您的智能手机与任何其他通用计算机没有什么不同。也就是说(Which),有恶意的人可以利用它来窃取您的信息或以其他方式从您的损失中获利。
无论是从事间谍活动、窃取您的钱财还是一般的受害行为,没有安全保护的智能手机都可能成为痛苦的根源。以下是如何阻止黑客进入您的手机。
保持您的手机(和应用程序!)更新
当您的手机告诉您有重要更新时,请安装它!如今,小型安全更新经常被推送到 iOS 和Android手机。它们通常是修复新发现的漏洞的补丁。补丁的发布也向全世界表明了漏洞的存在,所以期待许多黑客碰运气,希望在野外找到未打补丁的手机。
虽然不是那么重要,但您还应该更新您的应用程序。特别是如果更新描述中提到了安全问题。编写不佳的应用程序有时会为您的手机打开一扇门,具体取决于漏洞利用的类型。这是非常罕见的,但不是那么牵强,你应该无限期地推迟应用程序更新。
不要侧载应用程序(Sideload Apps)或使用不可靠的应用程序(Use Dodgy App) 商店(Stores)
Google Play Store和Apple App Store都有质量控制措施,以帮助确保恶意应用程序不会进入您的手机。它仍然可能发生,但总的来说,您不必担心这些官方店面上的应用程序。
真正的问题来自在您的设备上手动安装来自您无法信任的来源的应用程序(旁加载)。(sideloading)盗版应用程序是一个臭名昭著的例子。此类应用程序通常包含恶意代码。如果您使用这些,您不妨将手机及其密码交给黑客。
侧载本身并不坏。您可以通过这种方式安装许多值得信赖的应用程序。但是,您需要 100% 确定它们的来源。在Apple设备上,您不能在不“越狱”设备的情况下旁加载应用程序或使用替代应用程序商店。您可以阅读我们关于Cydia(Cydia)替代应用商店的文章中涉及的风险的更多信息。
使用强大的屏幕锁定
所有智能手机都允许您设置安全锁。因此,如果有人拿起电话,他们就不能简单地进入您的应用程序或开始查看您的信息。拥有这样的锁是保护Android手机免受黑客攻击的重要方法,但更重要的是选择具有适当安全级别的锁类型。
传统的密码非常安全。我们建议至少使用 6 位代码,但即使是 4 位代码也相当强大。六个数字有一百万种可能的组合,四个有一万种组合。鉴于大多数手机允许在设备锁定或自行擦除之前进行有限的猜测,这就足够了。
使用指纹或面部识别等生物识别锁可能很诱人。但是请仔细考虑一下,因为在许多情况下仍然可以欺骗面部识别。更不用说有人可以通过将手机指向您的脸或强迫您将手指放在扫描仪上来解锁您的手机。图案锁定也可能是一个问题,尤其是当您将图案弄脏在屏幕上时!
