Do you have an Android smartphone? If yes, then this post is for you!

Recently, the number of smartphones sold with Android operating system has been continuously growing. Thus, 77% of smartphones sold in the 2nd quarter of 2013 worked on Android. At the same time, according to independent analysts, in 2013 Russia, along with Iran and China, entered the top three in terms of the number of detected mobile threats. And almost all of them - 99% - are aimed at Android devices. Why Android? Because it's open operating system, which carries both pluses - a large number of developed applications for open source(including free ones) and vulnerabilities for mobile threats.

What are mobile threats? These are malicious programs - viruses, trojans, potentially unsafe applications. Why are they terrible? Well, for example, malware can invisibly send paid SMS, take control of user accounts in in social networks and send SPAM on behalf of the owner, access the owner's bank card data and infect devices so that they themselves become sources of malicious attacks.

Fear and horror!

But we have an answer for that too! This week we launched the Beeline anti-virus application for Android smartphones - please love and favor!

Friends, the app is free: o but called " Mobile Security”, developed jointly with the leading vendor of Anti-virus software - ESET and specially modified and customized for Beeline subscribers.What is important: anti-virus databases are updated automatically, without your participation and additional actions.

The antivirus is available for installation from Google Play.

Mobile traffic, which occurs when updating virus databases, we also made absolutely free. If you use mobile devices with the Android operating system, be sure to install "Mobile Security" yourself and recommend the application to relatives and friends.

Someone will ask: why did we make our Anti-Virus, if similar applications already exist? "Free" versions of popular antiviruses do not allow automatic updating of virus databases, are often complicated in settings, and it is simply impossible to contact support with a question.

With our application, not only virus databases are updated automatically, but you can also contact ESET support at free phone 8-800-200-01-57.

P.S. "Mobile security" works only on smartphones with a Beeline SIM card. For Megafon and MTS subscribers, we can only advise you to go to us) if you want, even with saving the number :)

In addition, there is also an extended version of the application (it costs 40 rubles per month). Of the useful additions, it has the functions of "anti-phishing", "anti-spam" and "anti-theft".


  • Antiphishing - blocks malicious web resources and protects the user from theft personal information when shopping online.

  • Antispam - allows you to manage calls, SMS and MMS, set rules to exclude unwanted calls and messages from known and unknown numbers.

  • Anti-theft - in the extended version, the application, when you try to change a trusted SIM card to an unknown one, automatically blocks the device, sends messages to trusted numbers and remotely erases confidential information from memory.

And the antivirus itself looks like this:

This year's market mobile devices overtook the PC market for the first time. This is a landmark event, as well as the rapid growth computing power and the capabilities of mobile devices pose new questions and problems in the field of information security.

Modern smartphones and tablets contain quite adult functionality, similar to that of their "big brothers". Remote administration, VPN support, browsers with flash and java-script, synchronization of mail, notes, file sharing. All this is very convenient, but the market for protection products for such devices is still poorly developed. A good example of a corporate standard is the BlackBerry, a smartphone that supports centralized management via a server, encryption, and remote wipe capabilities on the device. However, its market share is not so large, and in the Russian market it is practically absent. But there are many devices based on Windows Mobile, Android, iOS, Symbian, which are much less secure. The main security problems are related to the fact that the variety of operating systems for mobile devices is very large, as well as the number of their versions in one family.

Testing and searching for vulnerabilities in them is not as intensive as for PC OS, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but the expansion of functionality entails more complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices - it's a matter of marketing and the lifespan of a particular device. I propose to consider typical data stored on a smartphone, which can be useful to an attacker.

1. Access to mail and mailbox

Typically, access to mail services and mail synchronization are configured on the mobile device once, and in case of loss or theft of the device, attackers get access to all correspondence, as well as to all services associated with this mailbox.

2. Internet pagers

Skype, Icq, Jabber - all this is not alien to modern mobile devices, as a result of which both the entire correspondence of this particular person and his contact lists may be at risk.

3. Documents, notes

DropBox for mobile devices may well become a source of compromise for any documents, as well as various notes and calendar events. The capacity of modern devices is large enough so that they can replace USB drives, and documents and files from them are quite capable of pleasing intruders. It is not uncommon for smartphones to use notes as a universal password reference, and password-storing applications protected by a master key are also common. It should be taken into account that in this case the strength of all passwords is equal to the strength of this key and the literacy of the application implementation.

4. Address book

Sometimes information about certain people is very expensive.

