Common internet scams and how to avoid them

By 

Safeguard yourself against online scams

These days, internet fraud is omnipresent. Most people and most organizations, regardless of their location or industry, were probably targeted multiple times already. The line between those who fell prey and those who didn’t is thin – the victims were, most likely, just a bit naive.

People who get their bank accounts drained first reach out to the banks, an anonymous bank manager told PC Magazine. The banks, however, can do very little, and instead redirect the victims to the police.

“It’s very sad,” they said, speaking about the real-life effects of internet crime.

Criminals don’t care if their victims are in good standing or poor. They will target their life savings, home, and dignity, all for a little profit. Phishing remains the most prevalent attack, deceiving unsuspecting victims into believing they are interacting with regular people, their friends and family, or legitimate institutions. By enticing victims to click on malicious links, criminals gain access to sensitive login credentials, compromising bank accounts and other valuable information.

Trend Micro Premium Security Suite plus ScamCheck

Trend Micro Premium Security Suite plus ScamCheck

Powered by AI, Trend Micro Premium Security Suite with Trend Micro ScamCheck provides complete device security, identity protection, and scam prevention for up to 10 devices.

It works on Windows, Mac, Android, iOS, and Chromebook so you can secure all yours and your family’s devices whether you are at home or on the go.

The security suite includes Maximum Security with 24/7 support, Mobile Security, ID Protection, ID Theft Restoration, a Password Manager, Trend Micro Scam Chec,k and a secure VPN for protection on public WiFi.

Cheating the system

“I call phishing ‘out cheating’,” says economist Dr Darrin Baines. “You must at some level trust the person who’s conning you. So, for example, someone sends you an email saying ‘I’m in Africa, why don’t you send me some money?’. There must be something in that narrative that triggers the feeling that they’re worth trusting.”

Happily, shoppers are becoming more web savvy, spending more online, and getting ripped off less. “Last year an estimated £153million of card fraud took place over the internet – a decrease of 16 percent from 2008, when e-commerce card fraud losses were approximately £182million,” says Mark Bowerman, spokesperson for the UK Cards Association.

In the same period, credit and debit cards were used to buy a record £47billion worth of goods and services online, which was up 15 percent from 2008. So the percentage of dodgy web transactions is dropping – but that doesn’t mean you should get complacent.

Bowerman advises consumers to get familiar with the latest advice in the Cardholders section of the Card Watch website. Knowing which cons are in operation is key to staying safe online. In some cases, the swindles are old ones that have migrated to the internet. But what are they? Let’s take a look at the scams, how to spot them, and how to avoid them.

Internet scams

Threat actors exploit various tactics to defraud unsuspecting individuals, collectively siphoning billions of dollars annually into the underground economy. Staying informed about the latest scams is something we all must do.

A common technique is advanced fee fraud, where victims are lured with promises of substantial financial gain, only to be subjected to escalating fees and expenses. This predatory approach can lead to devastating financial consequences, including bankruptcy and even suicide.

The infamous Nigerian 419 scam is a prime example of advanced fee fraud. Victims receive emails claiming to be from the family of a deceased official seeking assistance in transferring a large sum of money. While the initial request may seem innocuous, it quickly escalates into a series of fraudulent fees and demands.

Another common scam is the fake lottery, where victims are falsely notified of winning a substantial prize. To claim the prize, they are instructed to pay various fees and taxes, ultimately losing money and never seeing their “winnings”.

It’s essential to remember that unsolicited offers of wealth, especially from unknown sources, are highly suspicious. If you haven’t participated in a lottery or competition, it’s unlikely that you’ve won. Even if you did participate, always double-check via other means. As a bank manager wisely advises, always exercise caution and verify any unexpected claims of financial gain.

When gain is really loss

While we’re talking about easy money, it’s worth keeping your eye out for pump-and-dump scams. Here, criminals buy up a bucketload of unloved shares. Inboxes around the world are then sent spam tipping the stock as a sure-fire winner.

The hope is that people will contact their brokers, buy the stock, and push its price higher. When the price shifts up, the scammers unload their holdings and trousers a profit. This sale inevitably depletes the price and punters around the world are left nursing a loss.

The infallible prediction scam is also a criminal’s favorite. Here you’re promised, say, the name of a winning horse for a fee. You pay and you get a nag’s name. But the scammer is also talking to other people, telling them different horses in the race will win.

