Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


June 2025
06.05.25

SIM swap scams: lock down your phone number with a strong carrier pin

We often talk about strong passwords and two-factor authentication (2FA) as the ultimate shields for your online accounts. And they are fantastic! But there’s a sneaky scam out there that can bypass even SMS-based 2FA: the dreaded SIM swap scam. It’s becoming a serious problem, and if you’re not careful, it could leave your digital life vulnerable.

Think of your phone number as a major key to your digital identity. Many online services send verification codes to your phone to confirm it’s really you logging in. A SIM swap scam happens when a bad actor manages to convince your mobile carrier to transfer your phone number to a SIM card they control. Once they do that, they start receiving your calls, texts, and those crucial 2FA codes, allowing them to take over your online accounts one by one. It’s like someone stealing your actual house key from your phone provider’s store!

How Does a SIM Swap Scam Work? The Hacker’s Playbook

Scammers usually pull this off in a few steps:

  1. Gathering Info: They might gather some personal information about you from data breaches or social media (your name, address, birthday, etc.).
  2. Contacting Your Carrier: They then contact your mobile carrier, pretending to be you. They’ll claim their phone was lost or damaged and they need to activate a new SIM card for your number.
  3. Bypassing Your PIN: This is where your carrier PIN comes in. If your PIN is weak or easily guessed, they can provide it to the carrier’s representative, “verifying” their identity.
  4. The Swap! Once verified, your phone number is transferred to their SIM card. Your old phone stops working, and suddenly, they’re getting all your calls and texts, including your 2FA codes.
  5. Account Takeover: With your phone number in their hands, they can then go to your banking apps, social media, email, and other online accounts, initiate a “forgot password” request, receive the 2FA code, and lock you out.

Your Secret Weapon: A Strong Carrier PIN

This is where you can really beef up your defense! Your mobile carrier allows you to set up a PIN or password for your account. This is different from your phone’s screen lock or your online account passwords. This PIN is what your carrier uses to verify your identity when you call them or go into a store. If a scammer can’t provide this PIN, they can’t perform a SIM swap.

What You Need to Do RIGHT NOW:

  1. Contact Your Mobile Carrier: Don’t wait! Call your mobile carrier (AT&T, Verizon, T-Mobile, etc.) or log into your online account (but be careful of phishing sites!).
  2. Set Up or Strengthen Your PIN:
    • If you don’t have a carrier PIN, set one up immediately.
    • If you already have one, ask to change it to something strong and unique. Don’t use your birthday, address, or simple number sequences. Make it long, complex, and memorable only to you.
  3. Ask About Extra Security: Inquire if your carrier offers any additional security measures for your account, such as a “port freeze” or extra authentication steps for SIM changes.
  4. Limit Public Info: Be mindful of how much personal information you share online that could be used by scammers to answer security questions or verify your identity with your carrier.

A strong carrier PIN is a critical, yet often overlooked, layer of defense against SIM swap scams. By taking this simple but powerful step, you’re putting a major roadblock in front of cybercriminals and keeping your phone number – and all the accounts linked to it – safe and sound. Don’t leave your digital life vulnerable; secure that PIN today!

06.04.25

App smart: how to dodge those potentially harmful apps

Our phones and tablets are packed with apps that make our lives easier, more fun, and super connected. But amidst all those helpful tools, there are also “Potentially Harmful Applications” (PHAs) lurking, just waiting to cause trouble. These sneaky apps can steal your data, bombard you with ads, or even hijack your device. The good news? With a few smart habits, you can dramatically reduce your risk of downloading a bad one.

Think of it like this: official app stores are like well-lit, reputable marketplaces. They have security checks in place to keep the sketchy stuff out. “Unknown sources” or unofficial download sites? Those are more like dark alleys – you never know what you’re going to find, and it’s rarely good!

Why Sticking to Official App Stores is Your Best Bet:

This is rule number one for a reason!

  • Security Checks: Official app stores (like the Google Play Store for Android or the Apple App Store for iOS) put apps through a rigorous review process. They scan for malware, check for privacy violations, and generally try to keep bad apps out.
  • Developer Verification: App stores usually verify the identity of developers, making it harder for anonymous bad actors to publish malicious apps.
  • Built-in Protections: Your device’s operating system is designed to work seamlessly with its official app store, offering integrated security features that might not apply to apps downloaded from elsewhere.

Avoid these like the plague:

  • Unknown Sources: Don’t enable “Install from unknown sources” on your Android device unless you absolutely know what you’re doing (and even then, be extremely cautious).
  • Untrusted Enterprise Certificates: These are sometimes used to install apps outside official channels. Unless your IT department specifically instructs you and you trust them completely, avoid installing them.

Even in Official Stores: Be a Digital Detective!

Now, here’s the kicker: even official app stores aren’t 100% foolproof. Sometimes, a malicious app manages to sneak through their defenses. That’s where you come in! You need to be the final line of defense.