使用生物识别 Killswitch
如果您确实决定在智能设备上使用生物识别锁,请了解如何快速禁用它们。您可以在我们的Face ID 和 Touch ID 文章(Face ID and Touch ID article)中了解如何在 iOS 中执行此操作。在现代 iOS 设备上,您按住电源和音量按钮之一来禁用生物识别。如果您拥有从 iPhone 5s 到 iPhone 7 的任何设备,您可以通过按电源按钮五次来禁用生物识别功能。
在您真正使用它之前,请先熟悉一下您的 iOS 设备的 killswitch。如果您激活了“嘿 Siri”,您还可以通过简单地说“嘿 Siri,这是谁的手机?”来禁用生物识别。所有这些方法只会持续到您下次再次锁定设备时。
在Android Pie和更新版本上,打开手机设置并查找名为“锁屏设置”或“安全锁屏设置”的内容。确切的菜单措辞可能因您的手机品牌而异。应该有一个名为“显示锁定选项”的设置。
如果您将其打开,则从锁定屏幕按下电源按钮将显示“锁定模式”按钮。如果您选择它,您的生物识别技术将立即停止工作,需要输入密码才能打开手机。
避免使用公共 WiFi
公共 WiFi(Public WiFi)网络是寻求轻松发薪日的黑客的完美猎场。为什么?因为当您与不认识的其他用户在WiFi网络上时,您的设备可以看到彼此的网络流量。
这意味着您手机发送的任何未加密数据都可以通过WiFi密码被其他用户读取。这也意味着您的手机可以通过其本地网络地址直接受到攻击。如果公共WiFi提供商错误地配置了他们的网络安全,它可能会使您的设备容易受到攻击。
阻止黑客进入您的手机的最佳方法是完全避开这些网络。
使用 VPN
如果您必须使用公共WiFi网络,那么您必须使用虚拟专用网络 (VPN)(use a virtual private network (VPN))应用程序来加密通过网络连接的所有数据。我们建议仅使用可靠的付费服务。一个月要花几块钱,但很值得。
使用非数据线充电
您的手机用于充电的端口也是数据连接。我们知道这对您来说可能不是新闻,但您是否考虑过此数据连接可用于破坏您的手机?
可以通过USB 端口(USB port)在智能手机上安装恶意软件。这(Which)就是为什么狡猾的黑客会在机场休息室或咖啡店等地方将无害的充电器换成受损的充电器。插入手机进行充电后,该设备会将恶意软件加载到您的手机上。
如果您绝对必须使用公共充电点,请给自己准备一根小型充电电缆。这些电缆缺少用于数据传输的布线,因此即使是被黑客入侵的充电器也无法对您的手机进行任何操作。
完美的安全性不存在
无论您对黑客采取多少对策,都永远不会有万无一失的防御措施。因此,请确保您采取额外措施,例如加密您最敏感的信息,永远不要在手机上保留密码列表等内容,以及养成良好的网络安全习惯。
同样值得考虑的是,大多数黑客并没有真正针对技术本身。相反,他们倾向于针对使用该技术的人。它被称为“社会工程”,网络钓鱼(phishing)(phishing)等黑客攻击是它的常见例子。
如果您在注意力不集中的时候被愚弄,没有安全应用程序可以保护您!因此,我们可以为您提供的阻止黑客入侵您手机的最佳提示是培养安全意识!这将使您适应出现的新威胁,并更有可能避免成为下一个黑客攻击受害者。
How To Block Hackers From Your Phone (Android and iPhone)
Your smartphone is no different from anу other general-purpose computer. Which is to sаy that people with malicious intentions can exploit it to steal your information or otherwise profit at your expense.
Whether it’s spying, stealing your money or general victimization, an unsecured smartphone can be a recipe for misery. Here’s how to block hackers from your phone.
Keep Your Phone (And Apps!) Updated
When your phone tells you that there’s an important update – install it! These days, small security updates are frequently pushed out to both iOS and Android phones. They are usually patches that fix newly-discovered exploits.The release of the patch also signals the existence of the exploit to the world, so expect many hackers trying their luck, hoping to find unpatched phones in the wild.
While not quite as critical, you should also keep your apps updated. Especially if there’s mention of security issues in the update description. Poorly-written apps can sometimes open a door to your phone, depending on the type of exploit. It’s pretty rare, but not so far-fetched that you should postpone app updates indefinitely.
Don’t Sideload Apps or Use Dodgy App Stores
The Google Play Store and Apple App Store both have quality control measures in place that help ensure malicious apps don’t make it onto your phone. It can still happen, but by and large you don’t have to worry about apps on these official storefronts.
The real problems come from manually installing apps (sideloading) on your device that come from sources you can’t trust. Pirated apps are one notorious example. Such apps often contain malicious code. If you use these, you might as well just hand your phone with its passcode to a hacker.
