Showing posts with label Did You Know?. Show all posts
Showing posts with label Did You Know?. Show all posts

Thursday, September 20, 2018

New Threat: Samsung Galaxy Note 9 Explodes In A Woman's Purse

New Threat: Samsung Galaxy Note 9 Explodes In A Woman's Purse

It may interest you to know that the Galaxy Note 9 smartphone has been found to have copied the nightmare Samsung Galaxy Note 7 had in 2016.
The explosive incident of Samsung’s recent Note model is still on the go! Sad as it may seem.


Samsung is being sued by a woman who reported an explosion of her Galaxy Note 9 smartphone

Recently, an American Galaxy Note 9 user reported that the phone exploded inside her purse. Reporting from New York Post, Diane Chung sued Samsung regarding the disgraceful explosion of her Samsung Galaxy Note right inside her purse. She filled a lawsuit against the company and she is currently waiting for the court’s judgement.



Diane Chung explained how the incident occurred, that she was using the smartphone while in an elevator and it suddenly became hot. For safety sake she stopped using the phone and dropped it inside her purse. Not quite long, she heard a noise and found smoke escaping out of her purse, only did she realise it was her Galaxy Note 9 that got exploded and in an attempt to bring it out, her fingers got burnt.

This is not funny at all! A $1234 (£899) Galaxy Note 9 has been found to be a threat to health. And according to her, the Galaxy Note 9 only stopped burning when it was carried with a cloth and dipped into water.

What Could Be The Cause Of This Galaxy Note 9 Explosion?
If one should investigate the cause of a smartphone that got burnt, the battery would be the first suspected part.
However, Kate Beaumont, product director, had a security check on Galaxy Note 9 batteries and concluded that the batteries did not catch fire. Meaning the battery may not be the reason for Diane Chung’s Galaxy Note 9 explosion.

Meanwhile, Samsung unleashed the following statement: “ We have not received any reports of similar incidents involving a Galaxy Note 9 device and we are investigating the matter.”




Monday, September 10, 2018

How To Effectively Recognize A Phishing Attack

How To Effectively Recognize A Phishing Attack


In the technology world today, cyber fraud is the most occurring activities performed by so many people who claim to be a computer guru. It's now as if being a black hat hacker is what tells one to be a computer wizard which is absolutely wrong.




So many devices’ users have fallen victim to this cybercrime. There are many ways to which these attacks come into your devices,  but one of the methods is via Phishing.

The phishing attack is the most used method for hackers to gain access to one's social login credentials or even your bank account details.

You might have received emails from scammers containing links such that when visited, will automatically redirect you to a scam web page that looks similar to an existing popular website. For example, the redirected webpage might seem to be facebook login page, asking you to input your facebook email, or phone number or username, and password associated with your Facebook account, claiming to be partners of the Facebook team.  And immediately you input those credentials of yours, it will automatically find its way to the attacker, thereby granting the hacker access to your facebook account and might steal any relevant information found on your Facebook account. The same thing is applicable to Emails, where you will be asked to renew your email via a link that will be sent to you.



So for this, I’ve published this discussion and reading it through will help you prevent yourself from all these cyber attacks. All you have to do now is to read them carefully.

You may be wondering, what is Phishing attack?

The phishing attack is a type of cyber attack in which an attacker sends a spam link such that when visited, will open a webpage that will look the same as an existing and popular website page, it may even be social websites or any other.

Now haven known what Phishing attack really is, you now need to know how to detect their spam message whenever you see them.


How do I identify Phishing attack?

Identifying them is quite easy and needs no technical procedure. Read the methods below.

Identifying their emails:

Identifying phishing emails is very easy. At first, you will need to do the following.

» Check the source of the email, I mean their email address, their addresses are never real. Most times they use email addresses that are similar to a popular email address owned by a company ( it may be a bank, Place of work ) or a social network.

For example, you may receive an email from the email address >>>> Manager@GTbank.com or gtbank02@GTbank.com instead of gtbank@gtbank.com  which is said to be the official email address for GTbank Nigeria.  You can only identify their fake email address only if you know the actual address they tried to copy.

