Notices. Copyright 2016 Malwarebytes. All rights reserved.

Similar documents
Malwarebytes Anti-Malware for Mac User Guide Version October 2015

Junos Pulse for Google Android

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

ESET Mobile Security Business Edition for Windows Mobile

Comodo Mobile Security for Android Software Version 2.5

Administrator's Guide

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Sophos Cloud Help Document date: January 2016

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Android App User Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

MALWAREBYTES PLUGIN DOCUMENTATION

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

avast! Mobile Security User Guide avast! Mobile Security User Guide

Malwarebytes Anti-Malware User Guide Version March 2016

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GFI Cloud User Guide A guide to administer GFI Cloud and its services

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

avast! Mobile Security User Guide avast! Mobile Security User Guide

SecuraLive ULTIMATE SECURITY

Comodo Mobile Security for Android Software Version 3.0

AVG File Server. User Manual. Document revision ( )

User Manual for Web. Help Desk Authority 9.0

TrustPort Mobile Security

Malwarebytes Enterprise Edition Best Practices Guide Version March 2014

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

AT&T Toggle. 4/23/2014 Page i

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

GROUPTALK FOR ANDROID VERSION for Android

Kaspersky Password Manager

Outlook Web Access. PRECEDED by v\

ESET MOBILE SECURITY FOR ANDROID

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E

Install MS Office 365 on your Android mobile device

Rochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation

Sophos Computer Security Scan startup guide

USER MANUAL SlimComputer

Super Manager User Manual. English v /06/15 Copyright by GPC

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO Version 8.0.

Norton Mobile Privacy Notice

Sophos Mobile Control user help. Product version: 6.1

Verizon Wireless Field Force Manager. Windows Mobile Devices

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version September 2015

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

ESC Mobile App Guide

ESET Mobile Security Windows Mobile

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Samsung KNOX User Guide KNOX for Consumers Edition

Sophos Anti-Virus for Mac OS X: Home Edition Help

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

Viewing Paycheck Information Online - LSUSH Off Campus

Detecting and Removing Spyware From Your Home Computer

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v

CareSentinel Set Up Guide for Android Devices

AVG File Server User Manual. Document revision (11/13/2012)

Charter Business Desktop Security Administrator's Guide

AdwareMedic. About AdwareMedic How to use AdwareMedic Frequently Asked Questions Version History... 9 License Agreement...

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Sophos Enterprise Console Help

Document Number: /15/2012

Viewing Paycheck Information Online - LSU Health New Orleans - On Campus

TRIMS Cloud Computing

New Features in Primavera P6 EPPM 16.1

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Good Share Client User Guide for ios Devices

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Sophos Anti-Virus for Mac OS X Help

AVG File Server User Manual. Document revision (8/19/2011)

Are free Android virus scanners any good?

Installation Instructions

This document should help you get started. The most important button in TagNotate is the, which you can find on the bottom of each screen:!

Welcome to GIFTS Online Mobile... 3

How to install the TLW Android Mobile Application:

Mobile Time Manager. Release 1.2.1

User Guide Novell iprint 1.1 March 2015

Mobile Connect for USA Mobility Pagers for iphone

How to Install Applications (APK Files) on Your Android Phone

Contents. McAfee Internet Security 3

Intel Unite Solution. Standalone User Guide

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Connecting Software Connect Bridge - Mobile CRM Android User Manual

Protection Service for Business

Lenovo Online Data Backup User Guide Version

Driver Updater Manual

ESET NOD32 Antivirus. Table of contents

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Security Analytics Engine 1.0. Help Desk User Guide

10 Magni Tablet User Guide

YOUR SUNPOWER MONITORING SYSTEM GUIDE

Transcription:

Malwarebytes Anti-Malware Mobile User Guide Version 2.0.5 3 May 2016

Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. You may copy and use this document for your internal, reference purposes only. This document is provided as-is. The information contained in this document is subject to change without notice and is not warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing. The Malwarebytes logo and Malwarebytes Anti-Malware Mobile are trademarks of Malwarebytes. Android and Google are registered trademarks of Google, Inc. All other trademarks or registered trademarks listed belong to their respective owners. Copyright 2016 Malwarebytes. All rights reserved.

