How do hackers steal money through a smartphone? Can a robot vacuum cleaner be hacked? 16 popular questions for a computer security expert
Miscellaneous / / April 08, 2021
Alexey Fedorov
Head of Avast Representative Office in Russia and the CIS.
1. Many users believe that antivirus software is no longer needed in 2021. On the one hand, we have become skilled enough to recognize threats. On the other hand, if hackers want to steal our data, the antivirus will not stop them. And Windows even has a built-in security solution. As a result, do we need antiviruses now?
People often think that hackers are young hooligans who infect computers for the hype. But ehThose times are already in the distant past. Cybercrime — this is a big criminal business. Attackers have become much more creative in their attempts to steal users' money and personal data. Many attacks are carried out through spyware on computers and smartphones, so only antivirus can save your data.
Windows built-in security does a pretty good job of dealing with major threats. But third-party antiviruses offer comprehensive protection. For example, in addition to blocking all types of cyber threats, antivirus
Avast Premium Security able to save you from going over to fake websites, ensure the security of passwords stored in the browser and the operation of the webcam, as well as save your personal files from ransomware and spyware. Antivirus has a permanent data destruction function and a sandbox mode that allows you to safely open suspicious files in an isolated environment. Also Avast Premium Security scans your Wi-Fi network for vulnerabilities and rogue devices.If there was only one security solution or antivirus in the world, attackers would sooner or later find a way to bypass it. The more security we have, the more difficult it is for cybercriminals to deal with them.
2. What about macOS? Most virus infections seem to occur on Windows. Is it possible to live with Apple technology without antiviruses?
No. Any computer can get infected with malware. Moreover, each of us can be targeted for online scams and ransomware attacks - no matter which device we use. Users are threatened by phishing and malware-infected sites, as well as vulnerable Wi-Fi networks.
3. Chrome, Firefox, Edge and others browsers warn when we try to open a hacked, phishing or untrustworthy site. Why, then, is additional internet protection needed?
Browsers use special filters to protect the device. When you visit a site, the browser checks it against a list of permissions before loading it, which contains thousands of pages that have already been reviewed and approved. Any resource that is not in this list of permissions is subject to rigorous analysis using Google's automated tools. If the site does not pass verification, then you will not be able to open it. But this method needs constant updating and monitoring: when a new malicious or phishing site appears on the Internet, the list of permissions will not block it. That is why it is worthwhile to additionally secure yourself with an antivirus.
Those who are especially concerned about their security and privacy can opt for specialized browsers, for example Avast Secure Browser. He provides a secure browsing experience and protects the online shopping process.
4. Can hackers really eavesdrop on us and spy on us through a computer? Should you glue cameras on your laptop and smartphone?
Cybercriminals can use viruses and special programs to gain access to your laptop's camera. Simple ways to get infected are by following links from questionable emails or downloading content from an unreliable source (including Trojans are purchased that disguise themselves as official programs), use outdated software or use the services of a third-party service support.
To stay safe:
- Check all active cameras. It is important to know how many of them are online. We usually remember about cameras on laptops and smartphones, but forget about game consoles, smart TVs, baby monitors. They are also worth checking out.
- Use strong passwords. This rule is ignored by most users. Never leave the default password. Change it to complex: more than 15 characters, consists of numbers, uppercase and lowercase letters.
- Update your software regularly. Developers often release new versions and updates for programs. They must be installed immediately. This will help you automatic software update function in Avast Premium Security, which will remind which programs have the latest versions.
- Make sure your router is secure. Antivirus Avast will check your home network to prevent attacks on your device.
- Don't click on suspicious links. Think before opening a letter from an unknown sender: errors, requests to urgently transfer money, a strange address - all this should alert you.
- Use a separate network for IoT devices. If other gadgets, such as a laptop, are hacked, do not use the network to which it is connected.
Install a reliable antivirus
5. It happens that you talk next to a switched on laptop, for example, about a new food for cats, and after 5-10 minutes the search engine and social networks are actively showing advertisements for such products. Are we still being bugged?
Stories like these are very popular, although experts have not found any convincing evidence that corporations are eavesdropping on conversations through devices. The rumors spawned by such frightening coincidences once again show how far the technology of creating targeted advertising has come.
Targeting platforms receive information from a variety of sources - often in real time. This is why it sometimes seems like advertisers are eavesdropping on us. They collect information from communication programs, track user activity on the platform, and track advertisements and cookies from third-party resources. All of these sources are legitimate and require at least the indirect consent of users to transfer data. To leave less information about yourself, use a browser that blocks cookies.
