AndroidSecurity

How to Protect your Android Smartphone from Hackers

This post will directly aims to provide the basic info that most people want to know about the security of their phones, and when to download application and when not to download applications from the Android Market. The amount of personal information people store on smartphones, make mobile handsets a prime target for hackers. Not only are you susceptible to identity theft, but now that mobile technology is moving into the realms of online banking, auto-pay accounts and digital wallets, hackers can use malware to access you money. So i will be providing you with some tips that will make you secure using smartphone:

Tips to secure your smartphone: Protection against Hackers

1. Be careful while installing the Applications from Android Market

This is particularly important for Android devices. Google recently 50,000 applications were withdrawn Suspects contain viruses. There are many applications, malware, viruses or other sneaky software to steal your information or limit damage to the phone. The Apple Application Store also has this problem.So, pay attention to the installation of applications. Check Permission before installing any Application from Market, below describes more about checking Permissions.

How to check Permissions

When you install an application the Market will tell you all of the permissions it needs to function. These are important to read. Permissions can give you an idea if an application is asking for more than it needs to function properly. While some legitimate apps often ask for more permissions than they need, it should at least raise an eyebrow. Again this is just part of what you should consider when deciding if an application is safe and good quality.

Note: In the latest version of the phone version of the Android Market the permissions are only shown after you click install. You will then be shown a screen with the list of permissions and an “Accept and Download” button.

[​IMG]

To see the permission given to an application after installation follow these steps:

Step 1– Go to you phone’s settings
Step 2- Then select “Applications” or “Manage Applications”
Step 3– From there you should be able to get to an Application’s specific settings. You should see buttons like “clear data.” To see the permission you may need to scroll down a bit.

2. Anti-virus

The efficacy of anti-virus apps on Android is a controversial subject on even the best of days. Needless to say, there are some very differing opinions on the necessity of having anti-virus software protecting your phone. Both sides of this debate have some credible and respectable reasons for their choice, so I will try and present both sides as objectively as I can. In full disclosure though, I personally do not use anti-virus on my phone. That’s a personal choice I made. Plenty of security experts whom I respect do chose to use anti-virus on their phones. So ultimately this will be a choice that is yours alone to make and not something where you should take cues from other people. That said, here are the pros and cons of each side as best as I know them.

One thing to remember though, is that each side may have some irrational or sensational arguments. These stem from either a sense of emotional justification or a vested interest in selling software. Put simply, neither side of the debate is above bad arguments and unintentional or intentional faulty logic.

Advantages using Antivirus:

– Will protect you from all past threats
– May protect you from a future threat
– Often can have additional features for privacy and data protection
– May have features to protect your phone if it is lost or stolen

Disadvantages using Antivirus:

– May waste system resources like battery and memory
– It’s hard to protect from future/unknown threats
– Can potentially cause serious harm to the OS (very rare but not unheard of)
– May provide a false sense of security and encourage risky behavior

3. Tools that Protect Your Smartphone and Online Identity

Abine’s MaskMe privacy suite
-Secure Password Generator
-KeePass’s Password Generator
-Use Bitcoin for online purchases
PtotectMyID Mobile App

Do not ignore antivirus checks and make sure your smartphone has the latest versions of browser installed. Monitor your device’s behavior and check out this article for a list of suspicious symptoms. In addition, you can useMint or Credit Karma app to monitor your financial accounts.

NOTE: We already reported that the majority of financial apps for Android are not secure while most paid financial apps for iOS have been hacked, too.

MaskMe can give you a disposable temporary MasterCard number you can use for online purchase, and they charge only $5 a month for it. In this case, the merchant won’t even know your ID when you do the purchase, except for the case when there is a delivery address. You can use this tweak to avoid having your actual credit card information stored on your smartphone and your online accounts. That way, even if your device gets hacked, the hackers won’t know your financial credentials.

4. Set a device lockout

All smartphones come with a security lockout. Granted people don’t like to keep unlocking their phones every time there is an email but leaving your phone open can prove disastrous.

There is a compromise solution: find a lock-out that is long enough for ongoing, day-to-day stuff, but short-enough to protect your phone should it wind up in enemy hands (fifteen minutes might be a good compromise). On Android phones there is a feature that allows you to create a finger-swipe pattern “password” which is typically faster than a traditional typed password.

5.  Protect from viruses

Smartphones are not remarkably different from PCs in that they also can get viruses, and more-and-more those viruses are designed to get at that treasure-trove of information that you have on your phone.  Thus make sure you’re running some form of anti-virus software to prevent malicious spyware from winding up on your phone and sending your information out over the web.

6. Avoid Jailbreaking or Rooting Your smartphone

If you jailbreak or root your Phone for fun and enjoyment, then good for you. But you should avoid it because it mess up your phone and show you more grief Happiness. Second, you will not be able to update your phone with the latest updates of the operating system, because it is in a unsupported mode.

7. Use an apps instead of Browser

If you’re banking on your Phone or trading stock or anything else that may contain sensitive personal data Information between your phone and the Internet, it is best to use in place a formal application to the site or the company with the opening Your browser example phone.For have Chase, Bank of America and other large financial institutions their own applications for iOS and Android.

6. Remote Wipes

Although it’s a horrid thing to have to consider, imagine if your phone was stolen and the thief was able to unlock it. What kind of information would this stranger have access to? Setting up a remote wipe will allow you (in a worst case scenario) to simply boot up your computer and issue a command that will erase all personal information from your lost or stolen phone.

7. Protect your iCloud and Google Account

Protect your iCloud and Google Account
Protect your iCloud and Google Account

The last thing is that most, if someone in your access iCloud or Google account, you can access a data set that you could create and edit your smartphone. In these times, it is a step to allow the 2 -Check these two Google Accountaccounts.Your connects you essentially all Google services from Gmail to YouTube to Google Calendar Google Maps Play for Google Picasa by Google.

So how was it? Do share your comments and suggestions about this post. We will really appreciate it.

Stay connected! Be happy always.

Harinder
the authorHarinder
blacklisthackers.com is created and owned by Harinder(Aarav).Aarav is a technology Blogger from India(Dehradun). He’s Quiet type and Creative Guy who enjoys creating and exploring new trends on the WEB. Currently pursuing B.tech from DIT University.

Leave a Reply