Contents 1.0 Introduction... 1 1.1 What s New... 1 2.0 Background (Real-Time) Scanning... 2 3.0 Getting Started... 3 3.1 Correcting Initial Issues... 5 3.1.1 Last Scan Performed... 5 3.1.2 Last Scan Ignore Malware (not deleted or added to whitelist)... 5 3.1.3 Unscanned Apps... 5 3.1.4 Old/Missing Malware Database... 5 3.1.5 Old/Missing Malicious URL Database... 6 3.1.6 Whitelist Cleared... 6 3.1.7 Scheduled Scans Disabled... 6 3.1.8 Real-Time Protection Disabled... 6 3.1.9 Security Audit Issues... 6 3.1.10 Malware Cannot be Deleted... 6 3.2 Navigating the App... 7 4.0 Scanner... 8 4.1 Scan Settings... 8 4.2 Running a Scan... 8 4.3 Viewing Scan History... 9 4.4 Interpreting Scan Results... 9 4.5 Acting on Scan Results... 10 4.6 Whitelist... 12 5.0 Security Audit... 13 5.1 Installing apps from unknown sources... 13 5.2 Development mode... 13 5.3 NFC... 13 5.4 Android Beam... 14 5.5 GPS tracking... 14 6.0 Your Apps... 15 7.0 Privacy Audit... 16 8.0 About... 17 9.0 Settings... 18 9.1 Scanning... 18 9.2 Protection... 18 9.2.1 Real-Time Protection...18 9.2.2 Scan Links Sent Via SMS...18

9.3 Other... 19 9.3.1 Scanning History...19 9.3.2 Database Updated...19 9.4 Notifications... 19 9.5 Feedback... 20 9.6 Help Us Anonymously... 20 10.0 Share... 21 11.0 Third Party Project Usage... 22

1.0 Introduction Malwarebytes Anti-Malware Mobile has been designed to detect and eliminate malware, spyware and PUPs (Potentially Unwanted Programs) for mobile devices utilizing the Android operating system (version 2.3 or later). Malwarebytes Anti-Malware Mobile also provides features which enable the user to control security features that affect them and their mobile device, in plain English! 1.1 What s New A number of changes have taken place in the newest version of Malwarebytes Anti-Malware Mobile. This is a brief rundown on those changes: Kindle device rotation problem fixed Turkish language support Resolution of memory issues New user interface scheme Several bug fixes Malwarebytes Anti-Malware Mobile User Guide Page 1

2.0 Background (Real-time) Scanning Malwarebytes Anti-Malware Mobile will automatically perform scans in the background during normal operation. These scans occur in real-time, and are based on specific events. These events include: Additions and/or modifications to files on the file system Downloading of files from external sources Installation of downloaded files Execution of applications Potentially Unwanted Programs (PUPs), based on functionality and/or behavior Insertion of SD memory cards Scan on reboot. At this time, some devices do not support this feature. If questionable files are found during a scan, they will be brought to your attention. You may choose to whitelist, skip, or delete each item. Whitelisting a file will prevent it from appearing on subsequent scans unless its signature changes. Skipping an item will allow it to remain, but it will be detected during the next scan. Malwarebytes Anti-Malware Mobile User Guide Page 2

3.0 Getting Started The first time that Malwarebytes Anti-Malware Mobile is launched, it will behave a bit differently than it will from that point forward. We want to give you the chance to read the End User License Agreement (EULA), to learn more about the value of Real-Time Protection, as well as give you the opportunity to turn on Real-Time Protection. As with any security product, always on protection keeps you and your device the safest. The following screenshots show what you will see the first time you launch Malwarebytes Anti-Malware Mobile. This is the screen you see when you launch Malwarebytes Anti-Malware Mobile for the first time. You will only see it once. Click Next to continue. Real-Time Protection is an essential part of keeping your device safe. We give you a chance immediately to Activate it or to Skip it and move on. Time to get started learning about Malwarebytes Anti-Malware Mobile! Malwarebytes Anti-Malware Mobile User Guide Page 3

