test out their service. If this is the case, remember to remove your details before your time runs out, as you may then be automatically charged for a paid subscription. 
  • Paid plans: If you find a VPN that you like, you may then decide to sign up for a paid plan. Consider the monthly cost of your new plan ahead of time and decide whether or not it is within your preferred price range. 

When looking for the best VPN trials of 2024, we wanted to see just how user-friendly they are, whether you’ll be asked to hand over payment card details, and whether or not the trials themselves have value.

  • Hands-on research: We conduct extensive hands-on research, including speed tests and DNS leak tests, on many VPN offerings in the market. If a VPN doesn’t perform as it should, they don’t make the cut. 
  • Usability: We kept usability and user-friendliness in mind when we tried out different VPN trials. The point of a trial is to learn how VPNs work and to ensure a VPN is the right product for you. 
  • Limitations: Some VPN trials will be limited; for example, users will only be able to connect to a handful of servers. We prefer it when trials are for the full VPN service, but there are some exceptions.
  • Customer reviews: We examined customer reviews, including both positive and negative experiences. We also kept in mind the longevity of VPN providers, considering their track records for user and data privacy, popularity, and the variety and accessibility of services. 
  • Money-back guarantee: You often have to rely on a 30-day money-back guarantee to test the most popular VPNs. However, with the exception of services like ProtonVPN, a subscription model is still preferable to free VPNs, unless they utilize the revenue generated from paid plans to support free options.

A virtual private network (VPN) is a network of nodes — or servers — which reroute internet traffic to mask its original IP address. VPNs also add a layer of encryption to protect data packets and online communication. As the internet was not designed to be inherently secure, VPNs were developed to bridge part of the security gap. While they are not a foolproof solution, a reliable and trustworthy VPN can help protect your online privacy.

If you want to understand how VPNs work in more detail, check out our guide on everything you need to know about VPNs.

A VPN trial is a way to test a VPN service before purchasing it. 

Typically, VPN trials last for a specific period or have limited functionality. Once the trial period ends, you must subscribe to continue using the service. VPN trials work by providing you with a temporary account, allowing you to test the VPN’s features and functionality. 

Some VPNs offer free trials. You can cancel your subscription within the trial period to avoid being charged, but you will likely have to provide your payment card details at the time of sign-up. VPN trials can range from a few days to a few weeks, depending on the VPN provider. During the trial period, you may have limited access to certain features, reduced connection speeds, or a limited number of servers to choose from. However, most VPNs offer a full range of features during the trial period.

Not all VPN trials are secure and trustworthy, so it’s essential to choose a reputable VPN provider that has a history of protecting user privacy and security.

Using a VPN is generally recommended day-to-day. However, there are some circumstances where you may decide not to enable your VPN. You should always check if using a VPN is legal in your country, for example. 

VPNs can slow down your connection, so if you’re not dealing with sensitive information, you may want to trade speed for security temporarily, like when gaming. 

VPNs protect your privacy by masking your IP address and encrypting your traffic. However, unless there are specific, integrated features, they do not offer protection against online threats such as phishing, drive-by malicious downloads, malware, ransomware, or third-party data breaches. 

To protect yourself against these attack vectors, you should ensure you have a firewall and antivirus software. It’s also recommended that you stay suspicious of untrusted messages and emails. 

There is a huge selection of VPN offerings on the market today. While we’ve showcased what we consider the best VPN providers that offer decent trials, there are other options available you may want to consider in 2024, as shown below:

View at Atlas VPNView at CyberGhostView at MullvadView at TunnelBear

منبع: https://www.zdnet.com/article/best-vpn-trial/#ftag=RSSbaffb68

بهترین VPN های مسافرتی 2024: آزمایش شده و بررسی شده توسط کارشناسان

ویژگی های NordVPN: پیشخدمت: بیش از 5000، 60 کشور | اتصالات همزمان: شش | ایموبلایزر: بله | بستر، زمینه: Windows، MacOS، iOS، Android، Linux، Android TV، Chrome، Firefox، Edge | ثبت: بدون گزارش فعالیت | تضمین بازگشت پول: 30 روز

در بررسی ما از NordVPN، اتصال سریع و قابل اعتمادی داشت و به طور کلی در طیف گسترده ای از موقعیت های آزمایشی سازگار بود. اگر در حال سفر هستید، احتمالاً می‌توانید روی NordVPN حساب کنید مهم نیست از کجا وصل می‌شوید.

