banner



How To Change Your Facebook Picture Without Anyone Knowing

A s nosotros've recently seen from leaked CIA documents, no one is allowed to hacking attacks. Here'due south how to protect yourself against them, whether they come from opportunist thieves or land-sponsored spies.

1. Keep upwardly to date – and don't open up holes yourself

When it comes to protecting yourself against hackers, step one is always to install software updates every bit soon as they go available: that's equally truthful on smartphones as it is on computers. Aye, updating can be a dull and intrusive procedure, and information technology sometimes brings annoying changes to the interface that yous're used to. However, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is only daft.

I'd besides strongly advise confronting using unofficial tools to "root" your phone (known every bit "jailbreaking" on iOS), unless you know exactly what yous're doing. On a rooted phone, technical safeguards tin can be defeated, allowing apps to perform all sorts of deportment that are normally prohibited – and that tin include snooping on your personal data.

2. Be careful of what you install

When yous install a smartphone app, you lot may be asked to grant information technology various permissions, including the ability to read your files, access your photographic camera or listen in to your microphone. There are legitimate uses for these capabilities, but they're potentially open to abuse: retrieve before yous approve the asking. That applies especially to Android users, every bit Google's app-vetting process isn't as strict as Apple's, and in that location have been reports of malicious apps spending months on the Play Store before being spotted and taken down.

Android also lets yous install apps from third-political party sources: this allows services such as Amazon'southward competing Appstore to operate, just it also provides an easy fashion for rogue apps to get onto your phone. I'd strongly advise against installing anything from an unfamiliar website.

iii. Review what'south already on your phone

Even if the apps on your telephone seemed simple and rubber when you installed them, subsequent updates could have turned them into something more sinister. Have two minutes to review all the apps on your smartphone, and see which permissions they're using: on iOS, you'll detect lots of relevant information nether Settings > Privacy.

On Android, it's harder to get an overview of which apps take which permissions, merely there are plenty of security apps that assistance here, including free packages from Avast and McAfee. These tools can also jump in and alert you if you're trying to install an app that'south known to be malicious, and warn you lot if a "phishing" attack is trying to play a joke on you into entering a password into an untrusted app or webpage.

4. Make it hard for intruders to go far

If a thief gets concrete access to your phone, they can crusade all sorts of trouble. For a start, your email app probably contains a trove of personal data. Make sure your phone is locked when non in use: both Android and iOS can be set to require a half dozen-digit passcode. Your device may offer other options likewise, similar fingerprints or facial recognition. Such methods aren't perfect – a really adamant hacker could copy your fingerprints from a drinking glass, or trick a camera with a photo of y'all – but they're a lot amend than zero.

And exist wary of "smart unlock" features, which automatically unlock your phone when yous're at abode, or when your smartwatch is near; these could let a thief bypass your unlock lawmaking altogether.

5. Exist prepared to rails and lock your phone

Plan ahead, so even if your telephone is stolen, yous know your information is safety. One pick is to gear up your phone to automatically erase itself subsequently a certain number of incorrect attempts to enter the passcode.

If that seems a bit drastic, don't forget that both Apple and Google operate "detect my device" services that tin can locate your phone on a map, and remotely lock or erase it. For Apple users, this is accessed through the iCloud website – you can bank check it's enabled on the telephone in Settings > iCloud > Find My iPhone. Android users can access Google's service at google.co.uk/android/devicemanager. You tin can also brand a missing phone ring – helpful for drawing attention to the thief, or tracking down a handset that'due south been merely mislaid.

6. Don't leave online services unlocked

Automobile-login is a very convenient feature, especially since a virtual keyboard can make typing passwords a chore. Information technology's also a huge liability: an intruder only needs to open your browser to gain access to all your online accounts.

Ideally, therefore, yous shouldn't use auto-login features at all. If you must, use a password manager app that requires you to regularly re-enter a main password. And don't utilise the same password for more than than 1 app or service: if that 1 password gets establish out, it tin can be used to access a whole range of private data. This applies even if you're perfectly scrupulous about keeping your smartphone secure: hackers regularly intermission into online services to steal user credentials, which they then try out on other sites.