You will now get your first look at the Dashboard. It is the entry screen for Malwarebytes Anti-Malware Mobile, and serves as a starting point for everything else you need to do within the program. You will briefly see an in-progress screen while the Dashboard performs a health check. This is a series of assessments that inform you of your device s security status. Samples of the Dashboard display are shown below. The device is considered safe. If you see the message See ignored issues after the first scan, it indicates that you have elected to ignore certain non-critical issues. The health check has detected noncritical issues which should be reviewed and/or corrected. Press Fix Now to see issues which were detected, and choose whether to correct them or to ignore them. The health check has detected critical issues. The database version is outdated. There may be other issues as well. Press the Fix now bar to see a list of all issues and correct them. Malwarebytes Anti-Malware Mobile User Guide Page 4

3.1 Correcting Initial Issues During the health check, the See ignored issues and Fix now message bars gave you the opportunity to look deeper at issues which Malwarebytes Anti-Malware Mobile considered to be a problem. Selecting either of those messages (depending on which was displayed) takes you to the Issues screen, shown below. Depending on the number of issues noted by the program, you may need to scroll through the list to see all of the issues. Issues are color-coded to denote their importance to your level of protection. Color coding appears on the bullet to the left of the message. Colors used are: Yellow: Issues have been noted which may affect your security, but they are not critical. Red: Critical issues have been noted, and your security is at risk. You will notice checkboxes to the right of each item. These checkboxes determine whether the accompanying notification will appear on the Dashboard. Red (critical) items are always checked, and are always displayed on the Dashboard. Yellow (non-critical) items may be checked or unchecked, and display of each non-critical item on the Dashboard is controlled by the state of its checkbox. The next several sections are a listing of all issues which may appear on this list, their severity, and the recommended method to correct each of them. 3.1.1 Last Scan Performed Non-Critical: Last scan has been performed more than a week ago Critical: Full scan has never been performed yet Critical: Last scan has been performed more than 2 weeks ago Resolution: Perform a full scan 3.1.2 Last Scan Ignore Malware (not deleted or added to whitelist) Non-Critical: After last scan user ignored some unwanted malware Critical: After last scan user ignored some dangerous malware Resolution: Perform a full scan 3.1.3 Unscanned Apps Non-Critical: User has new apps that haven't been scanned yet Resolution: Perform a full scan 3.1.4 Old/Missing Malware Database Non-Critical: Last malware database update has been performed more than a week ago Critical: Malware database has not been updated yet Critical: Last malware database update has been performed more than 2 weeks ago Resolution: Update Malware Database Malwarebytes Anti-Malware Mobile User Guide Page 5

3.1.5 Old/Missing Malicious URL Database Non-Critical: Last malicious URL database update has been performed more than a week ago Critical: Malicious URL database has not been updated yet Critical: Last malicious URL database update has been performed more than 2 weeks ago Resolution: Update Malicious URL Database 3.1.6 Whitelist Cleared Non-Critical: Whitelist that contained unwanted malware has been cleared Critical: Whitelist that contained dangerous malware has been cleared Resolution: Perform a full scan 3.1.7 Scheduled Scans Disabled Non-Critical: Scheduled scans are disabled Resolution: Enable scheduled scans 3.1.8 Real-Time Protection Disabled Non-Critical: Real-Time Protection is disabled Resolution: Enable Real-Time Protection 3.1.9 Security Audit Issues Non-Critical: Security Audit detected some issues Resolution: Review Security Audit and make changes where appropriate 3.1.10 Malware Cannot be Deleted Critical: Resolution: User has malware which couldn't be deleted after last scan Send report to Malwarebytes Technical Support with malware items info Malwarebytes Anti-Malware Mobile User Guide Page 6