5. Network tools

Using a smartphone or tablet for remote access to the workplace via VNC, TeamViewer and other means remote administration no longer uncommon. As well as access to corporate network via VPN. By compromising their device, an employee can compromise the entire "secured" network of the enterprise.

6. Mobile banking

Imagine that your employee uses the remote banking system on his mobile device - modern browsers quite allow to carry out this type of activity, and the same mobile device is tied to the bank to receive SMS passwords and alerts. It is easy to guess that the entire RBS system can be compromised by the loss of one device.

The main ways of compromising information from mobile devices is their loss or theft. We regularly receive reports of huge financial losses for organizations due to the loss of laptops, but the loss of an accounting tablet with up-to-date financial information can also cause a lot of trouble. Malware for smartphones and tablets is now more of a scary myth and marketing tool, but you should not lose your vigilance, as this market is developing at a frantic pace. Let's consider what protection means exist and how they are implemented in modern mobile operating systems.

Mobile OS protections

Modern operating systems for mobile devices have a good set of built-in protection tools, but often certain functions are not used or disabled.

WindowsMobile

One of the oldest OS on the market. The software for versions 5.0 and 6.x are compatible, which is why there are a large number of protections for them. Since version 6.0, encryption of memory cards is supported. The OS does not have the means to prevent the installation of applications from third-party unverified sources, and therefore is susceptible to malware infection. In addition to concepts, there are a number of real malware under this platform. Enterprise solutions are represented by many companies (Kaspersky Endpoint Security for Smartphone, Dr.Web Enterprise Security Suite, McAfee Mobile Security for Enterprise, Symantec Mobile Security Suite for Windows Mobile, ESET NOD32 Mobile Security, GuardianEdge Smartphone Protection).

These solutions offer not only antivirus protection, but also means of filtering traffic through all communication channels of a mobile device, means of encryption, centralized deployment and management. The solution from GuardianEdge includes elements of a DLP system. OS tools through ActiveSync and Exchange Server allow remote data destruction on a device. FROM using Exchange Server, you can configure security policies on devices, such as the use of a lock screen, the length of the pin code, and more.

The release of new firmware containing vulnerability fixes depends on the device manufacturer, but in general this happens extremely rarely. Cases of upgrading the OS version are also extremely rare.

Windows Phone 7 (WP7) was released quite recently, so far nothing is known about corporate solutions for protecting this OS.

Symbian OS

Despite Nokia's recent move to embrace WP7, Symbian still dominates the mobile OS market. Applications for Nokia are distributed as sis-packages with digital signature developer. Signing with a self-made certificate is possible, but this imposes restrictions on the capabilities of the software. Thus, the system itself is well protected from possible malware. Java applets and sis applications ask the user for confirmation to perform certain actions (going online, sending SMS), however, as you understand, this does not always stop an attacker - many users tend to agree with all the proposals put forward by the OS, not especially getting to the bottom of their essence.

Symbian also contains tools for encrypting memory cards, it is possible to use locks with strong passwords, supported by Exchange ActiveSync (EAS) policies that allow remote destruction of data on the device. There are many information protection solutions provided by leading manufacturers (Symantec Mobile Security for Symbian, Kaspersky Endpoint Security for Smartphone, ESET NOD32 Mobile Security), which are similar in functionality to Windows Mobile versions.

Despite all of the above, there are a number of ways to obtain full access with the replacement of the “installserver” file, which checks the signatures and permissions of the installed software. As a rule, users use this to install cracked software, which, of course, loses its signature after cracking. In this case, a generally good OS protection system can be compromised. Nokia releases firmware for its devices regularly, especially for new products. The average lifetime of the device is 2-2.5 years, during this period we can expect the healing of childhood diseases of the devices and the correction of critical vulnerabilities.

iOS

Operating system from Apple. For devices of the third generation (3gs and older), hardware data encryption is supported by the system. The OS supports EAS policies, allows you to implement remote control and configuration via the Apple Push Notification Service, including support for remote data wipe.

Platform closed and user-oriented Apple Store provides high protection against malware. Enterprise protection products are represented by a smaller number of companies (GuardianEdge Smartphone Protection, panda antivirus for Mac, Sophos Mobile Control). Moreover, Panda's solution is a desktop antivirus that can also scan iOS devices connected to a Mac. The solution from Sophos is announced, but is under development (at the time of writing, March 2011 - ed.). However, as in the case of Symbian, the system can be compromised due to the Jailbreak done. The recent news about iOS being hacked by the Fraunhofer Institute for Information Security Technology is proof of this. Firmware updates and vulnerabilities are fixed regularly for Apple devices.