NordVPN همچنین از اشتراک گذاری P2P (همتا به همتا) پشتیبانی می کند و یکی از VPN های مورد علاقه ما برای تورنت است. به لطف ویژگی Double VPN خود، لایه دوم رمزگذاری را ارائه می دهد و اگر می خواهید VPN را اجرا کنید که به عنوان سرور نیز عمل می کند، یک آدرس IP اختصاصی دارد. با توجه به سازگاری، NordVPN از تمام سیستم عامل های اصلی پشتیبانی می کند و دارای افزونه های مرورگر اضافی برای کروم، فایرفاکس و مایکروسافت اج است.

خداحافظ: NordVPN سرعت و عملکرد ثابتی را ارائه می دهد

به طور کلی، NordVPN یکی از بهترین انتخاب ها، به ویژه برای سفر است. دارای 30 روز ضمانت بازگشت وجه است، که باید زمان زیادی را در اختیار شما قرار دهد تا محصول را آزمایش کنید و ببینید آیا برای شما مناسب است یا خیر. می توانید بین Complete، Plus و Standard یکی را انتخاب کنید، تفاوت در دسترسی به مدیر رمز عبور، اسکنر نقض داده یا سرویس ذخیره سازی ابری رمزگذاری شده است.

قیمت ها از 2.99 دلار در ماه در یک برنامه استاندارد دو ساله شروع می شود. برنامه های یک ساله از 4.49 دلار شروع می شود. اگر می‌خواهید از امنیت سایبری و پوشش سرقت هویت نیز محافظت کنید، اشتراک Ultimate را در نظر بگیرید که از 5.99 دلار در ماه شروع می‌شود.

در زمان نگارش این مقاله، NordVPN تبلیغاتی را برای مشترکین جدید اجرا می کند و در صورت انتخاب یک برنامه یک یا دو ساله، سه ماه دسترسی اضافی را به صورت رایگان ارائه می دهد.

منبع: https://www.zdnet.com/article/best-travel-vpn/#ftag=RSSbaffb68

بهترین معاملات لپ تاپ امروز

ما به دنبال معاملات لپ‌تاپ در خرده‌فروش‌هایی مانند آمازون، والمارت، و بهترین خرید، و همچنین وب‌سایت‌های تولیدکنندگان بزرگی مانند Lenovo، HP، Dell، Apple، Acer، و Asus بودیم. ما همچنین از ابزارهای مختلف ردیابی قیمت استفاده کردیم تا اطمینان حاصل کنیم که پیشنهاد ادعا شده نادرست نیست.

ما بر روی محصولات با کیفیت از تامین کنندگان پیشرو تمرکز کردیم زیرا تخفیف های این لپ تاپ ها احتمالاً بیشترین تقاضای خریداران بالقوه را دارند.

