您可能已经阅读了很多关于黑客以及如何保护您的计算机的信息,但出于某种原因,大多数人并不真正关心智能手机的安全性。
可能是因为它不像传统的硬盘驱动器,用于存储所有文档、图像、视频等,但今天过度活跃的智能手机用户存储了大量非常敏感的信息,其他人(如黑客)会很乐意在你使用时获取这些信息。在星巴克(Starbucks)重新上网。
幸运的是,智能手机的安全性越来越受到关注,您可以做很多事情来帮助防止您的智能手机被黑客入侵。实际上,您为保护计算机而采取的许多相同措施也可以用来保护您的智能手机。如果您对保护智能手机有任何自己的建议,请在评论中告诉我们。
1. 到处使用密码
无论您使用的是Android 手机(Android phone)还是 iPhone,您都可以通过在Android上添加密码或(Android)锁定图案(lock pattern)来阻止访问您的设备。这种简单的安全措施(security measure)可以防止敏感信息被他人查看。
如果您安装了许多存储个人数据的应用程序,例如金融应用程序(Mint、银行应用程序(bank apps)等)、日记应用程序(DayOne)、笔记应用程序(Evernote)等,这一点尤其重要。在其中一些应用程序上,例如Mint和 DayOne(Mint and DayOne),您可以专门为该应用添加密码,除了密码之外,我总是这样做以保护主屏幕(home screen)。
主屏幕密码(home screen passcode)很重要,因为许多电子邮件应用程序(email apps)( iPhone上的Mail和(Mail)Android上的Gmail(iPhone and Gmail))甚至没有为您的电子邮件密码的选项。电子邮件可能包含大量私人信息,而且由于大多数人参加聚会并将手机放在桌子和柜台上,因此有人很容易窥探您的东西。
2. 保护您的 iCloud 和 Google 帐户(Your iCloud & Google Account)
大多数人没有意识到(t realize)的第二件事是,如果有人可以进入您的iCloud 或 Google 帐户(iCloud or Google account),他们就可以访问您可能正在通过智能手机创建和编辑的大量数据。在这些时候,在这两个帐户上启用两步验证是必然的不便。我已经写过有关如何保护您的Google 帐户(Google account)以及如何正确设置备份和恢复选项(setup backup and recovery options)以进行两步验证的文章。
这很荒谬,但是您的Apple ID基本上控制着对当前存在的每一项Apple 服务的访问,从 iTunes 到 iCloud 到(Apple service)FaceTime到 iMessage 等等。如果有人可以访问您的Apple ID ,他们可能会对您的(Apple ID)Apple 生活(Apple life)造成严重破坏,包括擦除远程控制您的 iPhone、iPad 和 Mac 。(iPad and Mac)
与Google(Google)几乎相同的问题。您的Google 帐户(Google account)基本上会将您登录到所有Google服务,从YouTube到Gmail到Google Play到Google 地图(Google Maps)到Google 日历(Google Calendar)到 Picasa 到Google+等等等等。
3.避免越狱或生根你的智能手机
如果您真的知道自己在做什么,并且越狱或将手机植根以获得乐趣和享受(fun and enjoyment),那么对您有好处。如果你想这样做是因为你在新闻中听说过它并且想要“摆脱”约束和限制,那么你应该完全避免这个过程。
首先,它会弄乱你的手机,(phone and cause)让你悲伤多于快乐。其次,您将无法使用操作系统的最新更新来更新您的手机,因为它将处于不受支持的模式。
是的,您可以安装一些应用程序并自定义您原本无法执行的设置,但这意味着您还下载了可能包含恶意软件的应用程序。你已经在Android上遇到了这个问题,因为它们不像Apple那样限制进入应用商店(app store)的内容。这将我们带到了下一点。
4.小心你安装的应用程序(Apps)
这在Android(Android)设备上尤为重要。谷歌(Google)最近删除了 50,000 个被怀疑是恶意软件的应用程序。不会有任何包含恶意软件(contain malware)、病毒或其他偷偷摸摸的软件来窃取您的数据或损坏您的手机的应用程序。
苹果应用(Apple app)商店也有这个问题,但程度要小得多。Apple在每个应用程序进入商店之前对其进行审查,并定期从商店中删除被认为违反商店政策的应用程序。
查看这篇文章(this article),了解 2012 年超过 3200 万台Android设备如何感染恶意软件,以及 95% 的恶意软件如何针对Android设备。
如果您讨厌Apple(Apple)也没关系,但事实是,如果您拥有Android 设备(Android device),则在下载应用程序时必须非常小心。检查评论,检查他们是否有网站,在谷歌(Google)中搜索应用名称(app name)等。
