Kaspersky Mobile Security 9. Reviewer s Guide

Similar documents
USER GUIDE KASPERSKY MOBILE SECURITY 8.0

Mobile Security for Android devices

F-Secure Mobile Security

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Kaspersky Endpoint Security 8 for Smartphone Implementation guide

ESET ENDPOINT SECURITY FOR ANDROID

ESET SMART SECURITY 10

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

F-Secure Mobile Security

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

Phone Guardian v3.0 by SymbianGuru User Manual

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Kaspersky Small Office Security 5. Product presentation

Junos Pulse for Google Android

Junos Pulse Mobile Security Dashboard

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 7

How to install Internet Security for Android app

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

TREND MICRO Mobile Security 9.0 for Android Product Guide

Course Outline (version 2)

Sophos Mobile Security

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008



Quick Heal Total Security

Installation Manual. and User Guide

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Kaspersky Mobile Security

WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010

How To Remove Personal Antivirus Security Pro Virus Windows 8

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Built without compromise for users who want it all

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Zillya Internet Security User Guide

Single Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October

How To Remove Personal Antivirus Security Pro Virus

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

TREND MICRO Mobile Security 10.0 for Android Product Guide

Get Max Internet Security where to buy software for students ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Bitdefender Mobile Security & Antivirus User's Guide

Multi device User Guide

Notices. Third Party Project Usage. Sample Code in Documentation

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

Notices. Third Party Project Usage. Sample Code in Documentation

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Junos Pulse Mobile Security Gateway

The best for everyday PC users

3CX Mobile Device Manager

Notices. Third Party Project Usage. Sample Code in Documentation

White Paper Hyper-Mobility meets Security in the corporate environment

Notices. Third Party Project Usage. Sample Code in Documentation

OWASP Seraphimdroid guide and documentation

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Octopus Online Service Safety Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Bitdefender Internet Security 2017 User's Guide

Junos Pulse Mobile Security Gateway

FREQUENTLY ASKED QUESTIONS

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

The Table Privacy Policy Last revised on August 22, 2012

Firewall. Firewall For further information on installing the Remote Control app please refer to page 3 of this document.

TREND MICRO Mobile Security 2.0 for ios Product Guide

Notices. Third Party Project Usage. Sample Code in Documentation

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Online Threats. This include human using them!

Frequently Asked Questions

3.5 SECURITY. How can you reduce the risk of getting a virus?

ECDL / ICDL IT Security. Syllabus Version 2.0

Kaspersky ONE. Universal Security. Smartphone. Security Solution. Tablet. Devices. Quick Start Guide

FAQ. Safe Anywhere PC 12. Disclaimer:

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Bitdefender Antivirus Plus 2018 User's Guide

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Comodo Mobile Security for Android Software Version 2.5

Kaspersky Security for Windows Server


Transcription:

Kaspersky Mobile Security 9 Reviewer s Guide

The purpose of this document is to provide an introduction to Kaspersky Mobile Security 9 (KMS 9). KMS 9 is a product that has been designed to protect the user from any conceivable mobile threat, including: privacy violation, phone loss or theft, unwanted calls and SMSs, mobile malware and network attacks. 1 Introduction People make calls, send SMSs, browse the web and communicate via social networks every day. Smartphones have become an integral part of modern life. But sometimes life throws up a few nasty surprises, and if your smart phone isn t adequately protected, it could mean that it is you that could be left smarting from the cost of an exposed private life and a bank account that has been emptied by cybercriminals. Modern mobile devices usually contain a huge amount of personal information about their owners. Details such as who the owner has called or SMSed, contact lists, photos, or even online banking data. If a smartphone is lost or stolen, all that private information is compromised, and if it s a corporate mobile that goes missing, it can expose your company to unnecessary risks, including blackmail and extortion. In many countries, smartphones are now regularly used to make online transactions and to keep track of personal finances. Little wonder then that they are now being ruthlessly targeted by virus writers and cybercriminals. It could be said that mobile malware has now come of age. It is no longer limited to the annoying, but relatively harmless programs dreamt up by the geeks of yesteryear. These days, Trojans can infect your phone and steal money from your mobile account by sending SMSs to premium rate numbers without your knowledge or consent. What s more, these very same Trojans can easily pass on everything that a cybercriminal needs to know about you in order to leave you penniless and vulnerable as well. As if that wasn t enough, unsolicited calls and SMSs advertising goods and services that you didn t ask for are another irritating aspect of modern life. Thankfully there is now Kaspersky Mobile Security 9 to take care of all of these problems, meaning that your private life really will remain private and it is now available for the 4 most popular mobile platforms: Android, BlackBerry, Symbian and Windows Mobile. 2 Read more Mobile Malware Evolution: An Overview, Part 3 http://www.viruslist.com/en/analysis?pubid=204792080 2

