MOBILE

Avert Tablet Trouble

12/4/2012 3:13:59 PM

How to secure your tablet against attacks

Description: Your tablet is similar to your smartphone in a lot of ways, including its susceptibility to attack

Your tablet is similar to your smartphone in a lot of ways, including its susceptibility to attack

Its portable form factor makes it great for plane rides, commutes, and all manner of travel, but those virtues also make it an ideal target for Wi-Fi snoopers, thieves, and cybercriminals. But because we use tablets differently than we use smartphones, they’re more susceptible to certain kinds of attacks than smartphones. Read on to determine how best to lock your tablet tight against threats.

Dedicated security apps

Similar to smartphones, tablets can take advantage of security apps from the respective platform’s application store. These range from simple RSS feeds of virus and malware alerts to more sophisticated scanners that check the apps you’ve downloaded for spyware and malware, built-in browsers that offer a more secure Web experience, and device location services that help your find your device if it’s lost or stolen.

Because you tend to do more Web browsing on a tablet than on a smartphone, you need to be more aware of potential Web-borne threats. Visiting a malware- infected URL can compromise your identity. For this reason, it’s a good idea to seek out software that includes a secure browser. In lieu of that, a URL checker can provide real-time protection against Web sites that are known to be malicious in nature.

Download with care

Like smartphones, tablets become more useful as you download more apps. This reliance on third-party code for core functionality can leave you vulnerable to apps, often free, that claim to be something you’d really like to have, but which can end up stealing your data, compromising your contacts, and worse.

Description: You take a risk every time you install an application from an unknown source

You take a risk every time you install an application from an unknown source

Thankfully, the first-party application stores from which you download apps have strong vetting processes designed to prevent the vast majority of malicious apps from becoming generally available. Some of these sour apps do get through, though, so a little common sense when downloading can help you stay safe. Avoid downloading free apps that sound too good to be true, inspect the reviews for evidence of the app not performing its advertised function, and read through the permissions with a critical eye before you tap Install. There’s no reason, for instance, that a Sudoku app needs access to your phone state and identity info.

The real risk here comes when downloading apps from unknown sources. The simplest solution is to avoid this as much as possible.

Audio video revolution

Thanks to tablets’ large and vivid screens, we spend a lot of our time with them viewing videos. In your quest to see something new, however, resist the lure of free movie streaming and download sites. The denizens of the Web who have no qualms about violating copyrights often have similarly little regard for the sanctity of your personal data. The same can be said for music downloads and apps that purport to offer unlimited music downloads for free.

Description: You love watching movies on your tablet, but paying for them is the safest way to watch

You love watching movies on your tablet, but paying for them is the safest way to watch

Gone but not lost

If your tablet is ever lost or stolen, you’re not only out the cost of the hardware, but you also have to worry about any financial, email, and Web service accounts that may have been compromised. One of the first things you should do is enable a password or pattern-based lock screen on your device.

Description: A passcode or pattern unlock screen can keep your data safe if your tablet ever falls into the wrong hands

A passcode or pattern unlock screen can keep your data safe if your tablet ever falls into the wrong hands

Tablets on all platforms also offer apps that let you look up the current location of your tablet on a map, play an alert tone, and even remotely wipe the device. Some apps can even use the tablet’s front-facing camera to take a snapshot of the potential thief and email it to you.

Total tablet security

Tabbing safely starts with being cautious with regard to your tendency to download apps, stream video, access Wi-Fi, and browse the Web. Follow our advice and you’ll be significantly less likely to run into trouble with your tablet.

Description: Apps like this one can significantly improve your sense of security when using your tablet

Apps like this one can significantly improve your sense of security when using your tablet

 

Other  
 
Top 10
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS