In Mobile Security Threats that You NEED to Know About (Part 1), I already start the discussion on the threats that could endanger your mobile devices and its contents. Worse, every year, the number of mobile threats keep increasing. Your phone gets more and more exposed each passing day.

So, let’s get into it and talk about the other 3 mobile security threats that pose as a harm.

  1. Viruses and Trojans

Next are the viruses and trojans. These attack your mobile devices and these are attached to seemingly legit programs. Once you install these seemingly harmless programs, they hijack your mobile devices and acquire the information stored in there. These information could be personal or banking details.

  1. Browser Exploits

One common sign of browser exploit is when your browser’s search page or homepage has been changed. The main screen, by default, redirects you to a link that you did not set. If you have experienced this, then, you have been a victim of a browser exploit.

Usually, browser exploits attack the security flaws in your browser. Then, they also target the other applications that you integrated on your browser, like a PDF reader and similar add-ons.

  1. Phishing Apps

Phishing apps are now a trend. This is a new take and old scheme. Before, when the emailing was still new, phishing emails are rampant. Cyber criminals will pose as the legit source and would send you an email asking for personal details.

If you are not careful, you could give away your password, credit card details, and other details  that only should know about. So, now, the same is happening with phishing apps. These apps mimic the real apps. At first glance, you would really think these phishing apps are the legit ones.

On a mobile device, screens are obviously smaller so it would be difficult to distinguish the fake from the real ones. If you are not careful, you could install the fake apps, and they could secretly acquire all the information you typed on that app — username, password, email, mobile number, and many more.

  1. Grayware Apps

Lastly, there are the grayware apps are not exactly harmful to your device, but they expose you to certain privacy risks. According to Symantec’s 2018 Internet Security Threat Report, 63% of grayware apps did leak the device’s number. Moreover, 37% of these apps gave away the device’s current location.

 

Final Thoughts

So, that warps the topmost threats that dominate the mobile sector in the recent years.  Now, that you now all these data, please do not take this lightly. Start protecting your online privacy because when you protect yourself, you are also protecting the people around you.

Cybersecurity is extremely important especially for business owners because the stakes are higher. Once a business’ online account is compromised, then all the transactions in that account will be as well. These vital business information could be sent to third party companies. That’s how Facebook spied on their competitors!

For all your cybersecurity needs, Omnipotech is the name you can trust. Contact Omnipotech Support Center  now to know more about all our cybersecurity solutions. If you have any further questions, please get in touch by calling 281-768-4800!

According to Symantec’s 2018 Internet Security Threat Report, the different mobile malware types increased by 54% from 2016 to 2017. Yes, in one year, it doubled.

Wait, there’s more.

Once a mobile malware gets into your phone, the other devices connected to your phone might be the next target. In a series of connected devices, the capacity of your online security will be only as good as your weakest link. So, malware can easily spread from a phone to a tablet and then to another device through the network.

In this blog post, I will list the rampant mobile security threats lurking around.

1. Madware and Spyware

First, you have to be careful about madware; since this article focuses on mobile threats, we aren’t dealing with the typical adware here.

Mobile adware (madware) is a program installed on your phone, usually done without your permission.

What does it do? A madware acquires your data for ad purposes. This way, companies can accurate target you with ads that are accordant with your own interests and hobbies.

It does not end there. Once there are madwares to target you with ads, it comes with a spyware. A spyware, like the name suggests, spies you. It will study on how you use the internet, collects all these information, and then, sends it to a third party.

Generally, companies buy this data of yours and they use these data for better ad targeting. Companies show you ads, you click, they spy, send you more ads, you click again, and so on. The cycle continues!

To be honest, the ads you see are the least of your concerns. When it comes to spyware, the alarming part is that your personal information collected. This means that your location, your internet usage, and your mobile contacts are all compromised. So, you see, it’s not just you exposed to mobile threats, but also every contact listed on your phone.

2. Drive-by Downloads

Drive-by downloads are those malwares installed on your mobile without any permission. This could happen when access the wrong website or open a malicious email. Then, without you knowing, a drive-by download will install something on your mobile device.

What will it do? The file it will install could be anything. That’s the danger of it! Perhaps, a madwaremalware or spyware. It could even be a bot that could potentially use your phone to do nasty things!

More will be discussed on Mobile Security Threats that You NEED to Know About (Part 2)

Time to take action!

