Tutorial: How To Stop Your Mobile Phone From Being Hacked

in #howto7 years ago


Smartphone users spend on average three hours every day doing non-voice activities on their devices, and in this time they need to be protected.


Mobile phones have become a prime target for hackers and ‘phishers’, attempting to access your private information.


Emails, social media, software updates, apps and open public Wi-Fi are all easy ways for hackers to breach your security but are also easy to prevent.


Here are a few tips to help prevent against an attack on your handheld device.


1. Firstly review your phone


Android or iPhone, spyware could be anywhere, even in plain sight. Search through your apps and delete those you don’t recognise or haven’t used in a while.


Revoking access to apps for components such as the camera or microphone is also an option that helps prevent the app from collecting personal information.


Don’t use an alternative file cleaner app, they advertise faster performance but more often than not clog your device. Instead delete apps and files manually.


In addition, you might want to check the credibility of the browser you are currently using as many won’t encrypt user search queries, allowing tracking, collecting geolocation data, and leaving any sensitive information entered unprotected.


2. Secure your email


In the age of the smartphone email has remained the main form of communication, with most of us being found ceaselessly ‘on the grid’ or ‘plugged in’. 


‘Phishing’ - the action of masquerading as another to gain sensitive information - is still the mobile hacker’s most frequent and effective tool. A scam varying from modest local bank to illustrious Nigerian Prince, it is very easy to get caught out, but also very easy to prevent.


To prevent such attacks don’t open any attachments or web links unless you are sure of its legitimacy. A two-factor authentication is advised, further reducing the risk of a breach.


And remember that authorized companies should never ask for you to complete an embedded form or offer direct links to free downloads away from their own website.


‘Spear phishing’ - where a hacker targets you personally via a fake social network account - can also be prevented by contacting and validating the friend through another means of communication before giving away any personal information.


3. Don't be caught out by false software updates


Touch-screen devices come with the risk of being liable to one-tap ads. These ads can contain dangerous malware or even harmless adware/freeware that increase our vulnerability to fake software updates.


Don’t be caught out by a false software update by only downloading updates directly from official sites. iOS support recommends we keep our devices up-to-date as hackers tend to target older tech.


This is easily achievable for both Android and iPhone by turning on auto-update in ‘settings.’ Due to this, we need never manually update our devices and won’t fall risk to a fake software update.


You should also consider a mobile antivirus, here is everything you need to know about mobile antivirus.


4. Monitor the apps on your phone


With the app store ever increasing, so too is the likelihood downloading an app that can be potentially damaging.


When aiming to download an app look up its details online. Check the author, when it was last updated, and its reviews; all can give clues as to the legitimacy of the application.


Always install any app from the official store, and limit the number of how many you use.


Remember to keep your apps up-to-date, especially those used for messaging and banking.


Both Apple and Google recommend we do not save our passwords for these important applications, as it makes security redundant if a hacker were to access our phone.


5. Be safe on public Wi-Fi


Public Wi-Fi has become one of the most common ways hackers attempt to gain access to your details, or even remotely control your device. The easy way to prevent this is to not use public Wi-Fi at all, but there are also other methods to reduce the risk.


You should also invest in a VPN (virtual private network). By encrypting the user's information, it allows for a secure connection and transaction within a public network. Here are some of the best VPNs.


However, the most effective form of prevention is to turn off Wi-Fi when making personal transactions from a public place.


Image credit

Sort:  

6.Remove or disable unused functions(Bluetooth, Wi-Fi, Etc ...)

Recently, vulnerabilities have been found targeting communications equipment like Bluetooth, Wi-Fi, Etc... If you don't use them ? please disable it now.

Congratulations @petercletus! You have received a personal award!

1 Year on Steemit
Click on the badge to view your Board of Honor.

Do not miss the last post from @steemitboard:

SteemitBoard knock out by hardfork

Support SteemitBoard's project! Vote for its witness and get one more award!

Congratulations @petercletus! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!

Coin Marketplace

STEEM 0.20
TRX 0.25
JST 0.038
BTC 98646.90
ETH 3511.62
USDT 1.00
SBD 2.98