3.2 Navigating the App Once Malwarebytes Anti-Malware Mobile has been installed on your device, it can be launched from the notification bar at the top of your screen, as well as from your Apps screen. You may configure the notification bar icon to be hidden as well more on that later. The following screenshot shows the presentation of Malwarebytes Anti-Malware Mobile. The entire left edge of the Dashboard is a hot spot. If you see three horizontal bars in the upper left corner of the Malwarebytes screen, swipe your finger from the left edge of the display, across the screen to display the program Menu. It is shown here. At other times, you will see an arrow pointing to the left in the same area of the screen. Pressing the arrow takes you back to the screen you were on most recently. The remainder of this guide will go into detail for the seven options that are displayed on the Menu. Malwarebytes Anti-Malware Mobile User Guide Page 7

4.0 Scanner These settings allow you to define how and when Malwarebytes Anti-Malware Mobile will scan your system for malware, what to do if malware is found, and what if anything it should ignore. Before going any further, two settings at the top of the Scanner page should be mentioned. Whitelist is used to exclude some files from being scanned as part of a normal scan. Scan Settings allow you to define if scheduled scans are to be performed, when they are to be performed, and if scans should be run based on certain device events. Both will be covered in more detail later. 4.1 Scan Settings This option is also available as part of Settings available from the Malwarebytes Anti-Malware Mobile Menu. Please refer to Section 9.1 for detailed information on this option. 4.2 Running a Scan The left screenshot is a typical view of the Scanner. There is no history until you create that history. Note the blue bar at the bottom labeled Run a Scan. Press that bar to start a scan. The screenshot on the right shows a scan in progress. The progress bar may be green, yellow or red. Green means a clean device. Yellow means that one or more PUP s (Potentially Unwanted Program) have been detected. Red means that malware has been detected. Malwarebytes Anti-Malware Mobile User Guide Page 8

4.3 Viewing Scan History After Malwarebytes Anti-Malware Mobile has been running on your device for a while, Scan History will look more like what you see here. There is a limited amount of room to show history of individual scans on a single screen, so you will need to scroll up or down to see the full scan history. 4.4 Interpreting Scan Results When looking at Scan History, you will notice a number of similarities between scan results. We thought it might be helpful to document the results you will be seeing. In this section, references will be made to whitelisting, ignoring and deleting files. Those will be covered in detail in the following section. The user ran an On-demand (non-scheduled) scan to completion. No problems were noted during the scan, so it is shown with a green dot. The user ran an On-demand (non-scheduled) scan, but stopped the scan before it was finished. The red dot indicates that malware was detected. If no malware was detected and the scan was not allowed to run to completion, the scan is not logged. The user ran an On-demand (non-scheduled) scan to completion. Malware was detected, and remediation has taken place. A scheduled scan was run by Malwarebytes Anti-Malware Mobile. No malware was detected. A scheduled scan was run by Malwarebytes Anti-Malware Mobile. Malware was detected. You must whitelist, ignore or delete the detected malware. Malwarebytes Anti-Malware Mobile User Guide Page 9

