Mobile Phones

How to protect your smartphone from hackers and protect your privacy

If someone hack into your smart phone you will probably feel as if they entered to steal your house, and even worse. It is an invasion of your privacy, a violation of your personal space, and probably afternoons to find out if something is missing. Your phone not only saves a lot of important things, but that you will also tell hackers what are the most valuable. For this reason, it is important to adopt measures and know how to protect your smartphone from hackers. Considering its size, and that they are constantly sending and receiving signals, it will always be an attractive target for cybercriminals. To keep your phone and its contents away from prying eyes, you have to develop a strategy to protect your information. Here here we give you some tips on how to protect your smartphone from hackers and intruders.

Update your operating system and applications

The companies are constantly updating their software, but do not do so only for aesthetic reasons. Many updates include bug fixes and security enhancements, helping to protect your smartphone from hackers and data theft, to eliminate the vulnerabilities. If you are announcing an update to the operating system of your smart phone or any of your apps, please install it as soon as possible.

Avoid Public WiFi

At this point, everyone should know the dangers of using a WiFi network open. A public network in shopping centres, cafes, airports or any other public place is a space ideal for the pirates. Try to use only your connection of cell phone and turn off the WiFi connection when you’re in a public place. If that is not possible, consider a VPN application, a utility that channels the communications network through an encrypted connection. But beware: not all VPNS are of the same quality. Also I will suggest you to turn Bluetooth off, unless you wear a smart watch that requires it.

Locks your smartphone

Always enter a access code a four-or six-digit to access your device. It is possible that they are not very convenient, but what you will appreciate that if extravías in a public place. E-mail, contacts, photos and bank information could be exposed easily. He even considers a longer password, with numbers and letters. If it bothers you this safety mechanism, the scanning of fingerprints and the identification of a face are more alternatives easy and fast. Make sure the applications with personal information also are locked with passwords.

Keep private your mobile phone number

Just as before not you gave your telephone number to the first thing that you say, do not give automatically the number of your mobile phone to any application that you request. The more places have your number, the more vulnerable you will be to the hacks and scams SMS, and even the invasion of your protected accounts to 2FA. Consider adding a second line to your mobile phone. Google Voice is a great way to protect your number of offenders in line, like applications as a Sideline, Line2 and Hushed, that make it easy to add a second line to your mobile phone.

Do not share your life in excess on social networks

proteger el smartphone de hackers facebook

It is okay to use your real name on social networks such as Facebook and Twitter, but avoid having to share “tons” of revealing information about yourself. Avoids enumerating cities of origin, specific addresses, work locations, specific phone numbers, surnames and other details that hackers can use to rastrearte. These days, Facebook allows you to hide a great part of the information about you with your settings and privacy tools, including the majority of your photos, friends lists, and more. Take care and streamlines your feed to get rid of the old information and outdated which could reveal more things about you than you want to. Even better: if you can, use Facebook only in the computer in your home, in place of access on your phone.

Travel advisories

Don’t store personal information, documents, or files in your phone, and limits the amount of photos geo-tagged in your Camera Roll. Get into the habit of keeping your phone relatively pristine, downloading images and documents on your computer, and deleting emails confidential financial accounts of employers and also related to your health.

Use two-factor authentication

This is another safety measure that the majority does not support. The two-factor authentication (2FA) is annoying because it involves an extra step, and it is really a pain if you forget to have your phone close. But, like the password, provides an additional layer to protect your smartphone from hackers.

Use strong passwords

Con contraseñas seguras podrás proteger el smartphone de hackers
With password safe allows you to protect your smartphone from hackers.

Everyone hates passwords. But when it comes to assign them, do not take half-measures. Use only secure passwords that hackers do not crack easily. Must contain from 16 to 20 characters, with a combination of letters and numbers, uppercase and lowercase letters and symbols. The crackers of passwords, brute force will be able to dismantle many of them, but to make your task easier by using your birthday, the name of your pet or the same password for everything is a bad idea.