Inevitably one will win and the person who receives that horse’s name will believe the scammer is somehow in the know. When the next race comes along, the scammer contacts his pool of now-seduced clients and sends them different horses’ names. Again, some will inevitably get the winner’s name, further enhancing his reputation. In essence, the scammer is playing a mathematical game where he can’t lose.

Human loss for profit

Playing with emotion is a lucrative game for scammers, and within hours of a natural disaster, emails begging for help begin to flood inboxes. But these emails are spam, and rather than collecting money for charity, the sites they point to save credit card details for later use.

It’s a nasty con that exploits human kindness, but it’s easy to avoid by waiting until an appeal is launched in the media and visiting the official site when it’s announced.

Doctor Feelbad

A large amount of spam concerns fake drugs, where spammers target those looking for a good time. Viagra, stimulants, smart drugs and prescription-only medicines are all apparently freely available via internet pharmacies. In some instances, outfits have even offered cannabis and ecstasy.

headache pain pills medication

The problem with buying illicit drugs online is that you’re hardly likely to complain if they don’t arrive. If you don’t get what you paid for, there’s no comeback. And what happens if the pharmacy is simply collecting credit card details? It isn’t worth the risk.

The cold call support con

Yet another typical scam involves cold callers posing as representatives from your internet service provider, claiming that your computer is infected with a virus and requires immediate attention. To address the purported issue, they request remote access to your device.

From there, they can do two things: Either ask for payment (and steal your credit card information in the process), or install malware on the device, using the remote access you provided.

Online auction scams

Online auction sites, while offering a treasure trove of deals, can also be breeding grounds for scams that exploit trust in the system. As economist Dr. Baines explains, an online reputation built through user ratings plays an important part for establishing trust.

Platforms like eBay rely heavily on this system, allowing buyers and sellers to rate each other. However, savvy bargain hunters need to be aware of several prevalent scams before bidding farewell to their cash.

Account hijack

A perfect seller reputation with 100% positive feedback is valuable, and scammers know this. They attempt to trick you into surrendering your password, allowing you to log in, change your details, and lock you out. While you scramble to prove your ownership to the auction site, the scammer exploits your good standing by creating listings for non-existent items.

Beware of phishing, if you want to stay safe. Never click on links within emails claiming to be from the auction site requesting login verification. Always log in directly through the platform’s official website.

Wire and escrow scams

Always utilize the built-in payment system offered by the auction site. If a seller insists on using wire transfer services like Western Union instead of secure options like PayPal, refuse. Wire transfers are not protected against fraud, and your money could disappear without a trace.

Scammers may offer high-value items (cameras are a popular target) at significantly lower prices to entice buyers. You win the auction, and send the money, but the transaction is rejected. The seller then claims a problem with their PayPal account and requests an alternative, unsecured payment method. Unaware of the scam, you send the money, and the seller vanishes.

Another similar scam is the fake escrow. Escrow services act as trusted third parties, holding the buyer’s money until the seller delivers the goods. While reputable platforms like eBay might suggest legitimate escrow services like escrow.com, be wary if the seller proposes a different service. Sending money through such channels could be akin to throwing it into a black hole.

Sending goods before payment

The auction winner might fabricate a story about delayed funds and offer fake documentation to prove they’ll pay soon. However, don’t be fooled. This tactic aims to pressure you into dispatching the goods before receiving payment.

Remember to never ship goods before receiving payment securely in your PayPal or bank account.

The chargeback

This scam exploits reputable payment systems. You receive payment via PayPal, and ship the purchased item, only for the buyer to file a false claim with PayPal stating they never received it. After that, PayPal refunds the buyer, leaving you out of pocket.

To counteract this, make sure to only ship items to PayPal-confirmed addresses.

Also, always utilize tracked delivery services like Recorded Delivery. Include the cost of secure shipping in your pricing, but avoid overcharging for postage. Inflated shipping charges can be deceptive themselves.

Try to understand these common scams and always adopt safe practices. If you do, you can become a more informed and secure online auction participant.

Inflated or unknown postage charges

This is a borderline scam that tempts many new sellers keen to maximise their auction income. If you’ve ever sold anything on Ebay, you’ll know that postage on a small item such as a book doesn’t cost a lot – maybe £2 including the time to go to the Post Office.

Close-up hands counting money American dollars

(Image credit: NATNN / Shutterstock)

Always take the postage charges into account when weighing up a bargain – especially if the stated postal method is second class, unrecorded post. If the seller says that he’ll only tell you the postage charge if you win the auction, he’s probably a con man – and you’d be very wise to look elsewhere.

