Skip to main content

How to protect your data and avoid being hacked

   Phones and other electronic devices                aren't impenetrable vaults.

              
              While most people aren't targets of the NSA, FBI or a foreign government, hackers are looking to steal the financial and personal information of ordinary people. Your phone stores more than just selfies. Your email account on the phone, for instance, is a gateway to resetting banking and other sensitive passwords.
Like washing your hands and brushing your teeth, a little "cyber hygiene" can go a long way toward preventing disaster.

1. Lock  your phone with passcode :

    Failing to do so is like leaving your front door unlocked.
    A four-digit passcode - and an accompanying self-destruct feature that might wipe a phone's data after too many wrong guesses - stumped the FBI for weeks and forced them to bring in outside help. Using six digits makes a passcode 100 times harder to guess. And if you want to make it even harder, you can add letters and other characters to further increase the number of possible combinations. These are options on both iPhones and Android.
     The iPhone's self-destruct feature is something you must turn on in the settings, under Touch ID & Passcode. Do so, and the phone wipes itself clean after 10 failed attempts. But the 10 attempts apply to your guesses, too, if you forget your passcode, or if your kids start randomly punching in numbers. Android has a similar feature.
      Both systems will also introduce waiting periods after several wrong guesses to make it tough to try all combos.
     Biometrics, such as fingerprint scanners, can act as a shortcut and make complex passcodes less of a pain.

  2. Use encryption : 

        Much to the FBI's displeasure, iPhones running at least iOS 8 offer full-disk encryption by default. That means that the information stored on the phone can't be extracted - by authorities or by hackers - and read on another computer. If the phone isn't unlocked first, any information obtained would be scrambled and unreadable.
      With Android, however, you typically have to turn that on in the settings. Google's policy requires many phones with the latest version of Android, including its own Nexus phones, to offer encryption by default. But, according to Google, only 2.3 per cent of active Android devices currently are running that version.

3.setup device finder:

      Find My iPhone isn't just for finding your phone in the couch cushions.
If your device disappears, you can put it in Lost Mode. That locks your screen with a passcode, if it isn't already, and lets you display a custom message with a phone number to help you get it back.

Also Read:  Airtel, Idea get new "weapon" to target JioPhone 
     The app comes with iPhones, but you need to set it up before you lose your phone. Look for the Find iPhone app in the Extras folder.
     Meanwhile, Activation Lock makes it harder for thieves to sell your device. The phone becomes unusable - it can't be reactivated - without knowing its Apple ID. The feature kicks in automatically on phones running at least iOS 7.
       If all else fails, you can remotely wipe the phone's data. While your information will be lost, at least it won't end up in the hands of a nefarious person.
      There isn't anything comparable built into Android phones, but Google's Android Device Manager app, along with a handful of others made by third parties, can be downloaded for free from the Google Play app store.

4. Backup your phone: 


     If you do have to remotely wipe the phone's data, it's comforting to know that you won't lose all your photos and other important data. It's helpful, too, if your toddler dunks your phone in a glass of water.
  As mentioned before, apps such as Find My iPhone and Android Device Manager will allow you to do this, provided you set them up ahead of time.

4. keep your phone updated:

     Software updates often contain fixes to known flaws that might give hackers a way into your device.
     On iPhones, Apple prompts you to get the update.
     It's more complicated with Android because updates need to go through various phone manufacturers and wireless carriers first. But do install updates when asked.
    

 

  


      

Comments

Popular posts from this blog

Microsoft Rewards tricks

  Rewards tricks        Hey, guys now you can earn money by just browsing the internet or searching on the Microsoft Edge browser.        You can earn unlimited money by creating multiple browser profiles on pc or multiple clones on Android phones. Steps to follow: use only 2 country servers India is a must on the day of redemption of re4awd use only the Indian server you can use one phone no for max 2 accounts. use any VPN, paid VPNs are better use abs for automatic search. download abs tools and extract it go to extension settings and turn n developer settings load the unpacked extension  now you are good to go CLICK HERE  -->   DOWNLOAD ABS

Facebook's new tool reveals to fight phishing

Facebook's new tool reveals to fight phishing: The social network giant facebook reveals  it new  features  on  wednesday   a  security feature  that  let   you see a list of recent emails that  send to you  by  facebook. If the passsword changes email looks odd , check the email list first. The hackers often send the emails  disguised as a email from company like facebook to  trick user give him the login and password information . The technique is  known as phishing it is famous among the cybercriminals. Now ,if you receive an email that appears to be Facebook---  but donˋt recognize the   activity or  the  alert --atool its     security and  login section in settings will   tell   you itˋs  legit.  Facebook usually  sends security  emails  from  the domain  ˋˋFacebookmail.comˋˋ ...

Future of biometrics

Future of biometrics: Banking/ATM Application of biometrics has proven fortunate at significantly reducing trick at ATM and unmixed-serve kiosks. These devices use integrated ironmongery canal likely Apple’s Enclave and Qualcomm’s TrustZone to provide a easy ecosystem to keep biometric data private, making biometrics one of the most confident away to defend a mobile decision. For example, New York University Langone Medical Center uses palm biometrics to establish a patient ID for treatments. Extending this to identify an accredited driver, management user preferences like radio and seat station, and set restrictions for maximum speed or alienation restrictions is also around the proverbial quarter. Intel Vehicles Keyless cars are comely a reality with today’s pocket that can be in a trouser or RFID “essential” that are coded to the particular vehicle. Home assurance Front and back door padlock have rest basically unchanged for hundreds of years. See larger sembl...