Friday, August 21, 2020

10 Easy Ways To Secure Your Smartphone

10 Easy Ways To Secure Your Smartphone Make Money Online Queries? Struggling To Get Traffic To Your Blog? Sign Up On (HBB) Forum Now! 10 Easy Ways To Secure Your Smartphone Updated On 09/01/2016 Author : Vikram Topic : Featured Mobiles Short URL : http://hbb.me/1gGzEt5 CONNECT WITH HBB ON SOCIAL MEDIA Follow @HellBoundBlog One of the greatest threats to the security and privacy of the average individual is the now ubiquitous smart phone. Devices like the iPhone and the various available Android handsets have greatly improved our lives, making things like comparison shopping for free car insurance quotes online a snap. Unfortunately, theyve also made it a trivial matter for hackers and malicious cyber-criminals to compromise your information. Here are ten easy ways to lock down your phone and protect yourself in the real world from day to day. 1. Know Your Apps Some critics have made comparisons between the Android operating system and the Windows platform during its less secure days. While that analogy is a bit unfair, its true that Android has fewer safeguards against malware than the iOS platform. That having been said, iOS has seen a few bad apps make their way into the iTunes App Store. Before you download and install an application, do some research and read the reviews that other users have submitted to make sure youre not getting a virus sandwich. 2. Password Protection Using a simple finger swipe to unlock a smart phone is the most common method for gaining access to a device. If your device isnt password protected, all you have to do is lose it in a public place for all of your data to be lost to would-be thieves. At the very least, enable the password to unlock function thats built into your phone. A simple PIN or password will go a long way in protecting you from identity theft and data loss. 3. Use The Security You Have Just about every smart phone on the market today features advanced security features above and beyond simple password-enabled screen lockers. Things like biometric fingerprint scanners now come standard on many phones, and such measures ensure that your phone is that much harder to access if it should fall into the wrong hands. When you get a new phone, acquaint yourself with all of the stock security features that ship with it and use them regularly. 4. Permissions, Permissions, Permissions Those familiar with Unix-like operating systems like Linux and Mac OS X will no doubt be highly aware of permissions and how they can affect the security of your mobile device. More specifically, you should look at every application you download and review what data and resources they have need to have access to for them to operate properly. Anything that requires root access to your phone should be avoided. Anytime youre asked for personal information or a password, thats typically a bad sign. 5. Go Easy With The GPS Location-aware applications like Foursquare and Gowalla allow users to “check in” when theyre at specific places to facilitate sharing. While GPS-based applications can significantly enhance your life, its also a double-edged sword that can threaten your security. If people can see where you are, they can make assumptions about where you arent. Thieves can easily use social platforms like Facebook and information from GPS-based apps to plan home invasions and robberies. 6. Watch Those Financial Transactions Probably the last thing you should do when youre out in public is use unfamiliar computers to do your banking online. Keyloggers and malware can easily steal your credentials if youre not careful. Second to that in terms of security threats is banking online with your smart phone on public Wi-Fi. You can reduce the danger somewhat with VPNs, although its best to leave your online financial transactions to your home computer where you can guarantee a safe connection. .IRPP_button , .IRPP_button .postImageUrl , .IRPP_button .centered-text-area { min-height: 86px; position: relative; } .IRPP_button , .IRPP_button:hover , .IRPP_button:visited , .IRPP_button:active { border:0!important; } .IRPP_button { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #3498DB; } .IRPP_button:active , .IRPP_button:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .IRPP_button .postImageUrl { background-position: center; background-size: cover; float: right; margin: 0; padding: 0; width: 30%; } .IRPP_button .centered-text-area { float: left; width: 70%; padding:0; margin:0; } .IRPP_button .ctaText { border-bottom: 0 solid #fff; color: inherit; font-size: 13px; font-weight: bold; letter-spacing: .125em; margin: 0; padding: 0; } .IRPP_button .postTitle { color: #ECF0F1; font-size: 16px; fon t-weight: 600; margin: 0; padding: 0; width: 100%; } .IRPP_button .ctaButton { background: #ECF0F1; color: inherit; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; margin: 18px 14px 18px 14px; moz-border-radius: 3px; padding: 12px 0; text-align: center; text-decoration: none; text-shadow: none; webkit-border-radius: 3px; width: 80px; position: absolute; } .IRPP_button:hover .ctaButton { background: #e6e6e6; } .IRPP_button .centered-text { display: table; height: 86px; padding:0; margin:0; padding-left: 108px!important; top: 0; } .IRPP_button .IRPP_button-content { display: table-cell; margin: 0; padding: 0; padding-right: 10px; position: relative; vertical-align: middle; width: 100%; } .IRPP_button:after { content: "; display: block; clear: both; } READGuest Authors Of HellBound Bloggers â€" July 20117. Stay Up To Date As with any operating system, the installation of iOS, Blackberry OS, or Android running on your smart phone is constantly being poked at and tested by hackers trying to exploit vulnerabilities. Modern computer security is all about patching vulnerabilities the second theyre recognized, and as such its essentially a game of catch up between security experts and cyber-criminals. When a security update is available for your phones operating system, you should install it ASAP. 8. Secure Wi-Fi You should probably turn off the auto-connect feature for Wi-Fi access on your smart phone. Public Wi-Fi hotspots such as those found at libraries and coffee shops are a security minefield for notebook PCs and mobile devices. Everything from ARP spoofing to the use of Firesheep can allow miscreants and neer-do-wells to hijack your communications without you even realizing it. If you need to use public Wi-Fi, utilize a VPN or a proxy to connect to the web over an encrypted SSL connection. Using Wi-Fi through your home gateway is of course typically safe if you cant get a 3G or 4G signal. 9. Monitor Applications Proactively You can learn a lot about security threats to your mobile operating system by looking at resource usage. If you notice your battery losing power more quickly than it used to all of a sudden, its often a sign that you have a malware program installed that you dont know about. If your phone is sluggish or unresponsive, look at CPU and memory usage for each application thats currently running to see if anything stands out. If one program is hogging all of your phones resources, you may want to ditch it. 10. Mobile Security Apps Your smart phone is essentially a small hand-held computer, with all the benefits and drawbacks that come with the territory. Much like Windows in the 90s or now for that matter, its going to be a magnet for viruses. Thats why a dedicated anti-virus application is a must. Commonly used services include F-Secure Mobile Security, Lookout Security Antivirus, and McAfee WaveSecure. As long as you have something thats working around the clock to ward off threats, youre far better off than a user without any security software whatsoever. Parting Shot While the world of mobile devices can greatly enhance your productivity and the convenience of your communications, it can also be a nightmare in terms of security. If you follow the above tips and take a moment to shore up your defenses, youll greatly reduce the risk of a security breach. This information isnt meant to scare you but rather to alert you to the potential dangers of smart phones from a safety standpoint. Just be careful when youre out and about and you should be fine.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.