Sideloading isn’t bad by itself. There are plenty of trustworthy apps that you can install that way. However, you need to be 100% certain of their origin. On Apple devices you can’t sideload applications or use alternative app stores without “jailbreaking” the device. You can read more about the risks involved in our article on the Cydia alternative app store.
Use a Strong Screen Lock
All smartphones allow you to set up a security lock. So that if someone picks up the phone they can’t simply get into your apps or start looking through your information. Having such a lock is an essential way to secure an Android phone from hackers, but what’s even more important is choosing a lock type that has the right level of security.
The traditional pin code is very secure. We recommend using at least a 6-digit code, but even a 4-digit code is fairly strong. With six numbers there are a million possible combinations and with four there are ten thousand. Given that most phones allow for limited guesses before the device locks up or wipes itself, that’s more than enough.
It can be tempting to use biometric locks such as fingerprint or facial recognition. Think carefully about it however, since facial recognition can still be fooled in many cases. Not to mention that someone can unlock your phone by pointing it at your face or forcing you to place your finger on the scanner. Pattern locks can also be a problem, especially if you leave the pattern smudged onto your screen!
Use a Biometric Killswitch
If you do decide to stick with biometric locks on your smart device, learn how to quickly disable them. You can learn about how to do this in iOS in our Face ID and Touch ID article. On modern iOS devices you hold down the power and one of the volume buttons to disable biometrics. If you have anything from the iPhone 5s to the iPhone 7, you can disable biometrics by pressing the power button five times.
Familiarize yourself with your iOS device’s killswitch before you ever have to use it for real. If you have “Hey Siri” activated, you can also disable biometrics by simply saying “Hey Siri, whose phone is this?” All of these methods only last until the next time you lock your device again.
On Android Pie and newer, open the phone settings and look for something called “lock screen settings” or “secure lock screen settings”. The exact menu wording might differ depending on your brand of phone. There should be a setting called “Show Lockdown Options”.
If you toggle this on, then pressing the power button from the lock screen will show you a “Lockdown Mode” button. If you select it, your biometrics will immediately stop working, requiring a passcode to open the phone up.
Avoid Public WiFi
Public WiFi networks are the perfect hunting ground for hackers looking to score an easy payday. Why? Because when you’re on a WiFi network with other users you don’t know, your devices can see each other’s network traffic.
That means that any unencrypted data sent by your phone can be read by other users with the WiFi password. It also means that your phone can be attacked directly via its local network address. If the public WiFi provider has misconfigured their network security, it could leave your device vulnerable.
The best way to block hackers from your phone is to avoid these networks entirely.
Use a VPN
If you must use a public WiFi network, then it’s essential that you use a virtual private network (VPN) app to encrypt all the data passing through your network connection. We’d recommend only using a credible paid service. It’s going to cost a few dollars a month, but it’s well worth it.
Use Non-data Cables for Charging
The port your phone uses for charging is also a data connection. We know that this probably isn’t news to you, but have you considered that this data connection can be used to compromise your phone?
It’s possible to install malware on a smartphone through the USB port. Which is why crafty hackers will swap harmless chargers in places like airport lounges or coffee shops with compromised ones. Once you plug in your phone to charge it, the device loads the malware onto your handset.
If you absolutely must use a public charging point, get yourself a small charging-only cable. These cables lack the wiring for data transfer, making it impossible for even a hacked charger to do anything to your phone.
Perfect Security Doesn’t Exist
No matter how many countermeasures you take against hackers, there’s never going to be a foolproof defense. So make sure you take extra measures, such as encrypting your most sensitive information, never keeping things such as password lists on your phone, and generally practicing good cyber security habits.
It’s also worth considering that most hackers don’t really target the technology itself. Instead they tend to target the people who use that technology. It’s called “social engineering” and hacker attacks such as phishing are common examples of it.
No security app will protect you if you’re fooled during a moment of inattention! So the best tip we can give you to block hackers from your phone is to cultivate a security mindset! That will let you adapt to new threats as they appear and make it that much more likely you’ll avoid becoming the next hacking victim.