Tag Archive for: settings

Google Wallet adds ‘Verification settings’ to balance security and convenience


What you need to know

  • Google Wallet has added a new verification settings menu for Android devices.
  • This setting allows users to decide whether or not they need to be verified before paying for a ticket on public transport.
  • This will help to make Google Wallet even more secure.

The ability to store card details, transit passes, boarding passes, and contactless payments, means Google Wallet is a convenient way to save time.  Now, Google is working hard to make Wallet even more secure and user-friendly by introducing a new ‘Verification settings’ menu.

The new addition, as spotted by 9to5 Google, lets users decide whether or not verification is required, specifically when paying for a transit ticket. Under “Wallet settings” is the new “Security” heading, under which “Verification settings” are listed. When selected, the user can “choose if you’ll need to verify it’s you when using your items stored in Wallet.” 

At the moment, the only available option here is “Transit payments.” When the “verification required” toggle is on, Wallet will require “verification for paying for bus, metro, and more with a credit or debit card.” This means the usual options for a device include a PIN or fingerprint scan, for example.  

Screenshots of the new verification settings menu in Google Wallet

(Image credit: Phone Arena)

If a user already has a transit pass stored in Wallet, the toggle will be switched on by default. The wallet will then require verification before paying with their bank card. If no transit pass is stored, this option will be automatically turned off. 

Source…

Check these settings to protect your Android device from malware scams


SINGAPORE – Android phone users’ freedom to download apps outside of official app stores – a defining feature of the operating system – is being curtailed amid pressure on tech companies to crack down on malware scams that have proliferated on the mobile platform.

Google, which develops Android, announced on Feb 7 that it would, by default, block attempts to install apps from unverified sources that require sensitive permissions, starting from the week of Feb 21.

Sideloading, as it is called, is common practice for the installation of apps for tech enthusiasts or for overseas businesses that are not supported by Google’s ecosystem.

This open door to unverified apps has been exploited by fraudsters to plant viruses. Malware scams left a trail of losses worth more than $34 million in 2023, according to the police’s scam statistics, which found that many victims were duped into installing virus-laden apps on Android phones.

In response, Google and phone manufacturers have had to tighten security measures on their devices in Singapore.

The blocking of installations of apps from unverified sources is part of a Singapore trial by Google and the Cyber Security Agency of Singapore (CSA) that will involve all Android users.

It is among a slew of security features available on the Android operating system – some of which are tucked away in the many sub-menus of the phones’ settings.

Here is a guide on how you can ensure your Android phone is shielded from the malware menace.

Look out for the new software update 

The new Android security feature that blocks attempts to install sideloaded apps will be pushed automatically to all Android devices – there is no need to manually update a device, said Google’s director of Android security strategy Eugene Liderman, in reply to questions from The Straits Times.

The update will beef up Google Play Protect, an in-built program on Android devices that scans for harmful behaviour, issues warnings and blocks or automatically disables suspicious apps.

ST understands that users will not be notified when the new software is enabled on their devices, but they will find that any new attempts to install apps from suspicious…

Source…

I’m a security expert – delete ‘invasive’ apps silently spying on your iPhone and Android using my settings trick


CYBERSECURITY experts have warned about invasive apps that can infiltrate your phone and steal your data.

Malicious invasive apps can easily compromise both Android and iOS devices.

Cybersecurity experts have warned about invasive appsCredit: Getty

WHAT ARE INVASIVE APPS?

Invasive apps are software that use a phone’s permission settings to spy on its user by accessing the phone’s camera, microphone, and more.

What’s more, these apps look like legitimate apps, “yet they have an ulterior motive,” security software company McAfee said in a blog post.

They are similar to spyware, except that spyware is malware that enables a hacker to obtain information about another’s computer activities.

“Both invasive apps and mobile spyware snoop on you and your phone, yet invasive apps work differently than mobile spyware. Invasive apps use a phone’s built-in functionality to spy and gather information on you,” McAfee explained.

A telltale sign of an invasive app is when the app asks for permissions it doesn’t need.

For example, if a flashlight app wants access to your microphone, that’s probably a red flag.

“The tricky bit with invasive apps is that many people quickly click through the user agreements and permission screens when they get a new app,” McAfee said.

HOW TO STAY SAFE

There are a number of ways to protect your device from invasive apps.

For starters, check your mobile device’s permission settings and manage anything that looks fishy.

For iPhone, go to Settings > Privacy & Security, then tap Safety Check > sift through apps’ permissions.

On your Android device, open Settings > select apps > tap the app you want to change > tap Permissions.

You can also run an antivirus or antimalware software on your device to run a security check.

Along with enabling security software, keeping your phone’s operating system up to date can help keep it protected.

You should also avoid downloading any suspicious-looking apps – especially if they’re only available outside of your device’s official app store.

Source…

These files can’t be opened – Your internet security settings prevented