Archives - Mobile Malware


Skip the sideload–stay safe with official App Stores on Android

Android offers a world of apps, but sometimes, you might stumble upon an app that isn’t available in the Google Play Store. It might be a game a friend recommends or a productivity tool you saw on a website. Here’s the thing: installing these apps, also known as “sideloading,” can be risky for your device. […]

Replace your phone when the security update period runs out

All smartphones have a limited period of time until they’ll stop releasing security updates for the device. Look up how long those periods are for your model. Most devices have three-year cycles, but some have up to five years. Once your security patches run out, you’ll be vulnerable to new threats.

Check your phone for unwanted apps

Sometimes, software can be installed on your phone or computer without your knowledge. It’s a good habit to occasionally check the list of apps installed on your devices and make sure you recognize everything on there. If you see something that looks unfamiliar or you no longer use, uninstall it. Be sure to check the […]

Stay away from malicious phone apps that ask to change your launcher

Phone launchers offer more features and functionality people love. However, stay away from malware that represents itself as a legitimate launcher. Your launcher controls virtually everything on your phone, and using a malicious launcher can be a severe security risk, not to mention it’s likely to make your phone unusable. They can also be tricky […]

Be careful of malicious apps on smartphones

Apple and Google try to keep their app stores clean of malware, but that doesn’t mean it isn’t there. Don’t download any apps that seem suspicious, and check the user reviews to make sure everyone’s experience with the app has been safe. Getting rid of bad apps on your smartphone can be exceedingly difficult once […]

Review mobile app permissions

Review the permissions each mobile app has on your device. Ensure your installed apps only have access to the information they need and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.