How to know if your phone or tablet has a virus or malware

What do viruses do to your phone or tablet?

Now that we’ve established that both Android and Apple phones and tablets can be hit by a virus or malware, are there tell-tale signs that will clue you in that your gadget is indeed infected?

Typically, profit-oriented infections like spyware, adware, clickware, or premium SMS scams are stealthy since these want to milk your gadget for revenue for as long as they can.

So aside from the obvious signs of ransomware and lockware, how can you tell that there’s something malicious lurking on your gadget?

Here are clues you need to watch out for to suspect that your gadget is infected with some form of malware (both Android and iOS, jailbroken or not).

Surge in data usage

One of the first things to check is your monthly data usage. This is generally located on your statement from your cellphone service provider or when you view your mobile account details online. Compare the amount of data used to data usage from the prior months and if you notice sudden spikes in your data even though you haven’t really changed your usage patterns, then chances are you are infected.

Adware infected phones usually perform unsolicited clicks in the background to generate profit for cybercriminals. All of these stealthy tactics use up bandwidth and the unauthorized data they consume should be fairly easy to spot.

Unexplained charges

One other sure sign that your Android gadget is infected is by incurring unusual charges on your cellphone bill under the “SMS” category. This happens when your gadget is infected with malware that sends text messages to premium-rate numbers and charges you.

Sudden pop-ups

If you’re starting to get annoying pop-up ads and notifications, unwanted reminders and nagging “system” warnings that just won’t go away, then your phone may have been compromised. Malware can also add bookmarks that you don’t want, website shortcuts to your home screen that you didn’t create and spammy messages that entice you to click through.

Apart from slowing down your phone and eating away at your data, these intrusive notifications can also install more malware on your phone.

By Francis Navarro

See full story at www.komando.com

Take these steps to secure your phone before letting anyone–even your friends–borrow it

When somebody asks to borrow your phone—perhaps a stranger asks to make a call, or a friend wants to scroll through your vacation photos—the thought can give you heart palpitations. We keep so much data and personal information on our little pocket computers that handing them over to others, even voluntarily, can seem like an invasion of privacy. But you don’t have to feel that way. Both Android and iOS include built-in options for restricting what guests can do on your smartphone.

These security tips differ from the general lock-screen protections we’ve previously discussed. That advice—for example, you should always have a PIN code protecting your phone—keeps your information safe from anyone who might steal or accidentally encounter your device. But in this guide, we’re looking at situations where you willingly hand over your smartphone.

Android

When the 5.0 Lollipop version of Android launched in 2014, the cellular operating system began including a feature called screen pinning. Essentially, this mode locks the phone’s user inside one specific app, such as a game or a photo gallery. When a guest holds a screen-pinned phone, they cannot open other apps or change the settings unless they know the PIN that unlocks full access to the device.

To set up screen pinning, go to Settings and tap Security & location, then Screen pinning. Toggle the switch to On and make sure the option to always ask for a PIN before unpinning is set to On as well. Next, open up the app you want to let your guest access, then tap the Overview button (the square on the right side of the navigation bar); recent apps will appear in a line, with the app you just accessed front and center. Drag that app to the middle of the screen, then tap the thumbtack-shaped pin button that shows up in the bottom right corner of the thumbnail. Congratulations—only that app will now be accessible to users. To restore your phone’s full function, press the Back and Overview buttons at the same time and enter the PIN code for your phone.

If you want to take further precautions, or you have one friend or relative who’s constantly borrowing your device, try out Android’s guest mode. This ability, like screen pinning, first appeared with the advent of Lollipop. It gives a frequent phone borrower their own user account, complete with independent apps, browser settings, and more. Compare it to the way that one computer can host different users, where each user gets his or her own settings, files, and layout. When someone else is using your phone in guest mode, they cannot return to your account or access your files without your unlock code.

By David Nield

See Full Story on www.popsci.com

This lock screen trick can help you recover your lost phone faster

Your phone is one of the most important things you take with you every day. It contains your emails, your data, and your life. If you lose or misplace your phone you may never get it back, and if you do, it can take a lot of effort and time to find it.

But, did you know you can change your lock screen so that people know how to contact you if you’ve misplaced it?

Android and iOS devices work differently, but both devices have a way to display information on the lock screen, such as your name and email address. In this tip, we’ll walk you through the steps and explain why it’s important.

For Android

An Android device has a built-in feature that will allow you to add a lock screen message to your phone. In this message, you can write your contact info and a good number to call to notify you when found.

It is important to note that some of these steps are newer features of Android Oreo.

To add a lock screen message go to your devices Settings App, then tap Security & Location. Next to “Screen Lock” tap Settings, and finally tap Lock screen message.

From there you can add your personal contact information so that if found, that device will reach you much quicker.

Try not to put too much information on the lock screen, because anyone can view that information without putting in your device’s passcode. “If found reach me at…” should be followed by an email address or a number of someone close to you.

By Nathan Mathews

See full story at www.komando.com

How to make sure your apps are safe with Google Play Protect

By now, you should be very aware that Google has worked tirelessly to introduce a new system that will go a very long way to protect your device(s) from malicious software. That system is Google Play Protect.

Before you get too excited, not every device has the pleasure of getting to know this new feature just yet. Google Play Protect rolled out with Google Play Services 11. To find out which version of Google Play Services is on your device, go to Settings | Apps | Application List | Google Play Services.

As you might expect, there is no Google Play Protect app to be found in the app store, it’s completely rolled into the Android system.

What can you do with Protect?

With that said, what can you do with Google Play Protect? The answer: not much. In fact, if you look in your App Drawer, you don’t find a launcher for the new protection system. Open up Settings (or Settings | Security) and there isn’t a section marked Google Play Protect. You have to dig into Settings | Google | Security | Verify Apps before you find any indication that Google Play Protect is running and protecting your device.

And so, the question remains, what can you do with Google Play Protect? Again, I say, not much. However, I believe that is exactly how it should be. Google has created a system that requires no user interaction and works completely in the background to scan for harmful apps.

Once you’re on the Google Play Protect settings page, you can’t even tap the “more” section of Recently scanned apps. What you can do is disable Play Protect (which you should not do), and enable the sending of unknown apps to Google. Enabling sending of unknown apps will allow apps from outside the Google Play store to be scanned. If you happen to work with apps from unknown sources, consider this a must-use feature.

By 
See full story at www.techrepublic.com

 

5 Security Tips Every Android User Should Know

Despite being open-source platform Android adhere to all security norms when it comes to user’s security. It works on latest techniques and smart algorithms to provide round-the-clock security to users worldwide. Android offers various built-in features to keep your device security intact. You can use these built-in features for improved device security. Additionally, you can use anti-malware and security apps for extended security of your device. Let’s discuss few useful security tips to keep your Android device safe.

Secure Android with Screen lock: This simple yet powerful step can help you protect your device data from falling into wrong hands when your device is lost or misplaced. It is also useful to keep your data away from prying eyes. Your device offers multiple locking options including PIN lock, password lock, pattern lock, and fingerprint or eye scanner lock. You can use one of these options to keep your device safe. In fact, following this simple steps can help you avoid more problematic situation like data loss. To activate screen lock on your device, head to Settings > Security > Screen Lock and select screen lock option from given options.

By OSCAR MICHEL

See full story at irishtechnews.ie

Android Malware Protection Tips, Advice: Why Users Need the 7.1 Nougat Update ASAP

The fight against malware and ransomware attacks will be an endless ordeal as technological advancement continues. While the methods used by hackers are advancing at a fast rate, tech companies are also coming up with their own ways to protect users from illegal and damaging software.

