Tuesday, June 10, 2014

How to protect your Android phone from stealing files and … – Reuters

 
 
 Last week, it was discovered a new Trojan for Android that has the particularity of ‘stealing’ the files to users and then demand a ransom for his recovery. To protect users of Android smartphones and tablets, ESET, the company responsible for the development of anti-virus, developed a set of rules that could contribute to greater security.

Install all applications from Play Google or other known stores

There are good reasons to install applications that do not come from Google Play (or other stores of big brands like Amazon) – for example, if your employer requires you to install a very specific application for your work that are not available in these online shops. If this is not the case, always use the official stores. The alternative shops, especially those that offer paid apps for free, are usually loaded with malware, and download applications from them is a good way to get infected. If you need to install a file from an unknown source, ensure that your device is subsequently configured to automatically block such installations. .

Do not assume you’re safe in Android

Stay tuned and do not fall on the most common social engineering tricks. Open links, downloads and attachments on Android can be as risky as doing it on the PC. But the vast majority of users assume that the opening of attachments is only dangerous when you are using a computer.

If possible, do not use very old versions of Android OS

In an ideal world, users should always have access to a new phone that would run the latest version of Android – KitKat. The issue is that the older versions are also less secure -., And its operator can not issue an update for your device, even if Google do it

Make sure you have the latest Installed Updates

Updates Google should are available ‘over the air “(OTA) whereas the newer phones, should be able to turn on automatic updating (with the restriction that it be just made via Wi-Fi rather than by mobile networks). The area of ??the settings where you can change these parameters varies by manufacturer, but the menu item you are looking for is ‘Software Update’. Select the first option to check if you are running the latest version, and if not install it right away

Do the basics -. Lock your phone

If you have the latest and top of Samsung or HTC models, has the luxury of being able to lock your phone, using up to three fingerprints. But even if not, there is no excuse not to lock your phone using a PIN or password. All this is very easy to do and just go to the Settings option> Security> Lock screen and pick the lock method you want to use. Normally one uses a pattern, a pin or a password. But keep in mind that a standard is less secure than a PIN and a password is the best choice.

Create backups

If you have a backup of the contents of your devices, Android, Windows or any other operating system – the Trojans that encrypt files will not be more than a minor inconvenience may be easily solved. For this reason make copies of the contents of your phone, wherever possible, either manually or by connecting it to a computer and using the tools provided by the manufacturer. Use applications like Google Drive or Dropbox to ensure that files such as photographs, are not only stored on your device.

Take care applications that can give direct access to your data

Applications like Dropbox can provide very useful information to cybercriminals – a scan of a passport or a photograph of a credit card, for example. There are several options to hide and lock applications. For example, the Free Application App Locker continues to be very popular for this feat. You can download from Google Play to lock sensitive applications.

Check the permissions of each application before installation

When you install an Android application, arises a list of ‘permissions’ – or put another way, the functions that the application can access. Permissions as ‘full access’ or the ability to send and receive SMSs should serve as an alert to a user. However, by itself, is not a guarantee that the application is malicious and everything depends on the program you are installing. If for example, the Facebook application is asking for multiple accesses totally normal. Now in the case, for example, a screen saver who wants to have access to the list of calls and to send and receive SMS, should be suspicious.

Use Google’s defenses to the fullest

Google offers very interesting tools of protection, including a locator that can help recover a lost device. Visit the management of Android devices available on https://www.google.com/android/devicemanager for more information alluding to your smartphone or tablet. You can make the phone ring (even if it is in silent mode), lock it or view its location on a map.

Never pay the creator of a ransomware

Although the latest malware has the functionality to repair the harm that may have caused, we strongly recommend that you do not pay for criminals, because this will only motivate other malware authors to continue with this type of operations.

<- infotext1 -> <- Sandra Gonçalves -> <- infotext2 ->

No comments:

Post a Comment