قالب وردپرس درنا توس
Home / Technology / Tips to protect your Android smartphone from malware

Tips to protect your Android smartphone from malware



Android is the most popular operating system for mobile devices. Therefore, the specific malware for this operating system is the most common. When it comes to the security of our connected devices, it's important to protect them from the start and to be aware of the various maneuvers that criminals use to outsmart users and infect devices.

An investigation by Kaspersky Lab, 83% of Android applications have access to their owners' confidential data, and 96% of these apps can be started without consent.

"We can not deny that cybercriminals are very creative and therefore users can not leave them, no open door that allows them to compromise their files, steal confidential information or maintain their bank account," says Santiago Pontiroli Kaspersky Lab security expert says, "Many users download applications without identifying their origins as a serious headache, so it is important to understand and understand the dangers of downloading applications of any kind from the Internet."

Um To avoid headaches and to ensure that the owners of Android devices are protected, Kaspersky Lab offers recommendations so that they do not fall in the traps of cybercriminals

How to safely download an application? Google has an entire department dedicated to reviewing applications on the Google Play Store. However, malware applications may be filtered from time to time. Although the risk of downloading an infected application directly from the official store is much lower than if you downloaded it from another source.

Is it just download and ready? Before you download an application, thoroughly examine the description, creators, and the number of people reporting problems or malware attacks with this application.

The application has a score of 1

0 points. What is the problem? A high-classification application is good, useful, and probably safer; Be careful anyway. A high rating is not everything and users' ratings must be consistent, written by people who have used the app rather than bots, even if they are negative. Sometimes cybercriminals use automated networks to improve the evaluation of applications so that users are not suspicious at the time of download. Also check the number of users who downloaded the application, as those with millions of downloads are less likely to get infected with malware.

What does the application need to know about me? The permission settings allow the user to control how much freedom an application has. For example, is it necessary for the application with which you are listening to music to have access to your camera? And to your microphone? One of the most common threats is that applications can steal your data (location, contacts, personal files) and perform certain operations in hidden ways, such as: Take photos, record audio, record videos, send messages, and more. According to Kaspersky Lab, around 40% of people in Latin America say they are not checking the permissions of their pre-installed mobile applications on their Android and iOS devices, and 15% of them are not checking permissions on downloading or installing new applications, not your mobile devices ,

Less is more. This sentence also applies to the online world: the fewer applications the user has on their device, the lower the chances of becoming victims of an attack.

"The last time I updated my applications was …" The more up-to-date you are The operating system and the versions of the applications are less the security issues faced by the user and his device. Therefore updates should be made regularly. "More than just technology in their favor, users need to be aware of the dangers found on the Internet to avoid them and be able to be protected from potential risks," says Pontiroli.

Double dose safety. Double-factor authentication is a resource offered by multiple online service providers that adds an extra level of security to the login process of each account. because the user must specify two forms of authentication. The first form – in general – is a password. The second factor can be anything, depending on the service, an SMS message or a code sent to an email.

My password is 1234. Without a doubt, choosing a password is important to avoid theft identity and information of your accounts. Although they usually remember everything, users often prefer an easy-to-remember password, even if it means it's more vulnerable. This increases the likelihood that cybercriminals can guess passwords and misuse accounts. Password management software such as Kaspersky Password Manager can help you store and manage more secure passwords containing multiple characters using a combination of letters, numbers, and symbols.

Make sure your internet connection is secure. It is important not to make online purchases or bank transactions while connected to a public Wi-Fi network. Make sure that you use a virtual private network (VPN) because all the information you send on this network is protected. You can also use tools that enable you to make secure online purchases and bank transactions for PCs or Macs such as Safe Money.

What else do I need? Regardless of the purpose of your download, make sure your device has a robust security solution that not only provides theft protection but also allows you to review applications that allow the user to remotely activate the alarm, photograph the alleged thief, block the device and delete all information.


Source link