Cybersecurity is important and you should not take it lightly. For a business establishments, the stakes are higher.

It’s a domino effect; once you are compromised, your clients will be as well. Third party companies could get a hold of your business transactions, banking information, and even the details of your clients.

Omnipotech is here to help you in strengthening your company’s overall security. Contact Omnipotech Support Center to know about the services we do such as cloud computing, IT consulting, and other IT services. For more information, you may call Omnipotech at 281-768-4800!

Since the coronavirus pandemic, companies have conducted online meetings. Video calls and online conferences have become part of our routine. Work isn’t something we’re used to anymore. With the proliferation of numerous coronavirus-related phishing schemes, it’s pretty hard for the average office worker to spot the legit or the fake news.

Security on all online interactions

Often times, security is the last thing on our minds. For the most part, we do not mind of the security measure; we just assume that one meetings and interactions are secure.

Access codes can help secure the meeting. Of course, you would not want to randomly joining your meeting. Imagine, if your team is talking about sensitive information, then, somebody from another department suddenly joins the meeting.

Sadly, if you do not restrict meetings with passwords or if you do not set them up properly, other employees, random people, or even online trolls can interrupt such private and important meeting. Thus, it is extremely crucial for you to implement basic safety measures to help secure the privacy of the ones involved in the meeting.

If implementation of such security are strictly followed, it lead to possible data breaches in the future. This could be a costly consequence for the company. So, what are the basic things you should do?

The tips to follow:

The tools to use in meetings are really dependent on your preference. I have discussed pro-privacy tools in a separate post.

Anyway, without considering the platforms you will use for your online meetings, there a number of things that you should follow to make sure that the online meeting is secure:

  • Set rules for conducting a virtual meeting and everyone involved should follow the given instructions.
  • Provide unique access codes; no two meeting should have the same passwords especially if you will discuss sensitive information. For a more secure meeting, set a unique identifier code among the attendants.
  • Speaking of passwords, make sure that passwords are alphanumeric; it shouldn’t be predictable. Avoid common words like,  “password”, “meeting1”, “conference02”, “1234pass”, and so on.
  • If you can, check who the participants are. Meeting attendees should identify themselves. Boot unidentified participants out of the meeting.
  • When you are having a video call, limit the participants who have screen-share capabilities.  Remind everyone to avoid carelessly sharing information.
  • If unused, do not allow file sharing, screen sharing, or anything like it.

Additional steps to follow:

  • Use only company-approved tools; if you are invited to join online meetings, do not share pins or passwords to anyone.
  • Oversee the meeting attendees and all times. Restrict access if all the participants are in.
  • The department heads or the host should only be the one screen sharing. Average participants should just listen and respond when asked.
  • Lastly, meetings should ONLY be on company-issued devices. Avoid using personal computers or mobile phones.

Online meetings are NEW to some people

For some people, virtual meetings are uncharted territory. If you are one of them, please know policies of your company and strictly follow them. Omnipotech is here to help you if you need more security tips for your company. Contact Omnipotech Support Center and talk to an IT professional about cybersecurity.

According to Go-Globe’s infographic on The State of VPN Usage, 25% of users have recently used a virtual private network. This is no surprise that the VPN industry is predicted to be worth $27.10 billion this year. In 2022, it is expected to gain $35.73 billion worth of revenues. Indeed, VPN is a lucrative business! However, is using a free VPN safe?

In the previous post regarding Free VPN Isn’t the best VPN, I already shared a few reason why a free VPN is not exactly the ideal option for you. Now, I will enumerate more reasons for you to not immediately jump on the free VPN bandwagon.

3. What? More Ads?!

You used a VPN to be secure, but you end up in a more deadly territory because of the pop-ups that suddenly appear. It’s very counterproductive to use a VPN that exposes to more annoying ads that you are avoiding in the first place. Moreover, these free VPNs are sneaking in trackers, which can still snoop and follow all the digital footprints that you leave behind.

A notable example for this is AnchorFree Inc’s Hotspot Shield VPN. In 2017, there was an FTC complaint regarding privacy violations by providing ads. It was found out that Anchorfree Inc sold personal data to third-party firms. In number 14 of the complaint, Hotspot Shield uses this information to “identify [a user’s] general location.” Not only that,  Hotspot Shield also collected “unique device identifiers, and other application information” on a regular basis.

