Tag Archives: highlighted

5 tips for protecting your YouTube account

youtube

Videos, videos, and more videos! The millions of YouTube users are probably unaware of the dangers when surfing the platform looking for the next viral hit. However, this Google service is in the eye-line of many cybercriminals.

Through phishing attacks, they try to obtain passwords to access information such as bank data associated with your YouTube channel. The problem may be even greater if the account you use is owned by the company for which you work.

So, in the event that you have a YouTube channel which you use frequently, take note. Carelessness can end up being very expensive taking some precautions will serve you in the long run.

5 tips to protect your YouTube account

1. Be careful with shortened links

To begin with, be wary of any shortened link that reaches you, no matter where it comes from. While most are safe, some hide nasty surprises, like a malware that is automatically downloaded to your computer to steal information. Before clicking, make sure you know where the link will lead you to.

password

2. Use secure passwords

A key aspect in preventing a phishing attack is to have a strong password. It should include a mix of uppercase, lowercase, numbers, symbols and the maximum number of possible. In addition, it is recommended to change your password every three months if you can. This way you’ll be able to ensure that the cybercriminals are stopped in their tracks.

3. Change your  password frequently

As if it needs to be repeated, but be cautious with your password – do not use the same one you use on other platforms and don’t have it written down. We must tread warily in the digital world, but the physical world can be just as dangerous.

4. Don’t give your information away via email

You shouldn’t trust emails that you receive that request the password with which you access your YouTube account. In fact, if it comes from Google itself, be extra wary – an attack uncovered a few months ago shows that a malicious URL, in the guise of a company link, could make users enter their information without realizing it.

5. Fill out the recovery form on Google

It is important that you fill out the recovery form on your Google account. Although you may not like the idea of ​​giving your phone number to the company, it is a good way to avoid bigger issues if you discover that someone tries to enter your account – you’re the only one who has access to the recovery code on your phone.

In short, common sense and some thoughtfulness when creating your password can save you some massive headaches later. Just check carefully where you enter your personal details and this will stop cybercriminals from getting their hands on it.

The post 5 tips for protecting your YouTube account appeared first on MediaCenter Panda Security.

More than 50% of malware for Android is aimed at stealing from you. Keep an eye on your pocket!

android

With the barrage of news about Hacking Team, the massive cyber espionage by governments, and the US intelligence raids, it might seem that cybercriminals are taking a different route compared to your average criminal. However, don’t let this fool you as they are all after the same thing which, as the famous song goes, is “money, money, money”.

Wherever there’s money, there are sure to be malware creators. So after the boom in internet shopping people are beginning to reach for their pockets to make payments once again; not with their wallets though, but rather their cellphones.

According to a recent study carried out by IAB, 7 out of 10 Spaniards (more than 19 million internet users) regularly buy online. The percentage of those who make purchases from their cellphones or tablets is steadily increasing and currently accounts for 15% of all purchases. In other countries, such as the United States, the percentage of purchases from mobile devices is even greater.

These online purchases generally require the use of sensitive bank information as you are paying with a card or performing a transfer, but this doesn’t seem to bother consumers. According to a report by ING, nearly half of Europeans now use their smartphone or tablet to carry out bank transactions.

mobile dollars

Slowly but surely tablets and smartphones are replacing the traditional computer for these types of tasks and, as a result, they have become a goldmine for cybercriminals. Financial malware, designed to gain access to your account, is thriving in the darkest corners of the internet.

More than half of all malware designed for Android has been created with stealing money in mind. This was confirmed by a recent study, which named Trojan and ransomware (which hijacks your terminal and requires a payment to unblock it) as the most popular tools deployed by cybercriminals.

It’s interesting to note that it is Android, and not iOS, which is the main target of attack. This is despite iOS taking a far larger profit share of the market. This is because, for the cybercriminals, it is all a matter of volume.

On a global level, Android is a far more popular system and accounts for 78% of the smartphone systems in operation, according to details from the IDC. Meanwhile, iOS only accounts for market share of 18.3%.

The more potential victims there are, the higher the yield for the cybercriminals, as we have seen with the infamous Sypeng and Faketoken cases, which wreaked havoc across the globe. So, if you have already been targeted by them you’re in a tricky situation, as prevention is better than the cure in this case.

An antivirus for Android and following some advice when completing transactions on your mobile device (such as avoiding public WiFi connections and avoiding applications that aren’t on Google Play) will save you a lot of hassle in the future.

