Sunday, December 20, 2015

3 steps to update the security of your Android – El Impulso (press release) (blog)

Christmas is a time of year when proliferating threats on Android, so it is essential to be prepared for the deception that these dates will circulate throughout the network.

In addition to frequently check if your mobile phone has been hacked, it’s not over also verify that the security of our smartphone is current. To do so, such simple tasks as checking applications with access permissions to our own to Google or disable the installation of applications from unknown sources may be enough to spare more than a scare.

To reassure users The page tuexpertomovil collected three steps to update the safety of an Android phone. In addition to these tips, recommend also be aware of the most common delusions of Android running on the network, see that encourages the user to install an alleged operating system upgrade or ensuring spy WhatsApp allow other people.

1. Reviews the applications connected to your account

When you install applications, on more than one occasion we can find in the position of having to accept permits connecting our Google account with the application. We are talking about a relatively everyday situation, and some applications require Androidrealmente have permission to access our Gmail account in order to function correctly. In any case, it is advisable to check with some frequency applications connected to our Google account in order to get detect any malicious application that we have been able to sneak in some time. To do this, follow these steps:.

We enter this link and, if necessary, initiate session data from our account Gmail
Once inside, what we see is a text with the message “You have granted access to your Google account for applications and sites listed below” a text that will be joined at the bottom by a list of applications. In this section we have to check that no suspicious application (the last thing we should do in this section is an application of a flashlight for example) does not appear. If we see any suspicious application, click on its name and then click on the option “Remove”.
2. You monitors devices that connect to your account

Do you have a suspicion that you watch? Do you think someone is accessing your Google account? In addition to checking if someone is spying your WhatsApp, what you should do often is to review the devices from which you access your Google account, even though you have the suspicion that you might be watching. This procedure allows to know both the model of the device from which you have accessed your account as the location of that device, and the date and time of the last logins. In this case, the procedure is this:

We enter this link and, if necessary, initiate session data from our Google account
Once inside. what we see is a page with the message “These are the devices that have been active in your account over the past 28 days or who are currently connected.” Below this text, the page just displays all devices that have or had access to our Google account; for further information on any of these devices, they simply have to click on its name.
If we detect suspicious activity by clicking on the device name in the case of it being a mobile- have the possibility of withdrawing their access to our account by pressing it on the option “Remove”. Likewise, in case of detecting unauthorized devices, it is essential to change the password as soon as our own.
3. Make sure you have disabled unknown sources

At Christmas, the network will be full of threats that try to get users to Androiddescarguen on their mobile applications, camouflaged under any excuse, all they seek is gain control of the device. Therefore, at this time it is more important than ever to disable the installation of applications from unknown sources, and for this the steps are these:.

We enter the Settings application of our mobile
.> Then enter the section “Security”
Once inside, we look for an option with the name “Unknown sources – Allow installation of applications from unknown origin” (or “Unknown sources”) and made sure that is disabled.

LikeTweet

No comments:

Post a Comment