5.使用应用程序(App)而不是浏览器(Browser)
如果您在手机上进行银行业务或股票交易(phone or stock trading)或其他任何在手机和互联网(Internet)之间传递敏感信息的方式,最好使用该网站或公司(site or company)的官方应用程序,而不是使用手机上的浏览器打开。
例如,Chase、美国银行、Vanguard、ScottTrade、Mint(Chase)和许多(America)其他(Bank)大型金融(Vanguard)机构都有(ScottTrade)自己的(Mint)iOS和 Android(iOS and Android)应用程序。智能手机浏览器也支持安全连接,但如果您获得可能具有额外安全功能的官方应用程序,您会更安全一些。
6.控制应用程序可以访问的内容
您可能已经在 iPhone 上看到以下消息一百次了:
有各种各样的“ AppName(AppName Would)想要访问您的数据”消息。数据可以是照片、位置、联系人等。请始终注意,不要一直单击“确定”。如果您一直单击任何内容,最好选择不允许(Don’t Allow),如果您以后真的无法使用该应用程序,您可以手动返回并更改它以允许访问。其中大部分都是非常合法的请求,不会造成任何伤害,但最好是安全的。
在Android上,情况再次变得更糟,因为一些应用程序会要求对所有内容的权限,即使他们不需要它。您可以阅读这篇Lifehacker 帖子(Lifehacker post),了解如何保护自己免受请求过多权限的Android 应用程序的侵害。(Android apps)Android上的权限也比 iOS 上的要多得多,所以如果你是Android 用户(Android user),你必须更加小心。
7. 保持数据备份
备份您的智能手机不仅是一个好主意,以防您将其掉入马桶,而且如果它被盗并且您必须远程将其擦拭干净,这也是一个好主意。Apple用户可以安装Find My iPhone应用程序,如果您知道手机被盗,它可以让您远程锁定手机并远程擦除它。
如果您没有备份您的数据,一旦被盗,您将丢失所有数据。如果您在本地或云中备份它,您将能够擦除手机并将所有数据恢复到新手机上。您可以使用 iTunes 将智能手机同步到计算机,也可以通过 iCloud 将其备份到云端。
在Android上,有一个内置的备份工具(backup tool),但它不会像 iOS 那样备份手机上的所有内容。(t backup everything)相反,您必须依靠Google Play 商店(Google Play store)中的第三方应用程序来完全备份您的手机。请注意,Android还具有远程擦除功能(remote wipe feature),但您需要先通过安装某些应用程序进行设置。
8. 报告您的手机被盗
在过去的几个月里,主要无线运营商之间创建了一个被盗电话数据库。(phone database)您可以报告您的手机被盗(phone stolen),这将阻止任何人连接到运营商并使用数据或分钟。
如果他们尝试擦除它、更换SIM 卡(SIM)等,由于序列号,它仍然不允许他们在任何运营商上激活。您可以访问以下页面报告您的智能手机被盗(smartphone stolen)并防止小偷连接到任何无线运营商(wireless carrier):
AT&T、威瑞森(Verizon)、Sprint、T-Mobile
9.更新操作系统
就像您必须不断为您的 PC 安装Microsoft 安全(Microsoft security)更新一样,为您的智能手机安装最新更新是一个好主意。您可以等待几天并确保更新没有重大问题,例如电池寿命(battery life)下降等,但如果没有任何问题,请更新手机。
除了更新操作系统之外,更新手机上安装的应用程序也是一个好主意。令人惊讶的是,我遇到过多少智能手机,其中有 10、20、30 多个应用程序的更新尚未安装。这些更新可能包括新功能,但其中很多是错误修复、性能更新和安全修复。
10. 无线和蓝牙
当您不在家时,最好尝试完全禁用无线和蓝牙,并尽可能使用您的 3G 或 4G 连接。在您连接到不受信任的无线网络(wireless network)的那一刻,您对黑客通过网络扫描受害者是开放的。即使您没有在银行业务或做其他涉及敏感数据的事情,黑客仍然可以尝试连接到您的智能手机并窃取数据(smartphone and steal data)等。
谈到蓝牙(Bluetooth),黑客攻击不太常见,但随着人们开始更多地使用这项技术而不仅仅是耳机,它越来越受欢迎。现在,您可以通过蓝牙和健身手环以及许多其他小工具将手表连接到您的手机。如果蓝牙已启用且可发现,它为黑客提供了另一种可能查看蓝牙设备(bluetooth device)和手机之间传递的数据的方式。
希望(Hopefully)这些提示能在您手机丢失或被盗的不幸情况下对您有所帮助。我个人不得不擦拭 iPhone,因为我丢失了它,后来意识到有人在使用应用程序和数据连接(apps and data connection)。这绝对不会再发生,即使我的手机丢失或被盗,因为我已确保它受到尽可能多的保护。如果您有任何其他保护智能手机的提示,请在评论中告诉我们。享受!
