Security Tips for Smartphone Users
Most computer users worry about securing their PCs, but few people pay the same sort of attention to their smartphones. That's a bad situation, according to some experts.
Smartphones, such as iPhones, BlackBerrys or Android-based phones, are actually handheld personal computers. Especially powerful devices such as Motorola's Atrix phone, which functions as the "brains" of a lightweight laptop, show that smartphones have the potential to replace PCs in the coming decade.
"The challenge is that basically, these smartphones are becoming computing devices," said Don DeBolt, director of threat research at Islandia, N.Y., security firm Total Defense.
Yet many consumers are careless about smartphone security, even though they install software, open email attachments, update Twitter feeds and Facebook pages and even bank online using their handheld devices.
Those are actions that only a PC could have done a few years ago. But just because they're done on a smartphone instead doesn’t mean that they're any less immune from hackers.
Apple and its iTunes store offer some measure of safety because apps available there are on a "whitelist" — Apple won't make them available to users without checking them out first. (This safety feature doesn't apply to "jailbroken" iPhones, which can install non-authorized apps.)
In contrast, Google uses a "blacklist" for its Android Market apps — it'll remove them only if there's a demonstrated problem , and there's nothing to prevent users from installing "off-road" Android apps from other sources.
It's not clear how long Google can continue a security policy that's essentially "release first, ask questions later."
With the explosion of smartphone software came an explosion of smartphone malware. Apple's iPhones have mostly been spared, for reasons noticed above, but the number of viruses and Trojans targeting Android phones
Most smartphones have an optional locking feature that requires a password or passcode to use the phone. Android phones also offer a "pattern lock" that allows you to create your own connect-the-dots diagram instead of a password.
But beware: Don DeBolt, director of threat research at Islandia, N.Y., security firm Total Defense, notes that pattern locks are especially vulnerable to people who keep an eye on the smudges your fingers leave on the phone's screen.
It’s actually a variation on an old hack. Back in the days of prepaid phone cards, thieves would stand near banks of payphones in airports and "shoulder surf." They'd watch callers punch in their passcodes, which was all you'd need to make a discounted long-distance call. They'd even use binoculars for longer distances, or watch the reflections of callers in runway-facing windows instead of looking directly at the victims.
Nowadays, a shoulder surfer need only take a high-resolution photo of you using your phone. In the right light, your finger streaks on the phone's screen will show up and reveal the full pattern you traced with an accuracy rate of 68 percent, according to researchers at Penn State University.
In near-darkness and with imperfect smudges, the pattern could be fully deciphered 14 percent of the time. And of course, a thief who actually steals a phone can examine it even more closely.
Passcodes and passwords are also vulnerable to shoulder surfing, but not to still images, because the dot-like smudges can’t tell an attacker if you repeated a letter or number.
Many smartphone social-networking apps automatically upload photos to the Internet. Sounds harmless, right? It is until you remember that many phones embed location tags, also called "geotags," right into the photo files themselves.
Anyone with the right software can look at your Facebook or Flickr photos and determine where you've been. If you're auto-uploading images, it'll tell them where you are at that very moment.
Thankfully, the geotagging feature can be turned off on most phones. If you'd rather keep the geotags, for example to document your hike across the Yosemite Valley, then turn off auto-uploading of photos instead. (Disabling that feature also lessens the possibility that you'd mistakenly post something you'd regret later.)
Similarly, a lot of apps, such as Foursquare and Facebook , ask for constant updates of your physical location. Not that many apps really need that information. There is no reason to tell someone where you are when you’re ordering something online or streaming music. If you don’t want to tell the world — including the neighborhood burglars — that you're not home, then disable this option.
Accessing email accounts and social networks often relies on stored passwords, usually in a "keychain" file, which lets the various apps automatically log into those accounts.
Convenient as that may be, it's better to simply not have the keychain file on your phone at all. The safest place for passwords is always in your head. Recalling and typing in a dozen different passwords may be cumbersome, but how many accounts do you really need to access from your phone?
Pressing a button on a website to restore your smartphone to its factory state, thus erasing all user data, is the single simplest way to make sure your information doesn’t fall into the wrong hands if your phone is lost or stolen. It isn’t foolproof, as forensic examiners with expensive and sophisticated tools (i.e., the police) can usually retrieve "erased" data.
But Debolt notes that the first thing anyone should do when he or she loses a phone is to hit the remote-wipe button from a PC, especially if the phone is lost in a public place . It doesn't take long to get to a public terminal in an airport or hotel.
All the major smartphone operating systems offer this feature (and if you are a BlackBerry corporate user, you probably know of it already).
If you're using Wi-Fi in a public place, anyone with "packet sniffing" software can eavesdrop on your transmissions to and from with the wireless router. That's why it's best to encrypt as many communications with websites as you can.
Not every online service offers encryption — for example, Facebook , Twitter and Gmail do, but Yahoo! Mail doesn't. Going to websites with "https" in the address is good, but those sites don’t always encrypt everything you do.
There are several third-party apps available to provide firewalls and encryption (or both) to your smartphone for use on public Wi-Fi networks. (It also doesn’t hurt to turn off the Wi-Fi and Bluetooth radios when you aren’t actively using them.)
And don’t depend on the app to encrypt the data. DeBolt said many studies showed that a majority of apps don’t even encrypt passwords.
references: securitynewsdaily.com
Diposting pada : Minggu, 04 Maret 12 - 22:38 WIB
Dalam Kategori : TIPS SMARTPHONES SECURITY SYSTEMS, ANDROID, BLACKBERRY, IPHONE, SECURITY TIPS FOR SMARTPHONE USERS
GUNAKAN KOTAK PENCARIAN DIATAS, JIKA ARTIKEL / FILE YANG KALIAN CARI TIDAK DITEMUKAN. Masukan Kata/Keyword
Pengunjung Blog yang baik adalah ia menyempatkan waktunya untuk memberikan LIKE/men-SHARE/meninggalkan TESTI/KOMENTAR. Berbagi ILMU & PENGETAHUAN kepada orang lain akan lebih bermanfaat, daripada hanya disimpan untuk kita sendiri :)

