SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
2CAN 0029-13-CID361-9H

7 October 2013

“MYPAY” OR NO PAY APPS
OVERVIEW:

Contact Information:
Cyber Criminal Intelligence Program
27130 Telegraph Road
Quantico, Virginia 22134
Phone: 571.305.4485 [DSN 240]
Fax: 571.305.4189 [DSN 240]
E-mail:
cybercrimintel.cciu@us.army.mil
CCIU Web Page:
www.cid.army.mil/cciu.htm

DISTRIBUTION:
This document is authorized for
wide release with no restrictions.

“DO WHAT HAS TO BE DONE”

The purpose of this Cyber Crime Alert Notice (2CAN) is to inform
Department of the Army personnel of third party mobile
applications that reference the Department Finance and
Accounting Services (DFAS) myPay system for federal
employees and members of the uniformed services, but are not
sponsored by the Department of Defense or U.S. Government.
DFAS processes pay for all DoD military and civilian personnel,
retirees and annuitants, and also supports other government
agencies. Using non-sanctioned applications to access your
myPay account can potentially lead to the compromise of your
myPay account information and theft of funds. CID elements are
encouraged to brief supported installations and units on the
contents of this 2CAN.

BACKGROUND:
An application called “MyPay DFAS LES” was initially released
on 13 Jul 13, as a free application on Google Play Android App
Store. The App provides the user with the ability to control their
military pay after the user enters their myPay login information to
access their individual account. Additionally, it provides the
ability for the user to update their security questions to reset their
password. Google Play estimates that between 10,000-50,000
members have already installed this App. A broader review of
mobile App sites disclosed several other myPay related Apps for
Android and iPhone devices.
GENERAL TIPS ABOUT MOBILE APPS:
 Before downloading, installing, or using an application, take a moment to review the “About the Developer”

section. This will help you get an idea about other Apps that specific developer has previously published. If
available, visit the developer’s website and assess its content for things like history, professional appearance,
etc…
 Apps that purport to allow access to military or government sites should only be installed if they are official

Apps sponsored by the military or other government agency.
 Peruse the user ratings and reviews to try to get a sense from previous customers as to the veracity of the

application’s claim. Arguably no App is completely perfect from the perspective of all users, but complaints
about security concerns should quickly stand out from other relatively benign issues.
 If you’re still not sure and end up downloading an App, inspect your device’s application permissions screen to

determine what other applications or information will be accessed by the App. A video game, for example, is
unlikely to have a legitimate need to access your contacts.
For more information about computer security and other computer related scams, we encourage readers to visit
the CCIU website to review previous cyber crime alert notices and cyber crime prevention flyers.

ADDITIONAL INFORMATION:
Defense Finance and Accounting Service (DFAS.mil)


DFAS: myPay Secure



Contact DFAS: Telephone 888.332.7411

U.S. Computer Emergency Response Team


Avoiding Social Engineering and Phishing Attacks



Preventing and Responding to Identity Theft



Protecting Portable Devices: Data Security



Safeguarding Your Data
Disclaimer: The appearance of hyperlinks in this 2CAN, along with the views and opinions of authors, products or services
contained therein does not constitute endorsement by CID. These sites are used solely for authorized activities and
information that support the organization's mission. CID does not exercise any editorial control over the information you may
find at these link locations. Such links are provided consistent with the stated purpose of this 2CAN.

CCIU uses the Interactive Customer
Evaluation (ICE) system. Please click
on the ICE logo and take a moment to
provide us with feedback.

Más contenido relacionado

La actualidad más candente

Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
tbrown230
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
Talwant Singh
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
Christopher Porter
 
Red Storm Rising
Red Storm RisingRed Storm Rising
Red Storm Rising
John Bonora
 

La actualidad más candente (19)

Be An IT Hero - 10 Reasons to Move to the Cloud
Be An IT Hero - 10 Reasons to Move to the CloudBe An IT Hero - 10 Reasons to Move to the Cloud
Be An IT Hero - 10 Reasons to Move to the Cloud
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020
 
Protecting and Serving Military Credit Consumers
Protecting and Serving Military Credit ConsumersProtecting and Serving Military Credit Consumers
Protecting and Serving Military Credit Consumers
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
 
E-Verify Compliance Essentials 2016
E-Verify Compliance Essentials 2016E-Verify Compliance Essentials 2016
E-Verify Compliance Essentials 2016
 
CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 CFPB Hot Topics in 2016
CFPB Hot Topics in 2016
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
 
The Future of SMS & IM for the Dating Industry
The Future of SMS & IM for the Dating IndustryThe Future of SMS & IM for the Dating Industry
The Future of SMS & IM for the Dating Industry
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Your Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions AnsweredYour Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions Answered
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignment
 
Reasons Why Claims Management Software is a Game Changer For Insurance Companies
Reasons Why Claims Management Software is a Game Changer For Insurance CompaniesReasons Why Claims Management Software is a Game Changer For Insurance Companies
Reasons Why Claims Management Software is a Game Changer For Insurance Companies
 
