قالب وردپرس درنا توس
Home / Tips and Tricks / The biggest security issue with your phone is the data connection – How it gets blocked «Android :: Gadget hacks

The biggest security issue with your phone is the data connection – How it gets blocked «Android :: Gadget hacks

After scandals like Equifax's data breach and the 2016 US election, cybersecurity has become an issue for Americans. Unfortunately, every time we use our devices, we are open to cyber attacks ̵

1; especially when surfing the Internet. But there are ways we can make it harder for hackers and data miners.

The biggest security hole in your smartphone is the data connection – unfortunately any device with permanent internet access is inherently at risk. Although there are no foolproof methods, you can better protect yourself from Russian hackers, Big Data or even a curious spouse with the following suggestions.

Step 1: Get a VPN

Perhaps the best way to improve your internet security while surfing the internet is to use a VPN. A VPN (or Virtual Private Network ) provides two important security features: encryption and privacy.

With the right VPN, all your data is encrypted during transmission. Imagine this: Instead of driving your data in a normal car, you're now driving in an armored truck. It may be slower, but it will be much harder for someone to access it while traveling from your phone to the website you are visiting.

The second feature that a VPN provides is privacy. Your IP address matches your mailing address at home. Much like the post office uses your mailing address to send letters, your IP address is used by your network to move data between your device and the Internet. Without a VPN, it is easy for someone to get the IP address of their device for a direct attack on their smartphone.

How a VPN works. Image of CyberGhost VPN / YouTube

VPNs create a secure tunnel between your Android device and the server (or router) that provides the VPN service. This server acts as a buffer between you and the Internet. Imagine, every time you send a letter, give it to the postman who puts the letter in another envelope that identifies the sender as himself. Now, when someone comes across the letter, he thinks he's from Mailman, not you.

VPNs work in the same way. Whenever you send data to the Internet, they are first routed through a secure server before goes online. The traffic is marked as if it came from the VPN server. Now if a packet is intercepted by a malicious entity, it does not have your IP address, but the VPN address.

With FCC's 2017 decision to effectively end net neutrality, data protection is more important than ever. Internet service providers (ISPs) have regained control over all the data that passes through their networks and can do what they think fit.

As history has shown, ISPs will use traffic based on the type of websites you visit or the services you visit. With a VPN, your ISP can not see which sites you visit. Only an encrypted connection between you and your VPN is displayed. Therefore, your ISP can not demote your Netflix movie quality or block your device from a specific service. It also can not effectively record your browsing history for sale to businesses. If your ISP does not block VPN traffic (which is possible), using a VPN is one of the few ways to surf the Internet privately and freely.

There are many excellent VPN services in the Play Store, but my personal favorite is NordVPN. because it offers an excellent balance between safety and speed. NordVPN uses the highest encryption method to protect your data, and has over 2,400 servers in 56 countries, allowing it to maintain high speed.

Step 2: Use a Password Manager

Difficult with so many different accounts Enter a unique and creative password for each one. Unfortunately, weak passwords are one of the leading ways hackers access personal information. Regardless of whether your password was found through a brute force attack or Yahoo's […] […] violation if you used the password on other sites, these accounts are now vulnerable as well.

So, the best course of action is to use a different password for each account, and to make sure that these passwords are random alphanumeric combinations that use special characters. Obscure passwords like these, however, are hard to remember, let alone any internet account you have. Password managers solve this problem.

A good password should look something like this.

With a password manager you just have to remember a password for accessing a database of all other passwords. When you create a new account, use Password Manager to generate a password. Choose from a variety of criteria to meet both the website's requirements and the strongest password. Now, when you visit this website or app, you can enter your password by copying it from the database.

LastPass is one of the best password managers in the Play Store. This is one of the few password managers that allows you to automatically fill in your information. The automatic filling is not only convenient, but also provides security against hackers. If a hacker gains access to your device, it may use keylogging that records every key you press on your screen. However, auto-fill does not require keys to be logged.