  • Read the Reviews – Carefully!
    • Quantity and Quality: Does the app have a decent number of reviews? Are they mostly positive, or are there red flags?
    • Specific Complaints: Look for reviews that mention suspicious behavior like excessive ads, battery drain, or strange permissions.
    • Fake Reviews: Be wary of reviews that sound generic, repetitive, or overly enthusiastic, especially if they’re all posted around the same time. These could be fake.
  • Research the Developer:
    • Official Website: Does the developer have a legitimate-looking website? Does it match the app’s branding and description?
    • Other Apps: Does the developer have other apps in the store? Check their quality and reviews.
    • Contact Info: Can you find legitimate contact information for the developer?
  • Check App Permissions (Before Installing!):
    • When you go to download an app, look at the permissions it requests. Does a simple flashlight app really need access to your contacts, microphone, and camera? If the permissions seem excessive or unrelated to the app’s core function, that’s a huge red flag.

By limiting your app downloads to official sources and then doing a quick “detective check” on the reviews and developer, you significantly reduce your risk of downloading a potentially harmful app. Stay smart, stay safe, and keep your phone clean!

06.03.25

How a dedicated email time and no notifications enhances cybersecurity

How often do you find yourself juggling a million things at once? Answering a work call, typing up a report, and trying to quickly glance at an incoming email notification? In our super busy lives, multitasking has become the norm. But here’s a secret: when it comes to email, especially with sneaky phishing attacks on the rise, being too distracted can actually make you more vulnerable.

Think about it: those clever phishing emails are designed to look legitimate and create a sense of urgency. If you’re stressed, rushing, or just not giving your full attention to an email, you’re much more likely to miss those tell-tale red flags – a weird sender address, a slightly off logo, or a suspicious link. Even the most tech-savvy folks can fall for a well-crafted phishing scam when they’re trying to do too many things at once. It’s like trying to spot a tiny hidden clue in a game while simultaneously being bombarded with distractions!

The Danger of Distracted Emailing:

So, why does multitasking make us so susceptible to phishing?

  • Missing Red Flags: Our brains are amazing, but they can only focus on so much. When you’re distracted, you’re less likely to scrutinize the sender’s email address, hover over links to check their destination, or notice grammatical errors that scream “scam!”
  • Impulsive Clicking: Phishing emails often create a sense of urgency. When you’re in a hurry and seeing a notification pop up, you might click a malicious link without thinking, just to clear the notification or address the “urgent” matter.
  • Reduced Critical Thinking: Being overwhelmed can diminish your ability to think critically and question suspicious requests. Your guard is down.

Take Control: Schedule Your Email Time and Silence Notifications!

The solution is simpler than you might think: dedicate specific time to your inbox and eliminate distractions. Here’s how to do it, especially in Gmail:

  • Schedule Dedicated Email Time: Pick a few specific times each day (e.g., 9 AM, 1 PM, 4 PM) when you only focus on your email. Close other tabs, silence other alerts, and give your inbox your full, undivided attention. This allows you to carefully read emails, spot anything suspicious, and respond thoughtfully.
  • Turn Off Desktop Notifications in Gmail: Those little pop-ups begging for your attention are major distraction magnets. Here’s how to disable them:
    1. Open Gmail: Go to your Gmail inbox in your web browser.
    2. Access Settings: Click on the gear icon (⚙️) in the top right corner.
    3. See All Settings: From the quick menu that appears, click on “See all settings.”
    4. Navigate to General: Make sure you’re on the “General” tab (it’s usually the default).
    5. Scroll to Desktop Notifications: Scroll down until you find the “Desktop notifications” section.
    6. Select “Mail notifications off”: Choose this option to silence all those tempting pop-ups.
    7. Save Changes: Don’t forget to scroll to the very bottom of the page and click “Save Changes.”

By scheduling dedicated time for emails and turning off those intrusive notifications, you create a focused environment. This helps you become a much sharper detective against phishing attempts, making it harder for cybercriminals to trick you when your guard is up. Reclaim your inbox, improve your focus, and boost your cybersecurity all at once!

06.02.25

Why you need to update your Firefox browser!

We’re constantly browse the internet – for work, for fun, for cat videos (admit it!). And while we might rely on our web browsers every single day, it’s easy to forget about one super important thing: keeping them updated. Even if you’ve got those “automatic updates” turned on, it’s a really smart move to double-check now and then. Today, let’s focus on Firefox and why making sure it’s running the latest version is crucial for your online safety.

Think of your web browser as your main window to the internet. Just like your house windows, if they have cracks or aren’t properly sealed, unwanted “things” can sneak in. Browser developers, like the awesome folks behind Firefox, are constantly working to fix these “cracks” (which we call security vulnerabilities or bugs) and add new features. If you’re not updating, you’re leaving those windows wide open for cybercriminals.

Why Update Your Browser? It’s More Than Just New Features!

