programming4us
programming4us
SECURITY

Secure Your Smartphone (Part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Here’s everything you need to know to stay safe when you’re online, wherever you are.

What’s on your Android phone? And more importantly, how would you feel about that data being accessed by scammers, hackers, and identity fraudsters. That’s exactly the risk uncovered by Ralf-Philipp Weinmann, a researcher at the Luxembourg University who discovered that he could listen to conversations, intercept data, and run up huge bills calling and texting premium rate services – all without the alerting the phone’s owner.

Description: This is a wallpaper app showing a fixed set of images, so why does it need your location and full internet access?

This is a wallpaper app showing a fixed set of images, so why does it need your location and full internet access?

With the ability to download and run apps, smartphones are now the main focus for a growing number of malicious hackers, and yet most devices are completely unprotected from such threats. For online criminals, the situation resembles that of PCs in the mid-1990s, except they now how much money there is to be made from online crime. Thanks to the deepest recession in living memory, straightforward theft and street muggings for smartphones are also at an all-time high, so how do you protect your freedom to compute on the move?

Passwords first

Most people would never dream of using something as obvious as 1234 as the password for their important online accounts, but some users protect their smartphones with such a sequence and then leave the online accounts it protects logged in for convenience.

Your first line of mobile defence should always be to select a password that’s both memorable for you and difficult for a theft to crack. For a few years now, the best advice on creating memorable and secure passwords has been to take the initial letters of a line in a song, poem, play or book, and to make a password from those letters. You can test the strength of passwords you generate in this way by using free online web security site services, such as How Big is Your Haystack at www.grc.com/haystack.htm.

As of version 2.2 Android OS supports not only gesture passwords, but also the more traditional text-based variety. To enable a password, click ‘Menu > Settings > Display’. You can combine a password with gesture recognition, but always ensure that you use a gesture that overlaps itself, otherwise the grease marks on the screen may give it away to anyone who steals your phone. It’s also a good idea to clean the screen every so often to prevent grit from scratching the gesture faintly into the screen’s surface for posterity. To enable passwords, iPhone users should open the Settings app and select ‘General > Passcode lock’. Windows Phone 7 users should tap ‘Settings > Lock and wallpaper’, and BlackBerry users need to select ‘Option > Security options > General settings.

Install antivirus

You would never dream of buying a laptop and going online without installing at least a free antivirus product first. The abilities of a smartphone or tablet computer are now approaching those of a laptop, but it seems that the vast majority of users have no form of protection, even though mobile computing devices are facing all the usual threats. Spam containing malware attachments or links to attack sites, infected apps and code that exploit operating system weakness are all beginning to appear. Botnets made up of mobile devices are also becoming more common.

Description: You would never dream of buying a laptop and going online without installing at least a free antivirus product first.

You would never dream of buying a laptop and going online without installing at least a free antivirus product first.

We’ve reached the point in the evolution of mobile computing where it has become just as necessary to install antivirus software on your phone as it is on every other online computing device. Most antivirus vendors now offer free versions of their commercial mobile offerings, and many offer handy package deals on their commercial versions, including protection for multiple PCs and a phone, for a yearly subscription. It’s worth investigating these deals because they could save you money in the long run, but what’s the difference between free and commercial versions?

Mostly, the difference is down to the facilities provided beyond basic protection. The ability to remotely wipe a lost or stolen phone, for example, is something that will give you real peace of mind, but it’s usually missing from the free versions of antivirus products.

Never be tempted to simply click a link that looks OK and install what purports to be a free version of an antivirus package. Check the URL; if it isn’t part of a vendor’s official website, don’t visit the page. Fake antivirus software, written to infect your device or make you think it’s protected when it’s not, has now made its way to smartphones. If you’ve found a package on an app store, click through to be software vendor’s website and download it from there.

Remote wipe

So you have a secure password guarding immediate access to your phone, the screen lock activates after just a few minutes of inactivity, and an antivirus package is watching out for any malware in the background. However, if the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

Description: if the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

If the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

Android, BlackBerry and Windows Phone users have a range of third-party, dedicated remote wipe applications to choose from, which enable you to contact the phone and have it wipe itself. These tend to be subscription services, but prices are usually less than $7.5 a month, which is good value for extra peace of mind. Alternatively, you can examine the facilities offered by different antivirus packages. Free versions, such as AVG’s Mobilation Free, offer local wipe facilities. However, it’s not always clear if remote wipe is included or just a local wipe facility, so check with the software vendor before you part with your cash.

iPhone users can install Apple’s free Find My iPhone app (www.bit.ly/tfERpz). This gives you the ability to sign into another iOS device with your Apple ID, locate the missing or stolen device, display a rather satisfying messages to the robber, play a sound, lock the device and then erase it. The only proviso is that your iPhone must have been enabled in the iCloud settings in order to locate it.

Other  
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us