LastPass also stores the password database on your device. This will prevent anyone from intercepting it if it has been stored remotely. It also uses the highest encryption protocols to protect your database, and allows you to use two-factor authentication (using a password and temporary PIN code via text or e-mail) and fingerprint authentication to better understand your database protect.

Step 3: Install a secure browser

Chrome is an excellent browser for easy operation and fast performance. However, if you want to protect yourself from external threats, we recommend that you change your default browser. Using a secure browser is important because most browsers by default try to combine security and speed with a focus on speed. Browsers are also suitable for businesses that want to sell ads. However, you can also do damage to these accommodations.

Cookies are small text files sent by web servers to identify you and to personalize your experience on a web page. For example, the way Amazon and eBay can recommend products is the use of cookies. However, these cookies can be changed to allow unauthorized access to your smartphone.

Web sites use trackers to track websites each time they view a page. These trackers report information to a server so that companies understand their customers better. They are used to enhance the experience and personalize your view (sometimes cookies are used as trackers). However, they can also be used for harmful purposes.

Although you can manually disable cookies and trackers in Chrome, there is a browser that does this by default. For this reason, we recommend Firefox Focus.

With Firefox Focus, Mozilla has created a browser dedicated to security and speed. but emphasizes safety. Almost all trackers are locked by default. Only those who can prevent the display of the website are allowed. It also prevents websites from opening a malicious website in another tab without you knowing it.

With all of this blocking, it's one of the fastest browsers in the Play Store because it does not have to load ads when loading pages (which usually takes some time). If you close Firefox Focus, all cookies and your browsing history will be deleted. So, if you're looking for more Christmas gifts, you do not have to worry about anyone seeing your activities.

If you use Firefox Focus, we also recommend changing the default search engine. With Firefox Focus open, tap the three vertical dots in the top right corner and choose Settings. Scroll from there to section Search and select the first option. Then switch to DuckDuckGo. DuckDuckGo is the only search engine in the list that does not track your search results.

Step 4: Take care of that little things

In addition to the apps just discussed, we have a few more recommendations for improving cybersecurity. The first is to use HTTPS as often as possible. Most popular websites will redirect you to the HTTPS version of their website. However, if you visit a website without a website, do not enter Personally Identifiable Information


HTTPS enables encrypted communication between your smartphone and the site's server. Although encryption is not the highest level to ensure that speed is not significantly reduced, it provides some protection when HTTP does not provide it. A VPN fixes this by providing encryption that uses the best currently available standards. However, the use of HTTPS is still a proven method.

Note the "https" at the beginning of the URL.

Our second recommendation is to avoid the use of public WLAN, it is unsecured networks vulnerable to cyber attacks. It can easily be used by a malicious agent to learn your IP address and attack your device.

Public, unsecured networks can also be forged. This is the case when a hacker creates a fake Wi-Fi hotspot that uses the same SSID public Wi-Fi. So, when you connect to the network, you're assuming that you're using public WLAN but are actually connected to a hacker computer that sends all your data to them. As with the first recommendation, VPN provides protection, but it's a best practice to follow.

Unsecured Wi-Fi networks do not have the lock icon next to them.

Finally, look for the sites you visit. Try to stay on popular websites instead of on dark websites. Avoid links to the websites of people you do not know and make sure you enter the website name correctly. One known tactic of hackers (called "phishing") is registering a website name for common spelling mistakes associated with a popular website (eg, "goggle.com").

If You Stumble upon a Phishing Attempt Instead of Going On the desired website, you are directed to the hacker's website, which can look just like the popular page. You believe you are on the popular website, and when you log in, send your username and password to the hacker.

While these recommendations will not completely deter you from cyberattacks, they definitely go a long way. In the end, the goal is to surf the Internet safely, keeping information and history secret. So, if you're worried about hackers or do not want your partner's browsing history displayed, these recommendations should be a good start.

This article was created during the special coverage of gadget hacks on the privacy policy of smartphones security. Take a look at the entire Privacy and Security series.

Do not miss: 13 Ways To Keep Your Android Device Safe

Cover Picture About Manuel / Pexels, Screenshots Of Jon Knight / Gadget Hacks

Source link