[ad_1]
The average person spends about 5 hours a day on their phone, and most people around the world start their day by checking their cell phones.
In a report published by the American site “hackernoon”, the writer Davibria Sunilkumar said that it is time to understand that our cell phone is a superb key that can open any door to our life, whether it is. virtual or physical.
The first thing we check at home is if the door and locks are working properly to secure our personal space, but do we have a problem? Himself Regarding the use of our cell phones?
The massive increase in the use of mobile devices has rapidly increased the number of malware. You may think of yourself as the “customer” when you surf the Internet or use an online service, but you don’t really know your data is being bought and sold. There is nothing for nothing in life.
Pay attention to app permissions
Recent studies have revealed that over 1000 Android apps steal your data such as location, passwords, and other personal data. Therefore, never approve unnecessary app permissions.
And if the shopping app requires permissions like storage, contacts, and microphone, ask yourself why the shopping app needs access to your storage. By giving this permission, the app can access anything in your phone’s memory, and if it requests microphone access, it can listen to your voice chats and calls.
A legitimate app only asks for permission based on its functionality, and to control app permissions, go to settings, apps, then select the app and click Permissions.
Mandatory password rules
Always use a password of at least 8 characters long consisting of a mixture of upper and lower case letters, numbers and symbols. Keep in the habit of changing your password every 60 days. Never repeat the same password for multiple accounts.
Some sites may make these rules mandatory while others ignore them. Have you ever thought about why we have to follow the above rules? This is the first rule to protect your accounts from indiscriminate force password attacks.
What is a blind force attack?
The attacker tries to use different combinations of letters and symbols to match your password. Now that we have computers with more computing power, a indiscriminate force attack can be easily performed with any of the normal passwords you use.
Haveibeenpwned.com allows you to check if your email address or password has been stolen anywhere on the Internet. In addition, “howsecureismypassword.net” will let you know how long it can take for a hacker to crack your password.
Uninstall them if there are any unused apps. Think of apps as windows in your house, the less there are, the safer you are.
Avoid third-party website apps
Download your apps only from the Google Play Store or the Apple Play Store.
Always configure multi-factor authentication
The first factor of authentication is something you know, like passwords and a PIN code. If the attacker accesses your password and tries to access your account, they will be asked for a second agent and something you own, such as a token or variable password.
This token is set with time restrictions so that it changes every minute, so even if an attacker gets your password, they must have access to your phone. In addition, it must have the PIN of the authenticator app or token you received.
Use a secure browser
Make sure you are using a secure browser, because browser security is important, the browser knows a lot more about us than anyone in our life. It knows what to look for, what passwords you enter, your medical history, who you are talking to and where you are. When it comes to browser security, choose one that focuses on privacy and security.
Mozilla Firefox and Brave are known to provide adequate levels of privacy and security. The difference is that in Firefox we have to manually add components like “NoScript” and “Ghostree” to ensure privacy and security, but in the “Brave” browser there is a built-in tracker, ad blocker and an ad blocker. browser fingerprint blocker.
Use a virtual private network
Always use a VPN when browsing from a public Wi-Fi network, as a public Wi-Fi hotspot is a haven for all hackers and intruders, as the open network has no security practice. standard.
With a regular tracking tool, an attacker can steal any data such as the passwords you used to log in especially from social websites, bank accounts, emails, etc.
A VPN can send your network traffic through a secure encrypted tunnel, making it difficult for others to steal your data. The VPN comes with many great features such as allowing access to region-limited content, it also maintains the privacy of your browsing from Internet service providers and encrypts network traffic on the Internet.
Be skeptical about the links
Don’t trust any link blindly. Always hover the mouse over any link you receive in an email or on social media to see if it takes you to the right page. Attackers can use social engineering techniques to steal your data.
You can use the “verrostotal” site to scan for suspicious files and web addresses, or add “unshorten.link” to the Chrome browser, which can reveal the exact web address of any shortened link and also lets you know if the site is classified as malicious or not.
Download anti-malware programs like “Malwarebytes” to your mobile device. And if you download a malicious application or open a malicious attachment, a mobile malware protection program can prevent the threat from spreading. Activate the “Google Play Protect” service by going to Settings, then Security, and clicking on “Google Play Protect”.
Put your device in Safe Mode if you experience performance issues like frequent app crashes, annoying pop-up ads on your screen, and unusual drop in speed and performance.
The author concluded that malware can steal sensitive data, control your device, and damage your system. If your phone has been damaged by a recently installed app, Safe Mode allows you to test if the app you just installed is causing a problem on your phone.
[ad_2]
Source link