Android OS

A young system in the mobile device market, the brainchild of Google, has rapidly conquered the market. Starting with version 1.6, it supports the Exchange Activesync protocol, which makes devices with this OS interesting for the corporate segment. EAS policies (however, not all) are also supported. Encryption of memory cards by means of the OS is not provided. There are a number of corporate protection solutions (McAfee WaveSecure, Trend Micro Mobile Security for Android, Dr.Web for Android, solutions from Kaspersky announced). Applications are distributed through the Android Market, but nothing prevents you from installing them from other sources. Malicious software for Android exists, but during installation, the OS shows all the actions that are required for the program being installed, so in this case everything depends directly on the user (however, no one reads the warnings specified during installation anyway, most completely legal programs from the Market issue a bunch of vornings for access to all conceivable places in the system - ed.).

The OS is protected from modification, but, as with Symbian and iOS, it is possible to gain full access to the system, here it is called root. After getting root it is possible to write to system areas and even replace system applications. Updating firmware and upgrading OS versions, fixing bugs and vulnerabilities occurs regularly on most devices.

Summing up the intermediate result, we can say that modern mobile operating systems have good security tools - both built-in and on the market. The main problems are untimely or inability to receive updates, bypassing protection by the user, lack of corporate policy security for mobile devices. Due to the difference in OS and their versions, there is no single enterprise solution that can be recommended. But let's consider what steps need to be taken to protect devices and what to consider when creating information security policies.

1. Device lock.

Imagine that your smartphone fell into the hands of a stranger. For most users, this means that someone will have access to everything at once. It is necessary to lock the device with a password (strong or limited number input attempts), after which the data on the device is overwritten or the device is blocked.

2. Use of cryptographic means.

Encryption must be used removable media, memory cards - everything that an attacker can access.

3. Prohibition to save passwords in the browser of the mobile device.

You can't save passwords in browser password managers, even mobile ones. It is advisable to set a restriction on access to email and SMS correspondence, use encryption.

4. Prohibition of the use of password managers for corporate accounts.

There are many applications created to store all passwords on a mobile device. The application is accessed by entering a master key. If it is not strong enough, the entire password policy of the organization is compromised.

5. The prohibition on installing software from unverified sources, the implementation of "hacks" of the OS.

Unfortunately, there are only means for a forced ban for Windows Mobile devices, in other cases you will have to trust the user at his word. It is advisable to use software from large, well-known developers.

6. Use of Exchange ActiveSync policies and anti-virus and other protection tools.

If possible, it will help to avoid many threats (including new ones), and in case of loss or theft of the device, block it and destroy the data on it.

7. In the case of granting access to the trusted zone, exercise careful control.

For users with access to the trusted zone ( internal network over VPN, remote administration tools), it is necessary to more carefully monitor the implementation of the above rules (recommend them to use IPSEC, do not store authentication data in applications). If the device is compromised, the entire internal/trusted zone can be compromised, which is unacceptable.

8. Limit the list of data that can be transferred to cloud services.

Modern mobile devices and applications are focused on the use of a variety of cloud services. Care must be taken to ensure that sensitive and trade secret data is not accidentally synced or sent to one of these services.

Conclusion

In conclusion, it can be said that for corporate use it is desirable to use the same platform (or better, the same devices) with enterprise-class software installed, which can be configured and updated centrally. From the text of the article, it is obvious that it is necessary to develop and implement an information security policy for mobile devices, check its implementation, and be sure to use the Exchange server to set EAS policies. In this article, BlackBerry OS was not considered (due to practically total absence on the Russian market), but it should be noted that this platform is a corporate standard in many countries around the world.

  • Blog of VimpelCom (Beeline),
  • Development of communication systems
  • Application audit page on wife's tablet, which was in the hands of a "jealous husband"

    We, together with the anti-virus company ESET, have made special version mobile antivirus for all our subscribers. The application is available for Android and is free for Beeline subscribers in Russia. Traffic for downloading updates is free.

    If necessary, you can upgrade to an advanced version with anti-phishing, anti-spam, and so on.

    Why did we do it?

    Because one of the most common reasons for not understanding where the money has gone from the account is the activity of malware, in particular, silently sending SMS to paid numbers. It is much better to protect subscribers' phones than to deal with what and where is installed later.

    What happens from the zoo?

    • SMS Trojans are malicious programs that secretly send messages to paid numbers, take control of social media accounts, and so on.
    • Downloaders are malware that downloads and installs other malicious programs from the Web onto the device, in particular, to form botnets.
    • Clickers - programs for generating traffic to websites by increasing the number of clicks.
    • Phishing applications and sites, for the most part aimed at stealing personal information when performing banking transactions.
    • Various applications for spying on users, in particular, conditionally malicious ones, positioned as “so that the wife does not cheat.”
    The most common ways malware creators work is to launch phishing websites that look like websites of banks or online stores. When entering data bank card and embezzlement occurs. Remote interception of SMS messages is also a desirable target for online payment data hunters.

    Research on what upsets the caller

    Last year we collected the most common causes dissatisfaction and tried to understand what can be done with each:
    - 17% of our saddened users drowned their phone. We can't help here.
    - 13% met a pole with their head, a chair with their little toe, or did something similar while reading their phone.
    - 8% of subscribers dropped the phone while trying to take something beautiful from a height. A hell of a lot, but there's nothing we can do again.
    - 5% lost money due to mobile viruses. This is where we can remedy the situation.
    - 3% lost their phone due to pets and children (I don't understand why they put them in the same category).

    ESET did its own research. About 13% of users mistakenly subscribed to unnecessary information services(here we introduced additional SMS confirmations a long time ago and generally reworked the procedure - here). 11% lost money from their account due to viruses, spam or scam tricks. That's why - because of those 11% - we're here.

    How fast is the antivirus?

    The signature feature of ESET solutions is work that is invisible to the user. This also applies to mobile antivirus. On most models of test phones, the increase in processor load is not very high and at the interface level it is imperceptible against the background of ordinary Android brakes. Phone boot time is increased by 5-20 seconds.

    Why Android?

    Most viruses, trojans, scams, and other threats are designed to Android users. According to the ESET Virus Lab, malware for this platform increased by 63% last year, accounting for 99% of known mobile threats.

    How to find in Google Play?

    On request "Mobile security". The application is free for Beeline subscribers, verification by SIM card. If the SIM is removed or replaced, the antivirus will behave in the same way as when the license expires.

    Tests

    During the tests, it turned out that there is another issue that worries our subscribers more than viruses. Namely, domestic jealousy, expressed in the attitude various applications for surveillance. We decided to see how the antivirus works on them.

    For the experiments, a tablet on Android 4.1.2 was chosen. The second half of the jealous person constantly uses the tablet. Let's call it a victim. With the consent of the victim, the jealous man obtained the password from the device and changed its settings so that applications could be installed on the tablet from any sources other than Google Play. The experiment lasted for a week.

    Sms2spy from Google Play. The spy developer goes completely frank and invites future users to check their soul mate by monitoring SMS from the device. After installing from Google play app He doesn't act like a spy at all. It honestly adds its bright shortcut to the desktop and application menu. Well, you can remove the shortcuts, then the victim will guess about the installation of the application only by rummaging through the settings. But all the SMS of the victim for a few days managed to be read. There was no new reason for jealousy.

    Application Audit in ESET Mobile Security displays Sms2spy with its original name and logo. The victim detected the spyware the first time they viewed the application audit in the antivirus.

    "Spy on the phone." Also installed with Google Play. In the description of the application, there are quite peaceful promises in the spirit of "Track the movements of the thief with your phone." Once installed, the app is reported to disappear from all app lists, so a thief won't be able to intentionally remove it. The application will also come in handy for spying on the victim. It will be useful to know where she goes and where she spends the most time.

    We install the application, watch how a second after installation, the shortcut on the desktop disappears by itself. We check that in the list of applications "Spy on the phone" really does not appear. We go to the site and check the performance of the application: the movements of the device can be tracked with all the details.

    "Mobile Security" displays "Phone Spying" in app audit under the cryptic name Tmf. However, the victim may not notice the spy if they do not carefully analyze the results of the audit.

    talklog, a separate apk. This spy promises everything at once: spying on SMS, listening to conversations, and controlling the movement of the device. Even the fact of turning off the phone can be tracked. The application is available for download on its website. We are trying to download it. ESET Mobile Security reacts instantly, warning that a mobile Trojan is about to hit the tablet.

    Hellospy, a separate apk. The description is even more inspiring than the previous one. Here and spying on SMS and calls, and tracking movements, and even access to contacts and photos on the device. We download the application to the device and immediately receive a warning that it is potentially unsafe. We skip it and allow the installation. The application behaves cautiously, does not create its shortcuts anywhere, suspicious actions like automatic start Wi-Fi does not commit. On the application portal for us, jealous people, there is a free two-day access to the account to track the data received.

