Archives - Mobile Security


Install apps only from trustworthy sources

Before downloading an app, conduct research to confirm the app is genuine. Checking the legitimacy of an app may include such thing as: checking reviews, verifying the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that […]

Review mobile app permissions

Review the permissions each mobile app has on your device. Ensure your installed apps only have access to the information they need and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.

Change your device name in Android

It’s possible that you set your Android device’s identifier to your own name when you first activated the phone. If that’s the case, it’s an unnecessarily easy-to-access piece of personal information that you share whenever you connect your smartphone wirelessly to a network or another device. Access the “About phone” page in Settings. Click “Phone […]

Use the Android “Smart cleaning” app for better performance and enhanced security

This built-in Android application can help you clear out old and unused apps as well as turn off those that are running in the background, including potential malware. Open the app and then press the “Optimize phone” button to stop currently operating apps and clear unnecessary data.

Transfer the Google Authenticator app to a new Android device

Nobody holds onto the same smartphone forever. If you use Google Authenticator and you need to transfer permissions to a new device, open your app on the old phone. Select the vertical ellipsis menu in the upper right corner, and then click “Transfer accounts.” Tap “Export accounts.” The app will generate a QR Code that […]

Bluetooth security best practice: Use hidden mode

Enjoying wireless connectivity is all about balancing convenience with security. Bluetooth devices, such as wireless headsets, speakers and microphones, make it easy to seamlessly take hands-free calls while driving or to move around freely while listening to your favorite music, among other use cases. Using these devices does represent a security trade-off, though. Open Bluetooth […]