هنگام جمع آوری لیست بهترین معاملات، موارد زیر را در نظر گرفتیم:

  • قیمت: طبیعتا قیمت لپ تاپ های پیشنهادی ما باید شامل تخفیف جذاب باشد. در حالی که برخی از تخفیف ها نسبت به قیمت کلی کوچک هستند – به عنوان مثال، 30 دلار تخفیف برای یک دستگاه 150 دلاری – و سایر تخفیف ها صدها دلار است، ما می خواستیم مطمئن شویم که در همه موارد، نسبت قیمت به کیفیت خوب است.
  • امکانات: ما طیف وسیعی از لپ‌تاپ‌ها را با ویژگی‌هایی که مطمئناً شما را شگفت‌زده خواهند کرد، شامل اندازه‌های مختلف صفحه نمایش، پردازنده‌ها، گزینه‌های حافظه و فضای ذخیره‌سازی گنجانده‌ایم. علاوه بر این، این لپ‌تاپ‌ها دارای سطوح امنیتی مختلف، گزینه‌های قفل والدین و وضوح نمایشگر هستند.
  • مورد استفاده: در ZDNET موارد استفاده متفاوتی را نیز در نظر گرفته ایم. به عنوان مثال، ممکن است به دنبال یک لپ‌تاپ اولیه مقرون‌به‌صرفه برای یک کودک باشید، یا ممکن است به یک لپ‌تاپ قابل ارتقا و مناسب برای کار نیاز داشته باشید. یا ممکن است به دنبال یک دستگاه بازی باشید.بنابراین ما مجموعه ای از توصیه ها را بر اساس اهداف مختلف گردآوری کرده ایم.

منبع: https://www.zdnet.com/article/laptop-deals/#ftag=RSSbaffb68

The top 9 mobile security threats and how you can avoid them

Hand holding hacked phone

Tero Vesalainen/Getty Images

Today’s smartphones hold all the keys to our communications, finances, data, and social lives, which makes these ubiquitous devices lucrative targets for cybercriminals.   

Whatever smartphone you use — whether it’s an Android device from Google, Samsung, or Motorola, or an Apple iOS-based iPhone — threat actors are ever busy evolving their tactics to break into these handsets. 

There are billions of smartphone users worldwide, and none of them can completely avoid cyberattacks. Spam, phishing, malicious apps, and ransomware are only some of the threats that mobile device users face today — and the attack techniques get more sophisticated every year. 

To stay protected, we need to understand and recognize the most common threats to smartphone security in 2023. This is our guide to what those threats are, the best defenses for avoiding those threats, and what to do if you suspect your device has been compromised. 

Here they are: the top threats to Android and iOS smartphone security in 2023.

1. Phishing, smishing, and vishing

Phishing occurs when attackers send you fake and fraudulent messages. Cybercriminals attempt to lure you into sharing personal information, clicking malicious links, downloading and unwittingly executing malware on your device, or handing over your account details — for a bank, shopping site, social network, email, and more. 

Phishing also can be used to install malware or surveillance software on your handset. 

Also: What is phishing? Everything you need to know

Mobile devices are vulnerable to phishing through all the same avenues that PCs are — including email and social network messages. However, mobile devices are also vulnerable to smishing, which are phishing attempts sent over SMS texts.

Spear phishing is a step up in the cybercriminal game, with attackers conducting surveillance first to gather information on their intended victim. Typically, spear phishing — aka targeted pishing —  occurs against high-value individuals, and the motives can be financial or political gain. 

Vishing — that’s short for voice phishing — is another attack vector gaining in popularity. Attackers employing this method will use voice services to try and defraud their victim. This can include leaving voicemails, using automated robocalls, voice-altering systems, and more to trick individuals into providing sensitive information. 

Your best defense: Don’t click on links in emails or text messages unless you are completely sure they are legitimate. Be wary of unexpected calls or voicemails, and treat them as suspicious unless proven otherwise. 

2. Physical security 

Many of us forget an essential security measure: physically securing our mobile devices. If you don’t use a PIN code, pattern, or biometric check such as a fingerprint or retina scan, your handset could be vulnerable to tampering. In addition, if you leave your phone unattended, it may be at risk of theft. 

Your best defense: At a minimum, lock down your phone with a strong password or PIN number; that way, if it ends up in the wrong hands, your data and accounts can’t be accessed. 