The post More than 50% of malware for Android is aimed at stealing from you. Keep an eye on your pocket! appeared first on MediaCenter Panda Security.

10 tips to stop cybercriminals from ruining your vacation

pc

Now that we’re entering into that time of year when planning your summer getaway is high on the agenda, there are always some things we can do in order to divert burglars’ attention from our vacant houses – don’t leave all the curtains and blinds closed over; ask a neighbor to collect your mail from the mailbox; be sure to leave a light on at night, etc.

However, these traditional forms of protection are now no longer enough. Our lives revolve around technology more than ever now and this also poses a risk during the vacation period, but don’t fear – these are some measures you can take to stop cybercriminals from ruining your summer.

10 tips to stop cybercriminals from ruining your vacation

1 – Don’t shout it from the rooftops

First of all, don’t post on social media about your upcoming vacation. If you really can’t avoid it, then don’t reveal too many details about your plans. This information could be useful for someone with a sinister motive and could leave your home and valuables exposed.

Another thing, make sure you deactivate your GPS. This way you don’t have to worry about it giving away clues of your whereabouts which might avert criminals to the fact that you’re out of town.

2 – Make a copy of everything

If you have decided that you’re going to take your laptop or tablet (or even just your smartphone, from which you can’t be apart!), don’t forget to make a security copy of everything on it and leave that at home.

This isn’t just to protect you against theft, but rather because you never know if you might lose it or have an unfortunate accident. It pays to think ahead!

3 – Protect yourself

Antivirus, firewall… make sure that all of your security measures are fully functioning before you head off on your travels. In the event that you need to connect to public WIFI, you can rest assured knowing that your device is secure.

4 – Avoid public connections

Despite having confirmed that your device is in good health, try to avoid using public WIFI as much as possible. By connecting to public WIFI you run of the risk of any cybercriminal accessing your personal information.

wifi airport

5 – Just stick to your own computer

Unless it is an emergency, try to avoid using computers that aren’t your own. This includes those that are available in your hotel or internet cafes because any information that you enter into them could be compromised. This could put your privacy and security at risk.

6 – Change your passwords

If you have no other choice but to use a public computer, do so with caution. Only use secure webpages, try to use it through a Virtual private Network (VPN) so that the information is coded, and change your passwords as soon as you have finished.

password

7 – Be wary of offers

Summer is a prime time for fraudulent offers. You should err on the side of caution if you see an offer online or receive one to your email account. Check out other reviews on it, check that the webpage is safe, and that all of the facts are real so as to avoid being duped.

8 – Deactivation of your smartphone

Prepare your cellphone for the worst – if you lose it or it is stolen, you’ll be glad that you activated one of the applications that allows you to locate your phone or deactivate it remotely. Android devices come with this feature built in thanks to the Android Device Manager and also you can usea our antivirus for Android.

find phone

9 – Buy with caution

When completing a purchase online, such as hotel or flight reservation, keep an eye on your personal details. Electronic payment systems and credit cards come with security measures which mean you can shop safely online. However, make sure that unauthorized purchases don’t appear in your account. If you spot anything out of the ordinary, change your passwords and contact your bank.

10 – Be careful with USBs

If, during your vacation, someone shares something with you via a USB on your computer, be sure to scan it with an antivirus first. Not only are there hidden dangers on the internet, but also on USBs, which can hide a nasty surprise.

The post 10 tips to stop cybercriminals from ruining your vacation appeared first on MediaCenter Panda Security.

If you like videogames, check out these safety steps!  

game boy

The good times are rolling for videogame companies as the sector has witnessed sustained growth in the last few years and, luckily, 2015 doesn’t look like it’s about to break this trend. According to recent estimates by Newzoo, an industry consultant, businesses in the sector are expecting global gaming revenues of $91.5 billion dollars – an increase of 9.4% compared to the previous year.

This rapid growth is in large part thanks to the boom in mobile and tablet gaming, which have registered revenues of $20.6 billion and $9.4 billion, respectively. They have also seen the largest rise increase compared to the previous year – 21% and 27%, respectively – although they still trail video consoles ($25 billion) and computers ($27 billion), which continue to lead the sector.

Despite this all being great news for video gamers, we still have to keep in mind the increasing danger posed by cyber-criminals. In the last few months we have seen some not-so-pleasant attacks which have been of a worrying frequency.