The user ran an On-demand scan to completion. Multiple PUPs were detected. Please note that PUPs are counted as malware. True malware would cause the status indicator to shift from yellow to red. You must whitelist, ignore or delete the detected malware. A scan was executed after the signature database was updated. The scan detected malware. You must whitelist, ignore or delete the detected malware. An SMS scan detected a phishing link. A scan of a SD memory card being inserted into the device resulted in malware being detected. From the red status indicator, we can tell that it is true malware. There may also be PUPs among the malware which has been detected. A scan was executed after the device was rebooted, and malware was detected. From the red status indicator, we can tell that it is true malware. There may also be PUPs among the malware which has been detected. Real-Time Protection detected malware during a file transfer. You must whitelist, ignore or delete the detected malware. Real-Time Protection detected a PUP during a file transfer. We know it was a PUP and not malware because the status indicator is yellow (instead of red). You must whitelist, ignore or delete the detected malware. Real-Time Protection was triggered by installation of a file which was identified as a PUP. It is shown as malware, but because it is shown with a yellow status indicator, we know it is a PUP. You must whitelist, ignore or delete the detected malware. Real-Time Protection was triggered by execution of a file which was identified as malware. You must whitelist, ignore or delete the detected malware. 4.5 Acting on Scan Results If you run a scan and the scan does not detect any malware, you re safe for the time being. If malware is detected, it needs to be dealt with. You have three choices: Delete The threat will be deleted from your device Ignore Always The file which has been detected as a threat will be added to a Whitelist, and excluded from future scans. Legitimate files are sometimes detected as malware. There may also be files which are classified as PUPs that you want to use. These are examples of files to be excluded from scanning. Ignore Once A file has been detected as a threat, but you re not sure whether it should be added to a Whitelist or deleted. You choose to ignore it this time only. It will be detected as malware on your next scan, and this scan to be shown as red status, because malware remains after the scan results have been processed. Malwarebytes Anti-Malware Mobile User Guide Page 10

This is a typical view of Scan results after a scan has been completed and malware has been detected. Please note that all items have been checked. (While we only see 5 items here, the Deselect All choice in the upper right means that all malware detected has been selected. Pressing Deselect All will remove the checkmarks from all files, and change the option from Deselect All to Select All. As stated above, you can choose to delete threats, ignore them once, or ignore them always. For each disposition, select the file(s) from the list and choose what you want to do with them. You will be asked to confirm your choice, and if confirmed, your choice will be acted on. The file(s) will be removed from the list, leaving only the files which still need to be acted on. Choose the files which will be handled in the next method. If your first action was to delete threats, you would now choose which should be ignored always. If any files are left over, choose to delete them or to ignore them this time only. You should not leave any threats outstanding without choosing how they should be handled. There may be times that files cannot be deleted after a scan. This may occur for the following reasons: Files may reside in system folders They are locked or in use by other apps Malwarebytes Anti-Malware Mobile was not given storage permissions (or permissions were revoked) Files are bloatware installed on the device by the vendor. If this situation occurs, you will see an error indication when you try to delete a file of this type. To find the location/path of the file, tap on the scan history (available in Menu Scanner). This will display all files and apps detected for that particular scan. Malwarebytes Anti-Malware Mobile User Guide Page 11

4.6 Whitelist Whitelist is a list of files or apps that have been considered suspicious based on scan results by Malwarebytes Anti- Malware Mobile, but have been specifically listed as acceptable by the user. A screenshot of the Whitelist is shown below. If a file/app is listed here, it is considered safe only because the user said it is safe. Files/apps may only be added to the Whitelist as part of processing malware detected during a scan. If you have added a file/app to the Whitelist and later decided that you do not wish it to be excluded from scanning, select the checkbox next to the file/app and press Remove from whitelist. It will be removed immediately. You may remove all files/apps from the Whitelist by pressing Select all at the top right, followed by Remove from whitelist. Once a file/app has been added to the Whitelist, it will remain there until you remove it, or if Malwarebytes Anti-Malware Mobile has determined that the file has changed. This may be because its signature has changed (possibly indicating active malware in the file/app), or because the file/app has been updated. Malwarebytes Anti-Malware Mobile User Guide Page 12

