What is one of the main problems of smartphones? In relation to them the users. Despite that fact, the smartphone is a nearly complete replacement for your home computer or laptop, many see it as a normal phone with all its consequences.
To better understand how silly things we often do on a smartphone, try to position it does not like your fancy mobile, but as a smaller version of a laptop computer. If every action ask yourself: would I do so on my laptop? That's the problem will become more apparent.
1. We do not set a password on your smartphone
For some reason all care about the safety of your laptop, but did not pay enough attention to the smartphone. Why do we zaparolivaem system on a laptop? Obviously, we carry it with you, and there are people around us, and we do not want these people at a certain situation could freely get into our computer.
In this regard, in the smart phone is even easier to get into, because we used to lay it on the table. Do not forget about intruders. Unprotected smartphone password will cause a greater temptation to steal from a thief, if he finds the lack of protection. In this regard, it is much easier to steal someone else's other smartphone, rather than wasting time and energy on discharge protection for your smartphone.
2. We make a purchase through a mobile browser rather than through the application
Any self-respecting major online store offers smartphone users a special application for shopping. The fact that the data from the application is much more difficult to intercept, they are more insulated inside and far less accessible from the outside.
In addition, malicious software can be operated via browser, but intervene in the buying process through the application much more difficult. The only thing you need to make sure the user - is the authenticity of the application being used, and its lack of "improvements" from third parties.
3. We do not razloginivaemsya in critical services
Holy faith in what our smartphone - it's only our smartphone, and no one will ever be able to reach it, and creates a similar nonchalance. It is unlikely that you leave your bank card within reach of the people around them. It is understood that while remaining logged in the financial and social services, you are almost completely devoting all their finances and personal information to anyone who will take into the hands of your smartphone (especially given the first points).
Do not allow such services to store data that you enter in a mobile browser or application. Of course, you do not really want to enter each time data at the entrance, but it is the price of the financial security and privacy of data.
4. We allow the smartphone to automatically connect to any open Wi-Fi network
Perhaps it is convenient, but how do you know who administers the network and what are his intentions? With appropriate software, which is freely available, the attacker can gain access to your data.
5. We leave Bluetooth turned on
There are methods of burglary and smartphone via Bluetooth. Despite the fact that this method requires the immediate vicinity of the attacker from the victim, crowded places such as shopping centers, airports and similar places can be great for such a feeding trough personalities.
6. We do not scrub data from old smartphone
Often, people do not pay enough attention to thorough cleaning of data in your phone before transmitting it to others. It can be a gift or sale, but you do not know who the device will be in the end.
Need a premeditated plan in case of a long-term transfer of the smartphone to other people, which must enter factory reset with the complete removal of all data, as well as low-level format removable drive.
7. We download incomprehensible applications from unknown sources
Great if Google help you find the apk file is a paid app, but to analyze the contents of this application for malicious code or functions he can not. We seldom read access rights to applications and it is likely a situation where such a "freebie" suddenly will merge all your logins, passwords, bank cards and other critical private information to third parties, simultaneously sending spam to all your friends and a few more for paid SMS numbers.
It is worth remembering that few enthusiasts left in the world that make the toll free only from a sense of solidarity with the principles of Linus Torvalds.
8. We keep very personal information on a smartphone
This largely relates to the preceding paragraphs, but still need to understand that photography "is not for everyone," e-mail and documents, financial data and any other information of value should not be stored on the smartphone accessible a. Especially talented also store passwords on your smartphone a file called "passwords." It is very polite towards the attackers.
9. We do not brush our history in a mobile browser
Keep history in the mobile browser - this is almost the same as the situation described in the third paragraph. If the attacker is a persistent desire to gain access to your data, the presence of history in the browser it can help greatly.
10. We do not install the app on your smartphone for remote formatting
Of course, if your device is stolen with a clear aim to steal data from it, this application will not help, but if you lose your smartphone or it was stolen just in order to sell, then this app will help if they do not return the smartphone, then at least to deprive the new owner access to your information.
corner paranoid
Perhaps you feel that all this gives nonweak paranoia. In the end, if you - not the head of the department of development of top-secret things on your electronic invoices do not have millions, why someone of your data? Never rule out a simple self-indulgence, it still has not been canceled. In addition, each stolen account any service - a great spambot, which has a list of friends who trust him. And in general, your contact list would do well to bring in a couple of large databases for spamming.