Payment for information

This is an interesting scam because it involves selling information about how to get goods rather than selling the goods themselves. The listing page might show something like an iPhone, and the description is worded as if you’ll be getting one, but what you actually buy is information about how to find items with descriptions that contain spelling mistakes and are therefore not being bid upon.

This is a handy tactic, but there’s no need for you to pay for these details.

Creative poster collage of man working typing netbook online earning money bags dollars trading success billboard comics zine minimal

(Image credit: Roman Samborskyi / Shutterstock)

Counterfeit goods

Sites such as eBay work hard to remove counterfeit goods as soon as they appear, but some get through. You should be suspicious of any auction listing that shows a generic photograph, and be very wary of items where the label isn’t on display. If the seller says that the item is “like” a well-known brand, leave it well alone.

Another tactic used by sellers of counterfeit goods is to keep the listing short so people think they’re missing out on a bargain. If you see any of these signs, it’s a good idea to report the auction.

Shill bidding

Shill bidding – artificially inflating the price by bidding on your own goods – is illegal in the UK. It may be that a legitimate bidder is desperate to win an auction and will always outbid you, but sometimes the bidder is not what they seem.

The way to protect yourself from this subtle con is to set yourself a clear limit not bid a penny more. If the seller is shill bidding and outbids you, he wins his own item and wastes his time instead of getting your cash.

“I’m not an expert”

Exercise caution when dealing with sellers who are unclear about the item they’re offering. This ambiguity might be a ploy to conceal defects or misrepresent the product. The phrase “sold as seen” is often used to mask potential issues, so it’s vital to approach such listings with skepticism.

To avoid this type of scam, ask specific questions to clarify any doubts and seek detailed information from the seller. If the seller is evasive or unwilling to provide clear answers, it’s best to avoid the auction and report any suspicious activity to the appropriate authorities.

Social networking scams

Social media platforms, built on trust and connection, have become fertile ground for cybercriminals. As Dr. Baines aptly notes, our online reputation and the perceptions of others significantly influence our digital interactions.

While we may be cautious about directly responding to phishing emails, we are more likely to trust information shared by friends and acquaintances. Unfortunately, these individuals may be unaware of the risks or have their accounts compromised, inadvertently spreading malicious links and threats.

This tactic echoes early email scams, where well-meaning individuals would forward chain emails warning of fictitious viruses capable of causing physical damage to computers. These hoaxes exploited human psychology, leveraging trust and fear to spread misinformation. Today, these same psychological principles are exploited to distribute actual malware.

Be wary of apps

In the race for revenue, many social networking sites allow users to install web apps and pass the time playing embedded games. However, the proliferation of apps is such that it’s difficult to keep up with new ones, even for the site’s dedicated security staff.

Because of this, there’s a real danger that you could accidentally install malware. Without proper antivirus protection, you could then see your Facebook or MySpace account hijacked and used to send spam and malware, or your credit card details being sold and abused.

Search for any app that you want to install to see if it’s been reported as dodgy – and ensure you’re running decent antivirus software too. Hackers who specialize in malware for social networking sites know that good lies can travel around the world faster than they can be exposed. A good example is the rise in cons that rely on worried friends passing on supposed advice about how to avoid the latest threat.

A flurry of wall posts on Facebook that include a link to a malicious web page can lend a level of credibility to a phishing site that can’t be achieved easily in any other way. There’s a good chance that many people will repost the link for their pool of friends to read without even checking the site to see if it’s legitimate first.

When you receive such a link from a friend, the first thing you should do is search for it to see if it’s been flagged as a scam. If it has, the responsible thing to do is to warn others by posting the news. It may embarrass your friend, but you’ll be saving their bacon in the long run, as well as that of their other friends. Just be careful how you word the update – you don’t want it to appear as if you’ve been hacked too!

The friend in trouble

A growing problem for social networking sites with chat facilities is the ‘friend in trouble’ scam. After hijacking an account, the con man starts a chat with somebody. He exchanges hellos and then says he has a problem. He’s on holiday in a dodgy part of the world and, unsurprisingly, has been robbed. Can you help him out by wiring him the money he needs to get home? Why wouldn’t you want to help out a friend you know in real life?

That’s the central mechanism that makes this con work. Your job is to try to decide whether you’re about to ignore a real plea for help. The easiest way of telling if the person is really your friend is to ask several questions only the real friend would know the answer to. Remember that the scammer has access to the information in your profile, the profile of the account he’s hijacked, and those of your mutual friends.

