Wednesday, December 19, 2012

How To Prevent Malware Attacks

How To Prevent Malware Attacks

It is common knowledge if the Android operating system quite vulnerable to malicious programs (malware). This is because Google's policy tends to open the Play Store in the selection of incoming applications.

Policies implemented Google is of course different from Apple's App Store policies that impose very strict systems in the process of entry of an application to the App from the App Store to be download by users.

Announcements from the Internet Crime Complaint Center (IC3), a division under the U.S. Federal Bureau of Investigation FBI, could be a warning for users of Android devices to be more careful in choosing the application.

Here we describe a number of tips that will hopefully protect your Android device from malware attacks:

1. When buying a smartphone or tablet, you need to know the features of the device, including the default setting. You do not need to turn off all the features on your Android device in order to minimize malware attacks.

2. Depending on the type of device you use, there are versions of the OS (operating system) that provides encryption. Encryption can be used to protect your personal data if an when the Android device is lost or stolen.

3. With the continuous development of mobile device applications market, you need to read the first review of applications will you download, either from the developer as well as a review of the community.

4. Learn and understand the permissions that exist in the application that appears when you are going to download it.

5. You need to protect your Android device by using a passcode. This method is the most basic step to provide security on your phone. Besides passcode, you also need to enable the screen lock mode after a few minutes of inactivity.

6. Use anti-malware applications or anti-virus for Android devices you use. Look for anti-virus application that can help protect your Android device from malware.

7. Beware of applications that enable geo-location. Such applications will be able to track the location of your existence.

8. Jailbreak or rooting Android is used to break a number of constraints given vendor or opsel in Android. By rooting then you will be able to control all parts of the Android device you are using. However, keep in mind that rooting often sacrificing security and increase the likelihood of entry of malware to Android.
When the application is run on the level of 'unrestricted' or 'system' in a rooted Android, you are giving permission to the application intended to control all parts of the Android devices.

9. Never connect your Android device to WiFi that you do not recognize. WiFi network you do not know can be a sneaky way to access your Andrioid device. The way it used to get the information transferred between the Android device you are using and the server.

10. If you decide to sell your Android device that you wear today, make sure you first do the wipe or reset to factory defaults. This is done to avoid any personal data is left in the device.

11. Android device needs an update to be able to run the application and firmware. If you reject this then updates the risk of hacking action will be higher than the device that receives the official update.

12. Avoid clicking on links or downloading software from sources that you do not recognize.

13. Set precautions in setting internet connection as you do on the computer. (Source: Inilah.com)


0 comments:

Post a Comment