5.0 Security Audit This feature provides capability to enable different options which enhance your personal privacy and security. Options shown are dependent on features which the mobile device offers. Each option shown here is shown in either the Insecure Settings or Secure Settings areas of the screen. Insecure Settings imply a security risk due to the setting chosen for the specific option, while Secure Settings are ones which do not put your device at risk. Shown below is the Security Audit screen displaying typical results. The screenshot at the left shows results of a Security Audit. Two settings fall into the category of insecure, while the other three settings are optimal. By turning off the two detected settings, the Security Audit screen will then appear as shown in the screenshot at the right. Please note that the Security Audit screen will only show references to features which your device offers. Below is a description of each of these settings. 5.1 Installing apps from unknown sources This feature maps to an Android screen which allows a choice between installing apps from any source, or only from approved sources. The specific screen name is variable depending on the mobile device used. 5.2 Development mode This feature maps to the Android Developer Options screen, which allows a device to be used as a development platform. In development mode, many security features are disabled to allow a developer to control these features programmatically. Presence of this feature is dependent on hardware and software which supports this feature. 5.3 NFC This feature maps to the Android Wireless/Networks screen, which allows a device to be able to communicate with another device using Near Field Communication (NFC). Presence of this feature is dependent on hardware and software which supports this feature. Malwarebytes Anti-Malware Mobile User Guide Page 13

5.4 Android Beam This feature maps to the Android Wireless/Networks screen, which allows a device to be able to transfer information to/from another Android device if Near Field Communication (NFC) is enabled. Presence of this feature is dependent on hardware and software which supports this feature. 5.5 GPS tracking This feature maps to the Android Location Access screen, which controls whether other apps can determine your location based on Global Positioning System (GPS) measurements made by your mobile device. Please note that GPS is always enabled for devices used in United States of America to comply with Emergency Services (911) guidelines. This setting cannot disable that aspect, and other built-in security measures assure that only Emergency Services communication systems are permitted to track device location. Malwarebytes Anti-Malware Mobile User Guide Page 14

6.0 Your Apps Your Apps is divided into two sections: Running apps and Installed apps. The left screenshot shows Running apps. You can see all Installed apps by pressing Installed. For either type, swipe down if needed to see the full list. Press the three bars at the upper right of the screen to change the way apps are sorted. Press the arrow next to Malwarebytes Anti-Malware to display app information, as shown in the screenshot at the right. You can get much more detailed information about the app itself by pressing App Info from the App screen. This screen shows memory usage characteristics of the app, and provides options affecting operation of the app as well as memory usage and configuration. These options include: Stop App info Uninstall Please note that when you are looking at App info, you have crossed over from the Malwarebytes Anti-Malware Mobile app to an Android system utility. It is an extension of the Android operating system, and while this utility provides deeper access to how apps function, it can also allow you to break apps unknowingly. For this reason, please read the following warnings: WARNINGS: 1. Many running apps are required for functionality of the mobile device. Use of the Stop or Uninstall options may cause undesired results. Stop affect all processes and threads related to the app, and may also affect other apps which rely on any of the processes being closed. 2. Unintended use of Clear data or Clear cache options may destroy app configuration and may immediately affect app behavior. 3. Many installed apps are required for functionality of the mobile device. Use of the Force close option may cause undesired results. Malwarebytes Anti-Malware Mobile User Guide Page 15

7.0 Privacy Audit Privacy Audit is designed to help you maintain a more secure environment when using your mobile device. When you load this screen, all apps are scanned with regard to privacy settings. When the scan is complete, you will receive a breakdown of how your privacy may be affected by each installed app, based on the following criteria. You may need to scroll down to see the entire list. Can Cost You Money These apps can send SMS and make calls. Can Make Calls These apps can make calls without user confirmation Can Track Location These apps can access your location. Have Network Access These apps can access the internet. Can Read Your Personal Info These apps can access your contacts, phone number and web history. Can Access Secure Settings These apps can change your PINs and lock patterns. Can Access Calendar These apps can access your calendar. Can Monitor Calls These apps can record your calls. Can Access Text Messages These apps can read your text messages. Can Access Storage These apps can read and write files from your phone s memory. Can Access Accounts These apps can access your added system accounts. These accounts include, but are not limited to, your Google account. Can Publish Shortcuts These apps can automatically create shortcuts on the main a screen, a tactic often used by aggressive ad networks. Can Control Hardware These apps can access your hardware, including, but not limited to, camera and NFC adapters. Press the arrow next to any privacy category to see a list of which apps are in that category. From the list of apps, you can press an arrow next to an any app which details its resource usage (as shown in the previous section. Don t be alarmed if you see some variation in resource usage each time you view an app. These numbers are dynamic, and are affected by what you are asking the app to do. Malwarebytes Anti-Malware Mobile User Guide Page 16