Any site we visit, search query and like are analyzed using Big Data technology, to give companies like Google or Facebook more accurate information about our interests and preferences. The results of these evaluations are then used to tailor the ad. Some companies may even get ahead of your immediate circle: there was a story in the United States of how a major brand found out about a teenage girl's pregnancy earlier than her own father.
So yes, companies collect data about us in order to use it for advertising purposes or to improve their services. But this happens with our consent to the terms of use. From a legal point of view, there is little that can be done about this. Adjust your privacy settings to minimize the amount of information you transmit. Revoke unnecessary app permissions, disable location tracking. If you want to get rid of annoying or unnecessary content, you can cheat the algorithms, clicking likes and browsing pages that don't interest you.
6. In 2017, suspicious mailbox attachments sparked a whole Petya / NotPetya virus outbreak. How to protect yourself from such threats?
Petya is one of the ransomware programs. Usually such viruses try to get to your personal files (documents or photos), but Petya locks the entire hard drive. It encrypts the files your computer needs to work until you pay.
NotPetya works in a similar way, but unlike its decryptable predecessor, it encrypts every computer it comes into contact with. It is impossible to fix this even if the ransom is paid.
To catch such a virus is very unpleasant. Sometimes it cannot be fixed and only buying a new hard drive will help. To protect you need:
- Limit the list of programs with administrator rights. Never grant such rights to a program if you are not sure that it is legal.
- Be skeptical about emails. If you don't download the attachment or click the link in the suspicious email, the ransomware won't be able to get to your device.
- Update software regularly. Malicious software exploits software vulnerabilities that companies fix in fresh versions. Install patches and updates as soon as they appear.
- Use antivirus software. They will detect and block malware.
- Ignore online ads. Malicious ads, especially pop-ups, are a common source of infection.
- Make regular backups. This will minimize your future losses. Cloud services and physical disks are great backup options, so use them as often as possible.
Those who use the latest versions of antivirus Avastare protected from Petya ransomware. If your computer is infected with Petya, the antivirus will detect it, quarantine it and destroy it. And ransomware protection adds an extra layer of security by keeping selected files and folders safe from unauthorized access.
Protect your computer
7. Is it possible to steal data from a banking application on a smartphone using malware and / or following a malicious link?
Such programs exist. As a rule, these are banking Trojans - they disguise themselves as legitimate applications in order to gain access to the details of your card or account. After receiving the necessary login information, the virus can share this information with malware developers, which will allow them to use your money.
To protect your bank card from cybercriminals:
- Download banking apps only from official sources. Better if they are from the list recommended by the bank.
- Do not use rooted smartphones.
- Do not share your personal data with anyone - whether by phone, in person, via email or social media.
- Track accounts in banking apps. Check your account regularly for strange payments and report suspicious activity as soon as you notice it.
- Do not connect to free Wi-Fi hotspots. Attackers can create a fake network or access unprotected Wi-Fi space and steal your data.
- Beware of phishing attempts. Do not follow the links in emails, otherwise you risk infecting your device with malware or voluntarily giving your card number to a scammer. Instead, enter the URL and open the site directly from your browser.
8. Malware is regularly found in official app stores, and hundreds of users manage to download infected versions before Google, Apple or another company removes them. Will antivirus help in such a situation?
You can protect yourself from this. For example, Avast Premium Security for android can detect malicious applications and potentially unwanted programs. Our researchers have repeatedly found banking TrojansEvolved banking Trojan Ursnif attacks users, advertisingHiddenAds ad trojan detected in 47 games on Google Play Store and even spywareAnalyzing parent-targeted spyware Software in the Google Play store. They also found fleecewareHow rogue iOS and Android apps made $ 400 million (applications with a free trial and automatic subscription at an extremely overpriced price) in Google Play and App Store. In such cases, we report them to Google and Apple, which usually remove them from the store immediately.
For protection before downloading the app:
- Checkif there are any typos in the title and description of the application.
- Read the reviews. If they look too good (not a single bad word, only high marks), then this should be alarming. Also copy the name and add the words “review” or “scam” to it in the search engine - you can find out a lot of interesting things.
- Check your download statistics. If a popular app has almost no downloads, then it might be fake.
- Look at the permissions. Before installing, click "View details" in the application permissions section to find out which sections and data on your device the application requires access to. Be wary if an app asks for information that it doesn't need to work (for example, a flashlight app pretends toFlashlight apps from Google Play abuse data access for access to geolocation, and a new game - to contacts).
- Learn more about the developer. If he only released one app, you might be better off looking for another option.
9. With the growing popularity of bitcoins, miners have become more active, including those who mine coins on the computers of ordinary users. Do antiviruses protect against such unforeseen mining?
Yes, we protect users from fraudulent cryptocurrency mining programs. There is cryptomining malware that infects your computer. We also saw virus programs embedded in the code of the page in the browser in the form of mining scripts: if you go there, the script will start using the computing power of the victim's device.
