Monday, December 21, 2015

3 steps to update the security of your Android – Informe21.com

To reassure users, page tuexpertomovil collected three steps to update the safety of an Android phone. In addition to these tips, recommend also be aware of the most common delusions of Android running on the network, see that encourages the user to install an alleged operating system upgrade or ensuring spy WhatsApp allow other people.

1. Reviews the applications connected to your account

When you install applications, on more than one occasion we can find in the position of having to accept permits connecting our Google account with the application in question. We are talking about a relatively everyday situation, and some applications require Androidrealmente have permission to access our Gmail account in order to function correctly. In any case, it is advisable to check with some frequency applications connected to our Google account in order to get detect any malicious application that we have been able to sneak in some time. To do this, follow these steps:.

We enter this link and, if necessary, initiate session data from our account Gmail
Once inside, what we see is a text with the message “You have granted access to your Google account for applications and sites listed below” a text that will be joined at the bottom by a list of applications. In this section we have to check that no suspicious application (the last thing we should do in this section is an application of a flashlight for example) does not appear. If we see any suspicious application, click on its name and then click on the option “Remove”.

2. You monitors devices that connect to your account

Do you have a suspicion that you watch? Do you think someone is accessing your Google account? In addition to checking if someone is spying your WhatsApp, what you should do often is to review the devices from which you access your Google account, even though you have the suspicion that you might be watching. This procedure allows to know both the model of the device from which you have accessed your account as the location of that device, and the date and time of the last logins. In this case, the procedure is this:

We enter this link and, if necessary, initiate session data from our Google account
Once inside. what we see is a page with the message “These are the devices that have been active in your account over the past 28 days or who are currently connected.” Below this text, the page just displays all devices that have or had access to our Google account; for further information on any of these devices, they simply have to click on its name.

If we detect suspicious activity by clicking on the device name in the case of it being a mobile – have the ability to withdraw access to our account by pressing it on the option “Remove”. Likewise, in case of detecting unauthorized devices, it is essential to change the password as soon as our own.

3. Make sure you have disabled unknown sources

At Christmas, the network will be full of threats that try to get users to Androiddescarguen on their mobile applications, camouflaged under any excuse, what they will only seek to gain control of the device. Therefore, at this time it is more important than ever to disable the installation of applications from unknown sources, and for this the steps are these:.

We enter the Settings application of our mobile
.> Then enter the section “Security”
Once inside, we look for an option with the name “Unknown sources – Allow installation of applications from unknown origin” (or “Unknown sources”) and made sure that is off

Source:. The Impulse

AM

LikeTweet

No comments:

Post a Comment