10 Smartphone Security Tips
You’ve probably read a lot about hackers and how to protect your computer, but for some reason, most peoplе don’t really care all that much about smartphone security.
Maybe because it’s not like a traditional hard drive where you store all your documents, images, videos, etc, but today’s hyperactive smartphone users store a lot of information that is quite sensitive and that others, like hackers, would gladly enjoy taking while you’re surfing the web at Starbucks.
Luckily, smartphone security is gaining traction and there are quite a few things you can do to help prevent your smartphone from being hacked. Actually, a lot of same measures you take to protect your computer can be used to protect your smartphone too. If you have any of your own tips for securing your smartphone, let us know in the comments.
1. Use Passcodes Everywhere
Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can prevent sensitive information from being viewed by others.
This is especially important if you have a bunch of apps installed where personal data is stored like financial apps (Mint, bank apps, etc), journal apps (DayOne), note apps (Evernote), etc. On some of these apps like Mint and DayOne, you can add a passcode specifically for that app, which I always do in addition to the passcode to protect the home screen.
The home screen passcode is important because a lot of the email apps (Mail on iPhone and Gmail on Android) don’t even have an option to passcode your email. Emails can contain a lot of private information and since most people go to parties and leave their phones on tables and counters, it’s very easy for someone to snoop around your stuff.
2. Protect Your iCloud & Google Account
The second thing most people don’t realize is that if someone can get into your iCloud or Google account, they can gain access to a lot of data that you might be creating and editing from your smartphone. In these times, it’s a necessary inconvenience to enable 2-step verification on both of these accounts. I’ve written about how to secure your Google account and how to properly setup backup and recovery options for 2-step verification.
It’s pretty ridiculous, but your Apple ID basically controls access to every single Apple service that currently exists from iTunes to iCloud to FaceTime to iMessage, etc, etc. If someone can access your Apple ID, they can wreak havoc on your Apple life including erasing your iPhone, iPad and Mac remotely.
It’s pretty much the same issue with Google. Your Google account basically logs you into all Google services from YouTube to Gmail to Google Play to Google Maps to Google Calendar to Picasa to Google+, etc, etc, etc.
3. Avoid Jailbreaking or Rooting Your Smartphone
If you really know what you’re doing and you jailbreak or root your phone for fun and enjoyment, then good for you. If you want to do it because you heard about it in the news and want to be “free” from constraints and restrictions, then you should avoid the process altogether.
Firstly, it can mess up your phone and cause you more grief than happiness. Secondly, you won’t be able to update your phone with the latest updates to the OS since it’ll be in an unsupported mode.
Yes, you can install some apps and customize settings that you could otherwise not do, but that means you’re also downloading apps that may contain malicious software. You already have that problem on Android since they are not as restrictive as Apple about what goes into the app store. Which brings us to the next point.
4. Be Careful With the Apps You Install
This is especially important on Android devices. Google recently removed 50,000 apps that were suspected of being malware. There won’t be any shortage of apps that contain malware, viruses or other sneaky software to steal your data or damage your phone.
The Apple app store also has this problem, but to a much lesser extent. Apple vets each app before it gets listed in the store and routinely goes about removing apps from the store that are deemed to be violating store policies.
Check out this article that talks about how more than 32 million Android devices were infected with malware in 2012 and how 95% of malware is targeted towards Android devices.