Product Features 2.1 Anti-Theft Anti-Theft protects the user s data and identity should the phone become lost or stolen. It comprises 4 sub-features: Block, Data Wipe, GPS Find and SIM Watch. Block / Data Wipe A user can remotely block their phone if it is lost or stolen. The user simply sends a predefined SMS to their phone and the device will be blocked and no-one will be able to access its contents. When the device is blocked, a user-defined text is displayed on the screen. i.e., the user can request that the smartphone is returned to them. The user can also remotely wipe data on their phone if it is lost or stolen. A user sends a predefined SMS to their phone and previously selected folders on the device will be permanently erased. GPS Find A user can locate their lost phone. The user sends an SMS with the password to the missing device and as soon as a GPS connection is established, they will be sent a link to Google Maps that will show the exact location of the device. Once the user knows the whereabouts of the phone, it should be apparent if it was lost or stolen and the appropriate action can be taken. SIM Watch The first thing a thief normally does is to remove the smartphone s SIM card. If the SIM card is replaced, SIM Watch will immediately block the device and send an email with the phone s new number to the legitimate owner, thus allowing the owner to use the Block, Wipe and GPS Find functions. 2.2 Encryption With Kaspersky Mobile Security 9, a user can select the folders on their smartphone that they want to encrypt and password-protect. The contents of encrypted folders and memory cards cannot be reviewed by anyone other than the smartphone s legitimate owner, either on the smartphone itself or by using a PC. With KMS 9, the user can encrypt any number of folders (This was limited to one in KMS 8). 2.3 Call & SMS Filter Call & SMS Filter can run in White List mode, only accepting calls and messages from specified contacts, or in Black List mode, accepting calls and messages from all numbers except those on the list. One-click operation means that managing your lists has never been so easy. 2.4 Privacy Protection KMS 9 is designed to enhance the user s privacy should the smartphone be used by someone other than the legitimate owner for whatever reason. In Privacy Protection mode, the user has exclusive control over which of their contacts and phone numbers they want to keep private. At the touch of a button a user can easily hide and unhide everything related to a particular contact, including their phonebook entries, SMSs and call logs. Others will remain completely unaware that the user s phone has Privacy Protection capability and that they can only see the things that the user allows them to. Supports both Phonebook and SIM contacts; Password protected; 3

Switch to Privacy Protection mode manually, automatically after a defined period of time, or remotely by sending a special SMS to your phone. 2.5 Parental Control When installed on a child s phone, Kaspersky Mobile Security can block outgoing calls or SMSs to undesirable numbers, including premium-rate services. GPS Find allows a parent to determine exactly where their child is at any time of the day or night. 2.6 Anti-Virus and Firewall Real-time AV protection On-demand AV scanning Scheduled AV scanning Over-the-air AV database updates Network connection restrictions can be set by selecting the security level. 2.7 Features available on different platforms Symbian Windows Mobile BlackBerr y Android Anti-Theft + + + + Privacy Protection + + - + Call & SMS Filter + + + + Encryption + + - - Parental Control + + - - Anti-Virus + + - + 4

