That our smart phones are often exposed to spyware and theft and loss and cause a big problem must be addressed

and the work of many ways to meet them and here we offer some of them

Today, we’ll provide a quick guide to help you get to know how to best protect your smartphone or tablet.

This will be a guide that explains the basic steps, with some applications as examples only.

What is important to us is that the novice user understands the basic rules of protection, but he is not bound by the applications we propose, but can start from the idea and look for applications that may be better suited to him.



five steps to protect your data from spyware

1. Lock the phone

It’s hard to enter a password each time you open the phone, but this is your primary line of defense, which is often a very strong defense line to protect your information and phone.

Fortunately, Android makes this process much easier.

Although there is a traditional password-writing option, but Android allows you to specify a style graphic to open the device,

a faster way to open the device compared to a password and not less secure. In fact, the FBI itself has never been able to break into the protection of an Android phone locked in this way.

The fastest and least effort to open the phone lock is by recognizing the face of the user,

and has been launched by Google starting with Android version 4.0 and above.

Just take a quick look at the front camera of your phone to unlock the doors. In fact this method is the least burdensome, but it may not be safer than the drawing style.

Although Google had previously said that the existing facial recognition algorithm can not be fooled by showing the person’s image in front of the camera instead of the person himself,

it turned out that it is sometimes tricked through the image. This means that the person who can steal your device, may be able to access it by showing your face picture of the phone camera.

So Google added in the Android version 4.1 option allows you to blink your eyes while checking your face when you open the device, so be sure that you actually exist and not your image

2. Protection from loss or theft

There are cases where you may lose your phone or forget where you left it, and there are worse cases where the phone may be stolen.

The good thing is that you – if you apply the first step – do not panic, your information, files and numbers are protected because you basically locked the phone.

That is, the thief can not tamper with them. But it would be better if you could destroy this information completely,

that is to delete it remotely, but it is even better to know the approximate location of your phone may be able to retrieve it with the help of the police.

Wheres My Droid

There are dozens of apps to help you find your lost phone. We will choose from but not limited to two applications:

It may be simpler and easier to use. If you lose your phone, you can send a predefined message from any phone to your number,

and the app will behave according to the message. This message can be a high-volume app to help you find your device if it’s lost at home, for example,

or you can send GPS coordinates and a Google Maps link to a message from the command.

The application also offers a web interface that also allows you to track your phone over the Internet. If the thief changes the chip (SIM card), the app sends the new slide number to another phone number that you previously specified.

The paid version of the application offers more options such as deleting all the information and files on the phone remotely through a special command,

using the phone camera to capture a picture of the thief, and if the Internet is effective on the device the image is uploaded to the web interface of the application where you can See it.

avast! Mobile Security

Avast This application is completely free and offers many options but it is more complex in terms of usage compared to the first application.

It provides functions other than anti-theft such as virus protection

and some other features that you do not need and does not support working with some famous messaging applications such as Go SMS Pro, But it is also a strong choice and worth a look.

3. Protect your private photos and videos

We are all passing through this experience, meeting your friend and seeing your new and beautiful phone asking you to watch it, and as usual you do not have to be embarrassed to ask you to unlock your screen so that it can preview the interfaces.

Your device may contain some family photos and special photos that you do not want to see.

Fortunately there are some applications that prevent this. These allow you to place a password on specific applications (eg, a photo gallery), which keeps the gallery open but hides the images you already specify. In this we choose:

App Lock

The idea of the application is very simple. Select any application you want to block access to, and App Lock will lock this application with a pattern or password,

and if anyone bypasses the main lock screen of your phone and try to access the locked application (eg photo gallery),

they will be prompted to enter the password or appropriate style graphic . Which means you have another lock above the main lock. that simple!

Vault-Hide

This app allows you to hide photos, videos, private messages, and even specific people from the call history.

With the application, you can easily select the things you want to hide from the photo gallery.

If anyone opens the photo gallery, they can access it normally but the hidden images will not appear. To show photos, they must open the Vault-Hide application and enter their password.

The paid version of the application ($ 2.99 per month) allows more, hiding the Vault-Hide application completely from the list of applications as if it did not exist in your phone,

and if someone searches your phone you will not know that you are using a special application to hide pictures, . To access the application you need to open the regular phone application in your phone,

but instead of making a phone call you must enter a specific secret code to access the application. So application is very safe and effective.

Vaulty

The application is very similar in concept to the Vault-Hide application, although it has fewer features (it can not hide SMS messages for example).

It does not offer the feature of hiding the application icon from the list of applications,

but it offers another advantage that it can disguise as an application to show stock prices (Paid feature).

Anyone who tampering with your device can open the app but find it a normal application to search for stock and stock quotes.

You can only enter a secret code to access your photos and videos.

The Vault-Hide app at the top is more distinctive but more expensive.

It requires a $ 2.99 subscription per month against the icon hides feature, but with Vaulty, if you want to apply fake stock quotes, you’ll only need to pay $ 4.99 for one time. The choice is yours in the end.

4. Protection from hackers and government espionage

Using your phone or tablet to connect to the Internet in public places (coffee shops, airports, …) is not safe. Anyone with the ability and knowledge to spy on your contacts.

Although Google’s basic applications are secure in this respect and only pass encrypted connections in Gmail, GTalk

and other Google services, but you can not guarantee the security of other applications, what’s the solution here?

The solution is to add an additional encryption layer that protects your phone from any hacking through the Internet. Whether a hacker is a person sitting at a table next to you in the coffee shop, or was your government.

In this direction, there are dozens and perhaps hundreds of applications and methods. Including free and paid, including what works on certain versions of Android

and does not work on others, including what needs to provide the powers of the router in the device, including what does not need,

including what is blocked in some countries

and available in other countries. So you can understand that it is difficult to provide a complete list, we may do this on a separate topic, but we will explain here the most famous applications and methods, and may require a little experience and exploration by you.

5. Access to your information and files after loss or damage to the phone

Now we get to the last point. What do you do if your phone is stolen and no longer is, or is it on the ground, and it is overtaken by a speeding car and turned into small pieces?

Fortunately there are many, many applications and methods for cloud backup.

With multiple cloud storage services, including free and paid, your information will always be available online even if your phone is completely damaged. Here are some tips:

– For contacts do not worry, you do not need any special applications in Android,

as the nature of the Android synchronizes the contacts in your phone with the contacts stored in your Gmail account.

Once you buy a new phone and sign in to your Google Account, all the names and numbers will come back to your phone easily and quickly.

– For messages, there are many, many applications that back up your messages and save the copy on your phone’s memory

and on the cloud too for later retrieval. One of the leading applications with this capability is the famous Go SMS Pro application.

– For the pictures there are a lot of means as well. Including the Google Social Network Google+ application with an option called Instant Upload,

which automatically and without any interference will upload any new image you take with your phone’s camera to your account.

the other steps

The image saved so that no one can see it except you. You can share it with people you want to like, or you can keep it private and keep it as a backup.

Also the application of the famous cloud storage service Dropbox offers similar service, and recently began Facebook to provide this service also.

– For files and documents, you can also rely on your favorite cloud storage service like Google Drive, Dropbox, Box, or dozens of other services available.

Store all your important files on this service and these files will remain available for access by all your devices,

including your phone and tablet. If you lose your phone, you will not be afraid to lose these files because they are always waiting for you on the cloud.

– For applications, there are also many backup applications that can periodically backup your applications

and upload them to the cloud for easy retrieval on the new phone. But applications that store application data, not just the app itself, need to have the power on the phone, most notably the Titanium Backup.

– Finally, if you want to manage backups of almost everything (images / videos / messages / files / music etc) from one place and from one application that handles all of this easily,

there are also applications such as G Cloud Backup application that can specify It has a specific daily timer in which it extracts a full backup of everything in your phone (except applications)

and upload it to the cloud of the service. This service offers 1 GB free or 10 GB for $ 0.99 per month or unlimited space for $ 4 per month. There are many similar services but are not usually free.

Conclusion

five steps to protect your data from spyware

1. Lock the phone

2. Protection from loss or theft

3. Protect your private photos and videos

4. Protection from hackers and government espionage

5. Access to your information and files after loss or damage to the phone

REFERENCE :

WIKIPEDIA