SECURITY

Secure Your Smartphone (Part 1)

11/7/2012 9:17:03 AM

Here’s everything you need to know to stay safe when you’re online, wherever you are.

What’s on your Android phone? And more importantly, how would you feel about that data being accessed by scammers, hackers, and identity fraudsters. That’s exactly the risk uncovered by Ralf-Philipp Weinmann, a researcher at the Luxembourg University who discovered that he could listen to conversations, intercept data, and run up huge bills calling and texting premium rate services – all without the alerting the phone’s owner.

Description: This is a wallpaper app showing a fixed set of images, so why does it need your location and full internet access?

This is a wallpaper app showing a fixed set of images, so why does it need your location and full internet access?

With the ability to download and run apps, smartphones are now the main focus for a growing number of malicious hackers, and yet most devices are completely unprotected from such threats. For online criminals, the situation resembles that of PCs in the mid-1990s, except they now how much money there is to be made from online crime. Thanks to the deepest recession in living memory, straightforward theft and street muggings for smartphones are also at an all-time high, so how do you protect your freedom to compute on the move?

Passwords first

Most people would never dream of using something as obvious as 1234 as the password for their important online accounts, but some users protect their smartphones with such a sequence and then leave the online accounts it protects logged in for convenience.

Your first line of mobile defence should always be to select a password that’s both memorable for you and difficult for a theft to crack. For a few years now, the best advice on creating memorable and secure passwords has been to take the initial letters of a line in a song, poem, play or book, and to make a password from those letters. You can test the strength of passwords you generate in this way by using free online web security site services, such as How Big is Your Haystack at www.grc.com/haystack.htm.

As of version 2.2 Android OS supports not only gesture passwords, but also the more traditional text-based variety. To enable a password, click ‘Menu > Settings > Display’. You can combine a password with gesture recognition, but always ensure that you use a gesture that overlaps itself, otherwise the grease marks on the screen may give it away to anyone who steals your phone. It’s also a good idea to clean the screen every so often to prevent grit from scratching the gesture faintly into the screen’s surface for posterity. To enable passwords, iPhone users should open the Settings app and select ‘General > Passcode lock’. Windows Phone 7 users should tap ‘Settings > Lock and wallpaper’, and BlackBerry users need to select ‘Option > Security options > General settings.

Install antivirus

You would never dream of buying a laptop and going online without installing at least a free antivirus product first. The abilities of a smartphone or tablet computer are now approaching those of a laptop, but it seems that the vast majority of users have no form of protection, even though mobile computing devices are facing all the usual threats. Spam containing malware attachments or links to attack sites, infected apps and code that exploit operating system weakness are all beginning to appear. Botnets made up of mobile devices are also becoming more common.

Description: You would never dream of buying a laptop and going online without installing at least a free antivirus product first.

You would never dream of buying a laptop and going online without installing at least a free antivirus product first.

We’ve reached the point in the evolution of mobile computing where it has become just as necessary to install antivirus software on your phone as it is on every other online computing device. Most antivirus vendors now offer free versions of their commercial mobile offerings, and many offer handy package deals on their commercial versions, including protection for multiple PCs and a phone, for a yearly subscription. It’s worth investigating these deals because they could save you money in the long run, but what’s the difference between free and commercial versions?

Mostly, the difference is down to the facilities provided beyond basic protection. The ability to remotely wipe a lost or stolen phone, for example, is something that will give you real peace of mind, but it’s usually missing from the free versions of antivirus products.

Never be tempted to simply click a link that looks OK and install what purports to be a free version of an antivirus package. Check the URL; if it isn’t part of a vendor’s official website, don’t visit the page. Fake antivirus software, written to infect your device or make you think it’s protected when it’s not, has now made its way to smartphones. If you’ve found a package on an app store, click through to be software vendor’s website and download it from there.

Remote wipe

So you have a secure password guarding immediate access to your phone, the screen lock activates after just a few minutes of inactivity, and an antivirus package is watching out for any malware in the background. However, if the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

Description: if the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

If the worst happens and someone takes your smartphone either by stealth or by force, you may also want to protect your data by being able to wipe all your files and contacts quickly and remotely.

Android, BlackBerry and Windows Phone users have a range of third-party, dedicated remote wipe applications to choose from, which enable you to contact the phone and have it wipe itself. These tend to be subscription services, but prices are usually less than $7.5 a month, which is good value for extra peace of mind. Alternatively, you can examine the facilities offered by different antivirus packages. Free versions, such as AVG’s Mobilation Free, offer local wipe facilities. However, it’s not always clear if remote wipe is included or just a local wipe facility, so check with the software vendor before you part with your cash.

iPhone users can install Apple’s free Find My iPhone app (www.bit.ly/tfERpz). This gives you the ability to sign into another iOS device with your Apple ID, locate the missing or stolen device, display a rather satisfying messages to the robber, play a sound, lock the device and then erase it. The only proviso is that your iPhone must have been enabled in the iCloud settings in order to locate it.

Other  
 
Top 10
Review : Sigma 24mm f/1.4 DG HSM Art
Review : Canon EF11-24mm f/4L USM
Review : Creative Sound Blaster Roar 2
Review : Philips Fidelio M2L
Review : Alienware 17 - Dell's Alienware laptops
Review Smartwatch : Wellograph
Review : Xiaomi Redmi 2
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8