0% found this document useful (0 votes)
161 views

Lock Your Smartphone: Easily Cracked by Hackers

1. Always lock your smartphone with a passcode or biometric authentication like fingerprint or face ID. Consider using longer, more complex passcodes with letters and numbers. 2. Use strong, unique passwords for all accounts and change them regularly, at least every 6 months to a year. Use password generators to create strong passwords. 3. Enable two-factor authentication for all accounts that support it for an extra layer of security in case passwords are compromised.

Uploaded by

Cyber Baba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
161 views

Lock Your Smartphone: Easily Cracked by Hackers

1. Always lock your smartphone with a passcode or biometric authentication like fingerprint or face ID. Consider using longer, more complex passcodes with letters and numbers. 2. Use strong, unique passwords for all accounts and change them regularly, at least every 6 months to a year. Use password generators to create strong passwords. 3. Enable two-factor authentication for all accounts that support it for an extra layer of security in case passwords are compromised.

Uploaded by

Cyber Baba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 24

Lock your smartphone

Always engage a four or six-digit passcode to enter your device. Passcodes may not be super
convenient, but peace of mind dictates that if your smartphone falls out of your pocket while you’re
trying out new sofas at Ikea, the first person who picks it up should not be able to get your life story
from your email, contacts, photos, and banking information. Consider setting an even longer passcode
with both numbers and letters. Not a big passcode fan? No worries. Fingerprint scanning and Face ID
are easy, fast alternatives to punching in numbers. While you’re at it, make sure apps with personal
information are also locked behind passwords.

Use strong passwords


veryone hates passwords. But when it comes to assigning them, don’t take half measures. Use only
strong passwords that are not easily cracked by hackers. They should contain 16-20 characters with a
mix of letters and numbers, upper and lowercase letters, and symbols. Brute force password crackers
will still dismantle many strong passwords, but making it easy for hackers by using your birthday, your
pet’s name, or the same password for everything is a truly terrible idea.
There are plenty of secure password generators online, so you don’t have to think them up for yourself.
Change your passwords every six months to a year, or as soon as you hear about a data breach of any
program you use. Oh, and a word about security questions: Lie. Do not answer security questions
honestly, and change your answers for different setups. This makes it harder for hackers to figure out
how to break into your phone based on public information about you online.
3. Update your OS and apps
Software companies are constantly updating software, and not only for cosmetic reasons. Many
software updates and bug fixes contain security improvements that help guard your smartphone against
data breaches and intrusions, and close off vulnerabilities, making it harder for hackers to break
through. When an update is announced for your smartphone’s operating system or for any of the apps
you use, install it without delay.
4. Avoid public Wi-Fi
By now, everyone should know about the dangers of using open Wi-Fi for anything, because free
public Wi-Fi in shopping centers, cafes, airports, or any other public venue, is open season for all kinds
of online mischief. Try to use only your private cell connection whenever possible and switch off Wi-Fi
on your mobile phone altogether whenever you are in a public place. If that is not possible, consider
using a VPN app, a utility that tunnels network communications through an encrypted connection. But
choose carefully — not all VPNs are equal in quality. Also consider disabling Bluetooth while you’re
out and about, unless you are wearing a smartwatch that requires it.

5. Use two-factor authentication


Here’s another obnoxious security measure that most people can’t stand. Two-factor authentication
(2FA) is hated because it requires an extra step, and it’s really a pain if you forget to have your phone
or watch nearby. But like passwords, it serves a purpose by providing an extra layer of protection in
case someone gets a hold of your password.

Two-factor authentication has become something of an online security buzzword over the last few
years. Most of us have logged into one service or another only to be presented with a message urging
us to implement this form of our protection on an account.
But two-factor authentication isn’t some silver bullet capable of stopping hackers in their tracks. It’s a
useful countermeasure to have among your defenses, but ultimately, it’s no substitute for a working
knowledge of the biggest threats we face online.
Activate two-factor authentication wherever the opportunity is offered up — but don’t make the
mistake of relying on its protection if you don’t understand what it can and cannot defend against. As
2016 proved, the keeping data secure is complex, and overconfidence can leave you open to attack.
Use built-in device protections

They’re not called “smartphones” for nothing. If your phone gets lost or stolen, you can contain the
damage using device tracking services, such as Find My iPhone and Android’s Find My Device, that
can locate your missing phone on a map and, in some cases, automatically erase it. These services can
also make your phone ring to help you locate a device you have temporarily misplaced. You can also
arrange for the phone to delete all information after a set number of false passcode tries.