JIKA ANDA MEMPUNYAI DANA BERLEBIH DAN DIRASA BLOG SAYA BERGUNA, ANDA BISA BERDONASI AGAR BLOG INI LEBIH BAIK LAGI, KLIK GAMBAR DIBAWAH DETAILNYA


Kami Menjual & Menyediakan Kaset CD DVD KALI LINUX, Windows XP, Windows 7, Windows 8,Windows 8.1, Adobe Photoshop & seri lainnya, CorelDraw, Microsoft Office, Linux (Backtrack 5 R3 , Linux Red Hat, Ubuntu, Linux Mint, Linux Fedora, dll), sistem operasi maupun Software-Software LAMA maupun TERBARU Lainnya (KLIK DISINI) !!

Jual FLASHDISK INSTALLER WINDOWS XP, WINDOWS 7, WINDOWS 8, WINDOWS 8.1 DAN LINUX TERBARU (KLIK DISINI)
My Yahoo Messenger

tertarik memasang Banner Iklan DI BLOG INI, Mention or Send Me Message on FACEBOOK AND TWITTER :)
UPGRADE KE FIREFOX TERBARU UNTUK KEAMANAN DAN KENYAMANAN SAAT BROWSING ;)

- Microsoft Sedang Kembangkan Mesin Pencari Bing Sistem Pencarian Foto
Minggu, 01 Mei 16 - 05:37 WIB - Dampak Negatif Rokok Elektrik, Bisa Rusak Sistem Kekebalan Tubuh
Minggu, 27 Maret 16 - 01:37 WIB - Jumlah Pengguna Twitter Indonesia 2016
Sabtu, 26 Maret 16 - 06:24 WIB - Review Linux Fedora 23
Kamis, 05 November 15 - 00:23 WIB - Sebelum Kaya, Orang-Orang Ini Dulunya Hacker Lhooo..
Rabu, 04 November 15 - 23:53 WIB - Dampak Negatif Salah Pakai Sepatu Untuk Berolahraga
Minggu, 01 November 15 - 05:36 WIB - Masih Muda Tumbuh Uban ? Ini Dia Penyebabnya
Rabu, 28 Oktober 15 - 02:19 WIB - Fitur Baru FireFox ! Plugins Browser Google Chrome & Microsoft Edge Bisa Dipasang Di Firefox
Rabu, 26 Agustus 15 - 10:52 WIB - Penggemar Sepatu Converse? Converse Merubah Desain Lama
Sabtu, 25 Juli 15 - 19:37 WIB - Hah ! Apple Promoskan Konten Lesbian dan Gay Di Apple Store
Minggu, 28 Juni 15 - 06:03 WIB
Jumlah Pengunjung (by UNIQUE IP ADDRESS)
Knowledge is for FREE
Orang-orang lebih khawatir dan takut jika Bumi ini Kiamat, PADAHAL Kiamat terbesar adalah ketika jantungmu berhenti berdetak, sehingga tidak dapat mengumpulkan pahala, melakukan shalat & sujud kepada Allah SWT...
Takutlah ketika panca indra/ hatimu biasa-biasa saja saat mendengarkan Adzan dikumandangkan & tidak segera melaksanakan shalat,
atau mata hati sudah dibutakan & biasa saja saat membaca peringatan serta melanggar yg sudah tertulis di Al-Quran.
bisa jadi kamu termasuk orang yg dibiarkan "tersesat" di dunia & akhirat.