Smartphone security

We’re fairly oblivious to the amount of data our smartphones hold about us. It’s something we well and truly take for granted. Today we store almost everything in our smartphones – from our bank details to our emails and even our day-to-day calendar. So if our smartphone, or the data it holds, gets into the wrong hands, it can have disastrous consequences.

There are ways around this, however, with plenty of things you can do and download to your device to reduce the risk of having important information swiped from your phone.

Smartphone security

Below you’ll find some of the more secure methods, all worth considering in an age where we rely so heavily on our mobile devices.

1. Install a VPN
A VPN, or Virtual Private Network, is useful for a lot of things, like improving security.Most of us have few problems connecting to public Wi-Fi hotspots, but in reality, we don’t know how secure they are and also who else is connected to it. A VPN allows you to camouflage yourself from the network and browse anonymously, offering that extra layer of security.

There are dozens of great VPNs out there, with CyberGhost often touted as one of the standout names. You can check out this CyberGhost review for more details on how it boosts the security profile of your smartphone, and also of your desktop.

Related Post:  Pentesting, digital forensics, and hacking distributions

2. Download an Antivirus
One of the more obvious, and indeed safest, options is to download an antivirus software to your device. Very few of us download antivirus as an app, but it’s wrong to assume our mobile devices won’t be infected.

You’ll often be able to use the same package as what you would on your desktop computer so it may cost you nothing to do. Even so, a mobile only antivirus won’t cost huge amounts and it can save you tremendously.

3. Manage Your Software Permissions
Something that won’t cost you a penny is simply managing the permissions within your apps. There are relatively simple ways to do this on both iOS and Android devices. Proper configuration of software permissions should give only trusted apps access to your mobile data and other apps such as Facebook or your Google Play or App Store account.

4. Use A Password Manager
It goes without saying that using the same password across multiple accounts isn’t the safest way to manage your affairs. If a hacker gets hold of one password, there goes, as they say, the whole neighborhood. Using strong alphanumeric passwords is the recommended thing to do, but remembering them all can be tough.

Related Post:  Fedora 13 btrfs installation guide

A password manager is perfect for getting around this and can not only remember all your passwords but generate incredibly secure ones that are almost entirely hacker proof. There are tons of great apps to do this, all costing a small amount. It’ll save you time and boost security on your mobile tenfold.

5. Set Up Remote Tracking & Wiping
It can feel like the end of the world when you lose your smartphone. All that data now in someone else’s hands. Fortunately, tracking and wiping allows you to wipe all your data and minimize the damage. And you don’t need an app installed to do so, although there are plenty out there to make this process easier. You can use Android Device Manager to do this, although it is very much a last resort as ultimately your device could already be in the wrong hands.


Share on facebook
Share on twitter
Share on pinterest
Share on linkedin

Hola! Did you notice that no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

52 Responses

  1. In your tutorial you had only 2 primary partition earlier at the start point. But I have 3 primary partitions consumed by windows:
    1st: System Reserved
    2nd: Windows Installation
    3rd: Application Software (I install windows software here)
    Unallocated space 120 GB

    I want to install 3 Linux OS in this Free space. Is is possible? How to do it?

    1. Unless you are using GPT-based partitioning, you have just 1 free primary partition left. That 120 GB of unallocated space will be created as an extended partition. From there, you then create the logical partitions to install the Linux distro(s).

      So the answer to the first part of your question, is yes, it is possible. The second answer will depend on what distros you intend to install. If you are new to disk partitioning in Linux, start with guide to disks and disk partitions in Linux.

      What are the 3 distros you intend to install?

      1. Thanks for quick reply.
        I want to install these three distros:

        1. Fedora 17 (I’ll use this mainly) within 70 GB

        2. Debian or Debian based distro (Just for testing)within 30 GB

        3. Any other distro (other than above two, just for testing ) within rest of the space

        Some more question:
        I will install Fedora 17 from Live USB. Do I need another third party tool to make that unallocated space as extended partition or Anaconda installer of Fedora will take care of that? I mean how to make an extended partition ?

        1. If Fedora 17 will be the main distro, and you only want to use the other 2 for testing, one option (the easiest) is to install Fed. 17 on all 120 GB of free space, then install the other two in a virtual environment inside Fed. 17.

          Virtualbox is the easiest app that will enable you to install any other OS in a virtual environment.

          Anaconda or Debian’s installer will create the partitions you need.

          Note that if you opt to install all 3 on real hardware, it will be easier to install a distro, like Fed. 17, last, as an installer that does not support LVM will not “see” an LVM partition. (Fed 17 uses LVM by default.)

          I don’t think you need a 3rd-party tool to make a bootable Fed. 17 USB.

    1. In the order that you listed them. It might be best to put in a second HDD for Ubuntu and RH. A small HDD for Vista, and a lager one for the Linux distros.

  2. I have Windows XP, Linux Mint 9 and Linux Mint 11. On the top of it, I installed Ubuntu (by selecting ‘install alongside other OS’ option). Ubuntu is installed and after update-grub, it is even listed in the grub (It was not, before). But when I choose Ubuntu 12.04 from grub, some CLI type commands are listed in the screen and Ubuntu doesn’t load.

    What do you think is the issue? It was an automatic install and hence I am not sure if it created a / folder. Do you think I should reinstall Ubuntu? The customized installer in ubuntu is very complex. Do you have a tutorial for the same?

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.


The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.