Recently, hackers have directed more of their attacks on smartphones. Why is this happening? Think about your own phone. What have you done to protect it? Many smartphone users don’t take the basic steps to secure their devices. Smartphones hold lots of valuable personal and financial information. There are over two billion smartphone users worldwide, a huge market. These devices are very attractive hacking targets.
Because of these hacking threats, we wrote an article about how you can better secure your smartphone. To view the full article, please follow the link below.
In this email, we cover two important ways you can make your device more secure:
When you can, we recommend that you disable bluetooth. Some hackers have used bluetooth to break into smartphones. There are different bluetooth versions with varying levels of security. The older versions have more security holes, while newer versions have become more secure. In general, it is best to disable bluetooth when you don’t need it.
Be Careful about the Apps You Install
An important step you can take to better protect your smartphone is to be extremely careful about what you are downloading and installing. The best rule of thumb is to only download apps from the Apple App store or the Google Play Store and not unofficial sites.
Apple does a great job of screening which apps become available through its App store. You can be confident that the applications you install on your iPad or iPhone are free of malware and viruses. The apps on the Google Play Store are more likely to have malware or viruses, but usually you can be confident when downloading from their store. Google has a scanner which scans its Play Store for malicious apps.
Also, it is important to check the permissions a new app is requesting when you download it. If a flashlight app is asking for permission to access your contacts, this should be a red flag.
This week, Facebook announced that it will be working on new technology which will allow people to control their computers with their brains. Wearable technology will be needed to detect brainwaves. This technology will allow people to do some computer work much faster, like being able to type 100 words per minute or more.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.