10 TIPS FOR SECURING YOUR SMARTPHONE
This month is National Cyber Security Awareness Month. Each week within October will take on adifferent theme, with this week's being 'Mobile'. So, with that in mind, we thought we'd prepare some tips to help keep your smartphone safe.
Top 5 threat protection best practices
Trend Micro predicts that there may be as many as a million Android malware threats by the end of the 2014. What's going on here? Make no mistake about it, there are REAL ANDROID MALWARE PROBLEMS. (Credit: Juniper Networks) Part of it is that Android is being targeted because it's extremely popular. The research company Canalys found that Android is running on 59.5 percent of all smart mobile devices that were shipped in the first quarter of 2013.
YES, YOUR SMARTPHONE CAMERA CAN BE USED TO SPY ON YOU...
Yes, smartphone cameras can be used to spy on you - if you're not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the screen is turned off - a pretty handy tool for a spy or a creepy stalker.
Free Security Scans - Find threats your antivirus missed
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data,even on your mobile device and Mac. You can't ignore your the safety of your devices any longer: you need to recognize and stop these threats before they do MORE harm.
MALWARE ATTACKS ON ANDROID DEVICES SEE 600% INCREASE IN 2016 / 2017
Malware targeting the Android platform is exploding, with a 600 percent increase in just the past 12 months. That statistic is among the findings of a new study--Mobile Security Threat Report--unveiled last week at the Mobile World Congress in Barcelona, Spain.
How Google fights Android malware
Android security: This newly discovered snooping tool has remarkable spying abilities
Fake Google Play Security Apps Harvest User Info
Mobile Security—How Secure Are Your Mobile Devices, Actually?
Derlusca / Pixabay |
What Google Says About Mobile Security Risk
They Can’t Bite Into your Apple. Or Can They?
Shared Insecurity
One good thing about the smartphone exploiters is that they believe we’re all equal—whether you boast a new iPhone or use a humble Android-run smartie, you have one thing in common: your phone can be compromised. So let’s zero in on how the bad (and also good) guys run shady operations through your devices without you having a clue.
Fake apps. Yep, not only are the news fake nowadays. Half of the top-50 apps in Google Play have evil twins, the Economist says. Hackers mimic popular applications, tweaking their names a bit (like, “MyGoogleTranslate” instead of “Google Translate”) to lure you into installing them. Then they steal your data or even mine cryptocurrency with your phone! Now, as Black Friday and X-mas madness are coming, we may also see the rise of the fake shopping apps that steal your credit card numbers. Apple’s App Store survived an infestation with hundreds of them the last year!
Malvertising. This summer, the conspiracy theories-themed site visitors (instant tip: Don’t be one!) got their Android-run phones infested with an unremovable app showing annoying ads. The app’s installation was triggered by clicking on fake ads posted on the abovementioned site. An even more curious event befell iPhone users. A fake advert posing as an iOS update tricked users into . . . physically destroying their phones! (The story in a nutshell: The hoax ad promised to make your iPhone waterproof.)
Sometimes, though, even the good guys can do you bad!
Sensitive info stealing. Even totally legitimate Android and iOS apps may sell your private data. Actually, here’s an article claiming that 7 out of 10 apps do it. This applies in particular to health apps, because your health info is a treasure (for insurance companies among others).
GPS tracking. This summer, iPhone users freaked out after finding that a popular iOS app was selling their location data to the third parties. It’s especially ironic, taking into account that some two years earlier Apple’s Tim Cook roasted Google for selling users’ GPS info to advertisers!
Read more at http://www.business2community.com/mobile-apps/mobile-security-secure-mobile-devices-actually-01943538#G9fFqJ7BU6KS3VWu.99
So you understand the risk. Now, let’s look at some popular mobile security facts and tips.
Read more at http://www.business2community.com/mobile-apps/mobile-security-secure-mobile-devices-actually-01943538#G9fFqJ7BU6KS3VWu.99
Mobile Security FAQ
Can I be totally safe by switching from smartphone to an old push-button cell phone?
Well, it’s definitely much safer to use an old “dumb” flip-phone without an internet connection. But it’s not totally safe. Even those old “candy-bars” have code in them—and any code can be broken into.
What is the most advanced way to protect my smartphone?
One of the recent hypes in the tech world is biometric security. Applied to smartphones, this means user authentication by fingerprint, face, or even by cardiogram. It can be used to unlock your phone and authorize payments. Biometric security is extremely hard to hack; however, it has its pros and cons.
Does installing only the paid apps guarantee 100% security?
It’s definitely safer to install paid VPNs and anti-viruses. On the other hand, it’s not a rule of thumb. While there are trusted and totally free apps like StopAd (Microsoft certified), there are some hidden catches in many paid applications as well.
How to Really Protect Your Mobile Security
So what can you do in order to ensure full mobile safety? Locking your devices in the microwave and putting a tin-foil hat on are the only ways to be totally secure. There are less radical ways though.
- We hate to break it to you, but you better stop browsing adult sites on your phone.
- Install apps only from authorised markets and credible developers.
- Update your operating system regularly to make sure all the flaws are patched.
- Do not root your phone.
- Remove any apps you’re not using. Every app is a potential problem—the fewer you have, the safer you’ll be.
- Next time you’re about to click “install”, be sure to think twice. Consider what exactly does that application require permission for? Your mic, camera, media files, bank account, etc.? In other words, don’t be a dupe—the human factor is the main vulnerability exploited against you both in PC and mobile realm (as well as IRL, BTW.)
- Read the terms of use for goodness sake! At least jump around in the text searching for the words like “third parties”, “data”, “behavior” and the like to make sure you aren’t willingly allowing the app to sell your sensitive info.
- To avoid being tracked, iPhone users may disable the “Find My iPhone” function (this way it isn’t possible to track your device—even if it’s stolen). Users may also enable apps using GPS only when they’re active (you can do this in the apps’ settings).
Last but not least, security is an integral part of comfort. StopAd’s Android version has most everything StopAd desktop boasts—it blocks all the ads on your device. If you use an iOS-run device, you may want get started and try StopAd for Safari.
Read more at http://www.business2community.com/mobile-apps/mobile-security-secure-mobile-devices-actually-01943538#G9fFqJ7BU6KS3VWu.99
It’s definitely safer to install paid VPNs and anti-viruses. On the other hand, it’s not a rule of thumb. While there are trusted and totally free apps like StopAd (Microsoft certified), there are some hidden catches in many paid applications as well.
Xafecopy Trojan Will Steal Money From Your Mobile, protect your phone now!
500 Android apps blocked from Play Store due to malware