Use an antivirus app


Hackers favor malware to steal passwords and account information. But you can combat that with a
smartphone antivirus app — some of which are offshoots of popular desktop apps like Avast, McAfee,
and Panda. The smartphone app variations provide enhanced security by ensuring apps, PDFs, images,
and other files you download aren’t infected with malware before you open them.
Manage app permissions

Check the apps on your phone to determine whether they have more privileges than they need. You can
grant or deny permissions like access to the camera, microphone, your contacts, or your location. Keep
track of which permissions you gave to your apps, and revoke permissions that are not needed. For
iPhones, go to Settings > Privacy, where you’ll see a list of all apps and the permissions you’ve
granted to them. The exact path to app permissions on an Android device depends on the device, but on
a Google Pixel you’ll find them in Settings > Apps & notifications > Advanced > Permission manager
or on a Samsung Galaxy look in Settings > Apps > App permissions (via the three vertical dots at the
top right).

Back up
One thing you need to be vigilant about is being prepared for the worst by making sure your phone is
backed up to protect critical documents and images in case your phone is lost or stolen. We have a
guide on how to back up your Android smartphone and also how to back up your iPhone. At least that
way, if your phone is lost or wiped, you can still access those precious photos or files.
Know where your apps come from
1. Password Protection
The lock screen is an important feature in Android, and keeping it secure is important for all Android
users. It’s actually gotten easier with Lollipop and above, as many of the customization features have
either been removed or placed elsewhere.
The first thing you’ll want to do is get into the Settings menu. You can do this by either pulling down
the notification shade and selecting the cog icon (stock Android devices require the shade to be pulled
twice before the settings icon will show up), or just tapping the Settings icon in the app drawer.

Once in the Settings menu, scroll down to the “Personal” section and tap the “Security” entry.

The first option in this menu should be “Screen lock,” which is the one we’re looking for here. Go
ahead and give that a tap.
his will present a handful of options:
 None: No lock screen security at all.
 Swipe: Not really secure at all, this option unlocks the device just by swiping on the lock
screen.
 Pattern: Unlocks the device by using a specific swipe pattern along a series of nine dots.
 PIN: Personal Identification Number. You know, like the one you have for your debit card. But
don’t use the same one, please.
 Password: Not your Google password, mind you, but one specific to the lock screen. This is the
most cumbersome way to unlock your device.

2. Mobile Device Locks. Smartphone enables automatics locking after a period of inactivity. The
same can be activated by users.

(a) How to enable Smart Lock

Google introduced Smart Lock alongside version 5.0 Lollipop of its Android smartphone operating
system, and it has evolved slightly since then. Smart Lock lets you specify conditions when it’s safe to
bypass the PIN, pattern, or any other hoops you’ve set up to unlock your phone.
The path to enable Smart Lock is slightly different depending on the phone you have and the version of
Android it’s running. If you have a stock Android phone or close to it, you’ll want to go to Settings >
Security > Smart Lock, or maybe Settings > Security & Location > Smart Lock. If you have a Samsung
Galaxy, then look in Settings > Lock screen and security > Smart Lock.
You’ll be required to enter your smartphone’s PIN, pattern, or password before continuing further.
With Smart Lock enabled, you’re ready to start configuring it to automatically unlock your phone.
There are five possible options: On-body detection, Trusted places, Trusted devices, Trusted face,
and Voice Match. Note that not all of these options are available on every device, so you will have to
check with your phone’s manufacturer to see which works and which doesn’t.

(I) How to use On-body detection


perhaps the easiest Smart Lock option to configure, uses the accelerometer and other sensors to keep
your phone unlocked when it detects that it’s being carried in your hand, pocket, or bag. The caveat? If
you give your device to someone else while it’s unlocked, it might stay unlocked. On some phones,
though, On-body detection goes so far as to learn the pattern of your walk and lock your phone if it
detects one that seems different.
Here’s how to enable On-body detection:
 In Android’s Smart Lock menu, tap On-body detection.
 Toggle on On-body detection.
On-body detection isn’t perfect. It can take up to one minute to lock after you’ve stopped moving, and
between 5 and 10 minutes after you get into a vehicle, like a car, bus, or train.

(ii) How to set up Trusted places

Trusted places is a good compromise. It uses geofencing — or geographic boundaries defined by your
phone’s mapping software — to detect when you’re at home, work, or another location where you feel
comfortable leaving your phone unlocked. As long as your phone has an internet connection and access
to your location, you never have to worry about unlocking it again.
You have to check a few things before you can enable Trusted places. First, enable location mode on
your phone. Here’s how:
1. Tap Settings
2. Find the Location section (may have a different name, depending on your device, for example,
on a Samsung Galaxy it’s Settings > Connections > Location).
3. Tap Mode or Locating method. Then choose between these three options:
1. High accuracy uses GPS, Wi-Fi, cellular networks, and other sensors to get the highest-
accuracy location.
2. Battery saving mode uses sources that use less battery, like Wi-Fi and mobile networks.
3. Device only uses GPS to determine location.
Once you have enabled and selected a location mode, you’re ready to enable Trusted Places.
 Add your home location by tapping Trusted Places from the Smart Lock menu. Tap Home, and
then tap Turn on this location.
 Add a custom location by tapping Trusted Places from the Smart Lock menu. Tap Add trusted
place, and a map will open to your current location. (Pick a different location by tapping
Search.) Name the trusted location, and tap OK.

(iii) How to configure Trusted face


is not the most secure way to unlock your smartphone, but it’s certainly one of the most convenient.
After you set a trusted face, your phone’s front-facing camera will search for your face and unlock it if
it recognizes you. This option is not present on some phones and you should be aware it’s not anywhere
near as secure as something like Apple’s Face ID which employs special hardware. Smart Lock’s
Trusted face can be fooled by a photo of you.
Here’s how to set up a Trusted face:
 In the Smart Lock menu, tap Trusted face.
 Tap Set up and follow the on-screen instructions.
 When your phone starts looking for your face, you will see the Trusted face icon. If your phone
doesn’t recognize your face, you can unlock it with the PIN, pattern, or password you’ve saved.
In some cases, your phone might have trouble distinguishing your face from someone else’s. Luckily,
improving facial recognition is a cinch.
 In the Smart Lock menu, tap Trusted Face.
 Tap Improve face matching.
 Tap Next and follow the on-screen
instructions

(iv) How to add Voice Match

From the Smart Lock settings menu, look for Voice Match.
 Alternatively, go to Settings > Google > Search > Voice > Voice Match.
 You can toggle on the “OK, Google” voice command in here and decide whether it should
unlock your phone.
 If you already set it up, but it’s not working well, you can also choose to Retrain voice model to
improve it.
3. Setting up remote wipe on your mobile device
emote wipe is a feature that allows you to remove all data from your mobile device should it ever get
lost or stolen. The documentation below outlines the process for Android, iOS devices, and Windows 8
phones. If you are Faculty, Staff, or Student and have NMU data (email, etc..) on your device you
should follow the steps below. Please note, if your device has been lost or stolen it is a good idea to let
your carrier know.

iOS
Before you can locate and wipe your devices, you need to set up iCloud and turn on Find My
iPhone (or Find My iPad or Find My iPod) on each of your iOS devices. Find My iPhone requires iOS
5 or later.
1. On your device’s Home screen, tap Settings, then tap iCloud.
If you’re asked to sign in, enter your Apple ID or, if you don’t have one, tap Get a Free Apple
ID, then follow the instructions.

2. If Find My iPhone (or Find My iPad or Find My iPod) is turned off, tap to turn it on.
Once Find My iPhone (or Find My iPad or Find My iPod) is turned on, you can access the lost or erase
functions through iCloud.com. You can select your device from the list in the center of the screen,
once the device is found (you will see a green dot) you can activate lost mode or, in the case of a stolen
device, you can issue an erase command. The erase command is permanent and will restore your
device back to factory settings with all data securely removed.

Android
Android devices make use of a Google service called Android Device Manager. Before you can use
Android Device Manager, you have to enable it on your device and associate your device with your
Google account. If more than one person uses the device, only the device owner can turn on Android
Device Manager. To turn on Android Device Manager on your device, follow the steps below.
1. Open Google Settings from your device’s apps menu.
2. Tap Android Device Manager.
3. You have the option of turning on the following Android Device Manager options:
 Remotely locate this device. You can use Android Device manager to show your
device’s location. Check the box next to “Remotely locate this device” to allow Android
Device Manager to show your device’s location on Android Device Manager.
 For devices running 4.1 and higher: Location access must also be turned on. To
turn it on, go to Google Settings > Location and turn the switch next to
“Location” to On. When the dialog box appears, read the text and touch Agree to
turn on location access.
 Allow remote lock and factory reset. You can use Android Device Manager to
remotely lock your device, erase everything on it, or change the lock screen passcode.
Touch the box next to “Allow remote lock and factory reset.” When the “Activate device
administrator” screen appears, read the text and touch Activate to turn on the device
administrator.
Once the Android Device Manager is active you can access the lost or erase functions through the
Android Device Manager website. You can select your device and issue a lock or erase command. The
erase command will restore your device back to factory settings with personal data removed.

Windows 8 Phone
Windows 8 phones make use of a Microsoft service called Find my Phone to locate and remotely wipe
the device. Before you can use the Find my Phone service you will need to make sure you can log into
the site windowsphone.com (you will need to sign in using your Microsoft account). Once you have
verified that you can log into the site you will need to enable to service on your phone.
1. In the App list, tap Settings, and then tap Find my phone.
2. Select either or both of the following check boxes:
 Always use push notifications (not SMS) to send commands and apps to my phone.
The Find My Phone service and the Windows Phone Store on the web use text
messaging to send commands and apps to your phone. Check this option to use push
notifications instead. Why? Push notifications can be faster than text messages, and if
your mobile operator charges you for each incoming text message, push notifications
might also be cheaper. Also, Find My Phone can only send 15 text messages to your
phone in a three-day period. With push notifications, there's no limit.
 Save my phone's location periodically and before the battery runs out to make it
easier to find. Microsoft can save your phone's location details every few hours so that
if your phone is out of range or the battery dies, we can still show your phone's last
known location on a map.
Once you have enabled these settings you can access the lost or erase functions through the
windowsphone.com website. You can select your device and use the tools on the site to locate, lock, or
erase the device if it has been lost or stolen.

5 . Use of PIN to Lock SIM Card

Setting up the SIM lock


Now, we get to the fun part. Here are the steps for setting up a SIM PIN lock. I'll demonstrate on a
Verizon-branded Samsung Galaxy S4. Follow these steps:
1. Go to Settings
2. Tap on the More tab
3. Tap Security
4. Tap Set up SIM card lock
5. Tap Lock SIM card (Figure A)
6. Enter the default SIM PIN
7. Tap OK

Access the SIM card lock settings in Android


First, open the Settings for your Android smartphone or tablet. Then, scroll down the list of settings. In
Android 8, tap Security & location, while in Android 9, tap Security & privacy.
You see a long list of security settings. In Android 8, scroll down until you find an entry named "SIM
card lock" and tap on it. In Android 9 , scroll until you find "More settings" and tap on it.
In Android 8, you have opened your SIM card lock settings. In Android 9 there are two more steps to
be performed. First, tap "Encryption and credentials."
Next, tap on "Set SIM lock". If you have a Dual-SIM smartphone, tap on "Set SIM 1 Lock" or "Set SIM
2 lock" depending on the SIM for which you want to change or disable the PIN.
In both Android versions, you should now see a switch for locking the SIM card and a setting for
changing the PIN. Read on to see how to use each of these options.
How to disable the SIM PIN when starting your Android
smartphone or tablet
If you do not want to enter the SIM PIN code each time you start your Android smartphone or tablet,
set the "Lock SIM card" switch to Off, by tapping on it.

You are now asked to enter your existing PIN, for the SIM card. Enter the PIN code, and tap OK.
From now on, the requirement to enter the SIM lock code, each time your smartphone or tablet starts, is
removed. You only have to enter your device PIN code, pattern, password, place your finger on the
fingerprint scanner, or use the face unlock features on your smartphone.

How to change the SIM PIN on your Android smartphone or tablet


If you want to use another PIN code and change the existing one, in the SIM card lock settings, tap
"Change SIM PIN."
You are asked to introduce your old PIN, the one that you currently have. Enter it and tap OK.
You are now asked to enter the new PIN code that you want to use. You can enter a code that is
between four and eight digits long. Enter it and tap OK. Then, you need to confirm your newly entered
PIN. Type it one more time and press OK.
Now your SIM card PIN is changed. Please remember that this PIN is different than the one for your
Android device. This PIN is required each time you start or restart your Android smartphone or tablet,
or when you introduce the SIM card into the device. It is not needed when you unlock the device after
Android has loaded, and the SIM card is already unlocked.

6. Use mobile Tracking features


How to disable background mobile data usage on Android

For a smartphone data is a bare essential and the device will continue consuming it unless you strictly
guide it not to do so. With 3G data being limited and expensive users are forced to turn off the data
manually every time they put down the device or if they feel that the device will not be used for a long
time. But there is a way you can tell your android not to unnecessarily consume data. This way the
application or function you are currently accessing will be the one allowed to utilize data and the rest of
the applications will be put on hold.
Steps 1

Steps 2
Once the settings menu opens locate and enter the data usage tab. Now this is the part of the setti

Step 3 Be wary of the fact that the device will automatically stop fetching tweets or updates for
applications and will resort to manual mode
wherein all applications will access the
internet if they are told to do so. This can be
useful if you have very limited data left to
be consumed, and is not advised for those
who constantly follow applications and
updates on apps like Facebook, Twitter,
Google+ and so on.
Step 4

You might also like