Instagram hacking on the rise with need for more followers.


Instagram users have been the target of several new credential stealers, appearing on Google Play as tools for either managing or boosting the number of Instagram followers.

Under the detection name Android/Spy.Inazigram, 13 malicious applications were discovered in the official Google Play store. The apps were phishing for Instagram credentials and sending them to a remote server. Altogether, the malicious apps have been installed by up to 1.5 million users. Upon ESET’s notification, all 13 apps were removed from the store.

All the malicious app seem to be using the same technique in their operation. They operate by harvesting Instagram credentials and sending them to a remote server. Ironically instead of their own boosting, these users accounts end up being used to increase followers for other people.


The question is what happens to stolen credentials? Apart from an opportunity to use compromised accounts for spreading spam and ads, there are also various “business models” in which the most valuable assets are followers, likes and comments.

In our research, we’ve traced the servers to which the credentials are sent off and connected these to websites selling various bundles of Instagram popularity boosters.

The scheme below explains how it works:



There are several measures you need to put in place to ensure that you are protected.

  • If you’ve downloaded one of these apps, you will find one of its icons under your installed applications. to clean your device, uninstall the above mentioned apps found in your Application manager or use a reliable mobile security solution to remove the threats for you.
  • Change your Instagram password immediately you notice from Instagram about someone attempting to log into your account to secure your account. In case you use the same password across multiple platforms, change these as well as malware authors are known to access other web services using the stolen credentials, you are advised to use a different password on each of your accounts.
  • Also avoid putting sensitive information to these third party apps.
  • Have an up to date antivirus to protect and control the download of third party apps for example ESET that has help in blocking of these malicious apps.

Credits: welivesecurity




Has Your Smartphone Been Hacked?

2111201660% of all Kenyan adults possess a smartphone today. We need these gadgets with us all the time since they help us navigate in today’s digitized society. They take high-quality pictures, it’s a quick access to latest news and entertainment. They connect us to people through social media and interaction is easy without the need of postal services. These gadgets make us feel connected to the world.

However, smartphones contain almost 80% of our personal data and to some 100% of their lives are contained in these gadgets. Personal data include bank PINs, passwords, credit card numbers, very personal messages and emails you name it. Even though these gadgets make navigation through life easier, it increases the risk of being hacked and personal data stolen or exposed.

44238790-Hacker-is-stealing-information-from-a-mobile-phone-Stock-Vector Viruses are designed to steal information and sometimes it is very hard to know if you are hacked or if it is just the phone that has issues. This is because, most viruses hide in the “background” and are harder to detect. The main question here is how can you know if you are hacked? If your phone has been infected, it may show sudden erratic behaviors that affect the connectivity and usability of your phone. Other signs may include, unauthorized charges and transactions to your credit card or bank or the phone seem unresponsive, text messages and calls that you did not make etc.


  1. Do not download data from unknown sources and take time to research and read reviews before downloading anything to find out if it is legit or not.
  2. The best way to keep your phone safe is to purchase an appropriate antivirus and always keep it up to date. ESET Mobile security for example has features that secures every inch of your phone starting from anti-phishing  to SMS.

best-mobile-antivirus-appESET mobile security has anti-theft features that locks your smartphone in case your phone gets stolen and therefore protects your personal information. Other than that, it facilitates tracking of your gadget whenever it is stolen and many more.



Stay protected and enjoy safer technology with ESET.







Selecting the best patch management software for your company

Its every business desire to have the right software in  order to protect its assets and importantly remain compliant. Patch management is an easy concept to understand, and it is the software that automates the process is an easy product to grasp. What’s difficult and requires insight, however, is the process through which a business purchases patch management software.

This article basically gives tips on the buying out process, explaining patch management process and even giving out few vendors that could best assist in addressing  management strategies.

The suitable patch management software for your business should offer many benefits beyond increased productivity and efficiency. It should helps companies remain secure from exploitation by hackers. This, in turn, can cause a great loss of assets.

Regulatory compliance is also another important area that can be secured with patch management tools. This enables businesses to give priority to certain operating systems and software in the patching process

To hence take advantage of the important and protections benefits that the software can offer, having a know how on how procure the right tool is substantial. Assessing the product’s usability, the systems it integrates with and how, and its features are just ways to ensure that the right patch management tool is chosen. Prioritizing a business needs means that a business is then ready to select the best patch management software for them.

TipsIn procuring the best  software, there is need to read and know about the different business use cases where an enterprise would need automated patch management tools, how they alleviate productivity and resource issues and can help mitigate risk. This will help achieve at a decision on the best software to go for.

patchIt’s important to learn on how to evaluate the software tools. These covers a wide range from cost to functionality. ESET Antivirus for example offers the cost of its products while also explaining their functionality to its customers for easier purchase. This helps an organization or company know which software to buy.

Selecting the right software means an organization must match up its patching strategy needs to vendors’ offerings, the systems tools which integrate with and the budget the business has set aside.

The most suitable software for an organization is then a software that closely matches its patch management and its overall strategies and within its budget. Follow this tips and get the best deal for your company.