Doulat Meah

0
[caption id="attachment_1309" align="alignleft" width="300"] FBI-Security[/caption]

Security of mobile platforms Android is still not ideal for the most part it's because the users themselves who ignore basic rules. American Bureau of Investigation FBI issued a list of rules so as to minimize the risks.

Google still has problems with fast identifying and removing harmful applications from service Play Store. Although she was already at the beginning of deployed service Bouncer , which scans each new recording application, rather it is already known defense against malicious applications that try to disguise under a different appearance. Google is a powerful weapon also called kill-switch, which is briefly able to remove the command from your mobile phone to any application remotely.



Internet Crime Complaint Center (IC3 short - part of the FBI dealing with cyber crime among others) now points to a pair of dangerous applications that users steal personal information. The first malware known as Loozfon, masquerades as an application for a work from home where you earn by sending e-mails. In fact, the attacker gains access to your phonebook. The second application is spyware FinFisher that looks like a patch system and secretly spying on users.
IC3 in this context has issued several recommendations, which should serve as the basic rules for the use of smart mobile phones, and not only on the Android platform. The greater part of these rules refers directly to the typical features of android and some are also applicable to other platforms.
These recommendations relate primarily to beginners, but can be useful even experienced users who do not realize the consequences of some of their decisions, such as rootnutí device. A similar list we have already brought in an article that dealt with the safety on the Android platform.


  1. Familiarize yourself with all the features of your new phone, including initial setup. Turn off features that you do not need to minimize the chance of such an attack.

  2. Depending on the type of phone operating system may allow the encryption of sensitive user data in case of theft or loss of equipment.

  3. Given the increasing number of applications on mobile supermarkets, users should take into account user comments (or review ) and references the developer or company application issues.

  4. Carefully read the list of authorization application during installation you.

  5. Zaheslujte you access to your mobile phone. This is the first line of physical defense to protect your data on the phone. Turn the lock screen, which within a few minutes the phone locks the phone.

  6. Be sure to protect your phone from malware. Download applications that aim to protect against viruses or protect files. This prevents malicious applications.

  7. Beware of applications that request information about your location, and so you can watch anywhere. These applications are mostly used for marketing purposes, but can also help stalker or flats.

  8. Jailbreak or rootnutí phone (both in short means unlock the phone in order to increase user rights - ed. editor) is used to remove certain restrictions set by the phone manufacturer or mobile operator. This allows users nearly absolute control over what applications can be installed on the phone and how the phone can be used globally. On the other hand, this intervention may expose users to security threats and dramatically increases the scope for malicious applications. Whenever an application or service running in "unlimited" mode or at the level of system applications, the user runs the risk that the application gets full control over the device.

  9. Do not allow your device to connect to unknown wireless networks . These networks can obtain information exchange between mobile phone server .

  10. If you are planning to sell your mobile phone, make sure that you make it fully clear (reset to factory settings), you have assurance that you will delete all user data.

  11. Smart phones may require installation of system updates. If the user does not permit this action, there is an increased risk of an attack on his mobile phone.

  12. Avoid clicking on suspicious links or downloading apps from unknown sources.

  13. When you browse the Internet, use your mobile phone to the same habits as if they were your classic computer.





Tag: What is FBI, The FBI, Android Operating System, Google Operating System




src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

Post a Comment

 
Top