Page 11 - index
P. 11
RESEARCH, ANALYSIS & TRENDS





































If the attackers are successful and the user doesn’t rec- 1. In order to clean your device, uninstall the above
ognize the threat upon seeing Instagram’s notification, mentioned apps found in your Application manager
the stolen credentials can be put to further use. or use a reliable mobile security solution to remove
the threats for you.
What happens to stolen credentials? 2. To secure your Instagram account, change your In-
stagram password immediately. In case you use the
You might ask yourself: What use is there for a couple same password across multiple platforms, change
of (hundred thousand) stolen Instagram credentials? these as well. As malware authors are known to ac-
cess other web services using the stolen creden-
Apart from an opportunity to use compromised ac- tials, you are advised to use a different password on
counts for spreading spam and ads, there are also vari- each of your accounts.
ous “business models” in which the most valuable as-
sets are followers, likes and comments. 3. To prevent getting your social media accounts com-
promised, there are a couple of things to keep in
In our research, we’ve traced the servers to which the mind when downloading third-party apps from
credentials are sent off and connected these to web- Google Play.
sites selling various bundles of Instagram popularity 4. Do not insert your sensitive information into untrust-
boosters.
ed login forms of third-party apps. To verify whether
an app is to be trusted, check the popularity of its
How to protect yourself? developer by numbers of installs, ratings and, most
importantly, content of reviews. However, don’t be
If you’ve downloaded one of these apps, you will find too quick to jump to conclusions, as many of the
one of its icons under your installed applications. You ratings and reviews can’t be trusted. When in doubt,
will also have seen a notice from Instagram about opt for high-quality apps marked as Top Developer
someone attempting to log into your account, as shown or found in the Editor’s Choice category.
above.
5. Last but not least, use a reputable mobile security
Finally, your Instagram account might appear to have solution to protect your device. ◊
increased following and follower numbers, or you might
be getting replies to comments you never posted. By Eset
Here are five tips for users to secure their devices:







MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   6   7   8   9   10   11   12   13   14   15   16