Fraud and Security Fraud and Security

Security Threats

Back to Security Threats

Be Smart with your Smartphone Security

Mobile malware continues to evolve infecting phones using tricks hackers once used on PCs. 

In June 2014, Kaspersky Labs released an article stating that US and UK Smartphone users are being actively targeted by crooks, locking up their phones through encryption methods and demanding a ransom to unlock them. 

This mobile Trojan malicious software is called Svpeng and originally evolved in Russia. The malware is designed to infiltrate a mobile device, collect information about mobile apps downloaded from specific banks, and locks the users' phone. The thief will then demand $200 (or more) to unlock the phone and return the information to the owner.

 What can you do to protect myself?

  1. Think about protecting your mobile phone like a computer. Periodically run specialized security apps from reputable sources like Symantec, McAfee, Kaspersky or Trend Micro. Or consider companies that specialize in mobile security like Avast, Lookout Mobile and Sophos. Click here to view a mobile security comparison article from Computer World magazine. 
  2. Be cautious before clicking links or opening attachments on your mobile phone.  Be sure you always reveal the redirected web address for any link—before clicking. For instance, on an iPhone tap and hold the link with your finger until the redirected address appears for you to view and either Open (if trusted) or Cancel.
  3. Verify the actual source of emails containing links. Calling your friend or family member may clear things up quickly. If their email or social media login was compromised or hacked, they may not have sent you the link for you to view at all. Healthy skepticism is your best ally.
  4. Remember you are dealing with crooks. If your mobile device is infected, unlocking your phone will be next to impossible without paying a ransom. We strongly advise against paying any requested ransom. Don’t provide any personal, financial or other information. Instead, contact your mobile service provider and report the details regarding the information breach on your mobile device.

For other great tips on securing your mobile phone, PC, and avoiding fraudulent scams take a look at other Pinnacle Fraud & Security Center articles and podcasts like these:

Protecting your Privacy

Federal law gives consumers the right to limit some of how your personal information is shared. See how Pinnacle protects your personal data.

Stop Email Fraud

Pinnacle developed a list of the Super Six questions you can ask yourself to help determine the legitimacy of any email.

Trusteer Rapport

Trusteer Rapport will not be supported in Tennessee after Dec. 31, 2018. Instructions for uninstalling the software are available here.