AnchorFree stated that, “the free version… is funded by ads. Since then, Anchorfree has been posting annual reports, which are accessible to the public.

4. Constant buffering would mean more waiting.

Why would people get a VPN? Because they want to access streaming sites even when they are away from home. Usually, some countries ban sites and these include streaming services such as Netflix, Disney+, HBO Go, Vudu, and more. In some cases, websites block your access if they found out you are in another location. So, how are you supposed to watch the video on a premium subscription site when your connection is slow to be begin with?

A free VPN would mean a very slow connection. Don’t expect to be able to flawlessly stream your favorite shows overseas. Often times, free VPNs only have a few servers available, meaning you spend more time waiting and bouncing between different over-crowded servers because paid users get more priority than you.

Also, subscription websites are doing their best in identifying users who are trying to sneak in their sites. They won’t hesitate to block IP addresses leeching of their premium services. Free VPNs won’t be able to provide you with a new IP addresses every time you go online. So, it would be pretty hard to log in a streaming site if your VPN is merely a free version because you’re stuck with an old and worn IP address.

Final Words

In looking for the right VPN for you, please do read the post regarding the 4 Factors to Consider when Choosing a VPN. Don’t immediately choose it because a VPN is free. Remember, ransomware attacks are continuing to increase each year. In 2019 alone, Kaspersky Lab noticed a 60% growth in vicious attacks, which are targeting passwords and other personal credentials.

Previously, I talked about the basics of having a virtual private network and what the factors to look for when buying a VPN. Catch up on that and more: 4 Factors to Consider when Choosing the Right VPN

A VPN is really helpful when you are always on the go and constantly moving from one place to another. When you are using a public WiFi, the VPN will serve as your shield from anyone who might steal your passwords, bank details, and other personal information. You are paying for a service to protect your privacy and your family’s privacy as well! So, when a VPN offers their services for free, how will they make money? What do they gain from this free service?

Below, I will share to you a few reasons why you should NOT choose a free VPN.

1. Free VPNs are not exactly safe.

Top10VPN.com analyzed a total of 150 VPN apps downloadable on Google Play… and what did they find out? When they tested the 150 free VPNs, majority of them had malware and viruses; app permissions. From the data collected from November – December 2018, the researchers concluded that 85% of the free VPNs are unsafe.

You see, these VPN providers need to secure their users and they would need the hardware for it. Usually, their servers are located in different countries and maintaining these servers are pretty expensive. The thing with free apps — not just VPN — need to maintain their services, and they do this through the data provide. So, go for paid services because if not, you would end up on the VPN provider’s menu.

Another Top10VPN.com found out that 59% of apps they have inspected are connected to China. The free VPN apps are not so free after all because the developers were sharing the data of their users to the Chinese authorities. Other than that, 64% of apps had no activity outside the Google Play Store page, and sadly, only 17% of them bothered to respond to customer emails.

2. It also comes with a free malware.

There’s a huge to get a free malware as well. In fact, the chances are 1 in 3 VPNs have bugs.  To be more precise, 38% of free VPN app may have malware according to a Data61/CSIRO paper. So, would you rather spend more than a $100 per year, or  would you prefer your bank details getting compromised? Surely, having your personal data stolen is more troublesome. You can earn your money again, but if your identity gets stolen, your are in grave danger.

At the end of the day, free services have their own repercussions because you are paying with your personal data. There’s no such thing as a free lunch. Talk to industry experts if you need help regarding cybersecurity. Do not put yourself at risk just because of some free app you found on the internet. If you have any questions and want to schedule an IT consultation, you may contact Omnipotech Support Center or call us at 281-768-4800 right now!

 

Next? More Reasons Free Why a Free VPN Is Not Advisable

Virtual Private Network (or VPN) will help you be anonymous online. But wait! Before you think VPN is all you need, it’s not.

What can VPN do?

Your VPN will give you anonymity and privacy only to some extent. However, your real identity is still revealed to the VPN provider and your Internet Service Provider (ISP), making you NOT entirely anonymous. It’s really a common misconception that VPN is the ultimate privacy tool, but the VPNs will only mask your IP address so that others may not spy on you. Websites will see your chosen VPN browsing their site, and not your own IP address.