Last summer we saw how a wave of Distribution Denial of Service (DDoS) attacks infiltrated, to name a few, popular platforms such as the Playstation Network, Xbox live, Twitch and Origin. The attacks, which denied users access to online gaming, were repeated again over the festive season. Groups such as Lizard Squad and Anonymous claimed responsibility for accessing, and leaking, as many as 13,000 passwords and credit card details from these platforms.

In January of this year, various users of Origin (Electronic Arts) complained that the service – including the online store – was carrying out charges to their bank accounts for purchases that the users hadn’t authorized. Twitch, Amazon’s well known streaming page, asked its users to change their passwords at the end of March following an attack that could have left log-in details exposed.

videogames

With this in mind, the best thing that any gamer can do is to take precautions when playing online. By following some simple steps you can avoid trouble if your favorite gaming platforms are targeted.

How to play safely

  • Don’t use your personal email address on gaming sites. If you create a new one, or even a disposable account, the hackers won’t be able to access personal information such as your contact list.
  • If you don’t play on buying games or add-ons during, don’t give out your credit card details – it’s an unnecessary risk.
  • Some platforms offer you the possibility of verifying your identity in two steps in order to protect your account. Don’t overlook this invaluable tool.
  • Before entering personal details into the registration form, ensure that it is an official page and not a copy. Phishing attacks are, sadly, rampant and a good way to make sure you’re not being duped is to click on the logos and links to verify their authenticity.
  • Finally, and most importantly, keep your antivirus up to date. Our antivirus software will detect fraudulent pages and the possible malware that will try to install itself on your computer.

By following these tips and using common sense, you can enjoy your favorite games without fear of anything bad happening during your gaming experience. Online security is no joke, so it is important to always play safely.

The post If you like videogames, check out these safety steps!   appeared first on MediaCenter Panda Security.

Public WiFi networks. Are they safe?

free wifi

Airports, hotels… On vacation we also spend the whole day connected to the Internet. WhatsApp has in many countries become an essential tool for personal communication. We all want to be able to check Facebook, post photos on Instagram, tweet something we’ve seen, and answer work emails from wherever we  are… and it’s possible. We mostly do all these things from a smartphone, or perhaps from tablets or (increasingly less) from laptops.

It is quite common to scan for and connect to public WiFi networks which aren’t password-protected and let you connect to the Internet cheaply and simply. In fact, a typical selling-point of many restaurant chains nowadays is that they offer free WiFi connections to customers, and in many places there are public WiFi hotspots provided by local councils.

Even though the price of mobile data connections has dropped considerably (largely thanks to competition and technological advances), and connection speeds continue to increase (GPRS, 3G, HDSPA, 4G…), most users, if they can, still try to avoid using mobile data. The reason is simple: many of the mobile data rates on offer include a limit on data download volume, and once this threshold is exceeded, either the connection speed drops or the charges increase. Moreover, not everywhere has good mobile data coverage, and that directly affects the connection speed. And that’s not to mention the question of data roaming when traveling to other countries, where prices are very often completely prohibitive.

It’s obvious that most of us at one time or another will try to connect to a public WiFi network. Is it safe? What are the risks? Can anyone spy on data sent from my device? Can I get infected if the network is malicious? These are some of the questions that we’ll answer below.

When you connect to the Internet from home or from your office, you know who is responsible for the network and which people can connect to it.  However, on a public network, anyone can be connected, and you have no idea of their intentions. One of the first questions that arises concerns the level of security on any Web page that requires you to enter your login credentials.

wifi airport

How to connect safely to a public WiFi network

Could someone connect to the same network and spy on data communications?

Yes, anyone connected to the network could capture the data traffic sent from your device, and there are simple, free apps available for this purpose.

Does this mean that someone could steal my Facebook username and password?

No. Fortunately, Facebook, along with many other social networks, webmail services, online stores, etc. have secure Web pages. You connect to them via SSL, which you can see on your browser (depending on which one you use) when the padlock icon is displayed next to the page address. This means that all the data sent to this page is encrypted, so even if it is captured by a third-party, it cannot be read.

What about other websites? Could someone see which pages I’m visiting, or access the data I enter on unencrypted site?

Yes. It’s very simple to capture this information, and anyone could see what pages you connect to, what you write on a forum or any other type of unencrypted page.

So as long as the Web page is secure, I’m alright, aren’t I?

