Last week, it was discovered a new Trojan for Android that has the particularity of ‘stealing’ the files to users and then demand a ransom for his recovery. To protect users of Android smartphones and tablets, ESET, the company responsible for the development of anti-virus, developed a set of rules that could contribute to greater security.
Install all applications from Play Google or other known stores
There are good reasons to install applications that do not come from Google Play (or other stores of big brands like Amazon) – for example, if your employer requires you to install a very specific application for your work that are not available in these online shops. If this is not the case, always use the official stores. The alternative shops, especially those that offer paid apps for free, are usually loaded with malware, and download applications from them is a good way to get infected. If you need to install a file from an unknown source, ensure that your device is subsequently configured to automatically block such installations. .
Do not assume you’re safe in AndroidStay tuned and do not fall on the most common social engineering tricks. Open links, downloads and attachments on Android can be as risky as doing it on the PC. But the vast majority of users assume that the opening of attachments is only dangerous when you are using a computer.
If possible, do not use very old versions of Android OSIn an ideal world, users should always have access to a new phone that would run the latest version of Android – KitKat. The issue is that the older versions are also less secure -., And its operator can not issue an update for your device, even if Google do it
Make sure you have the latest Installed Updates
Updates Google should are available ‘over the air “(OTA) whereas the newer phones, should be able to turn on automatic updating (with the restriction that it be just made via Wi-Fi rather than by mobile networks). The area of ??the settings where you can change these parameters varies by manufacturer, but the menu item you are looking for is ‘Software Update’. Select the first option to check if you are running the latest version, and if not install it right away
Do the basics -. Lock your phone
If you have the latest and top of Samsung or HTC models, has the luxury of being able to lock your phone, using up to three fingerprints. But even if not, there is no excuse not to lock your phone using a PIN or password. All this is very easy to do and just go to the Settings option> Security> Lock screen and pick the lock method you want to use. Normally one uses a pattern, a pin or a password. But keep in mind that a standard is less secure than a PIN and a password is the best choice.
Create backupsIf you have a backup of the contents of your devices, Android, Windows or any other operating system – the Trojans that encrypt files will not be more than a minor inconvenience may be easily solved. For this reason make copies of the contents of your phone, wherever possible, either manually or by connecting it to a computer and using the tools provided by the manufacturer. Use applications like Google Drive or Dropbox to ensure that files such as photographs, are not only stored on your device.
Take care applications that can give direct access to your dataApplications like Dropbox can provide very useful information to cybercriminals – a scan of a passport or a photograph of a credit card, for example. There are several options to hide and lock applications. For example, the Free Application App Locker continues to be very popular for this feat. You can download from Google Play to lock sensitive applications.
Check the permissions of each application before installationWhen you install an Android application, arises a list of ‘permissions’ – or put another way, the functions that the application can access. Permissions as ‘full access’ or the ability to send and receive SMSs should serve as an alert to a user. However, by itself, is not a guarantee that the application is malicious and everything depends on the program you are installing. If for example, the Facebook application is asking for multiple accesses totally normal. Now in the case, for example, a screen saver who wants to have access to the list of calls and to send and receive SMS, should be suspicious.
Use Google’s defenses to the fullestGoogle offers very interesting tools of protection, including a locator that can help recover a lost device. Visit the management of Android devices available on https://www.google.com/android/devicemanager for more information alluding to your smartphone or tablet. You can make the phone ring (even if it is in silent mode), lock it or view its location on a map.
Never pay the creator of a ransomwareAlthough the latest malware has the functionality to repair the harm that may have caused, we strongly recommend that you do not pay for criminals, because this will only motivate other malware authors to continue with this type of operations.
<- infotext1 -> <- Sandra Gonçalves -> <- infotext2 ->
No comments:
Post a Comment