5 Basic Tips To Stay Protected On Android Taking the - TopicsExpress



          

5 Basic Tips To Stay Protected On Android Taking the recent Android security issues into consideration, including the massive malware attack on Google mobile OSand the ability of apps to access your private data, such as photos, we think it is quite timely to once more cover the tips on how to keep your Android device (more or less) protected. To shortly go through the reasons of increased vulnerability it should be mentioned that the main stimulator that helps raise the threat is the endless stream of new Android-powered phones and tabletsto wireless carriers, as well as the huge and fastest growing Android app marketplace, already being a worthy competitor of the world’s largest Apple App Store. And yet Google habitually searches for malware or other infectious software contained by the already-available apps, the exposed nature of the OS and the capability of developers to make their apps live directly to the Android market mean that some safety intimidations might filter through. However, instead of refusing to get the benefits of an open source life and say no to all the apps, you may approach a less radical solution: a bit of precaution is quite enough to stay safe and secure till Google finds out a better security solution. Below you’ll find five quite basic tips that guarantee your security: 1.The first and yet the most important tip is to block apps outside the Android Market. As in difference with Apple’s strongly gated app store, serving as the primary access point for iOS apps, Android has no restriction over its users on to get applications downloaded from other servers outside the Android Market. Flexibility is a great thing in some cases, but not always the developers are as conscientious as it may seem, so limiting the app access from other sources but the official marketplace would enhance security a lot. However, yet it is not done and you have to avoid suspicious apps yourself, for your own sake! 2.The second tip is to never discard and moreover, always carefully review the feedback and the comments of the app in the Android Market before you decide to download it. Despite the fact that app permissions not always explicitly mirror each and every aspect of their functionality, you can still shape your opinion about it based on your own assumptions. For example the permissions of the app that NY times experimented on recently, called Tea Timer, only asked to allow access to internet connection, but actually copied the pictures on the device and posted in on the web. The thing here is that no one ever asked himself why an app serving a timer function would ever need the access to internet. Or ask yourself, does a solitaire app really need access to your contacts and call logs? Once you dont feel comfortable allowing the app creator accesses to private information, keep browsing the marketplace until you find that “ideal” app that asks few things but does a lot. 3.Passwords and screen lock are the key factors in remaining digitally secure. I know it sounds a bit bizarre mentioning lock screens here, but you’ll be surprised to know how many people forget to enable a lock screen, never realizing their phone in the physical possession of a third party unintended. So let’s agree that a lock screen is vital in providing your data with a first line of protection. Here is how to enable it quickly: go to ‘Settings’ > ‘Location & security’ to enable a PIN or pattern style lock screen. While you’re in ‘Settings’, change your ‘Screen Timeout’ under ‘Display’ to ensure that your lock screen comes on after a delay of phone activity. 4.Always, always disable Wi-Fi Auto Connect – free internet access at public locations activated without your permission carries enormous risk of sending data and information from your phone to untrusted servers. Search for an option to disable the auto connect in Wireless & networks tab of your phone found in settings for the majority of Android devices. But this is not all about Wi-Fi – you may sometimes saw the bunch you’re sitting on with your own hands if you agree to connect to untrusted and insecure wireless access points. 5.And the least – if possible, always prefer to stay anonymous and disable your geo-locations feature by navigating to Settings’ > ‘Location & security’ to disable the use of GPS satellite location and wireless network location. However, this will also make you less noticeable to authorities in an emergency situation so choose your battles wisely. Covering all the aspects and assessing pros and cons of location tracking is a topic of another debate, but for anyone interested in securing their personal data every measure counts, so it’s up to you to be rational. #RAGHAVENDRA#
Posted on: Mon, 26 Jan 2015 11:05:50 +0000

Trending Topics



Recently Viewed Topics




© 2015