Yes, but it must really be secure. Capturing network traffic is just one type of possible attack. If the hotspot has been deliberately set up by an attacker, they could, for example, alter the settings of the WiFi router to take you to the page they want. Imagine you enter www.facebook.com in your browser, yet the page you see is not really Facebook but a copy, so when you enter your username and password you are giving it directly to the attacker. Or, worse still, the page you are taken to contains an exploit which infects your device without you realizing. In any event, the fake page won’t be secure, which should help you detect that it is not the real site.

But is this still the case if I know that the WiFi hotspot is reliable, such as in a shop or restaurant?

Yes. although it is obviously safer, no one can guarantee that the router hasn’t been compromised, or that the DNS configuration hasn’t been changed, which would enable an attack like the one described above where you’re directed to a fake page. In fact in 2014, security holes have been discovered in popular routers which allow them to be hacked so an attacker could easily change the configuration.

This is chaos! Is there any way of protecting myself against these attacks?

Yes. One good way is to use a VPN (Virtual Private Network) service. This ensures all data traffic from your device is encrypted. It doesn’t matter whether the site is secure or not, everything is encrypted. When you are connected to the VPN, the router’s DNS settings are not used in any event, so you’re protected from the types of attack described above.

And what about password-protected WiFi networks? Is there the same risk?

This in effect ensures that only people who know the password can connect to the same WiFi access point, nothing else. In a way, you could say that this reduces risks by reducing the number of people who can connect, although the same kind of attacks can still occur in the same way as on an open network without password protection.

Does this apply to all types of devices or just to computers?

To all kinds: computers, tablets, smartphones or any other device with which you can connect to a network.

And so what about WhatsApp? Can anyone see my chats or the photos and videos that I send?

No. Fortunately that information is now encrypted. Previously it wasn’t, and in fact, an app was developed that allowed you to see people’s chats if you were connected to the same network. This is no longer possible, although there is a way someone could find out your phone number if you are connected to WhatsApp on the same network as them, but that’s the most they can do.

The post Public WiFi networks. Are they safe? appeared first on MediaCenter Panda Security.

WhatsApp for Android: Always download it from Google Play!

By becoming popular, they turn into a real danger. The more famous an application is, the more likely it will be used by cybercriminals to carry out frauds, which may turn out very expensive for those distracted users.

The perfect example is WhatsApp. Each novelty announced by the instant messaging service is exploited immediately by the thugs on the network to deploy all kinds of social engineering techniques.

Without going any further, WhatsApp voice calls lead on to fraud via email: the victim is notified by email of a pending voice message and in order to for hear it he just needs to click on it. By doing so, it will not play any message, but actually it will download a malicious software on the user’s computer.

To generate this avalanche of fraudulent services, cybercriminals not only take advantage of WhatsApp’s latest features. Sometimes they create totally fake versions with presumed advantages as the possibility of customizing the app’s appearance. The most recent case is the one of the so-called Blue WhatsApp, it promised changing the famous app’s green to blue, although this version hides a poisoned apple: a subscription to a premium service which will increase, quite a bit, the victims’ phone bill.

whatsapp azul

In general, the desire of enjoying new features on an application as common as WhatsApp makes some users to accept these updates even if they do not come from an official supplier.

That is why, the best way of avoiding any kind of fraud from making a hole in our pocket or someone stealing our information stored in our Android is using Google Play (or the App Store in case of having an Apple device) at the time of downloading and update or any other application.

whatsapp google play

In this way, users can sort the Web woven by the crooks on the Internet. Furthermore, not only should be wary of those web pages that provide the so-called WhatsApp download with little credible characteristics: on other occasions, a platform which doesn’t belong to the official app nor to the corresponding applications market, will simply offer users to download WhatsApp as a way of attracting potential new victims.

Without false advantages but just as fraudulent, these downloads will fill your device with malware or subscribe you to an SMS premium service at a great cost. It is the case of a website that distributes a malware designed to steal data and it does it under the official WhatsApp appearance.

whatsapp

The web site does not promise any new features in the instant messaging service. It simply enables the download. When the user installs it and accepts all permissions requested, this false WhatsApp access the information stored on the users’ Android device.

That way, both downloading and updating an application, the safest way to do it is going to the corresponding official site. Even so, users can also find in places like Google Play some fraudulent applications hiding under the appearance of a popular service or that simply requires more permissions than the strictly necessary.

For this reason, before downloading an application for the first time you should read carefully its rating and some comments from other users: if it is a trap that has evaded Google’s Play security, the previous experience of others can serve you as warning.

The post WhatsApp for Android: Always download it from Google Play! appeared first on MediaCenter Panda Security.

