AUGUST 23, 2013
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Phishing Attack Targets Chase Customers

Security for Home Users
How to Protect Your Mobile Privacy

Security for Business
Human Factor, the Routine Threat Vector?



Security for Home Users

How to Protect Your Mobile Privacy

Mobile threats want just one thing—your personal information. They can use it to infiltrate your bank account, steal your identity, or use it for trade as currency.”



Mobile threats want just one thing—your personal information. They can use it to infiltrate your bank account, steal your identity, or use it for trade as currency. Thankfully, there are ways to avoid becoming their victim.

Site and App Security

  • Bookmark trusted sites. This decreases your chances of typing wrong URLs that can lead to malicious sites.
  • Don’t overshare. Social networking may be fun but never reveal too much, especially private information like your address and phone number.
  • Secure your browser. Enable your browser’s “do not track” settings or use private browsing when available. Regularly clear your cache as well, preferably after every browsing session.
  • Only use official apps. If a shopping or banking site has an app, use that instead of going to its site. This makes transactions much more secure. Make sure though that the app you downloaded is legitimate.
  • Only download from first-party sources. Data-stealing mobile malware spoof popular apps. Always directly download from first-party sources so you can avoid them.
  • Check app permissions. Malicious apps always ask for more than they need. Don’t install apps if you’re doubtful about the permissions they require.

Networking and Communication Security

  • Avoid connecting to public or insufficiently secured hot spots. This way, you can prevent sniffer apps from tracking your network activity.
  • Disable Bluetooth® or NFC when not needed. This increases your battery life and protects your device from infiltration through these methods.
  • Never entertain unfamiliar correspondence. This includes calls and messages from unfamiliar sources. They could be a means of entry for scams and identity theft.

Device Security

  • Enable your device’s built-in security features. Before using your device to access the Internet, check its manual for instructions.
  • Look into device loss contingencies. A lost device puts your data at risk. Look for apps that can remotely wipe the data in your device should you lose it or allow you to pinpoint where your lost device is.

These tips, along with using a robust mobile security solution, can prevent you from becoming a cybercrime victim.

Copyright ©2013 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: