View Single Post
  #6   Report Post  
stevenmbrun stevenmbrun is offline
Banned
 
Posts: 4
Default

The Dangers Of Installing Apps On Your Phone
The first type of danger you need to know about is ‘spyware’ which is a program that will read, and even copy, your personal information such as passwords, accounts, email addresses, etc. It does this by recording the keys you type, and the programs you are using when you type those keys – this is called ‘keylogging’.

Phishing is another method for obtaining your personal information. The difference between phishing and spyware is that spyware is a program that works on your computer without you realising, and phishing is where a program, website or email pretends to be something it is not. The word ‘phishing’ comes from joining the words ‘phoney’ and ‘fishing’ together. Which basically describes the method. Often these fraudsters send out emails which appear to be from a bank, or a membership site of some kind, and they provide a link requesting you to go to their site and log in. If you click on the link it will take you to a site which looks just like the bank’s site but it is not. And when you input your details it records them. I have seen a number of these kind of emails pretending to be a bank, Paypal, and even World of Warcraft. In each case, they are attempting to steal your account and even your money.

Next is Adware. This is an application which might use Trojan, spyware or phishing tactics, but instead of stealing your private information it displays advertisements in the hope that you will respond to them. Often, adware will hijack your use of the internet, and force you to visit or trick you into visiting specific websites where it has products or commissions available. In this respect it is not as ‘dangerous’ as the other forms of malware, but it can disrupt your activities, change your settings and will often slow your computer or phone down considerably. Sometimes this is entirely legitimate, and is installed on your computer in exchange for your use of free products or services. But in other cases it is installed without your full knowledge. Overall, it can be very irritating!

But don’t be overly alarmed. Your Android phone is a robust device which is not easily infiltrated, so long as you are aware of the potential dangers out there, and you know how to safeguard yourself against them.

Protecting Your Android Phone
The main thing to bear in mind, when you look at all those descriptions above, is that the computer or mobile phone user must give permission to the document scanner app iphone to be installed. That is why so many threats use trickery, because your phone’s operating system has a high level of security which means that the only things that get installed, are the things you agree to. So the main protection you can employ, is caution.

Check The App Permissions
The permissions an app requires will tell you a lot about what the app is going to do. If you install an app and it requests permission to access your contacts, then make sure it is the type of application which handles contacts in some way. You can usually check an apps permissions requirements before installing it, by going to the security tab in its market entry.