Wednesday, October 31, 2012

Antivirus for My Phone? - Tech Support Service : Computer Tech ...

In the last few decades, cellphone technology has grown by leaps and bounds. Where once it was necessary to carry around a big, bulky device which could only make voice calls, now smartphones are small and sleek and can perform virtually any function that a desktop or laptop computer can. In fact due to the increasing level of power that the average smartphone has at its command, many people are using smartphones in place of both laptops and desktops.

With this explosion in technological capability, and the subsequent widespread use it has caused, comes the inevitable development of harmful and malicious software that sets different smartphone operating systems in their sights. While the two most popular operating systems that are used on smartphones, Apple?s iOS and Google?s Android, are generally considered much more secure than Windows, this does not mean that they are immune from all attacks. Not to mention the fact that the more time that is given to hackers and phishers, the more opportunity they have to discover ever more sophisticated methods of exploiting smartphone users.

As a result, it is important to understand what types of threats have already been identified, as well as different methods you can use to protect yourself. As with most things in life, more information means a greater chance of protecting yourself successfully.

The Threats

As was mentioned above, the operating systems that are most widely used on smartphones are much more secure than the most popular desktop and laptop operating system: Windows. Apple?s iOS is a modified version of OS X, the operating system that is run on most Macs. Historically, the OS family of operating systems has had a much greater degree of success in keeping users safer than their? Microsoft?s Windows? counterparts.

The other popular operating system that is used on smartphones, Google?s Android, is a variant of the Linux operating system. Linux has also been widely recognized as being much more secure than Windows, with the number of viruses and pieces of malware designed to exploit it coming in at a fraction of those that have been discovered on Windows based PCs.

Combine this inherently higher degree of security with the fact that smartphones are still a relatively new phenomenon in comparison to desktops and laptops and the number of recognized threats to smartphones is much smaller.

However, there is one area that provides criminals with a gateway to possible exploitation that you would not see on computers and laptops, and that would be apps. In essence, apps are to smartphones what normal normal pieces of software generally are to desktops and laptops. One of the primary differences is that many apps are developed and coded by private individuals and many times are free to download and use. As a result, there is a much higher chance that a hacker can write an app that performs malicious functions and it will actually see widespread use.

A perfect example of this type of app is one that was written claiming to allow users to access their bank accounts directly from their smartphones. However, when customers called their banks for assistance in setting up the app, their bank had no knowledge of this capability. As it turns out, the app did not provide the stated features, rather its only function was to capture the username and password of bank customers. As you can imagine, this type of information in the wrong hands can lead to catastrophe.

Another example of malware that has been tied specifically to smartphone users is Trojans that cause smartphones to dial different premium phone numbers that can cost money for each minute of connection. Typically the numbers called are pornographic chat lines with price tags of around $5 per minute! As you can see, a call like this could end up costing a pretty penny on the victim?s next phone bill.

Aside from these examples there are also the classics that can affect pretty much any internet user. Email attachments are notorious for containing Trojans and other virus programs. Clicking on unverified links can also allow criminals to slip invisible malware programs designed to wreak havoc and steal data.

How Can I Make Myself Safe?

When it comes to ensuring safety for your private data when it comes to smartphone usage, one of the most important things to remember is to never download and install an app that is made by an unknown source. Just because you find the app on a well known app development site does not necessarily mean that it has been tested and vetted by the site?s owners. Look for reviews by other people that have used the app before. As a rule, try to never be the first person to use a brand new app.

Another wise choice would be to download and install security software designed specifically to protect smartphones. A classic example of this type of software is produced by Good Technologies and can be found at www1.good.com. Software of this type can not only provide protection from malware and apps that seek to steal your data or call costly premium phone numbers, but can also locate your phone through its GPS if it is lost or stolen.

Above all, use common sense and good judgment. The same lessons you have learned for using the internet on your desktop or laptop will usually apply to using it on your smartphone. If you do not know the sender of an email, don?t open the attachment. Also, be wary of clicking on links if you are not 100 percent sure that the destination is a safe one.

As time marches on, more and more exploits are bound to be made specifically targeting smartphones and their operating systems. As a result, it is important to keep abreast of these developments and any protection that becomes available to combat them.

Source: http://www.techtous.com/blog/antivirus-for-my-phone-do-phones-running-ios-and-android-need-virus-protection/

whitney houston national anthem beverly hills hotel beverly hills hotel the watchmen whitney houston dies dolly parton i will always love you beverly hilton hotel

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.