Mobile phones have innovated from
keypad phones to smartphones. Majority
of these smartphones out on the market runs on Android operating system. The question is – how far is Android from
being overrun by security threats? Manny
Cuevas, a cyber-security researcher claimed that “Android is but a newborn
technology that needs ample care and support from its parents.”
more tips and tricks for cyber security, visit the Manny Cuevas website.
devastated millions of computers worldwide because of ransomware. From major ransomwares like WannaCry to
Petya, the world
have clearly recognized and feared ransomwares, their capabilities and their
objectives. In this extent, users are
required to make the most out of mobile cyber security.
keep your mobile phones from being fully cyber-secure, android users must only
keep in mind the acronym A.N.D.R.O.I.D.
stands for awareness.
foremost solution at hand is to be extensively aware of the current news and
trends. Knowing what to expect when it
comes to recent cyber-attacks
contributes a lot. For example, two new
google play applications have been reported to contain variants of
and recognizing these apps beforehand can direct users away from these
that cyber-attacks are endless. They innovate
at the same instance along with the security measures. Always keep anti-malware programs installed,
running and up-to-date.
installing applications, be wary of the app developers. There may be millions of developers around,
but there we can only count the most popular and widely-trusted
developers. Be sure to verify the
authenticity of the developers before proceeding with the app installation.
In addition to
its basic functions, Google Play comes with an extra-secure feature to verify
the security of the apps. Just visit the
verify app function at Google Play
with every app you wish to install.
stands for outside sources.
trusting when it comes to third-party apps, or those that come from websites
apart from Google Play. Most of the
time, non-Google Play apps become the nesting ground of malware and virus. Be sure to double check the app names across
the internet for extra security.
time, attackers invent app titles that might seem a little too interesting, or
too convenient to simply ignore.
Applications that offer free services in exchange of nothing are too
good to be true, and always contain unintroduced capabilities such as key
logging, snooping and more for the benefit of the developer. Do not take advantage of these blunt offers,
for these might take advantage more of you.
Free software sometimes comes with free malware.
simple yet neat trick when it comes to determining legit from scam apps. The app logo and interface design of verified
apps, as presented in the download pages, are always polished, vectored, and
fairly decent. Otherwise, apps from
reputable sources will seem like a college project, with edges and graphic
designs that looks like it did not take much time to accomplish. Malicious developers always focus on the
codes rather than the presentation.
A.N.D.R.O.I.D. tip can further aid users on being well-informed when it comes
to mobile security. Happy securing.