Are your messages secure?

Researchers at Brigham Young University have learned that most users of popular messaging apps Facebook Messenger, What’sApp and Viber are leaving themselves exposed to fraud or other hacking because they don’t know about or aren’t using important security options.

“We wanted to understand how typical users are protecting their privacy,” said BYU computer science Ph.D. student Elham Vaziripour, who led the recent study. Short answer: they’re generally not.

Even though What’sApp and Viber encrypt messages by default, all three messaging apps also require what’s called an authentication ceremony to ensure true security. But because most users are unaware of the ceremony and its importance, “it is possible that a malicious third party or man-in-the middle attacker can eavesdrop on their conversations,” said Vaziripour, who was joined on the study by computer science professors Daniel Zappala and Kent Seamons and five other student researchers.

The authentication ceremony allows users to confirm the identify of their intended conversation partner, and makes sure no other person — even the company providing the messaging application — can intercept messages.

In the first phase of a two-phase experiment, the research team prompted study participants to share a credit card number with another participant. Participants were warned about potential threats and encouraged to make sure their messages were confidential. However, only 14 percent of users in this phase managed to successfully authenticate their recipient. Others opted for ad-hoc security measures like asking their partners for details about a shared experience.

In the second phase, participants were again asked to share a credit card number, but in this round researchers emphasized the importance of authentication ceremonies. With that prompting, 79 percent of users were able to successfully authenticate the other party.

Despite the drastic climb, however, researchers discovered another significant hurdle: participants averaged 11 minutes to authenticate their partners.

“Once we told people about the authentication ceremonies, most people could do it, but it was not simple, people were frustrated and it took them too long,” Zappala said.

Because most people don’t experience significant security problems, both professors agreed, it’s hard to make a case for them investing the time and effort to understand and use security features that applications offer. But because there’s always a risk in online communications, Seamons added, “we want to make it much easier to do and cut that time way down.”

The ultimate goal? “If we can perform the authentication ceremony behind the scenes for users automatically or effortlessly, we can address these problems without necessitating user education,” said Vaziripour.

This study is an extension of ongoing work on usable security in the two labs Seamons and Zappala run, funded in part by more than $1 million in recent grants from the National Science Foundation and Department of Homeland Security.

“Security researchers often build systems without finding out what people need and want,” said Seamons. “The goal in our labs is to design technology that’s simple and usable enough for anyone to use.”

Godless Virus May Have Affected 4 Lakh Android Phones in India: Trend Micro

The new mobile malware "Godless" has affected nearly 4 lakh devices in India and about a million devices worldwide, said a report from cyber-security firm Trend Micro.

In the report titled "Mobile App Reputation Service", it said the "Godless" malicious software, found in all app stores including Google Play, hides inside an app and operates on the root of the operating system (OS), opening up the admin access to outside devices. "It contains various exploits to ensure it can root a device and it can even install spyware," said the report. It has been designed to exploit the Android devices in endless ways and those devices running on Android 5.1 (Lollipop) or earlier versions are vulnerable.

Once the "Godless" malware finishes its rooting, it cannot be uninstalled easily. "When downloading apps, users should always review the developer. Unknown developers with very little or no background information may be the source of these malicious apps.Users should also have secure mobile security that can mitigate mobile malware," said Nilesh Jain, Country Manager for India, Trend Micro.

According to Strategy Analytics, Google-owned Android dominated the global smartphone market since 2014 with 1 billion units shipped worldwide. It accounts for 81 percent of all smartphones shipped in 2014, followed by Apple with 15 percent market share and Microsoft with 3 percent at third.

“Many users choose Android over other OS-based devices because first, the devices can be relatively cheap; second, it’s known for fast and efficient data storage and third, it’s available across different form factors, brands, and price points," says Paul Oliveria, researcher of Trend Micro. Android is also popular among mobile developers and manufacturers for its capacity to house innovative app development without licensing fees, and sporting a simple and powerful Software Development Kit (SDK).

Here are some tips to keep Android Phones Safe and Secure:

Lock the screen – Enabling a screen unlock code will prevent a device thief from accessing your mobile data.

Protect your data – Android virtually comes with pre-installed security measures that can be easily accessed and enabled from the security submenu. The Android security screen also includes an option to encrypt the device. Enabling this option will help protect sensitive information stored in the device.

Strengthen passwords and app permissions – Google does a fine job at synching their updates with Android devices. However, some manufacturers take a little more time to update. Remember to check the features that you allow the app to access, and don’t forget to use strong and unique passwords. If you re-use your passwords, hackers can effortlessly guess the passwords on your other accounts.

Install a security app – It’s always a good idea to make use of security apps. An app that offers anti-theft features like remote wipe-out, tracking, and locking, as well as malware scanning and detection can help mitigate potential threats. For example, Trend Micro Mobile Security is a security app for Android phone and Android tablet, which blocks malicious apps from Google Play before they are installed; guards against identity theft and viruses; blocks dangerous and fraudulent websites; protects your privacy on Facebook; protects kids online; and even extends battery life and optimizes device performance and memory.

Connect to secure networks – Whenever you go online using a network you don’t know, such as public Wi-Fi, you should be more careful because unsecured Wi-Fi networks can be used to stage man-in-the-middle attacks where data can be intercepted by a third party. Avoid online banking, financials, and purchasing over public networks. If you use Wi-Fi at home, please make sure you use a password to secure your router.

Avoid rooting your device – Before rooting your Android device, consider the pros and cons first. While it allows you more control over your device, it could also allow unsigned apps, including malicious ones, access to your data. This also makes it difficult to patch and update your OS and apps, which could leave your device vulnerable.

Download from official app stores – Downloading from third-party sites or app stores is one of the easiest ways for any mobile device to get infected with malware. Limiting your apps to those from official or trusted app stores (like the Google Play app store) can lower the risks.