Connect with us

    Hi, what are you looking for?

    Blazin News

    The Government Warns Against Some Malicious Apps Used By Hostile Intelligence Agencies

    In a recent advisory, the cabinet division of a nation’s government has issued a warning about 133 malicious applications created by hostile intelligence agencies. These apps are designed to steal information. The Pakistani government has provided a list of these applications involved in hacking and stealing data.

    These applications are considered tools for espionage and have been created by hostile intelligence agencies to retrieve classified information. Many of these apps appear to be chat applications but they are blended with hacking tools that are intended to manipulate and trap government officials.

    Warning Government Entities

    The cabinet division has circulated the list of these malicious applications to all the necessary government departments, divisions, and ministries. Officials are urged to refrain from using these apps as they may steal sensitive data. In the event that someone has installed these applications, the government has recommended certain actions to be taken immediately. These actions include noting the contact details of the individual responsible for sharing the link to the app.

    The affected device should be disconnected from the internet, and all contacts should be notified about the incident to ensure security.

    Precautions to Take

    There are proactive measures that individuals can take to avoid becoming victims. The advisory suggests the following best practices in cybersecurity:

    • Review application permissions before installation.
    • Download applications from reputable sources such as the Apple Play Store and Google.
    • Regularly educate staff about the evolving tactics used by cyber threats.

    Technical Security Measures

    Cybercrime is increasing rapidly, with cyber attackers targeting key departments in Pakistan. Organizations can take various measures to avoid cyber attacks, including:

    • Regularly updating antivirus software.
    • Carefully reviewing application details before installation.
    • Disabling app installation from untrusted sources.

    The advisory recommends installing reputable antivirus solutions on Android devices, such as Avast or Kaspersky. After installation, the suspected device should be scanned with antivirus solutions to detect and clean any infections. It is important to read reviews and comments, as well as additional information, before downloading and installing apps on Android devices.

    Users are also advised to promptly install Android updates and patches when they become available from device vendors. Furthermore, individuals are warned against utilizing insecure WiFi networks that are often used by hostile elements to distribute malicious applications. The advisory also emphasizes the importance of practicing secure email practices, such as avoiding downloading or opening attachments from unknown sources.

    Advertisement. Scroll to continue reading.

    Lastly, the advisory highlights the significance of implementing two-factor authentication to protect online banking, email accounts, and social media platforms.

    It is important for every individual working in an organization to be trained in safeguarding measures. Workshops and training sessions are recommended for this purpose.

    Image Source: maicasaa / Shutterstock

    You May Also Like

    Reviews

    Microsoft has resolved 74 security issues in its software during the company’s August 2023 Patch Tuesday release. The previous month’s update tackled 132 vulnerabilities,...

    Hacks

    An economical high-voltage power supply project has been developed by Sebastian from Baltic Labs. The primary element of this endeavor is a commercial power...

    Hacks

    The issue of compatibility centers around the POPCNT CPU function. TheBobPony’s posts on Twitter uncovered that this function is found in several Windows 11...

    Hacks

    The choice to utilize USB storage was influenced by the nonexistence of Bluetooth and the substandard audio input port in the dated entertainment system....