7. Adopt an change ego

If you've followed this advice and so far, it should be very difficult for anyone to get into your phone. Even so, some major hacks accept been pulled off without any access to the victim at all. If someone can find out (for case) your date of birth, home boondocks and mother'due south maiden proper name – all stuff that can be easily picked up from a site like Facebook – that's frequently all they need to reset a password and first breaking into your accounts. Yous can come across off such attacks past fictionalising your past with details that are unlikely to be guessed; maybe, for the purposes of security, yous were born in 1999 to Mrs Victoria Beckham, née Adams. Just remember what you claimed, or you could end upward locking yourself out.

Personal information can easily be gleaned from sites such as Facebook
Personal information can easily be gleaned from sites such equally Facebook.

8. Beware open wifi

Nosotros all know there's a chance involved in using an open wireless network. But y'all may not realise how astringent it is: anyone in the vicinity can snoop on what you're doing online. This sort of attack demands specialist software and skills, so it's unlikely to be a adventure in your local buffet, but it'southward not a danger that can be ignored.

If you lot're at all doubtful about a wireless network, don't connect – stick with your phone's mobile cyberspace connection. Or apply a VPN tool such as CyberGhost or TunnelBear (both available gratuitous for Android and iOS). These tools road your traffic through a private encrypted channel, and then even if someone is monitoring your traffic they won't be able to see what you're up to.

9. Don't let lockscreen notifications give the game away

Lots of apps pop upwardly messages and notifications on your telephone'southward lockscreen. It's worth thinking near what these notifications may reveal. If you lot piece of work for a big depository financial institution, for example, a visible email from a piece of work colleague or a meeting reminder tells a thief that this might be a particularly interesting phone to steal.

On iOS, as well consider disabling access to Siri from the lockscreen. Siri isn't supposed to give abroad personal data before you enter your passcode to unlock the iPhone, only by hacks have permit intruders use Siri to unlock the device, access details of contacts and view photos. It's safest to close the characteristic off entirely: you'll find the option nether Settings > Touch ID & Passcode > Disable Siri on the Lockscreen.

10. Lock private apps

A potent passcode helps go along thieves out of your phone, just what if a stranger snatches your phone while you're using information technology? Or asks to borrow it to bank check a website, then bolts off down the street?

On Android, as a 2nd line of defence, yous can lock individual apps, and so even if someone can get past your lockscreen, they can't open your email or banking app without a second password. This adequacy isn't built into the Bone, but in that location are plenty of complimentary apps that provide it, such as AVG AntiVirus Costless. iOS users can't directly lock private apps, but check out Folder Lock – free on the App Store – which can countersign-protect your documents and folders, reducing the amount of information a thief tin can admission.

11. Get a alarm when your phone goes walkies

If you're on the fence about investing in a smartwatch, here's a little-known characteristic that could swing it: Apple Watch and Android Article of clothing devices can warn y'all immediately if they lose Bluetooth contact with your telephone. If you lot get this notification while y'all're in a public place, there's a good chance someone's simply picked your pocket, and is currently making off with your phone.

The device will normally be less than 50 metres away when the connection drops, then the warning gives you a hazard to band the phone right abroad, hopefully cartoon attention to the thief and prompting them to jettison it. Failing that, you tin lock it before the culprit has a adventure to offset trying to pause in and steal your information.

12. Continue an eye on things backside the scenes

No matter how cautious yous are, y'all can't completely eradicate the danger of your phone being hacked – not unless you decline to install any apps or visit any websites. What you can practice is supplement your on-device security measures with an online service. LogDog – available for both Android and iOS – is an app that monitors your identity on sites such equally Gmail, Dropbox and Facebook. It alerts you to suspicious action, such as logins from unfamiliar places, giving y'all a chance to stride in and change your credentials before serious harm tin can be done. As a bonus, LogDog will likewise scan your email and highlight letters containing sensitive data such as credit card details and passwords, which you lot can then purge to ensure they don't fall into the wrong hands.

Source: https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves

Posted by: laforestoulds1946.blogspot.com

0 Response to "How To Change Your Facebook Picture Without Anyone Knowing"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel