Can't Get Tumblr to Open Keep Reading Sensitive Media

A s we've recently seen from leaked CIA documents, no one is immune to hacking attacks. Hither'south how to protect yourself against them, whether they come from opportunist thieves or land-sponsored spies.

one. Keep upwards to date – and don't open up up holes yourself

When it comes to protecting yourself confronting hackers, step one is e'er to install software updates as soon every bit they become available: that'due south as true on smartphones as it is on computers. Yes, updating can be a tiresome and intrusive process, and it sometimes brings abrasive changes to the interface that yous're used to. All the aforementioned, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is but daft.

I'd also strongly propose confronting using unofficial tools to "root" your phone (known as "jailbreaking" on iOS), unless y'all know exactly what you're doing. On a rooted telephone, technical safeguards can be defeated, allowing apps to perform all sorts of actions that are normally prohibited – and that tin can include snooping on your personal data.

two. Be careful of what y'all install

When you install a smartphone app, you may exist asked to grant it various permissions, including the ability to read your files, access your photographic camera or heed in to your microphone. At that place are legitimate uses for these capabilities, but they're potentially open to abuse: recall before you corroborate the request. That applies particularly to Android users, as Google's app-vetting process isn't every bit strict as Apple'southward, and there accept been reports of malicious apps spending months on the Play Store before being spotted and taken downward.

Android as well lets you install apps from 3rd-party sources: this allows services such as Amazon's competing Appstore to operate, but it besides provides an easy way for rogue apps to become onto your phone. I'd strongly advise against installing anything from an unfamiliar website.

3. Review what's already on your phone

Even if the apps on your phone seemed simple and safety when yous installed them, subsequent updates could have turned them into something more sinister. Take two minutes to review all the apps on your smartphone, and see which permissions they're using: on iOS, yous'll notice lots of relevant information under Settings > Privacy.

On Android, it's harder to become an overview of which apps have which permissions, but there are plenty of security apps that help here, including costless packages from Avast and McAfee. These tools can besides bound in and alert y'all if you're trying to install an app that'southward known to be malicious, and warn you if a "phishing" attack is trying to play a trick on y'all into entering a password into an untrusted app or webpage.

4. Make it hard for intruders to go far

If a thief gets concrete access to your phone, they tin can cause all sorts of trouble. For a start, your email app probably contains a trove of personal information. Brand certain your phone is locked when not in apply: both Android and iOS can be set to require a six-digit passcode. Your device may offer other options too, similar fingerprints or facial recognition. Such methods aren't perfect – a actually determined hacker could re-create your fingerprints from a drinking glass, or trick a camera with a photograph of you lot – but they're a lot amend than nix.

And be wary of "smart unlock" features, which automatically unlock your phone when you're at home, or when your smartwatch is nearly; these could allow a thief bypass your unlock code altogether.

5. Be prepared to track and lock your phone

Plan ahead, so fifty-fifty if your phone is stolen, you know your data is safe. 1 choice is to set your telephone to automatically erase itself after a certain number of incorrect attempts to enter the passcode.

If that seems a bit desperate, don't forget that both Apple tree and Google operate "notice my device" services that can locate your phone on a map, and remotely lock or erase information technology. For Apple users, this is accessed through the iCloud website – you can bank check information technology's enabled on the phone in Settings > iCloud > Find My iPhone. Android users tin admission Google'due south service at google.co.united kingdom/android/devicemanager. You can also make a missing telephone ring – helpful for cartoon attention to the thief, or tracking down a handset that's been just mislaid.

half dozen. Don't get out online services unlocked

Auto-login is a very convenient feature, especially since a virtual keyboard tin can make typing passwords a chore. Information technology's likewise a huge liability: an intruder merely needs to open your browser to gain access to all your online accounts.

Ideally, therefore, you shouldn't use motorcar-login features at all. If you must, employ a password managing director app that requires you to regularly re-enter a master countersign. And don't employ the same password for more than than one app or service: if that ane countersign gets institute out, it can be used to admission a whole range of private information. This applies even if you're perfectly scrupulous about keeping your smartphone secure: hackers regularly intermission into online services to steal user credentials, which they and then try out on other sites.

