We explain how to secure your smartphone or tablet with anti-theft, anti-virus and other security tools or measures. Everyone is now more or less constantly online and uses not only PC and notebook but also powerful smartphones and tablets for an ever increasing number of activities. The more important mobile devices are for us, the more interesting they become as targets for Internet criminals.
Tip 1: Keep an eye on the app download
Equally important to everyone is the security of their own devices, but according to the MCSI study by Microsoft 77 percent of all users do not worry - a dangerous light, because pests such as viruses, Trojans and rootkits are next to PC and notebook also for mobile devices such as smartphones And tablets are an ever greater danger. What we can do to protect ourselves in advance is given in the following.
Tip 2: Avoid unnecessary risks
Before you download an app, you must first determine whether the source is trustworthy. The official website of the developer is always worth a look. This is directly linked to all app stores. If there is no serious website with imprint, caution is advised.
Tip 3: Authorizations as an entry gate to the mobile device
The "top developer" rating, which Google gives in its Play Store for selected software vendors not only delivering high quality, but also is particularly trustworthy. The quality seal can be found under the name of the developer on the app page.
Tip 4: No delay in updates
It is also recommended to disable the installation outside of the official App Store by default. This affects Android smartphones and tablets, as Google allows alternative sources. Such Android apps in the APK file format can be obtained, for example, via e-mail, from the developer's website or from an alternative app store.
To prevent a malicious program from being able to install apps unintentionally, remove the "Unknown sources" checkbox under "Settings / Security". Of course, alternative app stores are not fundamentally a threat or worse than the original, as Amazon and AndroidPIT prove: If you want to install an APK file, you can temporarily re-enable the above option.
Thanks to the closed App Store and a rigorous selection system on the part of Apple, the malware risk for iPhone and iPad owners has so far been massively reduced. Take care of owners of a rooted, thus released iOS device: Here, the app installation is of course possible via appropriate IPA files.
It goes without saying that you should definitely avoid the piracy of apps and software. These are made accessible via illegal sources on the Internet, but are potential malware traps - more on page 26. Especially in the field of mobile apps, this enormous risk is really not worthwhile, especially considering that it is usually a saving Of only a few euros.
Before downloading, check the permissions that an app will request during the installation. Depending on the program, Internet access and access to the internal memory are normal permissions without which many apps will not work. You should not be too sensitive on the subject of local data - these are free apps for targeted advertising.
However, if an app wants to tap the Google account, contacts, or phone status for no apparent reason, the alarm bells should ring. Because consideration of the rights granted is difficult to assess, always read the comments of other users in the App Store to recognize unusual things. Also, install a security app (Tip 7) that warns you of dangerous apps. In case of doubt, you should avoid installing the app.
Even if you have taken great care in installing software and apps, there is a risk of programming errors and security gaps. Windows and Office can keep PC owners up to date via the automatic update function or via our update package from the magazine DVD (see page 81)
Many programs that do not come from Microsoft now have a feature that looks for updates. To avoid having to do this manually for each tool, there is the "Secunia Personal Software Inspector" (PSI), which you can find on the booklet DVD. So you can find outdated versions quickly and can get the appropriate updates.
Also owners of smartphones and tablets should regularly update their apps. To do this, please visit the App Store app in My Apps. With the "Update all" function, all affected apps can be updated with a fingertip. This should be done in the WLAN as much as possible in order to protect the mobile data volume.
Tip 5: Protection against long fingers
As soon as you have your apps under control, you are protected against the worst threat for your smartphone or tablet. However, some important preparations remain so that you are protected in every situation: Official updates for your operating system are at the top of the list. Unfortunately, not all companies support automatic patches, so you may need to check the official website of your device manufacturer.
The easiest way to protect your data from prying eyes or thieves is to protect the lockscreen of the smartphone or tablet with a password. Capturing a gesture or no backup is far more popular. However, by smearing the screen, the gesture is not uncommon.
Tip 6: Encrypt sensitive data
In the event that your device is lost, there are anti-theft apps for your phone. For example, the App from Antivirus vendor Lookout can target your device via Google Maps, send an alarm, or take a picture of the person using the device. Even a remote encryption or even system remoteness is possible - but only for the premium version of the app.
Windows users can also protect their devices. You should create a password for each user. If you have to leave your workplace at short notice, it is enough to lock Windows using the key combination "Windows key + L". Windows passwords, however, are just a soft protection to keep the curious.
