We present the concluding part of our earlier post on the above subject. In case you missed the earlier post, please click here
(6) Not Verifying Your Apps Before Installing
Only few people verify applications before they download and install them. By verification , I mean carrying out some basic research before installing an app. Many smartphone users download and install applications that come packaged with malware that gives a remote hacker root access. Most recently users have been hit with the Quadrooter and Gooligan Malwares.
Quadrooter constantly shows pop-up ads and installs apps without permission. All this can be avoided. I think where the problem lies is mainly with Android phones because of the relaxed rules required to host an app in the Play Store. iPhone users are safer due to Apple’s closed wall policy.
(7) Clicking On Any Link You See
It’s generally more difficult to spot a fake login page on a smartphone than on a computer. Furthermore, shortened URLs make it extremely difficult to detect illegitimate addresses. The best way to stay secure is to avoid clicking on suspicious links sent via SMS or instant messaging apps.
(8) Jailbreaking or Rooting
I know many hard-core rooters and jailbreakers will probably bash me for this one. However, the fact remains that non-rooted Android devices and non-jailbroken iPhones have a certain level of security that limits the amount of access a user has to vital parts of the phone’s operating system. Jailbreaking or rooting gives you access to hidden system settings that allows you to do much more with your phone.
Everything comes with a price and the price you pay for that is greater security risk. I’m not saying you should avoid rooting your phone. All I am saying is that if you choose to do that, make sure you know what you are doing.
(9) Not Switching Off Bluetooth
You’ve probably not heard of the terms bluejacking , bluebugging or bluesnarfing. These are situations where hackers can gain access to your phone using your Bluetooth connection.
Using this method, the hacker only needs to be at just about 30 feet away from you and you’ll never ever know what just hit you. Within a matter of seconds, a Bluesnarfer can steal details such as confidential information and even login data to various sites. So, unless you are transferring or receiving a file, for God’s sake switch off your Bluetooth connection.
(10) Storing Sensitive Data On Your Phone
I don’t understood people store ATM card PINs, bank online passwords, sensitive images/videos and other such sensitive data on their phones. If your phone is stolen, it wouldn’t take a geek to know that a four digit number stored as a phone contact is a PIN to one of your accounts. With more analysis , a clever crook can mess up your life.
Make sure you check yourself and make sure you’re not doing any of these things to save yourself from security risks