It’s fine if you hate Apple, but the fact is that if you own an Android device, you have to be very careful about downloading apps. Check the reviews, check to see if they have a website, do a search in Google with the app name, etc.
5. Use an App Instead of the Browser
If you’re doing banking on your phone or stock trading or anything else that passes sensitive information between your phone and the Internet, it’s best to use an official app for that site or company rather than opening using the browser on your phone.
For example, Chase, Bank of America, Vanguard, ScottTrade, Mint, and lots of other big financial institutions have their own apps for iOS and Android. Secure connections are supported on smartphone browsers also, but you’ll be a little bit safer if you get an official app that may have extra security features.
6. Control What an App Can Access
You’ve probably seen the following message on your iPhone a hundred times already:
There are all sorts of these “AppName Would Like to Access Your Data” messages. Data can be photos, location, contacts, etc, etc. Always be mindful and don’t just click OK all the time. If you click anything all the time, it’s better to just choose Don’t Allow and if you really can’t use the app later on, you can manually go back in and change it to allow access. Most of these are very legitimate requests and won’t cause any harm, but it’s better to be safe.
On Android, it’s again worse because some apps will ask for permissions to everything even though they don’t need it. You can read this Lifehacker post on how to protect yourself from Android apps that request too many permissions. There are also a lot more permissions on Android than there are on iOS, so again you have to be more careful if you’re an Android user.
7. Keep Data Backed Up
It’s not only a good idea to keep your smartphone backed up in case you drop it in the toilet, but also if it gets stolen and you have to remotely wipe it clean. Apple users can install the Find My iPhone app, which will let you remotely lock a phone and remotely wipe it if you know it’s been stolen.
If you don’t have your data backed up, you’ll lose it all if it’s stolen. If you back it up locally or in the cloud, you’ll be able to wipe your phone and get all your data back on your new phone. You can either sync your smartphone to your computer using iTunes or you can back it up to the cloud via iCloud.
On Android, there is a built-in backup tool, but it doesn’t backup everything on your phone like the iOS does. Instead, you’ll have to rely on third-party apps in the Google Play store to backup your phone completely. Note that Android also has a remote wipe feature, but you need to setup it first by installing certain apps.
8. Report Your Phone Stolen
In the last few months, there has been a stolen phone database created that is shared between the major wireless carriers. You can report your phone stolen and that will prevent anyone from connecting to the carrier and using data or minutes.
If they try to wipe it, replace the SIM, etc, it still won’t allow them to activate on any of the carriers because of the serial number. You can visit the following pages to report your smartphone stolen and prevent the thief from connecting to any wireless carrier:
AT&T, Verizon, Sprint, T-Mobile
9. Update the OS
Just like you have to constantly install Microsoft security updates for your PC, it’s a good idea to install the latest updates for your smartphone. You can wait a few days and make sure there are no major issues with the update like degradation of battery life, etc, but if nothing stands out, then update the phone.
In addition to updating the OS, it’s also a good idea to update the apps installed on your phone. It’s amazing how many smartphones I’ve come across where there are 10, 20, 30+ apps that have updates of which none have been installed. Those updates may include new features, but a lot of them are bug fixes, performance updates and security fixes.
10. Wireless & Bluetooth
When you’re not at home, it’s best to try to disable the wireless and bluetooth altogether and use your 3G or 4G connection if you can. The moment you connect to an untrusted wireless network, you’re open to hackers scanning for victims over the network. Even if you’re not banking or doing something else that involves sensitive data, a hacker can still try to connect to your smartphone and steal data, etc.
When it comes to Bluetooth, hacking is less common, but it’s gaining popularity as people start to use the technology more beyond just headsets. Now you have watches connected to your phone via bluetooth and fitness bands and a whole host of other gadgets. If bluetooth is enabled and discoverable, it gives hackers another way to possibly see the data being passed between the bluetooth device and your phone.
Hopefully these tips will help you in the unfortunate case where you phone is lost or stolen. I’ve personally had to wipe an iPhone because I lost it and later realized someone was using the apps and data connection. That definitely won’t happen again, even if my phone is lost or stolen because I’ve made sure it’s as protected as possible. If you have any other tips for securing your smartphone, let us know in the comments. Enjoy!