You see, every sites you visit, you usually reveal your IP address, your unique ID that connects to your computer. The same is true for “incognito mode” on web browsers; it does not offer privacy. Private browsing will NOT offer protection. Additionally, it will not prevent websites from collecting your personal information. It will only delete browser history and not keep anything on your computer. That’s it!

What are the factors to consider in choosing a VPN?

So, now you know the scope of protection VPN and private browsing provide, it’s time to breakdown what you need to look for in a VPN provider. As I mentioned earlier, your VPN provider can still monitor and keep track of all your activity on the web. The only protection it provides is shielding your internet traffic from prying eyes by masking your IP address. With this being said, I believe that you should use a VPN provider that you absolutely trust.

How do you choose? Well, these are the top 4 points to consider when selecting a VPN:

  1. Scope of Protection and Privacy.
    • First and foremost, you should check what’s in it for you. What will happen to your information? Do they share your personal details to others? What logs do they keep? Please carefully go through all your prospects’ privacy policy and know their limitations. Of course, you should go for the VPN provider that does NOT collect or share personal data.
  2. Cost.
    • Next is the cost. Make sure it fits your budget. Free VPNs don’t actually help you. For more details, check out Free VPN isn’t the best VPN.
  3. Browsing Speed.
    • Browsing speed is important so you better try them out first before you buy. Usually, VPN providers offer a free trial so be sure to sign up for that.
  4. Server Locations.
    • Lastly, you should consider the geographic location. Different VPNs are located in different locations. Generally, you get to choose which country to connect to so try to research on where their servers are located. Most popular VPNs have servers in more than 20 countries.

Our Recommendations

With over 100 VPN companies to choose from all over the world, it’s hard to pinpoint just 1 best solution. At the end, the VPN to choose really depends on your needs. That’s why Omnipotech is here, and we will help you assess your needs. You can contact Omnipotech Support Center now and we will help you because we know how daunting it is to select a VPN that’s right for you. Whether you need help in IT consulting or have any questions on cybersecurity, don’t hesitate to call us at 281-768-4800!

 

In Pro-Privacy Tools to Use When You Are Planning to Work from Home (Part 1), I talked about few tools on video conferencing and other related devices on promoting privacy when communicating with teammates. Now, I will discuss options related to web browsers, email apps,  chat apps, and many others. Let’s get right into it!

Web Browsers: 

  • Well, for browsers, there are a number of pro-privacy tools you can use like VivaldiBrave, or Firefox. Plus, whatever browse you end up choosing, you can still add the DuckDuckGo Privacy Essentials extension on your desktop browser.
  • Not only that, if you are more of a mobile user than a desktop users, there’s also the DuckDuckGo Privacy Browser, which is downloadable on both Google Play and AppStore. The great thing about this mobile browser is that it has a “fire” button that will instantly clear all logs, history, and activities on the browser.

Virtual Private Networks (VPNs)

  • To be honest, this is kinda tricky. VPN is used to secure your internet traffic by masking your IP address. However, it does not mean that you are invisible to everyone. Remember, with or without VPN, your internet service providers can still see your traffic. Personally, I would NOT want to recommend a free VPN service. The same is stated on a CNET article right here.
  • Just to make it clear: VPN is not all you need to remain private or anonymous on the web. For an expert advice regarding Cybersecurity and anything related to IT Consulting, I suggest you contact Omnipotech’s Support Center or call 281-768-4800. Again, your Internet Service Provider can still monitor your internet activity and your IP address. I have made a separate post on the factors in choosing the right VPN for you so be sure to check that out!

Email Service Providers:

  • You are not stuck with Gmail and Yahoo! Mail. In fact, there are far more options for you because there are truly pro-privacy email apps out there. Let’s start with ProtonMail and TutaNota. Both are paid versions, but you can use their free account with limited features. Moreover, both offer end-to-end encryption and the only difference? TutaNota servers are based in Germany while ProtonMail is based in Switzerland. For a US alternative, Fastmail is an option to explore. They have data centers in Manhattan, New York and Bridgewater, New Jersey.

Chat Apps:

  • When you want to keep in touch with family and friends, Signal is the ideal tool for private messages and calls. Every message and every call is secured by an end-to-end encryption. Signal is recommended by the one and only Edward Snowden. If Edward Snowden is NOT enough to convince you, I don’t know what will.
  • If you want a business alternative, maybe you would want to check out MatterMost. For starters, it has layered security options and TLS encryption. Multi-factor authentication is also added for more security.