3 Kaspersky Mobile Security 9: Product Tour 3.1 Installation and setup Kaspersky Mobile Security 9 is compatible with smartphones running under Android (versions 1.6-2.2), Symbian (Nokia smartphones based on Series60 9.1, 9.2, 9.3 и 9.4), BlackBerry (versions 4.5-6.0)and Windows Mobile (versions 5.0-6.5). In the screenshots below, all aspects of Kaspersky Mobile Security 9 are shown as they appear on a Symbian-based Nokia E71 smartphone. Screens may differ on other platforms. Installation To install Kaspersky Mobile Security 9, copy the installation file to your mobile device from a computer, or download it directly from the Internet and start the installation. As the installation starts, accept the license agreement and make sure that there are no other antivirus applications installed on the device. Simultaneously running two antivirus products on a single device will lead to application conflicts. Generally, it is not necessary to restart your mobile device. When the installation completes, the KMS 9 shortcut will appear in the list of installed programs. NOTE: you can download Kaspersky Mobile Security 9 just by visiting URL kms.kaspersky.com from your smartphone. Your smartphone model will be detected automatically and the download will start. Note that for BlackBerry users this is the only way of installing Kaspersky Mobile Security 9. BlackBerry users cannot transfer the file to their device from a PC and launch it. How to activate Kaspersky Mobile Security 9 When the product is launched for the first time, the user is prompted to activate it. Activation is required to continue working with the product. The user can choose between the following activation options. 1. Enter an activation code that they have received, for example, if the product has been purchased from a retailer or online store 2. Start a free 7-day trial 3. Press One click buy to initiate a monthly subscription with a carrier. No activation code is required and the monthly fees will be taken directly from the user s mobile account 4. Or, to purchase the activation code online via the smartphone, the smartphone s integrated browser will open automatically When you enter your activation code, the product will need to connect to the Internet so that it can contact the activation server. 5

First steps after activating the product As soon as activation is completed, the user is prompted to set a secret code (a password). This password will be used by the product to identify the user. For instance, the password will be needed to open the product, or when sending remote commands to the smartphone, or when changing Privacy Protection modes, etc. Also, immediately after activation the user is prompted for the credentials to use if the user forgets the secret code and cannot access the product interface, or if the smartphone is blocked. Once a user has provided a valid code and confirms it, they are taken to the Protection Status screen. This screen will be displayed each time the product is opened. This screen gives a concise rundown of which components are active and which are disabled, what security threats have been identified, etc. In the screen above it can be seen that the antivirus databases are out-of-date and need to be updated right away. Once this is completed, a full scan of the smartphone is recommended. Next, the Anti- Theft and other components which are disabled by default will be configured. 3.2 Configuration and Use of Anti-Theft The Anti-Theft module is disabled by default. Each component of the module requires customisation to meet the user s specific needs. The Block component will be configured first. Upon opening, the user is informed about how this function works and what it is for. The product s interface typically provides similar descriptions for all of the product s components, thus a user can generally start working with the product straight away, without having to read the User s Guide first. The prompts can be disabled at any time by using the Hide button. Block It is quite simple to configure the Block component. Firstly enable it (Block = On) and then specify the text to be displayed in the event that the smartphone is blocked. The user can include their contact information in this message so that the missing smartphone can be returned to its rightful owner. 6

The Block feature can be tested right away by sending the message block:your_secret_code to the smartphone from a second phone. The smartphone will be blocked within a few seconds. The user will then receive a message on the phone that was used to send the block command stating that the smartphone has been successfully blocked. Data Wipe When configuring Data Wipe, it is necessary to first enable or disable the function. It is then necessary to specify which particular items of personal data such as contact lists, call logs, etc, and user folders to wipe. Exercise extreme caution when testing Data Wipe! Personal data may be accidentally deleted! To test Data Wipe, create a blank folder and configure Data Wipe so that only that folder is deleted (Delete data=no; Delete folders=yes). To activate Data Wipe, a message should be sent to the smartphone in the following format wipe:your_secret_code from a second phone. GPS Find To customize GPS Find it is necessary to first enable it (GPS Find mode = On) and then enter an email address to which a Google Maps link will be sent when the smartphone s location is requested. 7