Trolls on Twitter. How to avoid them

twitter birds

“We suck at dealing with abuse and trolls on the platform”, said Dick Costolo, former CEO of Twitter, as he stepped down July 1, at the beginning of the year. This statement showed what any user of the social network already new: that Twitter regrettably fails to control harassment.

A recent study carried out by Pew Research Center showed that 40% of the Internet users surveyed claimed to have been victims of cyber harassment. That’s why, one of the purposes of the social network is implementing the necessary tools so that the users do not suffer the abuses of those who are hiding behind anonymity to insult and attack others.

The most recent attempt from Twitter to minimize its impact was allowing users to share with their friends their lists of blocked tweeters. Thus, you can already block several trolls at the same time. Mass-blocking.

“You can now export and share your block lists with people in your community facing similar issues or import another user’s list into your own account and block multiple accounts all at once, instead of blocking them individually”, explained from the social network’s blog.

lista

To use this new feature to import and export lists of blocked users, tweeters who want to avoid harassment on Twitter just need to follow a few simple steps, starting from the ‘Blocked accounts‘ section of the settings on Twitter:

How to export a block list on Twitter

  1. In the ‘blocked accounts settings’, click on ‘advanced options’ and select ‘export your list’.
  2. Twitter will ask you to confirm which accounts you want to export. In this intermediate step, you have two options: select all the accounts that you have blocked with a single click or uncheck those that you don’t want to share.
  3. Once you have selected the accounts that you want to incorporate to the file, click ‘Export’. It will generate a .csv file that will be downloaded automatically on your computer and which you can share with who you want.

exportar

How to import a block list on Twitter

  1. Before starting, you must have received from a contact the .csv file corresponding to their list of blocked accounts on Twitter.
  2. With the file already downloaded on your computer, go to ‘advanced options’, in the ‘blocked accounts settings’, and there select ‘Import a List’.
  3. In the pop-up, click on the paperclip icon on the option ‘attach a file’ to upload it. From there, you must select the .csv file you had downloaded.
  4. It will display the list of accounts blocked by your twitter friend that shared the file with you. It will be then when you will have to select if you want to block the whole list (with just one click) or if you prefer to give some of them a chance. To do so, you will have to uncheck those accounts which you don’t want to block.
  5. Click on ‘Block’ to confirm your selection and automatically, the marked accounts on that list will no longer be among the potential stalkers who someday may decide to attack you on Twitter.

With these simple tools, the lists of blocked users will be shared very easily, so that Twitter users may clip with hardy any effort the wings of several trolls simultaneously (and by recommendation the contact who has shared with us his list).

The post Trolls on Twitter. How to avoid them appeared first on MediaCenter Panda Security.

Do you accept app permissions without reading them? You should be more careful!

A smartphone is nothing without its apps. Looking around the apps store is something we do quite frequently, either by necessity or to see what’s new or which game is most popular. And probably, while you are there browsing you end up downloading one or two.

That’s when Android users have to accept certain permissions of their new application. Apple users approve these permits the first time they use the app or certain features.

Applications request access to certain data and features of your device. As expected, maps apps ask for permission to use GPS and locate your device. However, most applications ask for more permissions than they should, which means that we are taking a few risks just by accepting them.

broken smartphone

One of the most shocking examples is the flashlight apps. For using them you don’t need to sing in and they are free. However, when installing the app we have to accept permissions which have nothing to do with the app’s purpose, as knowing their location thanks to GPS data, taking pictures, recording audio or even reading our text messages.

App Permissions – Read before accepting

Facing that avalanche of totally unnecessary permissions, the best thing users can do before installing an application is to look closely at what information the app wants to access.

Most of these times, these permissions do not respond to a real need for the application to function, but serve to create an advertising environment that adapts the location and the user’s interests. Hence a flashlight wants access to GPS or a QR code reader asks permission to view your browsing history and your web markers.

The users take several risks when they systematically accept these permissions. On the one hand, they are letting developers to know their location or their Internet habits, and the final destination of this information is not clear at all.

But the situation may be much more serious if there is a security breach in the application’s meat that allows cybercriminals to access your smartphone through these permissions.

So, giving full access to Internet could result in cybercriminals taking advantage of the connectivity to download malware to your device or to steal passwords transmitted through Wi-Fi.

However, security breaches and cybercriminals are not the only risks that a user may face when approving the requested permissions. In fact, they are not even the most common. The major risk is users handing over their data to apps development companies, and these companies end up sending their users’ private information to analysis or advertising companies.

These permissions can also lead, in the case of downloading malicious applications, to scams related with calling services and premium messages, which do not provide any service for the user but charge exorbitant prices for each message.

Finally, when you download and install an application, the best thing you can do is to stop and analyze if the permissions required are necessary and, especially, if the developer can be trusted.

Checking this before approving permissions willy-nilly can avoid any surprises, or at least, our data falling into anybody’s hands.

The post Do you accept app permissions without reading them? You should be more careful! appeared first on MediaCenter Panda Security.

25 years of security and innovation

It’s Panda’s Birthday. But this 2015 is not an ordinary anniversary. Tomorrow, June 25th, we turn 25, no more, no less!

Panda was born in 1990, which was also the date of the World Wide Web development, what a coincidence, right? It has been 25 years in which we had time to do many things but, at the same time, time has flied! 25 years researching, developing, analyzing and protecting our customers, both corporate and home users, against all Internet threats.

Despite all we could tell you here, it wouldn’t be enough! So, we think the best thing that we can do is to give you an overview of our 25 years of history with images. Thank you so much to all of you who have been part of it! :)

panda software

 

CeBIT 2001

CeBIT 2001

 

Bilbao Offices

Bilbao Offices, 2001

 

cebit, 2002

CEBIT, 2002

 

Cebit

CEBIT, 2003

 

PandaLabs

9 years ago… PandaLabs (2006)

 

panda - one step ahead

 

1st security blogger summit

1st Security Blogger Summit, 2009

 

panda-tres cantos

Old Offices in Tres Cantos (Madrid)

 

panda - the cloud security company

 

panda booth

Panda Booth at SIMO. 2007

 

open-windows

Open Windows Premiere. Madrid. 2014

 

news conference

Introducing Panda Security 2015 to the Media

 

Panda Security logo

 

Panda Kick Off

Panda Kick Off. Bilbao. 2015

 

simplexity

We’re Simplexity!

 

Congratulations and let’s enjoy another 25 years together! :)

 

birthday cake

The post 25 years of security and innovation appeared first on MediaCenter Panda Security.

Need help fixing the iOS text message bug causing iPhone crashing/reboot?

iphone

Something as simple as an SMS has threaten Apple and its iPhones. A security flaw has been found in Cupertino’s Smartphone, it is one of those text messages which gives the user a nasty surprise: when you receive it, your iPhone reboots.

The SMS that causes the device’s failure is not an ordinary text message. Therefore, it is virtually impossible that users receive this SMS by accident. The bug is a text string with symbols and Arabic characters in a specific sequence, which causes iMessage to collapse and the iPhone to reboot.

Just like you have seen in the video, it is not necessary that the user access the messaging application. As soon as you receive it, the device reboots. If that wasn’t enough, once the iPhone is back on, it is not possible to access the messaging application to eliminate the malicious conversation: it is blocked.

In addition, the SMS has not only highlighted the existence of a vulnerability in iPhones, but it also caused iPads, Macs and even the brand-new Apple Watch to crash too.

The company has already announced that they are aware of the vulnerability and that they will solve it through a future iOS update.

sms iphone

Are we still in danger?

Meanwhile, the controversial SMS continues to cause chaos on Apple devices. Putting an end to its effects is not easy, but fortunately, there are some fixes available to re-open the Messages app:

  • Ask the person who sent you the malicious SMS to send you another text message so the conversation continues, cancelling the effects of the first. Once received a second message, the user can access the conversation list and eliminate it.
  • Ask Siri. This is the solution proposed by Apple, but this time you will be the one paying for the SMS as you will be the one sending it. After receiving the damn message and seeing how the device reboots, the user could ask Siri to “read unread messages”. Siri won’t be able to read the SMS and will ask you if you want to reply. In that moment, you will be able to dictate a message to Siri, so the last strand of the conversation is not the one that causes the system’s failure. This way you will be able to access the conversations lists and delete the thread.
  • Send a picture via the Photos app, which will allow you to access the message history and then delete the conversation, at last.

All this taking into account that the character strand that causes the failure in the system is not a usual message. If you receive it, it is because your prankster friend or someone else wants to give you a hard time. So, until Apple launches the next iOS update we will need these tricks to fix this problem.

The post Need help fixing the iOS text message bug causing iPhone crashing/reboot? appeared first on MediaCenter Panda Security.