Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 17 October 2013

Three Tips to Keep Your Mobile Data Safe

Posted on 06:04 by Unknown
Keeping your mobile gear secure while you’re zipping across the grid is tricky business. Laptops and tablets—veritable gold mines of personal information—are popular targets for thieves. Law enforcement officials, meanwhile, could confiscate your smartphone and then examine the data—merely as a result of a routine traffic stop.

If you’re packing an Android device, it gets even trickier, because with such a device, you stand a better chance of falling prey to the booming mobile malware market. Independent malware testing lab AV-Test had less than 10,000 Android malware samples in its database by late 2011. Now, two years later, that number has blossomed to around 1.3 million.

Step One:
Encrypt everything

One of the easiest things you can do to protect an Android or iOS device is to take advantage of built-in hardware encryption. This feature will turn the data on your phone into nearly unreadable junk—unless it's properly unlocked with your password.

Let's start with the easy one: iOS. Owners of iPhones or iPads can rest easy knowing the data is already encrypted, provided you create a passcode from the lock screen.

Step Two:
Keep malware at bay


Android users are particularly vulnerable to malware. Google, unlike Apple, doesn’t vet applications before they go live on Google Play. This has proven an easy way for malware creators to sneak malicious apps onto Google’s app store. Malware-laden apps range from those offering free device wallpaper to games, and even to impostors that try to look like popular apps.

That’s why security vendors such as Avast, Kaspersky, and Lookout offer antivirus and security apps for Android to help keep you secure online. But how good are these apps, really? Back in late 2011, results from the AV-Test lab found that the free solutions were nearly useless.

Step Three:
Go Covert


You can protect your data from being nabbed by a Customs agent and downloaded into some massive data silo in the Utah desert. The Electronic Frontier Foundation suggests an interesting option: Leave the hard drive at home and boot your laptop from an SD card.

(Full instructions on how to create a Ubuntu boot disk or USB boot drive in Ubuntu guide for displaced Windows users.) ...Even if you don’t have any sensitive data to protect, this is such a great, secret-agent-style use for your laptop that you might want to try it simply for the cool factor. (more)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in amateur, Android, App, cell phone, computer, counterespionage, encryption, Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ▼  October (53)
      • How NSA targeted chancellor Merkel's mobile phone
      • Kremlin Alledegly Slipped Spy Gadgets into G20 Sum...
      • Do You Have an IT Spy Guy?
      • Business Espionage in America - We Lose More Than ...
      • Ankle Bracelets Have Criminals Bugged
      • How secure is the Merkel-Phone?
      • A Brilliant Halloween Costume, More LED Fun, and a...
      • Encryption Infographic
      • Citing "Terrifying" Surveillance Tactics, Yet Anot...
      • Court Rules: NO GPS for LEOs w/o CO
      • Rental Company Settles Spyware Case
      • No Jail for Skype Sex Scandal Cadets
      • Bugging Boss for a Raise Lands Three Employees in ...
      • Landlord, Tenant, SpyCam - What Could Possibly...
      • Captain Crunch sez... "Here's looking at you, matey."
      • Ex-School IT Director Faces Trial on Wiretapping C...
      • BOUNDLESSINFORMANT only shows metadata
      • Doc v. Doc Bugging Ends in House Call to Graybar M...
      • No more, "Gee, I thought you said..." — Record You...
      • RARE - Politico Admits to Phone Tapping & Butt Bug...
      • Industrial Espionage Threats to Small and Medium-s...
      • Yet Another Bird Spying Story
      • Gordon Ramsay Knows What's Cooking... in His Daugh...
      • Business Espionage - Top Businessman Bugs Other To...
      • Three Tips to Keep Your Mobile Data Safe
      • Eavesdropping on the Brain: Mind-Reading Devices C...
      • Two Arrested for Eavesdropping on Previous Employe...
      • Video Game CEO Throws Employees Arrested for Spyin...
      • Forget the NSA. That Smartphone Snooper May Be You...
      • Business Espionage Cautionary Tale - How Bugs Get ...
      • What are SIGADs starting with DS for?
      • D-Link Promises Fix for Home Router Firmware Flaw ...
      • How NSA Breakthrough May Allow 'Burner' Phone Trac...
      • The Taliban's Ultimate Bug? - A Bomb in a Microphone!
      • The Rube Goldberg Toy I Want for My Birthday
      • The CIA’s Most Highly-Trained Spies Weren’t Even H...
      • NIST - Not Indelibly Secure & Trustworthy?
      • Lawsuit Blames Companies for Hiring Voyeur
      • One Way Your Android Phone Can Get a Virus
      • From BULLRUN to NOCON and LACONIC
      • George Washington's Top-Secret Spy Ring Coming to ...
      • Betty Boop, The Muppets & Three Wiretappers Explai...
      • World's Heaviest Non-Electronic Eavesdropping Device
      • Hannah Anderson - Be Careful What You Say Around t...
      • Attorney & PI -- 75-100 Illegal Bugs and Surveilla...
      • International Spy Museum Looking for a New Safe House
      • ... or, say Beetlejuice three times.
      • Russia's Herculean Feat - Eavesdrop on All Olympic...
      • Hey, kids! Want a smart watch? All right. Who said...
      • Business Espionage: Eavesdropping Discovery at Nor...
      • 12 Detained After Bugging Device Found
      • Anti-Eavesdropping Just Became Kinky
      • School Principal's DIY Investigation Ends in Wiret...
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile