contador web Skip to content

Ignoring updates for Android and Apps can lead to security holes: worst case scenario

Security also involves virtual protection. And with increasingly versatile devices in the palm of our hands, I need to be careful. For example, avoid installing Apps from outside Google Play, rooting only if necessary, using a VPN, etc.

Since most devices use Android operating systems today, with a market share that exceeds 75% of the mobile device market, some important tips to keep in mind. Android operating systems have a number of important features and mechanisms that help improve user security, however, the consumer himself needs to be vigilant to keep some of these features in order.

Some of the top threats for Android devices

Today a smartphone is good for many things besides making calls and communicating with acquaintances, by the way, probably the thing you do with your smartphone is the traditional calls. You can solve bank issues, send important job files, attend video conferences, read your emails and resolve various issues through your mobile device, which is undoubtedly a hallmark of our current society.

Having so much information on one device can be much more problematic than you might think if that data is compromised in any way.

There are several types of malware designed especially to target Android systems. Malware is a program, code, or file whose purpose is to infiltrate a system unlawfully to allow data theft, changes to the machine, etc.

They are the most common threat, not only to Android, but to all types of devices, especially those that are constantly connected to the Internet, although because of the various security levels, proportionally speaking, Android suffers from "few" attacks.

Among the top malware used to attack devices running Android systems, we can name a few that are more frequent and have caught the eye in recent years, forcing developers to spend a long time closing certain security holes.

There is "Android.Geinimi" which enables the hacker to send specific commands to the infected device and thereby control the device; We can also list AndroidOS_Droisnake.A ", which sends information about the location of the device to third parties. We must not forget about" AndroidOS_BGSERV.A ", which opens a backdoor on the device, ie allows an output channel for the extraction of data, which is stolen from the user and sent to the attacker or other recipient.There are several threats besides these and we really need to alert you to what could happen if you do not take certain precautions.

What could happen worse?

If you have healthy behavior with your device and avoid exposing it to risk, most of these threats seem more fictional than anything else, but let's do that beautiful exercises of pessimism. What if everything went wrong?

You always hear about hackers, viruses and dangers on the Internet, but when you think about these things, you soon imagine that the main targets are just banking institutions, as if the hacker only cared about industrial, corporate and government espionage, and didn't have time to attack ordinary people like you, a small user. What do you have to lose? There's nothing to hide, really?

This is a fatal mistake. Most of the attacks are directed against ordinary users, small and medium businesses, and not exclusively against large corporations, precisely because of this "innocence" attached to the unprofessional user. My data!

Banks and large corporations have data that is often worth billions of Reais, but they are also generally protected by professionals, which makes life very difficult for those who are trying to break in, which definitely does not happen when a more "common" target, So, no matter what your bank balance, your social position or who you are: if you are connected to the internet, you are a potential target, because often the attacks are not directly applied, they work on the basis of phishing. , "fishing", like emails that are fired at countless people with fake pages requesting data. Many of the people who receive these messages fakes It's probably not the bait, but if you're not smart, you can be the fish of the round.

Having understood the most common risks, we will need to make it very clear which scenario may be the worst (or one of the worst) possible:

Your personal data, your bank account information, files and work information and virtually everything you have in your personal and confidential manner will be in the hands of a complete stranger (or even someone you agree with), who will use that information and this access any way you want.

Have you ever wondered how much information about you is inside your Smartphone?

You can lose money, information, important memories and of course have a lot of headache. In addition, your social networks can be hacked and, believe me, the discomfort will be very great. Even if you can recover your passwords, social networks, and other information, the damage can often be irreversible.

You definitely don't want that. So let's give some simple, efficient and very practical tips to improve your safety.

6 tips that can help you (and a lot!)

1 – Be careful with your personal passwords by creating strong passwords (with special characters like #, $,%, &, *, alternating upper and lower case letters and using numbers, for example) without sharing them the first step and the first step to stay safer. If I've been kind of unrealistic, go to this site and generate some random password.

* Often using a trusted app to manage passwords can be a good one too, worth researching on the topic.

2 – There are also several applications that help lock the device and require passwords. They can help prevent intrusions on your device, but of course, if you don't want to go that far, your Android has several options by default for device locking, make sure you have at least one of them set up.

3 – Keep all your apps, especially security ones, up to date. Turn on automatic updates for your Android if you're the kind of person who always forgets to do upgrades of Apps. Also, before you download anything from your computer, phone, smartphone, tablet, or any device with an Internet connection, make sure the program is secure. The Linux world this security usually has a very high level, when you download apps from your system store, with Android would be no different.

* On specific Android, check the permissions that the application you are installing is requesting.

Look for testimonials from other users. This will help you learn more about potential issues, vulnerabilities, and the reliability of these features. There are applications designed especially to make hacking easier for your device, so beware.

4 – ROOT if necessary:

5 – Another important tip is to use an Android VPN provider to better protect your connection, prevent data theft and intrusion.

It's worth keeping these and other ways to improve your security, and especially looking for a secure Android VPN app that doesn't misuse your data. When you use a VPN you force your traffic to go through a specific server, so it is important to research first and get a real sense of how reliable, after all, you will be passing absolutely all your network information through the machines of some company.

6 – Avoid downloading apps from outside the Play Store, this greatly reduces the possibility of you installing any ad that has been tampered with. Although we have seen rogue applications within the Google Play Store throughout history, surely there is still the safest place to find apps, much more than downloading any APK from a downloads site you don't know where to come from, especially pirated apps that would be paid in their traditional versions and games with some kind of cheat.

The most curious thing if we were to draw a line of "convenience vs. security" would surely each be at one end. Taking precautions and being careful is something that requires reasoning and reflection often, and not always simple or practical, but you will be willing to protect yourself in the name of practicality all that an attacker seeks.

Do you have more safety tips? Share your ideas in the comments!

See you next time!

_____________________________________________________________________________ See any errors or would you like to add any suggestions to this article? Collaborate, click here.