Skip to main content

Tips to secure mobile phones from threats.


Mobile phones are widely using a telecommunication device for information transitory. Even though if you are using mobile phones for personal usage, it can be attacked by most security violations too. Moreover, some threats can be happened with or without our knowledge. Hence our mobile phones similarly should be protected as our computers. So here some tips to block mobile attacks that would be useful to you.

Wi-Fi
  • Do not allow your phones to auto connect with unknown Wi-Fi networks connections.
  • Turn off your Wi-Fi connection when are not using it.
  • Do not send sensitive information via Wi-fi, until you know it is secure.
Bluetooth
  • Turn off Bluetooth auto pairing
  • Turn off the connection when you do not need. 
Apps
  • Never download an app from browser except from your mobile official store (play store/ app store).
  • Do not allow access permission unless you trust it.
  •  Keep them updated to ensure the security of the application.
  •  Take a moment for app review. Do not download when it has many bad reviews.


Browser
  • Never save your login credential in a web browser.
  • Always pay attention to URLs.
  • Do not click links, unless it seems secure.


System
  • Never use a weak password.
  • Avoid using Device without passwords.

Smishing (phishing via SMS)
  • Do not use the links which asks your information that seems not needed.
  • Never click on an unknown link which you receive from email and SMS. Eg: the message which says that you got a gift.
  • Delete email and SMS from unknown senders.
Vishing (phishing via voice)
  • Do not response the telephone calls, which asks your financial detail, unless confirming it from an associated organization.
  • Install software that confirms whether it is fake websites or not.

"Treatment without prevention is simply unsustainable" - Bill Gates



-     

Comments

Popular posts from this blog

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine.

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine. When the windows 2000 the machine came for public use, many vulnerabilities were identified. This was caused by the number of vulnerabilities in IIS services. Many attacks came from remote sources through the internet and there were critical flaws due to the vulnerable encryption methods. From this article how the vulnerabilities of windows would be identified using Nessus, and exploit it using Metasploit in kali machine will be described. To do it I am using my main operating system (OS) kali and virtual machine windows 2000. For that IP range of both machines should be in the same range to ensure those are in the same network. Therefore network setting was fix as bridge adaptor in windows virtual machine. Check IP of kali using ifconfig Check IP of windows using ipconfig Then Nessus vulnerability s...

Double Submit Cookie

Double submit cookie is one of the prevention method for Cross-Site Request Forgery ( CSRF ) . Same as the synchronizer token pattern, it is using a cryptographic random value to validate a request agent. However, the implementation is different since the way it is saved is dissimilar. Here, the generated token value is saved in the browser, not on the server. Therefore servers no need to save huge amounts of data. When a user makes a request, the server compared the token value in the form DOM element (in the body) and token in the cookie header of the request.  (Click on the images to view clearly) Source code of the implemented program can be downloaded from here . A login page, index.html has been implemented to enroll users. Once the user entered the credentials, the form data will be submitted to login_handler.php using POST method. If the username and password are correct, the user session is started and the username will be assigned to ...

Plain Blue screen - Kali Linux

When user login to the kali machine, the screen may look plain blue color without any application icon due to the Gnome corruption. To recover gnome with all previously installed packages restart the machine. Select advanced options for kali GNU /Linux Then select *Kali GNU/Linux, with Linux 4.15.0-Kali2-amd64 (recovery mode) When the terminal finish, loading the contents, type root password to log in. To recover the Gnome, Type below command in the root user terminal,       sudo dpkg --configure -a Finally, you can get your previous Kali Linux as it was.