While new bells and whistles are nice, the real reason to update your browser (especially Firefox!) is security:

  • Patching Security Holes: Hackers are always looking for weaknesses in software. When a new vulnerability is discovered in Firefox, the developers quickly release an update to fix it. If you’re not on the latest version, you’re exposed to that known vulnerability, making you an easier target for malware, phishing attacks, and other nasty stuff.
  • Protection Against New Threats: The internet is a constantly evolving landscape of cyber threats. Updates often include new defenses and protections against the latest scams and attack methods.
  • Improved Performance and Stability: Beyond security, updates often bring performance enhancements, making your Browse experience faster and smoother. They also fix bugs that can cause crashes or glitches.
  • Enhanced Privacy Features: Modern browsers are constantly improving their privacy tools to help you control your data. Updates often include better tracking prevention and other privacy safeguards.

Giving Firefox a Quick “Health Check”:

So, how do you make sure your Firefox browser is up-to-date and ready to tackle the internet securely? It’s super simple!

  1. Open Firefox: Launch your Firefox browser.
  2. Click the “Hamburger” Menu: In the top right corner of your browser window, you’ll see three horizontal lines (it looks like a hamburger!). Click on that.
  3. Go to “Help”: From the dropdown menu, hover over or click on “Help.”
  4. Select “About Firefox”: In the “Help” menu, choose “About Firefox.”
  5. Let it Do Its Thing: A small window will pop up showing the Firefox logo and its version number. Firefox will automatically start checking for updates in the background.
    • If it says “Firefox is up to date”: Great! You’re running the latest and safest version. Close the window and continue Browse securely.
    • If an update is available: It will immediately begin downloading. Once the download is complete, you’ll see a button that says “Restart to update Firefox.” Click this!
  6. Restart Your Browser: Make sure you restart Firefox to apply the update. Don’t skip this step!

Making a habit of checking for browser updates, even with auto-updates on, is a small effort that pays off big in terms of your online security. Keep your Firefox fresh, and keep those digital bad guys out!

06.01.25

App gone rogue? How to kick a malicious app off your Android

We’ve all been there: you download a cool new app that everyone’s raving about, thinking it’s totally safe. But sometimes, even popular apps can turn out to have security vulnerabilities or, worse, be downright malicious. Even the savviest tech users can get caught off guard! The good news is, if you suspect an app on your Android device is causing trouble, it’s pretty easy to give it the boot.

Think of it like this: your phone is your personal digital assistant, and sometimes, one of its “employees” (an app) might start misbehaving. Maybe it’s suddenly asking for weird permissions, draining your battery super fast, showing you endless pop-up ads, or your phone just feels… off. These could all be signs that you’ve got a problematic app on your hands. Don’t panic! We’ll walk through how to send it packing.

Signs of a Potentially Bad App:

Before we get to uninstalling, how can you tell if an app might be causing issues?

  • Sudden Battery Drain: If your phone’s battery life suddenly plummets, and you haven’t changed your usage habits, a rogue app could be the culprit.
  • Excessive Pop-Up Ads: Are you seeing ads even when you’re not using certain apps? That’s a major red flag.
  • Slow Performance: Your phone feels sluggish, freezes often, or takes forever to load things.
  • Unexplained Data Usage: Your mobile data bill suddenly skyrockets.
  • New, Unfamiliar Apps: You spot an app you don’t remember installing.
  • Suspicious Permissions: An app you’ve had for a while suddenly requests strange new permissions that don’t make sense for its function.

Give It the Boot! How to Uninstall Problematic Android Apps

Ready to clean house? Here’s the straightforward way to remove a potentially malicious app from your Android phone or tablet:

  1. Open Settings: First things first, swipe down from the top of your screen to open the Quick Settings panel, then tap the gear icon (⚙️) to go to your main Settings menu.
  2. Find Apps & Notifications: Scroll down and look for an option like “Apps & notifications” or simply “Apps.” The exact wording might vary slightly depending on your Android version and phone manufacturer (e.g., Samsung might call it “Apps” directly).
  3. Access App Info: Tap on “App info” or “See all apps” to get a full list of everything installed on your device.
  4. Identify the Culprit: Scroll through the list and find the app you want to remove. If you suspect a malicious app but aren’t sure which one it is, think about any apps you installed recently just before the problems started.
  5. Select and Uninstall: Tap on the problematic app’s name. This will take you to its App Info screen. Here, you should see an “Uninstall” button. Tap it!
  6. Confirm: Your device will usually ask you to confirm that you want to uninstall the app. Tap “OK” or “Uninstall” again.

What if “Uninstall” is Grayed Out?

Sometimes, you might find the “Uninstall” button is grayed out. This usually means the app has been granted “Device administrator” permissions, which can happen with some legitimate apps (like certain security software) but also with malicious ones.

If this happens:

  1. Go back to the main Settings menu.
  2. Search for “Device admin apps” or “Device administrators” (it’s often found under “Security” or “Biometrics and security”).
  3. Find the problematic app in the list and deactivate it.
  4. Now, go back to step 5 above, and you should be able to uninstall it normally.

By regularly monitoring your phone’s behavior and knowing how to quickly remove suspicious apps, you’re keeping your digital life safer. Don’t let those bad apps linger!