Red Storm Rising
Red Storm RisingRed Storm Rising
Red Storm Rising
 
Internet Privacy Explained
Internet Privacy ExplainedInternet Privacy Explained
Internet Privacy Explained
 
What to do if you encounter a mobile phone app scam
What to do if you encounter a mobile phone app scamWhat to do if you encounter a mobile phone app scam
What to do if you encounter a mobile phone app scam
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 

Destacado

Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track record
Francisco Prack
 
UNTurkeyESAWorkshop-TamerÖzalp
UNTurkeyESAWorkshop-TamerÖzalpUNTurkeyESAWorkshop-TamerÖzalp
UNTurkeyESAWorkshop-TamerÖzalp
Tamer
 

Destacado (11)

Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track record
 
Garr Reynolds' Top Ten Presentation Tips
Garr Reynolds' Top Ten Presentation TipsGarr Reynolds' Top Ten Presentation Tips
Garr Reynolds' Top Ten Presentation Tips
 
Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track record
 
Convenio con la comuna de Susana, departamento Castellanos para la transferen...
Convenio con la comuna de Susana, departamento Castellanos para la transferen...Convenio con la comuna de Susana, departamento Castellanos para la transferen...
Convenio con la comuna de Susana, departamento Castellanos para la transferen...
 
Snapchat Statistics
Snapchat StatisticsSnapchat Statistics
Snapchat Statistics
 
UNTurkeyESAWorkshop-TamerÖzalp
UNTurkeyESAWorkshop-TamerÖzalpUNTurkeyESAWorkshop-TamerÖzalp
UNTurkeyESAWorkshop-TamerÖzalp
 
Eskola kontseiluen gida - 2011
Eskola kontseiluen gida - 2011Eskola kontseiluen gida - 2011
Eskola kontseiluen gida - 2011
 
The Passion of Christ
The Passion of ChristThe Passion of Christ
The Passion of Christ
 
A Snapchat Tutorial, Evan Garber, Social Fresh Conference 2016
A Snapchat Tutorial, Evan Garber, Social Fresh Conference 2016A Snapchat Tutorial, Evan Garber, Social Fresh Conference 2016
A Snapchat Tutorial, Evan Garber, Social Fresh Conference 2016
 
Packet tracer 6.2 new features
Packet tracer 6.2 new featuresPacket tracer 6.2 new features
Packet tracer 6.2 new features
 
Prove Your Worth: Social Media Measurement, Zontee Hou, Social Fresh Conferen...
Prove Your Worth: Social Media Measurement, Zontee Hou, Social Fresh Conferen...Prove Your Worth: Social Media Measurement, Zontee Hou, Social Fresh Conferen...
Prove Your Worth: Social Media Measurement, Zontee Hou, Social Fresh Conferen...
 

Similar a Criminal Alert Notice (myPay)

Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
Mike Kuhn
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
Milos Pesic
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
ResearchProjectComplete
ResearchProjectCompleteResearchProjectComplete
ResearchProjectComplete
dannyboi17
 

Similar a Criminal Alert Notice (myPay) (20)

How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile Apps
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Money Apps: A Review
Money Apps: A ReviewMoney Apps: A Review
Money Apps: A Review
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
 
The Evolution of Cloud Computing - Sydney Social Enterprise Breakfast
The Evolution of Cloud Computing - Sydney Social Enterprise BreakfastThe Evolution of Cloud Computing - Sydney Social Enterprise Breakfast
The Evolution of Cloud Computing - Sydney Social Enterprise Breakfast
 
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
The Mobile Lawyer: 2014
The Mobile Lawyer: 2014The Mobile Lawyer: 2014
The Mobile Lawyer: 2014
 
Mobile Banking App Development A Complete Guide.pdf
Mobile Banking App Development A Complete Guide.pdfMobile Banking App Development A Complete Guide.pdf
Mobile Banking App Development A Complete Guide.pdf
 
ResearchProjectComplete
ResearchProjectCompleteResearchProjectComplete
ResearchProjectComplete
 

Más de U.S. Army Garrison Red Cloud and Area I

Más de U.S. Army Garrison Red Cloud and Area I (20)

In the Zone August 2015
In the Zone August 2015In the Zone August 2015
In the Zone August 2015
 
Wolmido island & cruise poster aug2015
Wolmido island & cruise poster aug2015Wolmido island & cruise poster aug2015
Wolmido island & cruise poster aug2015
 
Outdoor weekend trip water ski
Outdoor weekend trip water skiOutdoor weekend trip water ski
Outdoor weekend trip water ski
 
Partner 8 ball tournament
Partner 8 ball tournamentPartner 8 ball tournament
Partner 8 ball tournament
 
Gyongbok palace tour
Gyongbok palace tourGyongbok palace tour
Gyongbok palace tour
 