There are many generators online passwords, so you do not necessarily need to create them on your own. Change your passwords every six months and a year, or when you get a data breach in your applications. And do not answer the security questions with honesty and change your responses. This makes it more difficult for hackers to discover how to log in to your phone, based on your public information available online.

Beware of spam mails and phishing

One of the easiest ways for hackers to invade your phone and access your information is through the inbox of e-mail. The phishing scams (phishing) are designed to lure you to transfer access to their accounts. Avoid clicking on links in promotional emails, open suspicious attachments or run updates of the application requested by e-mail. Do not access financial accounts via emails random, but go to the web site of the financial institution and log in with your user name and password.

Uses built-in protections for devices

Do not call “smart phones” for nothing. If it is lost or stolen phone, you can control the damage by using the services of tracking devices, such as Find My iPhone and Find My Device Android, placing your smartphone on a map and, in some cases, they may delete it automatically. These services can also make your phone ring to locate it, if it is for example not what you find within your house. You can also choose to delete all information after a certain number of password attempts.

Use an anti-virus application

Hackers prefer the malware to steal passwords and account information. But you can combat it with an anti-virus application for smartphones, some of which are derivations of popular desktop applications, like Avast, McAfee and Panda. Variations for smartphones provide enhanced security by ensuring that the applications, PDF files, images, and other files that you download are not infected with malware.

Manages permissions for applications

Check the applications on your phone to determine if they have more privileges than they need. You can grant or deny permissions, such as access to camera, microphone, contacts, or location. Keep a record of these and revoke the ones that are not necessary.

On an iPhone, go to Settings> Privacy, where you will see a list of all the applications and the permissions you have granted.

On an Android phone, will depend on each device. In a Google Pixel, it will be in Settings> Applications and notifications> Advanced> Administrator permissions, whereas on a Samsung Galaxy you will find it in Settings> Applications> Permissions of the application, through the three vertical dots in the top right.

Supporting information

You should consider to prepare for the worst, carrying out regular backups of your phone to protect important documents and pictures in case of loss or theft. You can check our guides on how to make a backup on Android , or on your iPhone. In this way, you’ll be able to access those photos or files even if lost or stolen, your computer.

Know the source of your apps

Do not download any old application on your phone. While in the case of iPhone is limited to Apple’s App Store, which reviews all applications sold on the platform, it is easy to download applications in Android, and not all come from the Google Play Store. The best way to avoid malware on Android is to stick to the selection available in the Google Play Store, which is examined by Google. Never download applications through text messages, as it is a method that hackers use to inject malware into your phone.

Stay away from the chargers public

Cómo proteger el smartphone de hackers
If you want to keep your private information safe, you need to know how to protect your smartphone from hackers.

Charge your phone only in USB ports you trust, such as your computer or in your car. Hackers can hack into public ports of USB charging, such as the ones you find in a coffee shop or airport, in order to steal personal information. If you’re traveling, take your adapter and your USB cable. Hackers can’t access the data on your phone through your USB adapter.

Goodbye to the jailbreak

Although jailbreaking allows iPhone owners to access applications and software that are not available in the Apple App Store, it also exposes your phone to virus and malware. A phone with a jailbreak you’ll have no warranty and it is likely that the staff of Apple will not help you if it fails.

Bottom line

If you take positive measures to protect your smartphone from hackers and intruders, you must feel safe you have done everything possible to protect your sensitive information. This makes it less likely that you will steal your identity, inmiscuyan in your personal life, divert your money, control your phone and, in general, make your life miserable.

*Updated on January 8, 2020 for Daniel Matus.

Recommendations of the editor

SHARE
RELATED POSTS
The mobile can also be rude: you know the telephone CAT S32
Netflix will have control of playback speed in Android
Amazon redesigns the app from the Alexa for that controls your smart home

Comments are closed.