» Most times their messages contains forceful language which is the number two proof to detect phishing attack. These scammy and forceful languages can be seen in their emails, forcing you to input some kind of your details in relation to what they are trying to steal from you. But these forceful languages are often seen on their webpage where they redirected you to, they mostly use pop up messages forcing you to input your credentials.

So you have to be aware of this!


Recommended: How to protect your Android from hackers

Check if the email contains grammar mistakes and misspelled words.

Most of their emails contain grammatical misspelled words, though not all are perfect phishing attackers does this mistake often.




Note: You may also receive phishing link via your phone message inbox. Like the one I received some time ago, I was told that my BVN has been deactivated, and a link was provided to reactivate it and I was threatened that if it exceeds 72 hours, they will have my BVN permanently deactivated. Isn't that a scam?  Yes, it is because only the bank you are operating on has the right to send such message with no threat, and if they were to give you a link, then it should be their official website and not others.

So be aware of these tricks used by phishing attackers to keep you and your credentials protected.


Recommended: How To Secure Your PC From Hackers

Please share this with others too using the share button given below.


Friday, September 7, 2018

How To Verify Your Instagram Account (simplified steps)

How To Verify Your Instagram Account (simplified steps)


Just as Facebook and Twitter already had created an option for users to verify their profile to better help the social platform protect verified accounts against any existence of a fake account created by another user to gain popularity which may end up misleading users.
Instagram has also introduced this feature in which users will have to request verification to keep their account authenticated, and it just got much easier.




So lots of persons have been asking me about this process. Here, I’ll be discussing the process of how you can verify your Instagram account and get the blue badge attached to your profile. The procedures have been simplified below.


How To Verify Instagram Account

  • Open your Instagram account on your Android or iOS device and click on the three Vertical lines
  • Scroll down to ‘Settings’ and click on it
  • Scroll down and tap ‘Request Verification’



  • Fill every required filed correctly.
The following information is what you should drop in the required field;
Your Full Name A government ID that clearly states your Full Name and Date Of Birth.

NOTE: Government ID such as; National ID Card, International Passport, Driver’s License or any other Government ID existing in your country could be used, provided it clearly states your full name and date of birth.

  • Having filled these requirements, click on ‘Send

Your application for Instagram verification will be reviewed and you will be notified of any response Instagram should take regards your request. That is, you may get approved or be denied.

According to the official blog post, Instagram would review every verification request to check whether the profile is real and belongs to a global brand, celebrity, an entity, or a notable figure

If you happen to apply and gets disapproved, consider reapplying after 30 days (from the day you received the last notification).




Thursday, August 30, 2018

How To Secure Your Android From Hackers (Cyber Attackers)

How To Secure Your Android From Hackers (Cyber Attackers)


Top Security Tips To Secure Your Android From Cyber Attack (Hackers)

As an Android user, there are many cool kinds of stuff you could do with your Android device, meanwhile, several precautions have to be observed whenever you do what you do, this could help prevent prying eyes from seeing the contents in your Android device.
This post will teach you the essential security measures you should always practice as an Android user. Keep reading...




  • Regularly Update Your Android

Whenever your Android device receives an update, be sure to update your device. This may help fix some bugs/issues if there is any kind on your phone. Also, updating your Android may bring some new features such as improved security to keep your Android device and information protected.

  • Set Up An Antivirus Running

Antivirus/Antimalware apps/software is always ready to secure your device, you just have to download and install a strong Antivirus/Privacy Security app from a trusted source; I recommend Google Play Store.
Apps like Avast Mobile Security, Kaspersky Internet Security are very helpful when it comes to privacy protection.

If your Android device is rooted, the possibility of viruses/malware attacking your phone is on the high side. This is because rooting your Android device can automatically create flaws for attackers to pierce in. To prevent your rooted devices from hackers, a strong Antivirus needs to be installed.

  • Install Apps From Trusted Sources

Downloading and installing Apps from trusted sources like Google Play store gives a huge relief of having your device compromised by attackers. By default, Android is configured to block installation of apps from Unknown Sources. If you wish to download and install apps from sources other than Play Store, be sure you are making use of a malware-free website.



Recommended: How To Prevent Trojans From Entering Your Android Device

  • Always Use A Secure Browser To Surf The Web

There are so many Android browsers available on the web which is developed and is maintained to give users the maximum level of security and protection from malicious websites.

