Skip to main content

How to Make Your Phone Hacker-Proof

This is guest post by Amanda Tradwick about making your phone hacker free. Smart phones have become like small laptops for many of us: We use them to store pictures and videos, to access our online accounts, and to keep other personal data such as passwords and financial information. Unfortunately, storing so much personal data on our phones makes them bigger targets for hackers trying to steal that data. Just as you would for your home computer, there are steps you must take to secure your phone and protect your information. Here are a few things you can do to make your smart phone more secure:


Use a Strong Password


The first line of defense for your phone is to restrict access to it by setting a strong password. You can set a password to enable the phone, one to access voicemail, and one to access e-mail or other apps. When you create your password, be sure to use a phrase instead of a simple word, a combination of letters and numbers (or other special characters), and upper- and lower-case letters. Do not use a series of sequential or repeating numbers, common personal information such as birth dates or addresses, or simple words that can be found in the dictionary.


Turn of Apps and Features Your Aren’t Using

One common technique that hackers have used to gain access to cell-phone data is to use Wi-Fi connection spots to access open applications that use GPS and link to your phone. Hackers can use these open apps to gain access to information such as call records, texts, photos, and other personal data that be stored on or linked to your phone. You can protect this weakness on your phone by closing any applications or features that you aren’t currently using. Do not assume that you will be logged out once you stop using the app.

Be Alert to Phishing

Phishing has evolved beyond e-mail and is now a common tactic used in text messaging to try to access data. If you receive a text from a number that you do not recognize, do not click on any links within the text and do not reply to it. These texts may be sent in an attempt to access your data. Simply erase the text and block the number.

Install Anti-Virus Software


Apps and software are now available to help protect your phone from viruses and other
malware and spyware. Taking the time to install one of these protective programs will allow you to browse the Web and check your e-mail more securely. Be sure to install a trusted program with a known reputation and to update it often for protection against new viruses.

Install a Remote Wipe App

If your phone is every stolen, you can protect the data on it through a remote application installed on your computer that is connected to your phone. This app will allow you to wipe all the data on your phone through your computer. Of course, to ensure that you don’t lose the data forever, you should back up any valuable information on your computer long before this happens. Keeping your phone and your personal information safe from hackers is as simple as taking these steps and practicing safe browsing habits. Also be sure to change your password regularly, never to share your data with sites you don’t know and trust, and to only access your data on a secured network.

About the author:

Amanda Tradwick is a grant researcher and writer for CollegeGrants.org. She has a
Bachelor's degrees from the University of Delaware, and has recently finished research on school grants for low income and college grants in new york.


Technology Blog

Comments

Popular posts from this blog

iPhone sales help fuel worldwide smartphone numbers

There are nearly 150 million smartphones out there in the world, according to new figures. Thanks to record breaking sales figures by Apple for the iPhone 4S by the end of 2011 there was almost a 50% increase in the number of devices up on the previous year. The research by Gartner Inc. claims the figures rose during the final quarter of 2011 thanks to the 30 million plus iPhone 4S' sold by Apple. The results led to Apple becoming the third largest vendor of mobile phones in the world. They also became the top smartphone vendor, with nearly a quarter of global sales in the fourth quarter. Over the rest of 2011, Apple took a fifth of the share of the smartphone market. The UK and wider Western Europe along with North America were the driving forces for the figures, says Gartner. Up until the launch of the iPhone 4S sales were a little slow. Suddenly the spiked as we all ran out to buy the new device. Worldwide, mobile device sales figures reached 476.5 million in the fourth q...

3 Things to Avoid as a Motivational Speaker

Motivational speakers deliver at least hour-long speeches about positive thinking and how to better yourself and the people around you. These messages often apply to a wide variety of settings, whether at home, at work, or even at a personal level. If you're ever planning on becoming a motivational speaker, there are a lot of things that you should avoid. Here are the three of the most common ones.

Yahoo invisible detector – insights on a new online service

This is a guest article by Iulian about leading Yahoo Invisible detector service http://www.detectinvisible.com/ . There are several online businesses which are basically ruling the online industry, and one of them is Yahoo. Founded in 1994 by Jerry Yang and David Filo in Santa Clara, California, Yahoo! started to grow significantly over the years, now having millions of users all over the world. One of the most widespread products of Yahoo is Yahoo Mail and Messenger. Over time yahoo messenger had become a habit for millions and soon they’ve introduced the possibility to become invisible for other users. It was obvious that a whole new kind of service appeared online, that of yahoo invisible detector. The yahoo invisible detector as an online service first appeared when yahoo was at protocol 13, now being at protocol 17, and at first there were several websites offering their services in order for you to find out which buddy of yours is hiding. Unfortunately, as soon as yahoo star...

The Concepts of Social Networking in Today's World

In today’s high tech world, networking occurs as much on computers as in “real life” social situations. Social media has opened up a vast new frontier for people to connect with others. Before the advent of social media, people generally networked at social gatherings like mixers, fundraising galas and similar events. Of course, such “face-to-face” networking is still important and common, but social media allows possibilities that did not exist before. One of the problems with older networking models is that often the same people showed up at all the events. The percentage of the population that is active in community events tends to be rather low. On the other hand, almost everyone these days uses social media. Vast reach of social networking According to the latest stats, Facebook alone has more than 900 million active users worldwide with the number continuing to grow. Twitter and Google+ also have large numbers of active users that cross all demographic categories. ...

Archive