Tips To Reduce Risk of Hacking On Phone

Friday, August 12, 2011

Today the smart phone has become a lifestyle for modern people. Even if one day without a cell phone, life may feel differently, there is a prop. Therefore it is not rare that most people store their personal data on mobile phones. Of account numbers, passwords, and other personal information.

On the other hand, the phenomenon of smart phones growing plague other effects, namely the emergence of hackers who make the phone as a target.

Generally there are two main reasons when a hacker to hack the phone. The first is financial reasons. With the facility of money transfer through mobile phones, robbed in this way becomes very easy. Moreover, there are personal data that can be used to make transactions over the phone.

The second reason is spying. A concrete example of this case is a case of phone tapping carried out a journalist in England. This can be done easily if the hackers have managed to master your mobile phone.

Then how to fortify your mobile phone from hacker attacks? Especially for mobile users who on average are ordinary people who do not know much about what it is hacking.

Eliminate the risk of hacking can be said is impossible. Can do is reduce the risk of been hacked. The following are steps that you can do:

1. Use password protection to your voice mail service. So remember, do not use easily guessed passwords, like your birthday or the same password for accounts miraculous.
2. Turn off your cell phone.
3. Use the latest tools or updated.
4. Use the Phone Security. Anti-theft software may be used. Such software is useful to remotely lock the phone by sms. In addition softwaren can also format the phone from a distance, also with sms.
5. Use bluetooth as necessary. Most hackers use bluetooth. So try to use this service to a minimum.
6. Delete history from a browser on the phone regularly. Many phones that provide autocomplete feature. And of course if this feature is turned on, it will allow a hacker to spy on you, especially if you are someone who frequently access sites that require login.


Post a Comment

© Copyright 2010-2011 computer science & technology All Rights Reserved.
Template Design by zizif | Published by Borneo Templates | Powered by