You also should consider enabling security features provided by Apple and Google to help you recover your device in theft cases. Apple’s Find My service tracks down devices including iPhones, iPads, and AirPods, whereas Google can also track your smartphone and tablet.

3. SIM hijacking 

SIM hijacking, also known as SIM swapping or SIM porting, is the abuse of a legitimate service offered by telecom firms when customers need to switch their SIM and telephone numbers between operators or handsets. 

Also: Here’s how I survived a SIM swap attack after T-Mobile failed me – twice

Typically, a customer will call their telecom provider, prove their identity as an account holder, and then request a switch. An attacker, however, will use social engineering and the personal details they discover about you — including your name, physical address, and contact details — to assume your identity, instead, and dupe customer service representatives into giving them control of your number. 

In successful attacks, a cybercriminal can redirect your phone calls and texts to a handset they own. Importantly, this also means any two-factor authentication (2FA) codes used to protect your email, social media, and banking accounts, among others, will also end up in their hands. 

SIM hijacking is often a targeted attack as it takes data collection and physical effort to pull off. However, when successful, such an attack can be disastrous for your privacy and the security of your online accounts. 

Your best defense: Protect your data through an array of cybersecurity best practices so that it can’t be used against you via social engineering. Try not to overshare online. Consider asking your telecom provider to add a “Do not port” note to your file (unless you visit in person), especially if you know your information has been leaked due to a data breach. You can use Have I Been Pwned to check on the current status of possible breaches. 

4. Apps: Nuisanceware, premium service dialers, and cryptocurrency miners

Your mobile device is also at risk of nuisanceware and malicious software that will force the device to either make calls or send messages to premium numbers without your consent. 

Nuisanceware is malware found in apps (more commonly in the Android ecosystem than iOS) that makes your handset behave in annoying ways. Nuisanceware is not typically dangerous, but can still be very irritating and a drain on your power. You may be bombarded with pop-up ads, for example, or be shown promotions and survey requests. In addition, nuisanceware can launch ad-laden web pages and videos in your mobile browser. 

Also: This sneaky malware hides on your PC for a month before going to work

Nuisanceware is often developed to generate income for its makers fraudulently, such as through clicks and ad impressions.

Premium service dialers, however, are worse. 

Apps can contain malicious, hidden functions that will covertly sign you up for paid, premium services. Texts can be sent and calls to premium numbers made, with victims required to pay for these services — and attackers pocketing the cash.

Some apps can also quietly steal your device’s computing resources to mine for cryptocurrency. These apps sometimes slip through an app store’s security net and, in the past, have been found in official app repositories including Google Play. The problem is that cryptocurrency mining code can be found in seemingly legitimate apps such as mobile VPNs, games, and streaming software. 

Your best defense: Only download apps from legitimate app stores. Be careful and don’t just gloss over the permissions requested by new mobile apps. If you encounter overheating and battery drain after downloading new software, this could be a sign of malicious activity — so you should run an antivirus scan and consider uninstalling suspicious apps.

5. Open Wi-Fi 

Open and unsecured Wi-Fi hotspots are everywhere, from hotel rooms to coffee shops. They are intended to be a customer service, but their open nature also opens them up to attack.

Specifically, your handset or PC could become susceptible to Man-in-The-Middle (MiTM) attacks through open Wi-Fi connections. An attacker will intercept the communication flow between your handset and browser, stealing your information, pushing malware payloads, and potentially allowing your device to be hijacked.

Every so often, you also can encounter “honeypot” Wi-Fi hotspots. These are open Wi-Fi hotspots created by cybercriminals, disguised as legitimate and free spots, for the sole purpose of performing MiTM attacks. 

Your best defense: Avoid using public Wi-Fi altogether and use mobile networks instead. If you must connect to them, consider using a virtual private network (VPN). If you are using sensitive services, such as a banking app, always switch over to a cellular connection for added security. 

6. Surveillance, spying, and stalkerware

Surveillanceware, spyware, and stalkerware come in various forms. Spyware is often generic and will be used by cyberattackers to steal personally identifiable information and financial details. 

However, surveillanceware and stalkerware are typically more personal and targeted. For example, in the case of domestic abuse, a partner (or ex-partner) may install surveillance software on your phone to keep track of your contacts, phone calls, and GPS location.

Sometimes, apps marketed as parental control software or employee monitoring solutions can be abused to invade your privacy. 

Also: How to find and remove spyware from your phone

Symptoms of infection may include higher-than-normal power usage and the presence of unfamiliar apps. On Android devices, you may notice that the setting, “allow/install unknown apps” has been enabled. You should also watch out for unexpected behavior and increased mobile data usage. 

Your best defense: An antivirus scan should take care of generic spyware. While there’s no magic bullet for surveillanceware or stalkerware, you should watch out for any suspicious or unusual behavior on your device. If you think you are being monitored, put your physical safety above all else. 

7. Ransomware 

Ransomware can impact mobile devices as well as PCs. Ransomware will encrypt files and directories, locking you out of your phone, and will demand payment in cryptocurrency in return for a decryption key. 

Examples of ransomware detected over the last few years include Cryptolocker, WannaCry, BadRabbit, and Ruk.  

Also: What is ransomware? Everything you need to know

Ransomware is often found in third-party apps or deployed as a payload on malicious websites. For example, you may see a pop-up request to download an app — disguised as anything from a software ، to a betting app — and your handset can then be encrypted in minutes. However, ransomware is less common on mobile platforms than on PCs. 

Alternatively, if cyberattacks can steal your Google or Apple ID credentials, they may abuse remote locking features and demand payment. 

Your best defense: Keep your phone up-to-date with the latest firmware, and your Android or iOS handset’s fundamental security protections enabled. Don’t download apps from sources outside official repositories and run frequent antivirus scans. If you encounter ransomware, you might need to restore your phone from a backup or bring it back to factory settings.

8. Trojans and financial malware

There are countless mobile malware variants, but Google and Apple’s fundamental protections stop many in their tracks. However, of all the malware families you should be familiar with, trojans top the list. 

Trojans are forms of malware that are developed specifically with data theft and financial gains in mind. Mobile variants include Zeus, TickBot, EventBot, MaliBot, and Drinik.

Most of the time, users download the malware themselves, which may be packaged up as an innocent and legitimate app or service. However, once they have landed on your handset they overlay legitimate banking app windows and steal the credentials you submit, such as a password or PIN code. 

Also: A simple idea that could make Android more secure

This information is then sent to an attacker and can be used to pillage your bank account. Some variants may also intercept 2FA verification codes sent to your mobile device.

The majority of financial trojans target Android handsets. iOS variants are rarer, but strains still exist.

Your best defense: Keep your phone up-to-date with the latest firmware and enable your Android or iOS handset’s fundamental security protections. Ensure you only download apps from sources outside official repositories. If you suspect your phone has been compromised, stop using financial apps, cut off your internet connection, and run an antivirus scan. You may also wish to contact your bank and check your credit report if you suspect fraudulent transactions have been made. 

9. Mobile device management exploits

Mobile Device Management (MDM) solutions are enterprise-grade tools suited for the workforce. MDM features can include secure channels for employees to access corporate resources and software, spreading a company’s network security solutions and scans to each endpoint device, and blocking malicious links and websites. 

However, if the central MDM solution is infiltrated or otherwise compromised, each mobile endpoint device is also at risk of data left, surveillance, or hijacking.

Your best defense: The nature of MDM solutions takes control out of the hands of end users. Therefore, you can’t protect against MDM compromise. What you can do, however, is maintain basic security hygiene on your device, make sure it is up-to-date, and keep your personal apps and information off your work devices.  

Your lock screen is the gateway to your device, data, photos, private documents, and apps. As such, keeping it secure is paramount. 

