How to make your smartphone more secure. Do you need an antivirus on your phone? How to make using your smartphone safer

For many of us, a smartphone is an important part of life. We use it for shopping, chatting, watching videos, banking and much more. Modern life has become more crowded and mobile. However, this has its drawbacks. A stranger who has access to your smartphone essentially has access to your entire personal life.

No one is immune from theft or loss of a smartphone, so you need to prepare in advance for possible problems. We offer you 10 tips on how to make your smartphone more secure.

1. Screen lock

The idea of ​​a screen lock is quite simple: if a person wants to access a smartphone, he needs to enter a secret key, be it a PIN code, graphic key or a simple password. The most reliable option today is a fingerprint scanner. If your smartphone supports this feature, be sure to activate it.

2. App blocking

Locking your smartphone screen is one thing, but if you want to add another layer of security, you can use an app lock. This function quite useful for locking banking applications or notes.

The method of blocking applications depends on the smartphone model. You can use special app Lock, which allows you to set a PIN, password or fingerprint lock on any application.

3. Quit apps and services

We recommend that you exit the application each time you finish using it. It is especially worth paying attention to banking applications and social networks. Thus, if an attacker gains physical access to your smartphone, he will not be able to monetary transactions or read your personal correspondence.

4. Use a password manager

The password is the last line of defense against attackers, so you need to make sure it's long enough, complex, and different for everyone. account.

However, not everyone manages to remember complex password, in which case a password manager is a lifesaver. Password managers allow you to create new passwords and automatically save them.

In the previous paragraph, we advised exiting applications before finishing using them. Password managers make it easier to log into applications again because they automatically fill in the required login fields, such as username and password.

The most reliable and popular password managers are LastPass and Dashlane.

5. Use an antivirus

Smartphones are much less susceptible to viruses and other malware than personal computers, but they still pose a danger. An antivirus application will protect your smartphone from malware software by scanning applications, websites and files.

6. Don't use unofficial app stores

There are two ways to hack a smartphone: either someone gets physical access to it, or remotely. The attacker receives remote access usually with the help malware. You can avoid such programs if you use official app stores such as Google Play Store.

Most likely you have heard about root rights for Android devices and jailbreak for iPhone, but using these methods you are exposed to great danger. These features are recommended for advanced users. If you are not one, forget about them, otherwise problems may arise.

7. Avoid public Wi-Fi networks

Another way to gain remote access to your smartphone is through unsecured Wi-Fi networks.

Public Wi-Fi seems to be a convenient and simple solution for accessing the Internet, but not everything is so smooth. Attackers can use public Wi-Fi to steal your personal information.

3G and 4G networks are considered more safe method Internet access, but it's even better to use secure Wi-Fi networks such as home broadband. Make sure that the network is truly protected, such as with a password or encryption. Most routers offer advanced security options that you should definitely use.

8. Message encryption

If you take your personal security very seriously, you can use message encryption. Popular instant messengers such as Telegram and WhatsApp offer message encryption features. If you use email, you can install a specialized application such as ProtonMail.

For even greater security, you can delete messages immediately after they are sent. This way, if an attacker gains physical access to your device, they won't be able to read the message. You can use special applications, such as Bleep, that automatically encrypt messages and delete them as soon as they are read.

9. Enable Smartphone Remote Tracking Feature

Android and iOS operating systems offer useful function smartphone tracking, which is useful in case of theft or loss of the smartphone.

To enable the tracking feature Android smartphone, go to website Android Manager devices, or download the application with the same name. Then you need to log in to your Google account. After this, you will be able to track where your smartphone is on a map, as well as block or even erase all data.

In just a few years, smartphones have become an integral part of our lives. They serve us as a communicator, navigation device, entertainment center, e-book, pocket trainer, wallet and so on. However, such rapid development mobile devices has led to the fact that many users have not yet developed strong security skills for both the devices themselves and their data in them. Sometimes you’re simply surprised how careless people can be when handling their gadgets. Therefore, we would like to draw your attention to several rules that every smartphone owner must follow.

No blocking

Having to enter your unlock password every time can be a little annoying, but it's one of the most simple ways prevent unauthorized access and/or use of your phone. Of course, specialists, after spending some time, will be able to hack any protection, but this will at least give you a guarantee that your gadget will not be accessible to the prying eyes of ordinary people. The best view The lock is precisely the password. Set it to automatically lock after one minute of inactivity.

Public Wi-Fi networks

Public Wi-Fi networks can be very convenient, but they are also a big threat to your safety. Using simple and publicly available software, your passwords, credentials and other information may be intercepted. If you use Wi-Fi network in public places, it is better not to log into your financial, banking or other accounts that are important to you. If this is necessary, then use a VPN connection or even your mobile network data transmission.

