Six tips to protect your cell phone from virus

By The Sweet Home / September 13, 2016

Security firm Kaspersky Lab detected a total of 884.774 new malicious programs that want to make life difficult for users of mobile devices in 2015. The figure is three times the malware reported by the company in 2014: 295.539.

And among the new threats, her company reported a Trojan called Triadas, which target devices using the Android operating system. Given its complexity, experts compare it with malware designed to attack Windows.

“It’s stealthy, modular, persistent and was created by very professional cybercriminals,” said Kaspersky Lab on its website. “Devices that use versions 4.4.4 and earlier of the Android OS are at great risk,” he said.

Malware figures On mobile devices:

  • 884.774 new malicious programs in 2015
  • 295.539 were recorded in 2014
  • There were 7,030 banking Trojans in 2015
  • 94.344 users were attacked with ransomware in 2015
  • 18,478 were victims in 2014

Source: Kaspersky Lab

According to the company report, nearly half of the top 20 in 2015 were Trojans malicious programs “with the ability to get root access rights”. These rights give hackers the privilege to install applications and programs on your smartphone of a person without her knowing In 2015, 94.344 unique users were attacked by a ransomware virus, a program that installs quickly on your cell, blocks access to the user by seize your files. You can only recover if you pay a ransom.

The figure is five times more than in 2014, when 18,478 were reported, the company said.

The virus that hijacks your computer and asks for bailout

What you do then?

BBC consulted several experts about what we do to protect our phones cyber-attacks and we shows six recommendations.

Do not try to be the super hacker

The security expert recommended not “rooting” cell. It is a term known to Android users and is to gain access to the phone system to make deep changes.

Keep cyber defender integrity of the phone and do not disable the option that detects potentially harmful applications.

The word refers to “root”, which in English means root. For users of iOS the end of this activity is known as jailbreaking, which in English means escape. And it is precisely that the first tip that Kaspersky Lab said to BBC when asked about ways to care for mobile devices.

“Avoid ‘jailbreaking’ phone, your smartphone passes will be a bigger target for malicious actors when ‘successfully hack’ to download applications from other operating systems or change of mobile phone companies,” expert says.

Think wrong and be right

Stop your finger before clicking on a window, for example, requests access to the configuration of your phone or invites install a program.

The founder of digital security company Flag Solutions advises users not disable an option that in Android known as “Verify apps”. The function analyzes all applications before and after installing them to prevent malicious software is installed.

“It is assumed that applications pass strict safety controls. If the application is suspicious, that function will detect it, “said an expert in conversation with BBC World.

Kaspersky Lab also recommends not open attachments from emails on your phone. “As the malware for computers, mobile attachments may contain malicious programs,” says the company.

Nor advise clicking on links text messages that may be spam, as they can lead to malicious websites.

Install a “doberman”

Just as many of us would like to install three locks, two bars, barbed wire and a dog doberman well trained in the door of our homes, do the same with your phone.

A good antivirus are not exclusive to computers. Its role is to guard dog.

“Blocks access to your mobile device with a strong password to prevent unauthorized access to your contact list, personal photos, apps and emails,” says Kaspersky Lab. Install antimalware program is also important.

Remember the saying: “Whoever does not hear advice does not get old”

It is not to pay attention to what everyone says or whatever you most, but it is worth reading reviews from other netizens.

Systems engineer Antonio Navas, who has extensive experience in mobile application development, believes that when downloading must ensure that apps are known or verified.

“They are applications that have many reviews and many users use them. We must be careful especially with games or applications that promise to block, for example, advertisements, “he told BBC World.

“If you really want to install applications that are not well known, it is essential to check the permissions the app needs and if any sounds weird, it is better not to install,” said engineering director Duolingo.

Imagine you’re in front of your computer

There are many security measures we take to protect our personal computers.

Same precautions you implement to protect your phone as you generally use for in computer.

In fact, several of them can use to take care of our cell. “Be very careful with possible phishing sites while using your mobile browser,” says Fabio Assolini to the BBC.

If you can, type the address directly the website that you want to visit. “If you click on a link to a new page, check the URL to make sure you have not been redirected to an unknown web page.”

Another tip is to keep as many copies of your content as you like what you have on your phone. For example, regularly backup of your photos, videos and other content are very important for you on external drives or external memories.

Kaspersky Lab also suggests enable remote wipe option. “The most common problem affecting mobile users is the physical loss of your phone … from forgotten in the back of a taxi to stealing it,” says Assolini. “Clean memory will prevent thieves from accessing personal information on the phone”.

And as you do on the street, turns to see who is following

Although physically no one is behind you, in the jungle of internet many people can see what you do with your cell phone.

When a girl surf on the web we can leave clues unwillingly and cybercriminals by follow them.

Therefore, the company recommends turning off the Bluetooth function when you’re not using.

“Anyone with a phone with Bluetooth can easily spy on your activity on the phone, you make calls and text messages you send. In addition, do not accept messages sent via Bluetooth strange phone numbers.

And avoid public Wi-Fi networks, because “the information transmitted through these unsecured networks can be intercepted by cybercriminals. This may include your bank account number or credit card, “the company dedicated to computer security.

Hack into a cell or an Android mobile – How to protect yourself

Exactly that’s what I’m going to show in this tutorial. 100% free of charge, a tutorial in which we will see how hackers hack a cell phone remotely. This way they can be prevented.

Hackers are the next targets:

  • Remove the SD card or format the device
  • Make photos with front and rear camera
  • Perceiving the precise location on Google Maps of where the device
  • Making sound recordings
  • Spying messages and call history

Keep in mind that the nature of this tutorial is informative. Enough people suffering from pilfering and accurate to access your phone again to erase sensitive or critical information. If your goal is to do evil and pirating strange phone with this tutorial, we are not responsible for the use you make of our teachings.

We do not recommend any remote apps that works remotely with Bluetooth. Recommend technique uses Wi-fi, or standard Internet connection.

More to Visit:

About the author

    The Sweet Home

    Leave a comment: