Cybercriminals often exploit unsuspecting users by repackaging legitimate software with malware, viruses, spyware or other malicious elements. Here are some best practices that will ensure you are installing legitimate applications and software on your mobile devices and computers. Note that these tips are for informational purposes only.

COMPUTERS (WINDOWS, MAC, CHROMEBOOKS)

  1. Download from trusted sources. When downloading software, always ensure you are obtaining it from a trusted source. Research the software you need and visit the official website of the software provider to ensure authenticity and compatibility with your system. Download the software directly from the official website or from official app stores, such as the Microsoft Store for Windows or the App Store for Mac. Official software manufacturers assess their applications for security vulnerabilities and regularly release updates. Downloading from any other source could expose you to security and other risks.
  2. Scan and install. Scan the downloaded file with your antivirus software to confirm it is free from malware. This can provide an additional layer of security. Then, locate the downloaded file and double-click to start the installation process. Follow the on-screen instructions to complete the installation.
  3. Enable automatic updates. After installation, check for any available software updates. Visit the software's official website or, if provided, use its built-in update feature to ensure you have the latest version installed. Turn on auto-updates so you do not miss important security patches and software updates.

What can happen if you accidentally install software with malware on your computer?

Malware collects sensitive information and can gain remote control over the compromised computer by gathering data and potentially logging keystrokes, executing malicious code. It can install harmful software, compromising security.

While everything may seem normal at first, a compromised computer may experience slowness, display unexpected pop-up ads, or crash frequently. In the worst-case scenario, the attacker gains complete control of the compromised device, potentially rendering the computer unusable and accessing personal accounts for financial loss or identity theft.

Remember:

"Free" download does not mean free software. Exercise caution when encountering “free” software or have doubts regarding the legitimacy of it, as it may be pirated. This software may have undergone illegal modifications, meaning it will not receive official updates, patches, or feature releases like legitimate software would. The software may also contain malicious add-ons like malware or open backdoors that cybercriminals can exploit to gain control over your device.

Beware of unsolicited links or pop-ups. If you encounter a pop-up prompting you to update an application while browsing the internet, it is likely a ploy by cyber criminals to gain unauthorized access to your device. Avoid clicking on such links and close the pop-up immediately.

Be cautious of SEO poisoning. High ranking websites in search results may seem more legitimate, but this isn’t always the case. SEO (Search Engine Optimization) poisoning is a type of cyberattack that manipulates the search engine to rank websites with malicious software higher in the results tab. Always verify the site, even if it appears at the top of your search results. Avoid clicking on sponsored ad links, since there is frequent misuse of sponsored ads by malicious actors.

MOBILE DEVICES (PHONES AND TABLETS)

Most of us select apps through Google Play Store, Apple App Store or Amazon App Store, which perform extensive vetting before making apps available – but they may not catch everything. Even when using reputable app stores, you should always use caution when downloading apps. Before installing any app, keep in mind the following steps.

  1. Check the app’s name. Confirm that the spelling is correct and that there are no misrepresented letters or missing/extra spaces. Check the app’s permissions. Be cautious of apps that ask for unnecessary or excessive permissions. For example, does a calculator app need to access your camera and location?
  2. Look for red flags in the app’s description. These include grammatical errors, vague or generic information, and a lack of details about functionality.
  3. Look at the app’s reviews. Look for reviews that mention fake offers or excessive ads.
  4. Look at the app’s age. If you don’t need the app right away, monitor the number of installs before downloading.
  5. Check the app’s developer. Verify that the developer is legitimate. Read reviews of other apps they have published and check their website.
  6. Utilize additional mobile security apps. There are a number of apps that can scan for malware, detect suspicious behavior, and alert you when an app is potentially dangerous.
  7. Always keep your devices up to date. When using any software or application, it’s important to apply security patches and updates as soon as they become available so that vulnerabilities are remediated in a timely manner.