Lack of antivirus

Users take seriously the presence of an antivirus program and updating its database on the desktop, but at the same time, they categorically do not understand the same need for mobile devices. Meanwhile, in terms of their functions, mobile devices are becoming almost identical to desktops, and the emergence of massive virus infections for them is only a matter of time. It is better to prepare in advance for their distribution and install a modern mobile antivirus, especially since there is a choice, including free programs.

Ignoring updates

Many, although not all, gadget manufacturers release periodic updates to improve functionality and fix security issues. They are not always installed automatically; sometimes you need to go to the website, download and manually update the software for your gadget. This opportunity should not be ignored.

Installing programs from third-party sources

Devices on Android platform have the ability to install programs not only from the official store, but also from other sources. Very often, users download and install hacked programs containing various malware from dubious sites. As a result, an attempt to save 1-2 dollars results in significantly larger losses.

Phishing sites

According to cybersecurity experts at RSA, smartphone users are more vulnerable to phishing attacks than desktop computers. It is much more difficult for them to recognize fake login pages on a mobile browser than on a desktop browser. Therefore, you need to be very careful about links that come to you via SMS or e-mail, but it’s better to generally use only a regular computer to visit important sites.

Superuser rights

Rooting or jailbreaking your device can be very helpful for unlocking additional features smartphone. However, this action puts his safety at great risk. Especially in cases where the owner of the device is not very technically prepared and does not really understand what he is doing and why.

Because of this operation, any application will be able to perform an unlimited set of actions, including stealing information, sending messages, withdrawing money, and so on. Therefore, it’s worth thinking again about whether you need this and whether you understand all the consequences.

Bluetooth

Have you heard of terms like bluejacking, bluebugging or bluesnarfing? All these terms refer to different types of hacker attacks using Bluetooth connections. Using this technique, a hacker can be up to 30 meters away from you and connect to your device undetected. Within a few seconds they can steal your confidential information and even login passwords for various sites. So remember to turn off the Bluetooth connection when you don't need it.

Autologin

Many services, websites, and social networks offer an automatic login option for your convenience. Thanks to this, you won't have to enter your login credentials every time. However, do not forget that anyone who gains access to your device will be able to easily access any of your sites in the same way. Therefore, never use the auto-login option and do not forget to click on the exit button when you finish working with a particular service.

———————————————————————————————

All of the security issues listed above are easy to fix. This does not require significant effort or material costs. Yes, sometimes this brings additional inconvenience, but in case of unpleasant situations, which, as you know, you never expect, they will help to completely or partially avoid damage.

Many mobile device users are paranoid, or perhaps this is not paranoia, but justified caution. From thieves to malicious apps, Android smartphones are under threat from all sides. Attackers are constantly coming up with new ways to take control of your device.

Admittedly, there is no perfect method to protect your Android device from thieves and hackers. If a truly skilled hacker targets your device, they will likely gain access to it.

Despite this, there are many ways to protect your Android device from common security threats, and they require minimal effort on the part of the user. Just as a deadbolt protects your home from thieves, a pin code protects against pickpockets, and proper security settings protect against malware. Below are six simple ways to keep your Android smartphone secure.

  1. Device lock

    This seems obvious, but many users don't lock their devices so they don't have to deal with unlocking later. Why do you need to enter a PIN every time to use your own phone?

    However, you should think about how you will feel if you lose your smartphone or it is stolen from you and it falls into the wrong hands. Is there information on your device that is confidential or too personal? If yes, open Settings > Security > Lock screen and create here pin, can also be used graphic key or Fingerprint's scanner, if you have it on your smartphone.

    The Smart Lock feature will allow Android to unlock the device when the camera sees your face, or when it is at home, near a special NFC tag and in other predefined places.

  2. Remote detection and erasure of data on a smartphone

    The smartphone is locked, but you still lost it. What to do? will come to the rescue Android Device Manager, which will help you track a lost device and, if necessary, erase information on it, but to do this you need to activate a couple of settings on the device.

    Open Settings > Google > Security and enable two options: Remotely detect this device And Allow remote locking and erasing.

    Now, even if your Android smartphone is lost, you can find out where it is, if it has wireless connection and the battery is not discharged, and erase the data stored on it.

  3. Disable the Unknown sources option

    We've dealt with physical threats, now let's talk about more subtle matters, including malicious applications. Google goes to great lengths to make sure that Play store Store is free of malware, but the company cannot protect you from apps from other stores and sites.