To test the GPS Find function, send an SMS to the smartphone containing the following text: wipe: your_predetermined_text_code. Remember that GPS can be unreliable if the smartphone is located within a building, therefore it makes sense to conduct the test out of doors. In a real-life situation, when the GPS Find command is sent, the missing phone will continue attempting to establish a GPS connection until it is successful. SIM Watch The SIM Watch module contains more settings, but they are all equally as straightforward. SIM Watch Mode Firstly enable / disable the component as required. E-mail address an email address needs to be entered, to which notification of the new number will be sent if the SIM card is replaced. The Phone number function is used in much the same way, except that in this case, notification of a change of number is received via SMS. The If SIM card replaced function determines whether the device should be blocked or not in the event that another SIM card is inserted. Text when blocked the text entered here will be shown on the screen if the smartphone is blocked (identical to the Block component). Unlike other Anti-Theft components, SIM Watch does not require any external user commands. If somebody has replaced the SIM card in the device (try experimenting with this) the phone will be blocked and the user will receive notification of the new number. As the new number is known in the case of someone that is experimenting, it is possible for the experimenter to try out the Block, Data Wipe, and GPS Find functions. 8

3.3 Customizing and using Privacy Protection Customization When starting to work with Privacy Protection, it is necessary to select how the change to and from Privacy Protection mode will be achieved (Normal / Private), which contacts are to be concealed when in Privacy Protection mode and exactly what data should be concealed, i.e., Contacts in the contact list, call log records and incoming calls and SMSs. Privacy Protection mode can be entered either manually, or by choosing a time period after which it will auto-enable (Hide automatically) or remotely (Hide on SMS) by sending a predetermined SMS using the hide:secret_code format. Use the Contact list window to choose one, or several contacts, that will be concealed when Privacy Protection mode is enabled. The contacts can be added from the smartphone s memory or SIM card and additionally, a number can be added that is not directly stored in the smartphone s memory or on the SIM card. Finally, Hidden objects can be used to select the extent to which personal contacts are concealed: Messages determines whether SMS-messages should be concealed; Call entries hides call log records; 9

Incoming calls blocks incoming calls from the personal contacts list (after switching to Normal mode the calls will be shown as missed); Incoming SMS Suppresses the sound of any incoming SMSs and conceals the messages folder (after switching back to Normal mode the messages will be shown); In Privacy Protection mode the contacts from the contacts list are always concealed. Changing Privacy Protection modes From the product interface. Open the Privacy Protection mode window. Automatically. If the feature is preset, Privacy Protection mode will be enabled automatically every 1, 5, 15 or 60 minutes in stand-by mode. Remotely by sending an SMS. If this feature is enabled, it is possible to send an SMS to the smartphone using the hide:secret_code format to switch the device into Privacy Protection mode. 3.4 Customizing and using Encryption From the main Encryption window it is possible to choose when access to encrypted folders should be blocked (Block access) and also to select folders to be encrypted. As with other components in the product, one or several folders can be selected for encryption. If an attempt is made to open files that are stored in one of the encrypted folders, a password will be requested. Thus, unauthorized access to information will not be allowed, either via the smartphone itself, or in the event that the memory card is removed and inserted into a computer card reader. 10