On Android, consider these settings:

  • Screen lock type: Swipe, pattern, PIN, password, and biometric checks using fingerprints or your face.
  • Smart lock: Keeps your phone unlocked when it is with you, and you can decide what situations are considered safe.
  • Auto factory resets: Automatically wipes your phone after 15 incorrect attempts to unlock.
  • Notifications: Select what notifications show up and what content is displayed, even when your phone is locked.
  • Find My Device: Find, lock, or erase your lost device.

On iOS devices, look for these settings:

  • Passcode: Set a passcode to unlock your device.
  • Face ID or Touch ID: Biometrics can be used to unlock your device, use apps, and make payments.
  • Find my iPhone: Find, track, and — if necessary — lock your lost iPhone.
  • Lockdown Mode: Dubbed “extreme” protection for a small pool of users considered most at risk of targeted attacks, this feature provides additional security for malicious links, content, and connections. You can enable Lockdown Mode in iOS 16 or later.

If you notice your Android or iOS device is not behaving normally, you may have been infected by malware or be otherwise compromised. 

Here are things to watch out for:

  • Battery life drain: Batteries degrade over time, especially if you don’t let your handset run flat every so often or you are constantly running high-power mobile apps. However, if your handset is suddenly hot and losing power exceptionally quickly, this could signify malicious apps and software burning up your resources. 
  • Unexpected behavior: If your smartphone behaves differently and you’ve recently installed new apps or services, this could indicate that all is not well. 
  • Unknown apps: Software that suddenly appears on your device, especially if you have allowed the installation of apps from unidentified developers or have a jailbroken smartphone, could be malware or surveillance apps that have been installed without your knowledge or consent. 
  • Browser changes: Browser hijacking, changes to a different search engine, web page pop-ups, and ending up on pages you didn’t mean to could all be a sign of malicious software tampering with your device and data.
  • Unexpected bills: Premium number scams and services are operated by threat actors to generate fraudulent income. If you have unexpected charges, calls, or texts to premium numbers, this could mean you are a victim of these threats. 
  • Service disruption: SIM hijacking is a severe threat. This is normally a targeted attack with a particular goal, such as stealing your cryptocurrency or accessing your online bank account. The first sign of attack is that your phone service suddenly cuts off, which indicates your telephone number has been transferred elsewhere. A lack of signal, no ability to call, or a warning that you are limited to emergency calls only can indicate a SIM swap has taken place. Furthermore, you may see account reset notifications on email or alerts that a new device has been added to your existing services.

On occasion, enterprise and government-grade malware hit the headlines. Known variants include Pegasus and Hermit, used by law enforcement and governments to spy on everyone from journalists to lawyers and activists. 

In June 2022, Google Threat Analysis Group researchers warned that Hermit, a sophisticated form of iOS and Android spyware, was exploiting zero-day vulnerabilities and was now in active circulation. US government employees abroad have been targeted with government-grade mobile malware.

The malware tries to root devices and capture every detail of a victim’s digital life, including their calls, messages, logs, photos, and GPS location. 

However, the likelihood of you being targeted by these expensive, paid-for malware packages is low unless you are a high-profile individual of interest to a government or other organization that’s willing to go to these lengths. You are far more likely to be targeted by phishing, generic malware, or, unfortunately, friends and family members using stalkerware against you.