The main consequences of such attacks are a decrease in the productivity and efficiency of equipment, as well as an overall reduction in the life of computers, smartphones and smart TVs.
10. It seems that virus writers are always one step ahead of antivirus developers. How does your software help prevent threats you don't already know about?
Have Avast there is a dedicated team of engineers, cybersecurity experts, and malware analysts. These people are constantly researching and uncovering the tactics, methods and schemes of the attackers. The CyberCapture function built into our antiviruses, with the user's permission, sends suspicious files to Avast to investigate a potential threat, and a behavioral analysis tool helps you find hidden malicious code in a seemingly safe program.
Avast also applies next-generation technologies to combat cyberattacks in real time. The cloud-based machine learning engine is constantly receiving a stream of data from hundreds of millions of our users. This makes our artificial intelligence smarter and faster.
11. Do I need to install an antivirus on my child's device or are there enough parental control services?
Parental control solutions mainly focus on restricting children's access to certain content or controlling the amount of time they spend on the Internet. They do not protect against viruses, so it is better to additionally install an antivirus on the child's device.
12. Is it possible to determine without an antivirus that something is wrong with a computer or smartphone? For example, if it suddenly began to slow down, is it necessary to immediately buy an antivirus, or can the problem be solved differently?
It is often difficult to understand that a computer is infected with something. Sometimes you can immediately suspect something is wrong: the battery is quickly discharged, the case of the device heats up very much, programs open on their own, a lot of annoying ads appear. In this case, the problem cannot be solved by yourself - you need to install an antivirus, and in difficult cases contact a specialist.
13. I have a smart device: I connected it to my home Wi-Fi and synced it with my smartphone. Can I be hurt in some way by this? Are intruders able to reach me, for example, through a robot vacuum cleaner?
It depends on how well you protect this smart device. To mitigate the risks, change the default password and use the latest software from a reputable vendor.
Do not forget about the router: you also need to change the password and install updates on it. Your home is protected only as much as its most important point is protected.
By hacking into your home network, attackers can gain access to personal information, your security system data, and shopping information. You may even be monitored through a baby monitor. The worst part is that it is almost impossible to immediately know about a hack. Hackers can watch your life for a long time without revealing themselves.
14. Sometimes messengers receive letters from unknown senders, and it seems that something is wrong with them. Looks like phishing. Can antivirus recognize it in messengers and SMS?
PhishingAlmost half of Russians have faced phishing attacks - a common type of fraud. Its purpose is to "extract" the victim's confidential data. You receive emails or SMS on behalf of popular brands, private messages from various services (banks, applications, social networks).
Typically, in phishing emails, scammers scare the user or promise implausible discounts, often focusing on time limits to unsettle the victim. When you click on the links from such messages, you risk getting to a fake site, similar to the authorization page on the service. If an inattentive user enters his login details on a phishing resource, they will end up in the hands of cybercriminals. Antiviruses such as Avast Premium Security, detect and block such URLs even in instant messengers.
15. I received a letter stating that the intruders have my photos and correspondence and, if the ransom is not paid, all my friends will see them. It seems to me that this is true, because the letter contains my real password. What to do in such a situation?
In most cases, this is a deception and, withmost likely, the attackers do not have your data. They usually follow the same method: they send out emails in bulk claiming they have private messages, photographs or recordings of the user during intimate moments, and threaten to post them if the victim does not pay a certain the amount.
Keep calm and just ignore such emails. The attacker uses social engineering techniques to scare you and make you pay. Sometimes, for credibility of threats, scammers can mention your old data: databases with email addresses and passwords from time to time leaked from compromised services and then sold on specialized forums. In this case, be sure to change the current password to a more complex one.
16. I have nothing to hide and I am unpopular. Why would anyone hack me?
Scammers usually do not engage in pinpoint attacks, but hack users en masse.
For example, you could enter your username and password on a fake site, or a virus stole them. Then such accounts are sold on the darknet. They can be used, for example, to deceive friends. You probably received messages asking you to lend money, which turned out to be the tricks of the burglars. You can be stolen from the bank details that you sent to your mom in the messenger. Or intercept a personal photo and start blackmailing you. Therefore, it is advisable to think about defense in advance and always be ready for an attack.
It is difficult to keep all the recommendations in mind, so it is better to use additional protection. Antivirus is a simple and effective way to avoid the dangers that lie in wait for us on the Web, and to protect personal data and money. Avast Premium Security helps protect all your devices: it's available for Windows, macOS and Android.
Download Free Trial
Cover: Vektorium / Freepik / Marynchenko / Oleksandr / Shutterstock / FOTOSPLASH / Lifehacker