Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Tip #18 Are You SURE You Want to Download that App?
    Cyber Security Awareness Month Tip

    Tip #18 Are You SURE You Want to Download that App?

    By Elizabeth CornellOctober 26, 20151 Min Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link
    Image: Ad for Kodak Instamatic Camera. Life Magazine, Sept. 17, 1965, p.64.
    Image: Ad for Kodak Instamatic Camera. Life Magazine, Sept. 17, 1965, p. 64.

    A Snapchat notification twinkles out at you from the phone. It’s midterms week and you’re craving a break from studying. Before you can open up the (probably very funny) “snap” your best friend sent you, an ad for something called SnapNSave pops up. “Save and view snaps as many times as you like,” reads the app’s description. You think to yourself, What a great idea!

    But little do you know, the Snapchat you’re about to save will be hacked and exploited like the other 500Mb of photos that were just stolen by this app.

    Legitimate third-party applications can offer entertainment or functionality. But use caution when you decide to enable any application on a device. Avoid applications that seem too good to be true, or significantly change the operation of a trusted app. Also, adjust your settings to limit the amount of information an application can access.

    Read more about third-party app risks in this article from FireEye.

    By Nicole Kagan, Fordham IT News Editor

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    cell phones Exploits and Vulnerabilities scam Security Awareness
    Previous ArticleTip #17 Free Antivirus Protection from Fordham
    Next Article Article: How To Stop Ransomware, The Cyberattack That Holds Your Computer Hostage Until You Pay

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d