    Meanwhile, the victim does not immediately notice the new spy. A new line appears in the application audit with a standard android application icon and the name SystemService. Looking at the details of an app is not suspicious at first.

    By this time, more than one spy is already working on the tablet, so the victim complains that the device is too slow. She decided to beef up her defenses. Scheduled scanning is now enabled in the antivirus, and the "Deep Scan" option is selected. After examining the antivirus settings, the victim also configures the detection of potentially dangerous applications, which is not present by default.

    Because of these protective measures, surveillance did not last long. During the first scan, the antivirus detects a threat and offers to remove it.


    Hellospy showed promise and could have been a successful scout, but was revealed in a deep scan

    Finally, a few screenshots of ESET Mobile Security on a tablet, which is spied on by a dozen applications.


    An even line of labels "spies"


    Standard greeting to the victim from the antivirus


    Not all developers of "totally invisible" spies keep their promises

    What happens if the device is stolen and the SIM card to which the license is attached is removed?

    The Anti-Theft feature allows you to install additional password and has additional functionality in the extended version.

    If you lose your device or someone steals it and replaces your SIM card with a new (non-trusted) one, the device will be automatically blocked by ESET Mobile Security and an SMS message will be sent to the numbers you specified. It will contain telephone number inserted SIM card, IMSI number and Phone IMEI. An unauthorized user will not know that a message has been sent, as it will be automatically removed from the "Messages" dialogs.

    How many viruses are there for mobile platforms?

    If in 2010 the experts of the ESET antivirus laboratory discovered three families of malware for Android, then in 2013 their number reached 79. One family (group) of malicious objects, such as viruses, trojans or unsafe applications, combines up to several million samples.

    Antivirus is updated daily by default. At the same time, new databases can be released once a week. Traffic is free. You can set long refresh periods in the settings, but do not disable them - this feature is protected.

    How many people know about mobile threats?

    As a rule, subscribers are not worried about viruses as such - only the consequences. According to surveys at the end of last year, 53% of users do not even know that there are antiviruses for smartphones.

    Today you can often hear from customers mobile communications It is unclear that their operator writes off funds from the balance for what services, but, as a rule, the subscriber himself is to blame, and not the mobile operator. This is due to the fact that mobile fraud is becoming more common, and customers fall for the tricks of scammers. In addition, subscribers do not even notice how they fall for the “bait”. As a result, funds are debited from the mobile balance, and the subscriber cannot understand why the money is being withdrawn.

    Given the facts of fraud, the mobile operator Beeline made a protective service called "Mobile Security". This service can allow you to protect against viruses and intruders. In this material, it will be possible to get acquainted with the service from Beeline in detail, as well as find out the cost and features of the option.

    Option Description

    Mobile devices that run on Android based, today most of all are exposed to various threats and viruses. Such viruses can penetrate the phone and send text messages to a variety of paid content without the owner noticing. short numbers. They can also open unnecessary links on their own and, even worse, steal personal data from the device.

    The option from Beeline is made specifically for devices with the Android operating system, and the company recommends using this particular service for security purposes. It should also be noted that this service made under the leadership of ESET - a reliable antivirus company.

    The main features that the client can get using the service are as follows:

    1. Your phone, smartphone and other devices will be protected from virus attacks.
    2. All programs that are of dubious origin will be detected and neutralized using the option.
    3. Allows you to block and remove viruses from your device.

    You should also highlight the advantages of the option for users and communication clients from Beeline:

    1. By setting the service in the form mobile application"Mobile security" users will be able to receive free of charge updates to the virus database, which is produced in automatic mode. You don't even need to be connected to the internet to do this. It should be noted that when updating the database, the client will not pay for traffic, updates occur through mobile network operator. In other words, subscribers install the application, and the phone itself will perform the necessary actions for protection.
    2. Users can install and use an enhanced version of the Mobile Security app. If you activate advanced features, you can get additional features and functions. For example, anti-phishing, filtering messages and calls are added, and it will also be possible to analyze applications and much more.

    Only customers can use the Mobile Security service mobile operator Beeline. Use and connection to the option is possible anywhere in Russia. The service can work with both mobile phones, smartphones and tablet devices. The main thing is that the equipment has an operating room android system from version 2.3. and newer. Screen extension for the service does not matter. If a device with two SIM cards is used, then the operator advises putting the Beeline SIM card in the main slot for the service to work correctly.