8.0 About The About screen allows you to quickly determine database versions used in Malwarebytes Anti-Malware Mobile, as well as the version of the program itself. App version is the version of Malwarebytes Anti-Malware Mobile. This includes added information that is primarily used internally. The part you need to be concerned with the leftmost portion (v2.00). Malware DB version is the collection of threat signatures which keep you safe. It is updated on a regular basis. Malicious URL DB version guards against phishing and malicious web sites. It too is updated on a regular basis. Rate this app allows you to tell other potential users what you think of Malwarebytes Anti-Malware Mobile in Google Play. Clicking License Agreement will launch a browser and connect to the Malwarebytes website, to allow viewing of the licensing agreement which governs use of all Malwarebytes products. Malwarebytes Anti-Malware Mobile User Guide Page 17

9.0 Settings These options control many aspects of the behavior of Malwarebytes Anti-Malware Mobile. You may control scheduling of scans and database updates, real-time protection and which results you see. 9.1 Scanning These settings allow you to enable/disable certain types of scans, and in the case of scheduled scans, specify exactly when they will be performed. Explanation of each setting is as follows: Scan after reboot If checked (enabled), a full system scan will occur immediately after your device is rebooted (restarted). If unchecked, no scan will occur at that time. Scan after update If checked (enabled), a full system scan will occur after each database update. If unchecked, a database update will not trigger a scan. Scheduled scans If checked, your device will be scanned automatically by Malwarebytes Anti-Malware Mobile based on the following settings: o Scan frequency Select this to choose whether scheduled scans will occur on a daily or weekly basis. o The days of the week If Scan Frequency is set to Weekly, selecting this option will take you to the Scan Days screen. This screen allows you to check which days that you would like a scan to occur on. o Time Select this to choose the exact time at which a scan will begin. Please note that if scans are scheduled to be run on multiple days, all scans will occur at the same time of day. If Scheduled scans is unchecked (disabled), non-scheduled scans still occur on an on-demand basis. 9.2 Protection Along with maintaining a current set of database threat signatures, these settings control the most critical aspect of protection that Malwarebytes Anti-Malware Mobile offers. While some users prefer to run scans at a time that is convenient, it is not always possible to undo damage which may have been caused by not using real-time protection. For this reason, we strongly encourage you to enable these settings. 9.2.1 Real-Time Protection When this setting is checked (enabled), Malwarebytes Anti-Malware Mobile proactively protects your device from harm in a number of ways, which include: Additions and/or modifications to files on the file system Downloading of files from external sources Installation of downloaded files Execution of applications Insertion of SD memory cards 9.2.2 Scan Links Sent Via SMS When this setting is checked (enabled), Malwarebytes Anti-Malware Mobile will scan received SMS messages to assure that links in these messages do not contain phishing URLs. This type of malware is very prevalent in mobile devices. Malwarebytes Anti-Malware Mobile User Guide Page 18