A perfect choice of such protective browser is Google Chrome browser

  • Read Up Permissions Before Installing An App

Many times, we download and install apps on our Android device without first getting to know what access or permissions will the device grant to that app required for executing its function.
Before Installing an app/game, make sure you read its permission(s) to conclude whether they are essential requirements for running the app or are contrary to what the app allegedly declares.

***How worthless and dangerous it would be to have an installed calculator seeking permission to access contact or even GPS***

Conclusion

There are many other tips to secure your Android phone from cyber attacks, however, the above-discussed tips are the most essential precautions you should always observe as an Android user.

Friday, August 17, 2018

How To Avoid Downloading Trojan Viruses On Your Android Device

How To Avoid Downloading Trojan Viruses On Your Android Device

What Are the Trojans?
Since the title says “how to avoid downloading of trojans on Android devices”, you should know that the so-called trojans are enemies to devices and its users.


Trojans are corrupt/unwanted/malicious files which no one would ever want to have on his/her device but still, they find their way into the device via a downloaded software or app that is affected. They are more like Viruses and when they are downloaded along with an affected file, it gives the hacker (developer of the trojan)  full access to that device which he can steal as much information found in it without encountering any security challenge.


It is best you know how these bad files can download itself into a device and some preventive measures you should practice. This post contains several ways you can avoid downloading Trojans on your Android device and stay protected.

Never Fail To Update Your Android



On any device, updates will always flow in whereby the user will decide whether to proceed with the update or ignore. Most times an update may be released to help fix existing bugs/issues affected on the smartphone and if a smartphone is suffering from a specific bug and the user failed to update the system, the bug will remain unfixed.


These new Android updates may not only fix existing bugs, they may come with enhanced security features to keep Android devices protected.
Android Security Patch Level is an example of security updates which Android releases almost on monthly basis to keep users save. Read more on Android blog

Do Not Install Apps From Unknown Sources
There are so many malicious sites on the web waiting for you to pay a visit and download from there, but Android is always ready to keep users safe from harm of which it configures Android devices by default to reject installation of apps from third-party websites other than the Google Play Store.


Most of us have long ago modified this setting to allow installation of apps from sources other than the Play Store. However, there are some cool websites where we can download awesome apps & software but we should learn to take preventive measures.

Google advises Android users should always get Apps and Games from the Play Store. But what about apps such as Fortnite For Android which cannot be found on Google Play? Then you should ensure that the site you want to get that app from is well trusted to be free from malicious contents like Trojans or malware or viruses. I recommend some APK sites like ApkPure, ApkMirror to get those apps.




Not All Free Apps & Games Are Genuine
Now, this may sound more scary and weird, should you download paid apps and games only all in the name of keeping your device(s) and personal information safe?
Not really. Some free apps and games especially modded apps (modified apps) may likely accommodate Trojans. Someone might have modified a paid app and inject trojans in it which he will disclose online for people to download for free. Be careful! Instead, download apps and games from trusted developers.

Read Up Permission Before Installing An App
While trying to install an app we most times skip to read what permissions that app is requiring from the device and we continue with the installation progress probably because we are eager to make use of the app. Don't be too quick to install and use an app, take just little of your time to read what kind of information or permission your device will grant to it if it is installed.
If at the end you conclude that the kind of permission it seeks is what normally should be required for such an app to run on your device, then proceed with the installation.

But what if you download a Recorder app and instead of requesting permissions to access just your Microphone & Storage, it further requests let's say internet access & Location; What for?

Get An Anti-Virus / Anti-Malware App
This is one essential type of apps every Android devices should have. It is best you keep your personal information undisclosed to spies and you may need an assistant to help you with the task, such assistant is an anti-virus or anti-malware app. I will always recommend Avast Mobile Security; it is the perfect app for this job.
An alternative Mobile Security app is Kaspersky Internet Security

You now know what Trojans means and what they do. Be sure to implement the above instructions on the daily use of your Android device, do not forget that your Android device and your personal information needs protection.

Thanks for reading my article.
Be sure to visit this blog every day because we post new Tech update (not excluding Android tips) on daily basis. Thanks again.