If you suspect your Android or IOS device has been infected with malware or otherwise compromised, you should take urgent action to protect your privacy and security. Consider these steps below:

  • Run a malware scan: You should ensure your handset is up-to-date with the latest operating system and firmware, as updates usually include patches for security vulnerabilities that can be exploited in attacks or malware distribution. Google and Apple offer security protection for users, but it wouldn’t hurt to download a dedicated antivirus app. Options include Avast, Bitdefender, and Norton. Even if you stick to the free versions of these apps, it’s better than nothing. 
  • Delete suspicious apps: Deleting strange apps isn’t foolproof, but any apps you don’t recognize or use should be removed. In the cases of nuisanceware, for example, deleting the app can be enough to restore your handset to normal. You should also avoid downloading apps from third-party developers outside of Google Play and the Apple Store that you do not trust.
  • Revisit permissions: From time to time, you should check the permission levels of apps on your mobile device. If they appear to be far too extensive for the app’s functions or utilities, consider revoking them or deleting the app entirely. Keep in mind that some developers, especially in the Android ecosystem, will offer helpful utilities and apps in Google Play only to turn them malicious down the line.
  • In other words, legitimate apps don’t always stay that way, and these changes can come out of the blue. For example, in 2021, a popular barcode scanner developer pushed out a malicious update and hijacked millions of devices in one ،. 

  • Tighten up communication channels: You should never use open, public Wi-Fi networks unless it is essential. Instead, stick to mobile networks; if you don’t need them, turn off Bluetooth, GPS, and any other features that could broadcast your data. 
  • Premium service dialers: If you’ve had unexpected bills, go through your apps and delete anything suspicious. You can also call your telecom provider and ask them to block premium numbers and SMS messages. 
  • Ransomware: There are several options if you have unfortunately become the victim of mobile ransomware and cannot access your device. 
    If you were alerted to the ransomware before your device is encrypted and a ransom note is displayed, cut off the internet and any other connections — including any wired links to other devices — and boot up your smartphone in Safe Mode. You might be able to delete the offending app, run an antivirus scan, and clean up before any significant damage occurs. 
    However, if your handset is locked, your next steps are more limited, as removing the malware only deals with part of the problem. 
    If you know what ransomware variant is on your handset, you can try using a decryption tool such as those listed by the No More Ransom project. You can also provide information to Crypto Sheriff, and researchers will try to find out what type of malware you’re dealing with for free. 
    In the worst-case scenario, you might need to perform a factory reset. Removing ransomware stops it from spreading further but will not restore files that have been encrypted. You can restore your device following a reset if you’ve consistently backed up your data. 
    Remember, paying a ransom does not guarantee that your phone will be unlocked or your files will be decrypted. 
  • Stalkerware, surveillanceware: When you know or suspect you’ve been targeted by stalkerware or surveillanceware, this can be extremely difficult to handle. If it’s the case that basic, generic spyware has landed on your device, Google, Apple, or a dedicated antivirus app should pick this up for you and remove it. 
    However, suppose a partner or other close contact is monitoring you, and you try to remove a stalkerware app from your phone. In that case, they will be alerted directly, or they will become aware because they are no longer receiving your information. 
    You shouldn’t try to remove these apps if this risks your physical safety. Indeed, some commercially available forms of spyware damage a handset so severely that the operator can remotely reinstall them, anyway, and the only real option is to throw the device away (or keep it for law enforcement purposes). 
    Reach out to an organization that can help you, consider using a burner phone, and keep yourself as physically safe as possible. 
  • SIM hijacking: If you suspect you have been SIM-swapped, you have a very short window for damage control. The first thing you should do is call your telecom provider and try to have your service restored as quickly as possible — but as we all know, you can be left on hold for an infuriatingly long time. If you can, go and visit your carrier in person, in-store. 
    No one is exempt from the risk of SIM swaps, customer service representatives may not have been trained to recognize SIM hijacking, and cybercriminals may have enough of your personal information to pass as you without challenge. 
    To mitigate the risk in the first place, consider linking your crucial ‘hub’ accounts, financial services, and cryptocurrency wallets to a number that isn’t publicly connected to you. A simple pay-as-you-go number will do, and so if your personal or work numbers are compromised, the potential opportunities for theft are limited. 

منبع: https://www.zdnet.com/article/the-top-9-mobile-security-threats-and-how-you-can-avoid-them/#ftag=RSSbaffb68