9.3 Other This group of settings takes care of what information is provided to you in your scan history, as well as how and when you perform database updates. 9.3.1 Scanning History This defines which types of scans will be reported to the user via History, as described above. This option does not affect what triggers a scan, only what is reported following completion of the scan. Scan categories which can be reported are as follows: Execution These are apps which have entered the run state (scheduled, programmatic or by user request). The scan will occur after execution. If no malware is present, no entry log is created. Installation This includes apps which are being installed. The app will be scanned after installation. File monitor This includes files which have been added, moved or renamed. System scan This includes all directories on the mobile device. Specific file extensions which will be scanned are.apk,.dex,.so,.bin and.jar files. This also includes all installed applications, but does not include applications currently being installed. SD card monitor This includes all files stored in auxiliary memory (SD card). SMS scanner This includes phishing links or malicious links which are associated with SMS messaging. 9.3.2 Database Updated These settings determine how and when your device receives updates. A brief description of each setting is as follows. Auto updates enabled Determines whether you receive updates to your signature database automatically. If this setting is disabled, the setting for Update frequency is also disabled. Please note that this is a critical part of keeping your device protected. Auto update Over Wi-Fi Allows you to specify whether you receive database updates using Wi-Fi networks exclusively, or use a cellular network. Use of Wi-Fi allows you to reduce data usage. Update frequency The interval between checks for database updates. You may choose an interval of 1, 3 or 6 hours between checks. This setting is disabled if Auto Updates Enabled has been turned off. Force Update A toaster message will inform you that the database is up to date, or that a database update is beginning. Please note that the date and time of the most recent update check will be shown here whether you actually download a database update. If your signatures are already current, there is no need to update again. 9.4 Notifications This screen includes four settings which govern information provided by Malwarebytes Anti-Malware Mobile during execution. Information pertaining to these settings is as follows: Notification Icon This setting determines whether the Malwarebytes icon is shown on the Notification bar, and when shown, whether it is in color or in shades of gray. The choice of color to be displayed is strictly a matter of user preference. Scheduled Scans This setting determines whether a notification is displayed when a scheduled scan starts. If disabled, the scan will run silently in the background. Scan Result This setting controls whether scan results are displayed following execution of a scan when no malware was detected during the scan. Malwarebytes Anti-Malware Mobile will let you know when malware was detected. When no malware was detected, the choice is yours to make. Database Updates This settings determines whether notifications will be displayed pertaining to database updates. Malwarebytes Anti-Malware Mobile User Guide Page 19

9.5 Feedback This option allows you to send us an email. After using Malwarebytes Anti-Malware Mobile, tell us what you like. Tell us what you don t like. What would you like to see in the future? We can t tailor our products to match everyone s wish list, but it s always good to know what people want and need. This gives you a chance to tell us how we re doing. 9.6 Help Us Anonymously Checking this setting allows Malwarebytes Anti-Malware Mobile to send usage characteristics for review. Usage characteristics is defined as: App Name and Version Device System Architecture (ARM, x86, etc.) Phone Locale OS Name (currently Android only) UUID (unique code associated with Malwarebytes installation on a specific device) Database Version Analytics will also be sent when malware has been detected as a result of real-time protection, an ondemand scan or a scheduled scan. This information is sent five minutes after installation of Malwarebytes Anti-Malware Mobile, and every six hours afterwards. If this option is turned off, App Name/Version and UUID will not be sent to Malwarebytes. All other information listed above will continue to be sent every six hours. Malwarebytes Anti-Malware Mobile User Guide Page 20

10.0 Share Pressing Share allows you to share Malwarebytes Anti-Malware Mobile with one or more contacts. In this case, no method has been previously set up, so you can choose from the various messaging methods which you are using on this device. Once you have chosen a method of sharing the app, you will see a way to specify who to share the app with. This may be through use of another app, or through a code snippet. That varies from method to method and will not be shown here. Please note that if you uninstall the app which you have chosen as your sharing method, you may experience undesired results. Also, choosing a sharing method which you are not logged into at the time will prompt you to login to the app used by that method. Malwarebytes Anti-Malware Mobile User Guide Page 21

11.0 Third Party Project Usage Malwarebytes software is made possible thanks in part to many open source and third party projects. A requirement of many of these projects is that credit is given where credit is due. The Malwarebytes Third Party License Supplement is a downloadable reference which specifies each of these projects, and where they are used. It can be downloaded from: https://www.malwarebytes.org/pdf/guides/thirdpartylicensesupplement.pdf Malwarebytes Anti-Malware Mobile User Guide Page 22