alexa

Player created by Inbound Now - Social Media Tools.

Wednesday, February 8, 2012

How to Secure Your Cell Phone

secure your cell phone
Did your girlfriend just send you a sexy pic of her? How would it feel if it landed on the internet?

Securing your mobile phone from hackers is one of the major concerns among this generation.The increasing threats have turned the eyes of various mobile phone security experts for the prevention of security breeches.

Here are some basic steps for your cellphone's security boost:

Bluetooth

bluetooth logo
In order to protect your cell phone from wireless hack make sure your bluetooth is always off when not in use as many explicit hacking applications can actually copy your files, view your inbox slash phonebook and also change passwords "without even your authentication".


Mobile Security Software/Antivirus

A good mobile antivirus software must be installed on your cell phone. Some anti-viruses like F-secure also has a anti theft feature which sends out text messages to preset mobile numbers whenever someone replaces your sim card with another chip. 

Password

Did you leave your cell phone on your friends couch when you went to the bathroom? Ahh.. so what? No one could ever sneak into your cellphone or memory card which contains hundreds of private things- as it is password protected. Right?
Well i disagree. With most mobile phones having you to set a 4 digit phone lock code, it is not that hard to try a guess and most of the times it might work.

Some of the most common passwords as noted by osxdaily.com are:

  • 1234
  • 0000
  • 2580
  • 1111
  • 5555
  • 5683
  • 0852
  • 2222
  • 1212
  • 1998

  • Encrypt your Files

    Almost majority of the smart phones like blackberry, Android and Iphones have built in encryption technology but still if your phone is missing it download a 3rd party encryption software like the one from whisper systems.
    An encryption software encrypts all the importact datas on your phone like phonebook, messages etc and make it unreadable it someone manages to intercept it.

    0 comments:

    Post a Comment

    Powered by Blogger.