Story time july
Story time julyStory time july
Story time july
 
Everyday
EverydayEveryday
Everyday
 
Dmz tour august 2015
Dmz tour august 2015Dmz tour august 2015
Dmz tour august 2015
 
Nami island trip
Nami island tripNami island trip
Nami island trip
 
Ville clean up august
Ville clean up augustVille clean up august
Ville clean up august
 
In The Zone - July 2015
In The Zone - July 2015 In The Zone - July 2015
In The Zone - July 2015
 
In The Zone - June
In The Zone - June In The Zone - June
In The Zone - June
 
Casey library storytime flyer
Casey library storytime flyerCasey library storytime flyer
Casey library storytime flyer
 
Repairs closed poster
Repairs closed posterRepairs closed poster
Repairs closed poster
 
Boss (stanley) afn broadcast
Boss (stanley) afn broadcast Boss (stanley) afn broadcast
Boss (stanley) afn broadcast
 
Ice cream soiree poster
Ice cream soiree posterIce cream soiree poster
Ice cream soiree poster
 
Video game fifa15-poster
Video game fifa15-posterVideo game fifa15-poster
Video game fifa15-poster
 
8 ball pool tournament poster
8 ball pool tournament poster8 ball pool tournament poster
8 ball pool tournament poster
 
Cookin nanta poster
Cookin nanta posterCookin nanta poster
Cookin nanta poster
 
National kids night out poster
National kids night out posterNational kids night out poster
National kids night out poster
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Criminal Alert Notice (myPay)

  • 1. 2CAN 0029-13-CID361-9H 7 October 2013 “MYPAY” OR NO PAY APPS OVERVIEW: Contact Information: Cyber Criminal Intelligence Program 27130 Telegraph Road Quantico, Virginia 22134 Phone: 571.305.4485 [DSN 240] Fax: 571.305.4189 [DSN 240] E-mail: cybercrimintel.cciu@us.army.mil CCIU Web Page: www.cid.army.mil/cciu.htm DISTRIBUTION: This document is authorized for wide release with no restrictions. “DO WHAT HAS TO BE DONE” The purpose of this Cyber Crime Alert Notice (2CAN) is to inform Department of the Army personnel of third party mobile applications that reference the Department Finance and Accounting Services (DFAS) myPay system for federal employees and members of the uniformed services, but are not sponsored by the Department of Defense or U.S. Government. DFAS processes pay for all DoD military and civilian personnel, retirees and annuitants, and also supports other government agencies. Using non-sanctioned applications to access your myPay account can potentially lead to the compromise of your myPay account information and theft of funds. CID elements are encouraged to brief supported installations and units on the contents of this 2CAN. BACKGROUND: An application called “MyPay DFAS LES” was initially released on 13 Jul 13, as a free application on Google Play Android App Store. The App provides the user with the ability to control their military pay after the user enters their myPay login information to access their individual account. Additionally, it provides the ability for the user to update their security questions to reset their password. Google Play estimates that between 10,000-50,000 members have already installed this App. A broader review of mobile App sites disclosed several other myPay related Apps for Android and iPhone devices.
  • 2. GENERAL TIPS ABOUT MOBILE APPS:  Before downloading, installing, or using an application, take a moment to review the “About the Developer” section. This will help you get an idea about other Apps that specific developer has previously published. If available, visit the developer’s website and assess its content for things like history, professional appearance, etc…  Apps that purport to allow access to military or government sites should only be installed if they are official Apps sponsored by the military or other government agency.  Peruse the user ratings and reviews to try to get a sense from previous customers as to the veracity of the application’s claim. Arguably no App is completely perfect from the perspective of all users, but complaints about security concerns should quickly stand out from other relatively benign issues.  If you’re still not sure and end up downloading an App, inspect your device’s application permissions screen to determine what other applications or information will be accessed by the App. A video game, for example, is unlikely to have a legitimate need to access your contacts. For more information about computer security and other computer related scams, we encourage readers to visit the CCIU website to review previous cyber crime alert notices and cyber crime prevention flyers. ADDITIONAL INFORMATION: Defense Finance and Accounting Service (DFAS.mil)  DFAS: myPay Secure  Contact DFAS: Telephone 888.332.7411 U.S. Computer Emergency Response Team  Avoiding Social Engineering and Phishing Attacks  Preventing and Responding to Identity Theft  Protecting Portable Devices: Data Security  Safeguarding Your Data Disclaimer: The appearance of hyperlinks in this 2CAN, along with the views and opinions of authors, products or services contained therein does not constitute endorsement by CID. These sites are used solely for authorized activities and information that support the organization's mission. CID does not exercise any editorial control over the information you may find at these link locations. Such links are provided consistent with the stated purpose of this 2CAN. CCIU uses the Interactive Customer Evaluation (ICE) system. Please click on the ICE logo and take a moment to provide us with feedback.