Android, security and Internet: What we should not do

870

Android, security and Internet: What we should not do

Written by

May 4, 2016

android tools

The possibility of connecting to the Internet through our tablets and smartphones gives us unlimited opportunities. Not only can we instantly know what happens in any part of the world, but through the Web we can also communicate with people from all over the planet thanks to social networks, or also, enjoy the best audiovisual content before even Get to our country. However, as we have mentioned on other occasions, apps and navigation are the two main entrance doors of all kinds of harmful elements that, despite not having a greater incidence in many cases, require adequate protection of the devices that We use daily.

If we add to these elements the fact that Android it is the most popular goal for hackers and other creators of malicious elements, we have as a result a whole repertoire of Actions that, although we don't believe it, in other cases they can be very harmful not only for us, but for third parties. Here is a list of uses that we should not make of the most popular software in the world to avoid both the infection of our terminals and even taking legal action against us.

malware

1. Prudence with Facebook and Twitter

Hack an account of any of these social networks and that at the same time, we are victims of this action, it is something very simple. In some cases it is enough to know the name of the user in question or the email address associated with the accounts and through which we may require passwords. On the other hand, there are apps specifically created to decipher profiles keys. The consequences of entering third party accounts can result in criminal charges for crimes such as impersonation, defamation or violation of the right to privacy. The most recommended to protect us from this, goes from the security settings of Android until the installation of antivirus.

2. Nothing to hack Android

In some cases, the length of time between the versions of the interface created by those of Mountain View is too much for groups of users who want to know as soon as possible what the new members of the green robot family bring. This leads them to occasionally proceed to hack the system With the consequences that this entails: Loss of guarantee and most importantly, the complete disable of the terminals without the possibility of repairing or exchanging them in the event that the hacking goes wrong.

root android

3. Beware of YouTube downloads

Through the portal of videos The world's most famous can enjoy all kinds of audiovisual content whenever we want. However, it is also possible download them to store them on our tablets and smartphones. The possibility of lowering them comes through unofficial applications which in many cases, are loaded with virus whose main actions are the theft of our personal information, and the acquisition of administrator permissions. In addition, another important fact that we all know, with illegal downloading, copyright is violated.

Through applications like WhatsApp, millions of users share all kinds of links to our friends and other contacts. However, these elements can also compromise the security of the devices since in many cases, they do not link to the page we want but to others that contain virus and malicious elements that are sometimes difficult to eliminate. In this case, it is best to act with common sense and distrust all those links that are not known to us or do not come from prominent portals.

ramsonware android notice

5. Permission management and file browsers

Finally, we highlight two measures of which the main beneficiaries will be all those who possess Android 6.0 The most recent member of the family incorporates, on the one hand, and as we mentioned on other occasions, the possibility of users controlling what information we offer the applications that we download and use, and on the other, a File Browser native that avoids us resorting to platforms developed by third parties and that, in some cases, are again the entrance of malicious elements capable of infecting our tablets and smartphones. On the menu "Settings»And accessing«Storage»We can find this new element.

As you have seen, there are dozens of ways to make us attacked by hackers but also, actions that can harm us and other people from the legal point of view. And, the reality teaches us that although the security measures in the terminals, increase both by manufacturers and developers, the threats are also increased. In these situations, to avoid shocks and as we have reminded you on other occasions, it is best to act with common sense when using our devices and not only equip the terminals with powerful and updated antivirus. You have available more related information such as, for example, what we should not do if we want to make the most of the charging of our models' batteries and at the same time, prolong their useful life, so that you know another way to get the most out of them.