7. Adopt an modify ego

If you've followed this advice then far, information technology should be very difficult for anyone to get into your phone. Nevertheless, some major hacks take been pulled off without any access to the victim at all. If someone can find out (for example) your engagement of birth, home town and female parent's maiden name – all stuff that can exist easily picked up from a site like Facebook – that'due south frequently all they need to reset a password and start breaking into your accounts. You can run across off such attacks by fictionalising your past with details that are unlikely to be guessed; perhaps, for the purposes of security, you were born in 1999 to Mrs Victoria Beckham, née Adams. Just remember what y'all claimed, or you could end up locking yourself out.

Personal information can easily be gleaned from sites such as Facebook
Personal data tin easily exist gleaned from sites such equally Facebook.

viii. Beware open wifi

Nosotros all know at that place's a risk involved in using an open up wireless network. But you may not realise how severe information technology is: anyone in the vicinity tin snoop on what you lot're doing online. This sort of set on demands specialist software and skills, so it's unlikely to be a hazard in your local cafe, but information technology'southward not a danger that tin be ignored.

If you're at all hundred-to-one about a wireless network, don't connect – stick with your phone's mobile net connection. Or use a VPN tool such equally CyberGhost or TunnelBear (both available free for Android and iOS). These tools road your traffic through a individual encrypted aqueduct, so even if someone is monitoring your traffic they won't be able to see what you're upwards to.

ix. Don't let lockscreen notifications give the game away

Lots of apps pop up letters and notifications on your phone's lockscreen. Information technology's worth thinking about what these notifications may reveal. If yous piece of work for a big banking company, for case, a visible email from a work colleague or a coming together reminder tells a thief that this might be a especially interesting telephone to steal.

On iOS, also consider disabling access to Siri from the lockscreen. Siri isn't supposed to give away personal information before you enter your passcode to unlock the iPhone, but past hacks have let intruders employ Siri to unlock the device, admission details of contacts and view photos. It's safest to shut the feature off entirely: you'll observe the pick under Settings > Touch ID & Passcode > Disable Siri on the Lockscreen.

10. Lock private apps

A stiff passcode helps keep thieves out of your phone, just what if a stranger snatches your phone while y'all're using it? Or asks to infringe it to check a website, then bolts off downwards the street?

On Android, every bit a second line of defence, you can lock individual apps, so fifty-fifty if someone can get past your lockscreen, they tin't open up your email or cyberbanking app without a 2nd password. This capability isn't built into the OS, just there are enough of gratis apps that provide information technology, such as AVG AntiVirus Free. iOS users can't directly lock private apps, but cheque out Folder Lock – free on the App Store – which can password-protect your documents and folders, reducing the amount of information a thief can access.

11. Get a alert when your telephone goes walkies

If y'all're on the argue about investing in a smartwatch, hither's a little-known feature that could swing it: Apple Sentry and Android Wear devices can warn you immediately if they lose Bluetooth contact with your telephone. If you get this notification while y'all're in a public place, there's a proficient chance someone's simply picked your pocket, and is currently making off with your phone.

The device will ordinarily exist less than l metres abroad when the connectedness drops, so the warning gives yous a chance to ring the telephone right away, hopefully drawing attention to the thief and prompting them to jettison it. Failing that, you can lock it before the culprit has a gamble to start trying to intermission in and steal your data.

12. Keep an eye on things behind the scenes

No matter how cautious you are, you can't completely eradicate the danger of your phone existence hacked – non unless you refuse to install any apps or visit any websites. What y'all can do is supplement your on-device security measures with an online service. LogDog – available for both Android and iOS – is an app that monitors your identity on sites such as Gmail, Dropbox and Facebook. Information technology alerts y'all to suspicious activity, such every bit logins from unfamiliar places, giving you lot a risk to step in and change your credentials before serious harm tin can exist done. As a bonus, LogDog will likewise browse your e-mail and highlight messages containing sensitive data such as credit card details and passwords, which you lot can then purge to ensure they don't fall into the incorrect easily.

westonlifforess.blogspot.com

Source: https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves

0 Response to "Can't Get Tumblr to Open Keep Reading Sensitive Media"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel