Smartphone shoppers: watch for online tricks

Nov 21, 2012
People crowd the aisles inside a Macy's department store after the midnight opening on "Black Friday" in 2011. Attention smartphone shoppers: watch for cybercriminals using phony apps or messages in an effort to hijack your device or steal your data.

Attention smartphone shoppers: watch for cybercriminals using phony apps or messages in an effort to hijack your device or steal your data.

Law enforcement and security experts say that as more people use their mobile devices in stores and on open Wi-Fi networks, the risks are increasing as well.

The FBI-backed is warning consumers to be on the lookout for fraudulent apps, messages and Wi-Fi networks which can trick users of mobile devices to divulge passwords, personal data or .

"Many times, e-mails, texts or phone calls will look or sound like they are coming from a well-known retailer, stating a need to 'verify' the full credit card number you used for a purchase or ask you to click a link to update personal account information," the center said.

The center said Android devices are often targeted by spyware, including one system called FinFisher, capable of taking a mobile device, or Loozfon, "an information-stealing piece of malware."

Security firm McAfee's Gary Davis said that as the popularity of apps surges, "so have the chances that you could download a malicious application designed to steal your information or even send out premium-rate text messages without your knowledge."

Davis said some are using Twitter ads offering special discounts for popular gifts, linking to .

"Criminals are getting savvier with authentic-looking and deals that take consumers to legitimate looking websites," Davis said.

"In order to take advantage of the deals or contests, they ask them for personal information that can obtain a shopper's credit card number, email address, phone number or home address."

Lookout, a offering free apps for Android and , also urges prudence.

"Be careful what you do on public Wi-Fi networks especially when you're shopping. Do not expose passwords, account numbers or credit card information unless you are certain that you are on a secure connection," a company statement said.

"Use discretion when downloading apps. Even the most innocent-looking shopping app can contain software designed to steal personal data, make fraudulent charges or even hijack your phone. Only download apps from sites you trust."

Explore further: Facebook's Internet.org expands in Zambia

add to favorites email to friend print save as pdf

Related Stories

Google puts malware scanner in Google Play pipeline

Oct 16, 2012

(Phys.org)—A new version of the Google Play app store will enable scanning users' smartphones for malware, according to Android Police. The site's report, headlined "A Built-In Malware Scanner," said, ...

Beware of highway robbers on Wi-Fi

Oct 12, 2009

As the number of Wi-Fi hot spots grows, travelers might want to heed a word of caution from the Wi-Fi Alliance, a nonprofit industry group that promotes Wi-Fi technology: Think security.

Staggering surge in Android gadget viruses: Juniper

Nov 16, 2011

The arsenal of malicious code aimed at Android-powered gadgets has grown exponentially, with criminals hiding viruses in applications people download to devices, according to Juniper Networks.

Consumers urged to be vigilant in wake of Zappos cyberattack

Jan 18, 2012

(PhysOrg.com) -- As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning t ...

Recommended for you

Facebook's Internet.org expands in Zambia

14 hours ago

(AP)—Facebook's Internet.org project is taking another step toward its goal of bringing the Internet to people who are not yet online with an app launching Thursday in Zambia.

Body by smartphone

Jul 30, 2014

We love our smartphones. Since they marched out of the corporate world and into the hands of consumers about 10 years ago, we've relied more and more on our iPhone and Android devices to organize our schedules, ...

Breakthrough elastic cloud-to cloud networking

Jul 30, 2014

Scientists from AT&T, IBM and Applied Communication Sciences (ACS) announced a proof-of-concept technology that reduces set up times for cloud-to-cloud connectivity from days to seconds. This advance is a major step forward ...

Security CTO to detail Android Fake ID flaw at Black Hat

Jul 29, 2014

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread ...

User comments : 0