With tools such as the "Offline NT Password & Registry Editor" you can easily remove the Windows password. If you already have a Windows 8 device with a touch screen, you should better protect it with a "gesture message"
Tip 7: Never without protection
INFO Correct behavior at the WLAN hotspot
To do this, in the start screen at the top right, click on its user name and select "Change profile". Then tap on the left to "User" and in the right half of the image click on "Create image code". Now you can create an individual login gesture from an input of strokes and circles.
Against thieves, who want to steal the whole notebook, a "Kensington Lock" helps. Some notebooks have this anti-theft device: a wire cable with a special Kensington lock (from 10 euros) can be inserted into a slot on the notebook. The steel cable itself is thereby bound around a fixed object. Whose notebook does not have this protection can take alternative backups, such as the PNY Thinksafe (about 20 euros). Here, the steel cable is attached to the hinge of the notebook via a latch.
Save as little personal information as possible on your device: Passwords or credit card data have not lost anything on the device memory. If you need to have access to important data, you should encrypt it. For example, all browsers offer the option to cache access data to web services, but this is a risk.
Better one uses a password manager service like LastPass. This is available for both Windows and mobile devices. The Password Manager collects all your credentials and stores them encrypted. From now on, you only have to log in with a password and you will be logged into all your services.
If you prefer to store your passwords locally, you should use the KeePass tool. The resulting password database can also be opened on mobile devices: Mobile apps are available with KeePassDroid (Android), MiniKeePass (iPhone) and 7Pass (Windows Phone 7/8).
Sensitive documents should be stored on the notebook only encrypted. This works very easily with TrueCrypt. The free tool creates container files, which can be integrated into the Windows Explorer as virtual drives. If the laptop is lost, the encrypted stored data is securely protected against misuse.
"Install a security software" - this should be familiar to every PC owner, but the reality looks different. According to the Microsoft study already mentioned in the beginning, only 56 per cent of PC users have installed anti-virus software, 44 per cent are therefore surfing unprotected through the Internet.
This easy thing is easily prevented: Good anti-virus software you get even free, for example "AVG AntiVirus Free 2013". On mobile devices the ratio looks even worse, but also here is very good protection for free, such as "Lookout Security & Antivirus" for Android, iOS and Kindle. Even a device location brings the lookout app back to find missing devices.
In contrast to the private WLAN, a public hotspot (eg in the hotel lobby, in the cafe or restaurant) is unencrypted and is open to any user. With appropriate tools, a fellow user of this hotspot can intercept your data traffic and listen to your access data for e-mail, Facebook, or online banking.
Thousands: The data display is a free pseudo-hotspot, for example, with its notebook, which is used to listen to the data streams of all victims who log in to this case.
A firewall protects your notebook in unsafe WLAN hotspots. Windows is already equipped with it: As soon as you connect to a WLAN, Windows offers you the alternatives to choose from. Instead of "home network" or "workplace network", select "Public network" at the hotspot. Alternatively, you can also use the firewall of your Internet Security.
In general you should always check your e-mails in encrypted form. Virtually every e-mail provider offers this option, but many e-mail programs and apps default only insecure. How to read your e-mails reliably is explained in the article on page 71. It is important to note that some e-mail providers use different port numbers for encrypted access to the mail server. See the help pages of your mail provider on the Internet.
Many websites and online services offer the possibility of encrypted access directly through the web browser. This is important so nobody can intercept your access data. Instead of using http, you can access an encrypted https version of the site: Instead of www.gmx.net, www.amazon.de or www.facebook.com, you can https://www.gmx.net, https: // www .amazon.de or https://www.facebook.com. However, not every web page offers this secure call option.
Anyone who wants to surf, mail and communicate with their notebook or mobile device in the open WLAN undisturbed, should establish a VPN connection. Data traffic is then redirected via a secure "tunnel". Such VPN services are usually payable.
For occasional use, however, the limited free VPN offerings of OkayFreedom VPN Free or Hotspot Shield Free VPN are sufficient. Hotspot Shield also includes apps for Android, iPhone and iPad.
WLAN hotspots are unsafe
Activate firewall correctly
Retrieve encrypted emails
Secure web pages
Use VPN connection
No comments:
Post a Comment