    In some cases, third-party app stores are quite respectable, like the . In other cases, stores turn out to be questionable, and some sites try to install applications on a smartphone without the user's permission.

    Luckily, Android has a setting for such situations. Open Settings > Security and remove the switch from the option unknown sources. At any time, you can return the switch and install an application from a third-party store, after which the setting must be disabled again.

  4. Let Android Scan and Verify Your Apps

    Although Google monitors the apps in its store, there is always a chance that malicious code will sneak through the security redoubts. When turned on correct settings Android smartphone can periodically scan installed applications in search of malicious code. Open Settings > Google > Security > Verify Apps and enable the Scan devices for security threats option. After this, Android will keep an eye on your applications and notify you if anything seems suspicious.

  5. Keep your device updated

    Hackers are constantly changing their methods of hacking Android security systems, and Google, to counter them, releases security updates that close the vulnerabilities found. For this reason it is important that Android version was the very last one. If not installed Latest updates Android security, the system is vulnerable to many attacks.

    An Android smartphone will usually notify you that an update is available. You can check its availability manually in the section Settings > About phone > System update.

  6. Enable Chrome Safe Browsing feature

    Malicious apps aren't the only threat your Android device can face online. The global network is full of dangerous sites that will try to steal your personal data using phishing attacks or download a malicious application to your smartphone.

    The Chrome browser on Android offers a Safe Browsing feature that alerts you to suspicious website activity. The alert will give you the opportunity to leave the site before your data is stolen. To activate this feature, launch your browser, click on the menu button with three dots in top corner screen, select Settings > Privacy > Safe Browsing.

Android security shouldn't be taken for granted. Being the most widely used smartphone platform worldwide, it is a tempting target for attackers and all users should follow at least basic Android security practices.

People using Android devices face a wide range of security threats:

  1. Data loss
  2. Identity theft
  3. Hacked accounts
  4. Compromised financial information and even theft of your Android devices

Given the wide range of customizations, it is almost impossible to cover the security features offered by all Android ROMs and spyware. This article discusses the security features in the version that will be available in most other ROMs.

We'll move on from basic settings security to more advanced settings as we progress through this article.

This is a basic level of security for Android that you can configure to prevent physical access to your device. You have the following options to choose from.

  • No— the device is not blocked.
  • Swipe- Again, no blocking. You just need to scroll to go to the home screen.
  • Sample - Set up a pattern lock on your device. When setting up, you will have to draw the design twice. You should know that it is very simple templates you can simply tell by looking at the spots on the screen. Multiple overlapping nodes can make it difficult to recognize the start and end nodes and make your pattern more complex. You can bypass pattern blocking if you are locked, but this is a drastic step and is not recommended to take on any device that is not your own.
  • Pin— you can install a digital lock on your device. The length of the lock is at least 4 digits, but we recommend increasing the number of digits. As with general contact number recommendations, do not use birthdays, anniversaries, or other dates of personal significance as a pin. In the age of social media, it becomes all too easy to find out the dates that are important to someone.
  • Password - Set up a device password that is at least 4 digits long. Passwords are often recommended to be 8 or more in length and this precaution also applies here. You can use numbers and symbols to make them more secure.

My personal preference is for pattern locks as they are easy to use and provide a decent level of Android security. See what works best for you and tweak it!

#2 Set up fingerprint access (optional)

If your device has a fingerprint reader, you can set it up as a password for your device. As a regular user of this feature on my S6, I would say this is the most convenient way to access your device.

To do this, you can go to "Nexus Imprint" under Security and follow the on-screen steps to get your imprint registered on the device. Next time you want to log in, just keep your finger on the reader and you're in!

When it works, it's an incredibly convenient way to access your device and keeps your Android device secure.

# 3 Setting up Smart Lock

Smart Lock lets you set your device to search for certain situations and remain unlocked. You can enable or disable the Smart Lock feature in Settings > Security > Trusted Agents (under Advanced). You have the following settings to configure your smart lock.

  • Body Detection- You can enable this setting to allow the device to identify itself when you carry it and remain unlocked. It locks when you are not holding it.
  • Reliable places— You can find places on Google Maps, which you want to consider “trusted” and the device will remain unlocked there.
  • Trusted devices- Allow your Android device to remain unlocked in close proximity to smartphones, cars or even NFC stickers. Please note that this feature requires Bluetooth.
  • Reliable person- Use the camera on your device to recognize the face of authorized users and unlock. Sometimes this method can go wrong and a regular PIN, pattern or password will be a more secure option.
  • Reliable voice - For normal operation For this function you must always use “OK Google”. You will need to go through a training process that establishes a voice model that matches your voice before using this feature. If the voice recognition is inaccurate, you can go back and train the voice model again for greater accuracy.

