How to Secure Android Phone from Hackers

kratikal Academy
3 min readNov 15, 2019

--

The most used operating system in the world is Android, in fact, bigger than Apple or other mobile platforms. It covers more than 85% of the world’s smartphone market share. But, iOS always beats Android in one sector and that is security. However, some changes are done to boost the security level of android but the attacks are getting more complex and frequent as the security of the devices is increasing.

According to the Android security bulletin released by Google, Hackers could sneak their way inside any android phone or tablet by sending a malicious image file. The scariest part of all is that people may not be aware that they are being targeted. Luckily, you can take the following security precautions to secure your android devices that cyber security training programs always remark.

1. Download Apps from the Secure and Trusted Sources

Google Play Store strictly keep the track of apps that’s been adding on their platform. Besides, you can immediately report the apps that you find suspicious. Any third party app store is more likely to contain malware or viruses in their files and cannot be trusted. Agent Smith was the malware that spread via a third-party app store 9apps.com. However, there is no need to download “.apk” files from these stores when you can find a suitable app in the Google Play Store.

2. Read and Accept App Permission Carefully

Some applications ask permission to access your phone’s camera, media, mic, location, etc. Most of the people don’t even bother about that and use the application as per their need. Now suppose these apps can record your voice, hack your data and even get your image from the image gallery. So, next time be aware and think before you grant permission to an app.

3. Install an Antivirus App

Viruses come from different sources and kinds; you can never know when and how you can hit by a virus. Every device needs protection from viruses and for that timely scanning of device and applications are essential. You can install an antivirus app to automatically detect and remove viruses from your device.

4. Always keep the Android and Apps Versions Updated

One way through which a Hacker penetrates the device is the loopholes obtained from the older versions of the application and operating system. Hence, keeping your device updated will help improve its security because the latest version fixes those vulnerabilities or loopholes.

5. Install the Android Device Manager

Android Device Manager is used to remotely control your Android device to locate, lock or wipe the files in case it gets lost or stolen. You can install Android Device Manager from Google Play Store for the following purposes:

· Locate the device.

· Lock the device.

· Wipe the device.

· Help someone track and control his lost/stolen device.

6. Avoid Public Wi-Fi

This one’s a basic but important precaution to take and always taught in a Cyber Security Course. Only use a trusted internet connection in your device. Generally, the Wi-Fi open for public use are not secure. Use VPN to direct secure traffic through encrypted mobile connections.

7. Use Pin/Passwords to Lock Your Device and Apps

It is important to use passwords to lock your device and applications to improve your phone’s security. Keep the password at good strength and set it smartly. You can choose alphanumeric pin or pattern lock as a password for your phone. Set an automatic lock for your device when it is idle.

We cannot ignore the fact that the hackers are getting more frequent and sharp with their attacks as the cyber security community is coming up with robust security techniques. Nowadays, cyber security training includes security measures for mobile devices. Hence, if you are interested in this domain than you can pursue an online cyber security course and learn the countermeasure for these types of attacks on the devices.

--

--

kratikal Academy
kratikal Academy

Written by kratikal Academy

kratikal Academy offers cyber security training and certifications with live projects on Ethical Hacking, Web Application Security, Mobile Application Security,

No responses yet