However, the owner of the phone will not have to insert a password too often. Access to folders is blocked only after a predetermined period of inactivity has elapsed (see. Block access). Read more z%^ef$g73$5r(@&#!! - a few words about encryption http://www.viruslist.com/en/analysis?pubid=204792094 3.5 Customizing and using Call & SMS Filter Configuration The user can choose between two Call & SMS Filter scenarios either blocking calls and/or SMSs from predefined, blacklisted numbers, or if faced with an unwanted caller / SMS, immediately after the call is over or the SMS is received, without having to return to the KMS 9 interface. The blacklisted subscriber will hear an engaged tone as if the smartphone s number is always busy. Three Call & SMS Filter modes are available to choose from: Black List all calls and SMSs are received, except those added to the Black List White List only calls and SMSs from Whitelisted numbers are received. i.e., you can White List just a couple of priority numbers and enable it when very busy (e.g. during an important meeting). Both Lists this mode enables Whitelisted numbers to call, but blocks Blacklisted numbers. If a call or SMS is received from a number which is not included on either list, it can be added to the Black List or White List in the dialogue window, or to neither of them. In the Mode window you can choose the required mode and select additional settings. Allow contacts always allows numbers from the contact book (i.e. considers all contacts as Whitelisted) Non-numeric originators sometimes the origin of SMS-spam can appear on the screen as text instead of in numeric format (e.g. Message from: Sales ). This setting enables all such communications to be blocked. 11

When adding a number to the Black List it is possible to define whether that number should be blocked for calls and / or SMSs. It is also possible to block any number on the basis of the receipt of an SMS that contains a particular piece of text. Read more 3.6 Configuring and using Parental Control "Instant" threats The Parental Control module allows parents to define which numbers their child should not call or send http://www.viruslist.com/en/analysis?pubid=204792005 SMS messages to. To prevent the child from modifying Parental Control settings and number lists, the product s interface can be password-protected. Parental Control can be viewed as being like Call & SMS Filter, but working the opposite way around. It also uses a Black List and a White List, but it is outgoing rather than incoming calls and messages that are blocked. Parental Control has two modes: White List (the child can call and send messages only to those numbers which are on the list) and Black List (calls and messages are not blocked unless the number is Black Listed). For example this allows parents to block the child s messages to premium-rate numbers (4-digit and 5-digit numbers, etc.), calls to other countries and calls to premium-rate services, etc. With Kaspersky Mobile Security 9 installed on a child s telephone, it is possible to use the GPS Find feature to determine the exact location of the phone (details can be found in the Anti-Theft section) and thus the child s whereabouts too. The feature can also be used to search for the phone if it is missing. 3.7 Configuring and using Anti-Virus Anti-Virus has reasonably complex and varied functionality, but a good place to start is with the protection settings. Protection mode. Enabling or disabling real-time protection. Objects to be scanned. Selection of objects to be scanned: all files or executables only. If a virus is detected. Selection of an action to be performed if a virus is detected: quarantine, delete or log the event. 12

Protection icon. Selection of options for displaying the protection icon: always show, in menu only, do not show. The icon shows the status of antivirus protection: it is red when protection is enabled and grey when it is disabled. The Scan menu includes various options for scanning the device for viruses: the entire device, a selected folder, memory only, or messages only. It can also be used to configure the product s behavior during scanning and to schedule scans. It is recommended that a full scan be performed immediately after installing and activating the product and updating the antivirus databases (see the screenshots below). The Anti-Virus feature also allows the user to view quarantined items and configure antivirus updates by setting the download updates schedule, choosing Internet access points to be used, deciding whether to update whilst roaming, etc. It is worth noting that mobile Internet connections charges are usually very high outside the home network. 3.8 Configuring and using the Firewall The Firewall s configuration options are easy to use and designed for the average smartphone user. You can select from predefined security levels: maximum protection, recommended, block all connections or off (allow all connections). You can also enable or disable popup notifications displayed when an application s network activity is blocked. 13

3.9 Additional The Additional window provides various options relating to the product as a whole. The License window allows the user to view information about the current license, enter the activation code or buy / renew the license online directly from the phone. Other items in the Additional window include: Send command send a remote Anti-Theft or Privacy Protection command to another telephone with Kaspersky Mobile Security 9 installed on it provides an alternative to manually sending an SMS message with a command and password. Settings here the user can change the secret code (password), enable or disable hints provided by the product s interface, configure sound notifications and screen backlight and enable or disable displaying the protection status screen when launching the product. Database info information about the antivirus databases used on the device. About brief information about Kaspersky Mobile Security 9. Log event log for all of the product s components. 14