Applications that require certain special permissions will be listed in the Device Administrators section. Click on an app to see what permissions it requests and whether you want the app to be able to have that permission.

You need to enable "Android Device Manger" as it allows you to remotely wipe and lock your device if it is stolen or lost.

Inclusion " Android Pay» as a device administrator will place certain restrictions on the PINs and passwords you can use on your device.

Enabling encryption on your Android device ensures that data is not in readable form when the device is locked. This is great for keeping your Android device data safe. Once it is unlocked, the data is decrypted and used.

Some devices, like my Nexus 9, are encrypted by default. Other devices may be able to enable it. Enable this feature to further enhance Android security.

You can use this feature to pin the current screen on your device until you unpin it. You can request a password verification when the screen is not added. The steps to connect the screen aren't the most intuitive, although as a security measure it can be used to limit access to just one screen on your device.

How to connect a screen to an Android device?

  1. Enable Screen Snapping in Settings > Security > Screen Snapping.
  2. Open the screen you want to display.
  3. Touch Overview (quick app switching menu)
  4. Swipe up and tap the pin icon at the bottom

How to unpin a pinned screen?

Press the Back and Review buttons at the same time. You may need to enter a pattern, PIN, or password to unlock depending on your settings.

Note. Screen capture may not limit the user to one screen, but rather to one application. For example, linking the security screen to Android settings allows me to navigate through all settings, but does not allow me to do so outside of settings.

Trusted credentials are used by applications and browsers communicating over the Internet to verify the identity of the server they are connecting to. These credentials prevent any other server from being created as the authentic server and ensure that any data sent by applications or browsers goes to its intended destination.

Typically you don't need to log into trusted credentials and do anything, especially in the System section. The User section lists the credentials you could add, if any. You must ensure that the credentials you add are truly trustworthy.

#8 Restrict apps using access

These are apps that have permission to control how your app is used on your device. They can track and record which applications are used, when and for how long, etc. Typically this list will include Google services Play and Play Store. If you don't install an app to track your usage, no other apps should be tracking it.

If you do not want Google to have this information, you can opt out of access to your usage data.

#9 Toggle some settings

  1. Turn off "Make pattern visible" to hide the pattern from prying eyes when unlocking the device.
  2. Disable "Make passwords available" so that they are hidden when you unlock your device.
  3. Disable "Unknown Sources" to prevent apps and APKs (what is an APK?) from being downloaded from sources other than the Play Store.
  4. Turn on“Power button instantly locks” to immediately lock the device when you press the power button.

#10 Other security measures for Android

Keep your Google account secure - Your Android device is protected just like your Gmail account associated with the device. Keeping your Google account secure will help keep your smartphone safe. Additionally, if you are locked out of your device for any reason, you can use your account information to verify your identity and unlock your device.

You should disable developer options if you are not using Android device for application development.

Capable of performing many more tasks than a few years ago Cell phones. However, a significantly expanded range of opportunities also means the emergence of new risks.

Because now we use our phones for more tasks (from communication in in social networks to online shopping, banking and web browsing), we all need to take reasonable precautions to protect our phones and our information from malicious attacks.

How to make using your smartphone safer

  • Lock your phone
    Make sure your screen lock is turned on to reduce the risk of your phone falling into your hands.
  • Use encryption to protect information that is important to you
    Check if your phone has a data encryption feature and make sure it is in use. If your phone is stolen, computer criminals will not be able to access the personal information stored on your phone if that information is encrypted.
  • Monitor the behavior of applications on your phone
    Make sure that access to resources on your phone is granted with your permission when prompted by the application. This is especially important for Android smartphones.
  • Protect your phone and your information
    Many users who wouldn't even consider using a laptop, PC or Mac without antivirus software forget that modern smartphones are powerful computers, and they are exposed to the same danger. Make sure all devices are using a reputable antivirus program, and antivirus databases data is regularly updated.
  • Be aware of the dangers of gaining root access through jailbreaking
    Although it is tempting to become root in order to gain access to special applications and services, this can significantly reduce its security. To keep your phone and your data safe, do not try to root or jailbreak your phone.
  • Turn off Bluetooth whenever possible
    If the Bluetooth connection is not in use, it is best to turn it off. This way you can make your phone less vulnerable to attack and reduce battery consumption.
  • When choosing an antivirus for your smartphone, make sure that it has protection in case of theft.
    Some smartphone security products include a wide range of anti-theft features that give the owner remote access to a lost or stolen smartphone so it can be locked, located, and erased.