Because of this, be sure to ask about unique events that may have happened decades ago, and which neither of you has spoken about for years. It’s surprising just how quickly a scammer will make excuses and leave, whereupon you must contact the account’s real owner and tell him what happened.

“Is this you?”

This scam highlights the power of trust in online relationships. Some time ago, X (while it was still called Twitter) users received direct messages from seemingly compromised friend accounts, warning them to delete a photo uploaded to an unknown site. This vague yet urgent message, coupled with the perceived trust in the sender, enticed many users to click on the malicious link, leading to malware infection.

To protect yourself from such scams, it’s critical to verify the authenticity of messages, especially when they appear urgent or suspicious. Avoid responding directly to the message and instead opt for alternative communication channels like phone calls or email to confirm the sender’s intent.

read more

Top 10 Best Practices for Effective Data Protection

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework?

In this article, we’ll explore data protection best practices from meeting compliance requirements to streamlining day-to-day operations. Whether you’re securing a small business or a large enterprise, these top strategies will help you build a strong defense against breaches and keep your sensitive data safe.

1. Define your data goals#

When tackling any data protection project, the first step is always to understand the outcome you want.

First, understand what data you need to protect. Identify your crown jewel data, and where you THINK it lives. (It’s probably more distributed than you expect, but this is a key step to help you define your protection focus.) Work with business owners to find any data outside the typical scope that you need to secure.

This is all to answer the question: “What data would hurt the company if it were breached?”

Second, work with the C-suit and board of directors to define what your data protection program will look like. Understand your budget, your risk tolerance to data loss, and what resources you have (or may need). Define how aggressive your protection program will be so you can balance risk and productivity. All organizations need to strike a balance between the two.

2. Automate data classification#

Next, begin your data classification journey—that is, find your data and catalog it. This is often the most difficult step in the journey, as organizations create new data all the time.

Your first instinct may be to try to keep up with all your data, but this may be a fool’s errand. The key to success is to have classification capabilities everywhere data moves (endpoint, inline, cloud), and rely on your DLP policy to jump in when risk arises. (More on this later.)

Automation in data classification is becoming a lifesaver thanks to the power of AI. AI-powered classification can be faster and more accurate than traditional ways of classifying data with DLP. Ensure any solution you are evaluating can use AI to instantly uncover and discover data without human input.

3. Focus on zero trust security for access control#

Adopting a zero trust architecture is crucial for modern data protection strategies to be effective. Based on the maxim “never trust, always verify,” zero trust assumes security threats can come from inside or outside your network. Every access request is authenticated and authorized, greatly reducing the risk of unauthorized access and data breaches.

Look for a zero trust solution that emphasizes the importance of least-privileged access control between users and apps. With this approach, users never access the network, reducing the ability for threats to move laterally and propagate to other entities and data on the network. The principle of least privilege ensures that users have only the access they need for their roles, reducing the attack surface.

4. Centralize DLP for consistent alerting#

Data loss prevention (DLP) technology is the core of any data protection program. That said, keep in mind that DLP is only a subset of a larger data protection solution. DLP enables the classification of data (along with AI) to ensure you can accurately find sensitive data. Ensure your DLP engine can consistently alert correctly on the same piece of data across devices, networks, and clouds.

The best way to ensure this is to embrace a centralized DLP engine that can cover all channels at once. Avoid point products that bring their own DLP engine (endpoint, network, CASB), as this can lead to multiple alerts on one piece of moving data, slowing down incident management and response.

Look to embrace Gartner’s security service edge approach, which delivers DLP from a centralized cloud service. Focus on vendors that support the most channels so that, as your program grows, you can easily add protection across devices, inline, and cloud.

5. Ensure blocking across key loss channels#

Once you have a centralized DLP, focus on the most important data loss channels to your organization. (You’ll need to add more channels as you grow, so ensure your platform can accommodate all of them and grow with you.) The most important channels can vary, but every organization focuses on certain common ones:

  • Web/Email: The most common ways users accidentally send sensitive data outside the organization.
  • SaaS data (CASB): Another common loss vector, as users can easily share data externally.
  • Endpoint: A key focus for many organizations looking to lock down USB, printing, and network shares.
  • Unmanaged devices/BYOD: If you have a large BYOD footprint, browser isolation is an innovative way to secure data headed to these devices without an agent or VDI. Devices are placed in an isolated browser, which enforces DLP inspection and prevents cut, paste, download, or print. (More on this later.)
  • SaaS posture control (SSPM/supply chain): SaaS platforms like Microsoft 365 can often be misconfigured. Continuously scanning for gaps and risky third-party integrations is key to minimizing data breaches.
  • IaaS posture control (DSPM): Most companies have a lot of sensitive data across AWS, Azure, or Google Cloud. Finding it all, and closing risky misconfigurations that expose it, is the driver behind data security posture management (DSPM).