According to reports, Google has introduced a security feature specifically made to protect users from threatening malware hidden in their apps. The so-called “Panic Detection” mode in the latest Android update automatically kicks in once the phone detects malicious software. If a malware tries to lock the screen, the feature is activated after multiple presses of the back button are made.

This means that after four consecutive back button presses, the system overrides everything on the screen and leads the user back to the home screen. The new feature is Google’s answer to some malware apps that disable physical buttons in the smartphone.

Forbes noted that the Panic Detection mode is not yet enabled by default. For users who are the tinkering type, they have the option of making minor changes in the feature by heading to their device’s config.xml.

BY SHEANNE AGUILA

See full story at  www.christianpost.com

7 Tips to Secure Your Rooted Android Device

To Root or not to Root an Android is a never ending debate. Surely, rooting opens a window of opportunities for Android but then it also makes it vulnerable to security threats and voids the phone warranty, which are two major red flags.

In fact, phone security is one of the major concerns that most of the general public would prefer a non-rooted phone. However, if you have found the prospects of rooting more promising, then here are a couple of tips to secure your rooted Android device.

1. Install a Trusted Root Management App

Aforesaid, rooting lets you customize your Android to your heart’s content. Not only customization, it also lets you effectively manage the phone’s internal storage and run special apps. And these apps often need an administrator access to function.

2. Oversee Android App Permissions

So, now that you have installed a gatekeeper app, it’s natural that the rooted apps will ask for admin access or superuser access. And when these special apps ask for permissions, we often grant them without a second’s thought.

3. Get Apps from Secure Sources

The Google Play Store is often the source of most of the Android apps. Though it’s not the best, it’s one of the safest places from where you can download your apps. This is because Google regularly checks apps for viruses, malware or for anything suspicious.

By Namrata Gogoi

See full story at www.guidingtech.com

How To Track Your Lost Android Phone Without Installed Tracking App

There are a handful of phone recovery or anti-theft apps on the Google Play Store which can be a lifesaver in case you lose your phone or, even worse, it gets stolen. But many people might only realize that there are such apps AFTER it got lost or stolen. Then it usually is too late and you have to face the ugly truth that the phone is gone for good.

How to track your Android phone or tablet after it got lost or stolen

But don’t burst out in tears just yet. There’s still hope for your phone to find its way back to you! There are a few ways to remote control and track your phone even if you haven’t installed a recovery app before it vanished.

Let’s have a look at the various ways to get your Android smartphone back to its rightful owner!

1. Track your lost Android with Android Device Manager or Google Find My Device

Requirements:

  • Your device is connected with your Google account.
  • Your device has access to the internet.
  • Allowed Android Device Manager (ADM) to locate your device (turned on by default). This can changed in the Google Settings app.
  • Allowed ADM to lock your device and erase its data (turned off by default).

Android Device Manager (also called Google Find My Device) is Google’s official and easy-to-use tool to track your Android phone or tablet. The best thing about it is that you don’t need to install an app to be able to track your devices. The only requirement is that your device is connected to your Google account, turned on and connected to the internet. All you need to do is visit the Android Device Manager while being logged into your Google Account. Once the site is loaded it will automatically try to track down your phone. If you habe several Android devices registered, make sure the right one is chosen in the dropdown menu.

2. Remote control and track your smartphone with Android Lost

Requirements:

  • Your device is connected with your Google account.
  • Your device has access to the internet.
  • You’re not running Android 3.0 or higher.

This is a more complicated way to track your phone. Basically, you need to install the tracking app ‘Android Lost’ on your phone and activate it by sending it an SMS (this can be done from any phone). How do you install something when you don’t have your phone with you? That’s very easy. You can install any app on all your registered devices directly from your browser through the Google Play website. Simply navigate to the Android Lost app and click the install button.

The remote installation process of Android Lost is very straightforward and only requires that your phone is still connected with your Google account. However, in case of theft, you have to hope that the thief doesn’t disconnect from your account.

By Marc Knoll

See full story at trendblog.net