    You can block intrusive calls, messages and spam using the service.

    Price

    Subscribers can use the service free of charge. It is important to simply install the application on your mobile phone. Also, customers can record an extended version for themselves, which will cost a certain amount.

    Concerning free version, then it includes the main functions that are described in the article. In the extended application, the functionality of the possibilities will be increased. For more detailed information on the option, customers can call the operator help desk and get all the details. The operator's number is short and looks like 0611. All calls to it are not charged.

    Connection

    To activate the service, you need to install the application. This can be done in different ways:

    1. Customers can call 0758. After that, a link to install the application will be sent to the device. Calls to this phone are not charged, but the number will not work if international roaming. In addition, by this phone you can find out all the data and information on the application and services in general.
    2. Also, subscribers can independently download the service using the market with Google apps Play or just follow the link https://play.google.com/store/apps/details?id=com.eset.ems2.beeline. Another service is available for download on the Beeline website. To do this, go to the site and go to the mobile security tab. The last method for downloading is using the ESET website or the link http://download.esetnod32.ru/home/beeline/ems.apk. It is not recommended to install an application from third-party resources, since a virus can be installed instead of a service.

    You can disable the option by simply deleting the application from your mobile device.

    Antivirus from Beeline is designed to protect customers' smartphones from unauthorized access to personal data and virus attacks on software. At the same time, the telephone company has done everything necessary so that users do not encounter difficulties when using the service and have the opportunity to take care of the security of the phone without spending extra money on it. Subscribers are only required to carefully study the terms of the offer, familiarize themselves with the rules for connecting and activating the option, and take the actions recommended by the developers. After that, you can safely use the antivirus program and not worry about all sorts of threats and actions of scammers.

    The Mobile Security service allows telephone company customers to install Eset antivirus on own smartphone and enjoy free protection. At the same time, subscribers are offered a standard version of the mobile application for protection against external threats, which is distinguished only by the connection order. The service is provided free of charge, users do not have to pay for security, since the operator has taken care of the payment. The proposal does not contain other features and unusual details, since they are not necessary.

    Capabilities

    Keeping in mind that Beeline Eset Mobile Security does not differ from the standard version of the mentioned program, protection measures will also turn out to be standard:

    • fighting viruses with Trojans;
    • protection against theft of passwords and logins;
    • protection of personal information;
    • constant monitoring of online threats and timely blocking of attempts of virus attacks on the device;
    • ensuring the safety of financial information and money on the client's accounts.

    The program will not be able to protect the user only from rash actions and mistakes made. In other cases, security is guaranteed, and any threat will be eliminated.

    Advantages

    Considering all of the above, the benefits of using the application are obvious:

    • reliable protection against viruses even when you are on a home or public network;
    • free subscription to protection;
    • the ability to update virus databases and software without spending traffic.

    The only drawback that may disappoint some customers is the availability of a version only for Android devices. iPhone owners will have to look for other ways to increase security when visiting sites and using virtual services, since the proposed mobile operator the system will be inaccessible to them.

    To whom is the service available?

    It was previously stated that Beeline antivirus for Android will not help owners of Apple devices. There are no other restrictions preventing subscribers from using the service.

    It is important to emphasize that the availability of an option does not depend on tariff plan installed on the user's SIM card. Moreover, the offer is valid not only for customers with package tariffs, but also for those people who have connected a traditional connection that allows you to pay only for actually completed actions. The main thing is to be Beeline customers and follow all the operator's recommendations for downloading and installing the application.

    Price

    Threat protection while using the Internet is provided free of charge. At the same time, customers who decide to install a new anti-virus program should know that they are offered free of charge:

    1. Download program.
    2. Install and connect the application.
    3. Use a service to check your smartphone and current threat protection
    4. Regular antivirus updates.

    From the above, it is obvious that you will not have to pay, since the service is completely free and does not contain pitfalls that you need to know about.

    How to connect and where to download?

    The connection process is extremely simple. Users should download Beeline antivirus for Android from the proposed source operators and simply run the program installation procedure. After that, it remains to follow the recommendations and instructions of the system. In this case, you can download the antivirus:

    • by calling 0758 and receiving a message with the necessary links;
    • by visiting the app store https://play.google.com/store/apps/details?id=com.eset.ems2.beeline;
    • by visiting the website of the antivirus manufacturer http://download.esetnod32.ru/home/beeline/ems.apk.