6. Understand and maintain compliance#

Getting a handle on compliance is a key step for great data protection. You may need to keep up with many different regulations, depending on your industry (GDPR, PCI DSS, HIPAA, etc.). These rules are there to make sure personal data is safe and organizations are handling it the right way. Stay informed on the latest mandates to avoid fines and protect your brand, all while building trust with your customers and partners.

To keep on top of compliance, strong data governance practices are a must. This means regular security audits, keeping good records, and making sure your team is well-trained. Embrace technological approaches that help drive better compliance, such as data encryption and monitoring tools. By making compliance part of your routine, you can stay ahead of risks and ensure your data protection is both effective and in line with requirements.

7. Strategize for BYOD#

Although not a concern for every organization, unmanaged devices present a unique challenge for data protection. Your organization doesn’t own or have agents on these devices, so you can’t ensure their security posture or patch level, wipe them remotely, and so on. Yet their users (like partners or contractors) often have legitimate reasons to access your critical data.

You don’t want sensitive data to land on a BYOD endpoint and vanish from your sight. Until now, solutions to secure BYOD have revolved around CASB reverse proxies (problematic) and VDI approaches (expensive).

Browser isolation provides an effective and eloquent way to secure data without the cost and complexity of those approaches. By placing BYOD endpoints in an isolated browser (part of the security service edge), you can enforce great data protection without an endpoint agent. Data is streamed to the device as pixels, allowing interaction with the data but preventing download and cut/paste. You can also apply DLP inspection to the session and data based on your policy.

8. Control your cloud posture with SSPM and DSPM#

Cloud posture is one of the most commonly overlooked aspects of data hygiene. SaaS platforms and public clouds have many settings that DevOps teams without security expertise can easily overlook. The resulting misconfigurations can lead to dangerous gaps that expose sensitive data. Many of the largest data breaches in history have happened because such gaps let adversaries walk right in.

SaaS security posture management (SSPM) and data security posture management (DSPM for IaaS) are designed to uncover and help remediate these risks. By leveraging API access, SSPM and DSPM can continuously scan your cloud deployment, locate sensitive data, identify misconfigurations, and remediate exposures. Some SSPM approaches also feature integrated compliance with frameworks like NIST, ISO, and SOC 2.

9. Don’t forget about data security training#

Data security training is often where data protection programs fall apart. If users don’t understand or support your data protection goals, dissent can build across your teams and derail your program. Spend time building a training program that highlights your objectives and the value data protection will bring the organization. Ensure upper management supports and sponsors your data security training initiatives.

Some solutions offer built-in user coaching with incident management workflows. This valuable feature allows you to notify users about incidents via Slack or email for justification, education, and policy adjustment if needed. Involving users in their incidents helps promote awareness of data protection practices as well as how to identify and safely handle sensitive content.

10. Automate incident management and workflows#

Lastly, no data protection program would be complete without day-to-day operations. Ensuring your team can efficiently manage and quickly respond to incidents is critical. One way to ensure streamlined processes is to embrace a solution that enables workflow automation.

Designed to automate common incident management and response tasks, this feature can be a lifesaver for IT teams. By saving time and money while improving response times, IT teams can do more with less. Look for solutions that have a strong workflow automation offering integrated into the SSE to make incident management efficient and centralized.

Bringing it all together#

Data protection is not a one-time project; it’s an ongoing commitment. Staying informed of data protection best practices will help you build a resilient defense against evolving threats and ensure your organization’s long-term success.

Remember: investing in data protection is not just about mitigating risks and preventing data breaches. It’s also about building trust, maintaining your reputation, and unlocking new opportunities for growth.

read more

Best smartphone features to combat thieves

By 

Best smartphone features to combat thieves

Android smartphones and iPhones have several useful features that protect them against use and data exfiltration by thieves — including locking mechanisms and location tracking.

Many apps and services available on smartphones require sensitive or personal data and documents to function properly.

They can also support powerful features like payments from your bank account, including through growingly popular digital wallets.

Fortunately, they come with several security features to prevent unauthorised access to your files and apps, which is a big threat in a country like South Africa.

However, many of these features are not enabled by default, and some users might consider them unnecessary during initial setup.

When it comes to protecting your device, it is imperative that you have a locking mechanism enabled.

While you can choose a secret PIN or pattern to unlock the device, repeatedly entering this will sometimes leave markings or smudges on the screen that thieves can use to figure it out.

It is also easier for thieves to get you to share your PIN once and then have near unlimited access to your phone than to require that you provide biometrics.

Most modern Android smartphones offer optical or ultrasonic fingerprint readers, typically located under their displays or on the rear of the phone.

Some also have facial unlocking support.

However, on most Android phones, this method is not deemed as sufficient verification for accessing sensitive information, changing important settings, or opening apps for mobile banking or payments.

That is because Android facial recognition typically relies on a single front camera and, in some cases, a depth sensor.

While Apple does not offer fingerprint readers on its iPhones, its facial recognition feature, Face ID, is regarded as far more advanced and secure than the options on Android.

The Face ID system uses three sensors in the iPhone’s notch or “Dynamic Island” to accurately verify users — even in the dark.

It uses a combination of a laser dot projector, an infrared flood illuminator, and an infrared camera to scan, store, and read a 3D pattern of your face.

Apple says that its system is so meticulous that there is only a one-in-one million chance that another random person will have features similar enough for Face ID to fool them into thinking they are the verified users

Seasoned Android users used to simple hole-punch camera cutouts might think the Dynamic Island unsightly, but it serves an important security purpose.

Location detection

Another way to protect your phone against thieves is to enable location tracking services, which allows you to monitor the location of your device from another device where you are logged into the same account.

For Apple, this is called Find My iPhone, Android’s iteration is Find My Devices, and Samsung’s version is SmartThings Find.

These features can track your smartphone via its GPS and use low-power Bluetooth tracking, pinging from various other devices on their networks to pinpoint your device’s location.

Apple and Google’s Find My networks are not enabled by default, but Samsung’s is.

Therefore, if you have a non-Samsung smartphone, be sure to turn on the feature in your phone’s settings.

It should also be noted that Samsung users can benefit from both the Find My Device network and SmartThings Find network.

It is recommended not to try to track down dangerous criminals who might have your smartphone, but it can assist law enforcement or professional private security in tracking down the culprits.

The networks also allow you to remotely lock and wipe your device, which is very useful if you have sensitive data on it and have a secure backup on the cloud.

Unfortunately, thieves can simply turn off the device to take it offline and prevent your device from updating its location.

However, certain smartphones — including recently released iPhones and Google Pixel devices — can be tracked for some time, even when turned off.

This capability is enabled through a special provision that preserves a part of their batteries for offline Bluetooth Low Power tracking.

To use it on iPhones, be sure to turn on “Find My Network” under your “Find My iPhone” settings.

On Google Pixel devices, users must turn on the capability under “Find your offline devices” in the “Find My Device” section.

Specialised anti-theft features

Apple’s iPhones also have a Stolen Device Protection feature, which is not enabled by default.

This feature implements a time delay for certain security-sensitive actions, like changing your Apple account password.

To use it, you must enable two-factor authentication for your Apple account and have the following enable:

  • A device passcode, Face ID, or Touch ID; and
  • Significant Locations (also known as Location Services)

To turn Stolen Device Protection on, head to your iPhone Settings page, and tap Face ID & Passcode.

You will be required to submit your passcode or biometrics before turning Stolen Device Protection on or off.

Google recently began rolling out a slew of new anti-theft features that will become available on millions of smartphones running Android 10 or later through a Google Play Services update later in 2024.

The first big upgrade is a new AI-powered theft protection lock.

Google said this can detect whether a phone was potentially snatched out of your hand by a thief and they tried to run, bike, or drive away.

“If a common motion associated with theft is detected, your phone screen quickly locks — which helps keep thieves from easily accessing your data,” Google explains.

The second capability is offline device lock, which will automatically lock your smartphone if a thief tries to disconnect your device from a network for prolonged periods.

The third new feature lets you remotely lock your smartphone simply by entering your phone number and completing a quick security challenge on any device instead of logging into your account first.

“This buys you time to recover your account details and access additional helpful options in Find My Device, including sending a full factory reset command to completely wipe the device,” Google explains.

In addition to the above, newer devices that support updating Android 15 are getting the following features:

  • Factory reset blocking requiring account credentials
  • Private space for hiding sensitive apps
  • Requiring PIN, password, or biometric authentication for disabling Find My Device
  • Compulsory biometric authentication if a thief figures out a PIN
read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
Verified by MonsterInsights