Conclusion

Google is not only the search engine out there. In these difficult times, you should not compromise your privacy and security just because of newly discovered disease. Things, like COVID-19, are beyond one’s control, and to be honest, all we can do is trust our medical experts and stop the spread of fake news. Help protect yourself – and your family as well – by following these 4 Tips in Protecting Yourself from Coronavirus Phishing Sites

 

 

If you are working from home since the COVID-19 outbreak, this new work arrangement may seem unfamiliar to you. Don’t worry, I will share to you some helpful tools during this coronavirus pandemic. You can still collaborate with your staff while working far from each other. Thankfully, platforms like – DuckDuckGo – are advocates of privacy so let’s get into some serious business without exactly exposing your identity online. The tools listed below will help you protect your privacy during these difficult times.

Video Calls

First on the list are video conferencing recommendations. Of course, team collaboration won’t happen if you don’t talk to your team. Nowadays, Zoom.us has been a popular choice, but is it safe? On March 30, 2020, the FBI reported about that users complained about being hijacked during their Zoom teleconference. A high school based in Massachusetts stated that an unknown person joined in an online class. Thus, the term “zoom-bombing” was coined. So, what are the alternatives for this?

  • Facetime

    • This ain’t something foreign to you, but Facetime offeres end-to-end encryption as stated on Apple’s list of privacy features. On all devices, Apples ensures end-to-end encryption on the messages and calls on iMessage and FaceTime. Additionally, Apple stayed that FaceTime and Group FaceTime calls are NOT stored on their servers.
  • Microsoft Teams

    • If there’s Apple, Microsoft also has an entry with the help of Microsoft Teams. On April 6, 2020, Microsoft reiterated its privacy and security features. According to the said blog post, Microsoft Teams “encrypts data in transit and at rest.”
  • Jami

    • Jami is a cross platform alternative, making it available to Windows, MacOS, Android, and even Linux users. In their website, Jami is direct in saying that it is private and anonymous. Communications made within Jami are end-to-end encrypted. Moreover, they do NOT require any personal information from anyone when signing up for an account.
  • PRO-TIP: Just because these tools say that it is protects your provacy and offers strong encryption, it doesn’t mean you won’t apply your own precautionary measures. Please do mute or turn off any smart devices during your company calls. For sure, you wouldn’t want Alexa, Cortana, or any smart assistant eavesdroping while you make calls.

Webcam Covers

Video conference won’t be complete without webcams. Sadly, hackers can get into your computers and spy through the webcam on your computer. They send seemingly harmless emails your way when, in fact, these are attempts to install malware on your email. Read more on Beware of Coronavirus Scams and Other Related Malicious Sites

To avoid any malicious programs entering your computer, a webcam cover can help with this ordeal. You can opt use a sticker laying around your desk, a stocky note you have, or a masking tape, or any tape really. These are your FREE options.

But of course, if you want a sturdy and reliable cover, there are webcam sliders or sliders you can easily buy online. Lastly, thanks to DuckDuckGo for providing a list of pro-privacy tools for everyone to use.

 

Next? Pro-Privacy Tools to Use When You Are Planning to Work from Home (Part 2)

 

 

In Beware of Coronavirus Scams and Other Related Malicious Sites, I made you aware of the phishing tactics spreading around the internet lately. I made sure that I would allocate a specific post regarding the protection against these online threats. Wether you admit it or not, there will be people using this global pandemic to their advantage. These cybercriminals don’t just go for healthcare institutions, but they also target your personal banking details.

Generally, cybercriminals don’t just spread threats online, but they have the audacity of going through your very homes. In fact, CNN posted an article about criminals that are posing as government authorities to scam people.

Protection Against Coronavirus Phishing Sites

As mere users, what can you do to avoid phishing scams? More importantly, if you own a business, what can you do to help your employees fall for these schemes?

  • Knowledge IS Power.

First, you have to inform everyone you know about COVID-19 so they won’t carelessly look for information elsewhere. Others may not be as well-versed as you are so keep them away from any threats by sharing the knowledge you know.

  • Only Share Official Websites.

Next, you have to stop speculating. The internet is full of conspiracy theories about the coronavirus. We all have to deal with this as a team and now is NOT the time to insist on your personal opinions. COVID-19 is a health emergency. Having said that, believe what the doctors and medical experts are saying. They are the most reputable sources of information today; don’t go sharing what you read on Facebook without verifying anything.

To help you get started, you can visit these websites:

  • Conduct a Quick Cyber Awareness Training.

Since this global pandemic has change the landscape of our workforce, it’s also timely to make them aware of the threats proliferating online. The virus we are fighting isn’t just found outside, but there’s also a threat spreading online. Phishing emails can endanger businesses as well. Teach all your employees on how to spot suspicious websites and emails, which are used to steal information. Most importantly, use pro-privacy tools even when one is using a shared computer at home.

In order to avoid to fall victim on these malicious email and sites, please read the following articles on cybersecurity.

  • Before Doing Anything, Verify First.

Lastly, don’t believe everything you read online. Verify all the information you have gathered. If you know a doctor or a nurse, you ask them first. Don’t spread unnecessary fear about the coronavirus.

Also, don’t immediately perform tasks which require you to supply sensitive information such as money transfers or signing documents. For instance, an employee got an email that he or she should transfer money immediately because a supervisor or an executive is not available at this time. Inform all your employees to:

  • Examine carefully all the emails they get. Check where the email is from, the email address used, the domain name of the email. Make sure everything matches with the information that they have!
  • As much as possible, verify through a phone call or through internal communication about the task especially if it entails money and classified information.
  • Never reply to those phishing emails and delete them right away!

As the number of Coronavirus Disease 2019 ( or COVID-19) cases rapidly increase throughout the world, there are also a growing number of Coronavirus websites proliferating. At every corner of the internet, you could see websites popping up getting email addresses and personal user information. Sadly, these websites only bring more harm than good. Thus, it is important to filter the information that come your way. Don’t be fooled by other websites and only believe data from verified outlets. For reliable information, you can visit the  Public Health Emergency, Centers for Disease Control, and The New York Times.

Now, more than ever, is not the time to spread malicious websites. The Health Sector Cybersecurity Coordination Center warns the netizens about a malicious website that’s not only fake, but it is also a malware. Worse, most users are unsuspecting of this because they just want to learn and get updates about COVID-19.

Undeniably, cybercriminals are using this global pandemic for their personal gains. Now is the time to be alert of the coronavirus spread, but also of the people taking advantage of new disease. The threat online is also as important the threat we experience in the real world. So, let’s dissect the phishing websites spreading online? What are the tactics they use to scam people?

A Fake COVID-19 Tracker

In any disaster, often times, people rely on the internet to get the new information. That’s why cybercriminals aim to replicate real and actual sites, making them seem harmless. What do they do exactly? They come up with a fake live tracker.

corona-virus-map[dot]com, a phishing website, seems to be the real deal when you look at it. Please don’t even try visiting the said site! I am not linking it here; this is just to make people aware that such fake tracking map exists. COVID-19 is already a serious threat as it is, and now, this fake website is only making thing worse. The phishing website is said to impersonate an actual health organization called John’s Hopkins University. Upon visiting the said site, the website visitors will infect with a trojan, and this AZORult trojan will steal information from the unsuspecting visitors. The information gathered can be used for cybercrimes and even theft.

More Coronavirus Domains

According to the security firm CheckPoint.com,

Since January 2020, based on Check Point Threat Intelligence, there have been over 4,000 coronavirus-related domains registered globally. Out of these websites, 3% were found to be malicious and an additional 5% are suspicious. Coronavirus- related domains are 50% more likely to be malicious than other domains registered at the same period.

COVID-19 Related Cybercrimes

More and more news articles pertaining to the coronavirus are being published each day. In fact, CheckPoint.com even reported that legitimate sites such as CNN and Financial Times have more than 1,200 articles and 1,100 articles about the coronavirus respectively.

Ever since the World Health Organiztion categorized COVID-19 a global pandemic, numerous COVID-19 themed websites are popping up. Other malicious websites spread through different means like:

  • sending malicious links online,
  • attaching shady links on emails,
  • spreading through online ads, and other portals on social media.

So, everyone should be aware on how cybersecurity threats can spread. Don’t just be cautious over this new corona-virus-map[dot]com site, but also be careful on the links and emails you click when you browse for new information about the coronavirus. Read helpful on 4 Tips in Protecting Yourself from Coronavirus Phishing Sites

 

SOURCE: (1)