How can yoy be sure that mobile devices will not be exposed to piracy in the next time you step out of the house; it has become accustomed to communicate with the Internet, both inside cafes, airports, or on planes and trains. However, the problem is that we forget how much we are exposed to security threats.
This is due to the transformation of mobile devices to more complex devices, as they are dealing with the same e-mail, passwords, and security information.
With the growing popularity of some devices have become a favorite for hackers target, Five years ago devices (NBC) of (Microsoft's) most vulnerable to attacks, as opposed to the (Apple), according to Nocera, who added, "but in a period and a half years, we have seen a change and targeting hardware system (Android), and (iPhone). We expect that in 2014 the majority of these devices are targeted, as quoted by the magazine (BBC World) e. "
But the good news is that it will not be difficult to protect these devices at low cost, and the protection of the information they contain, and that the reform process will be easy, and here are ten tips to help keep Ojhzaktkm during travel:
1. Make sure you update your program, because "each version of the software patched a number of security breaches." It is preferable before embarking on any journey, or during every two weeks, do disclose the company producing the software site to make sure the availability of new versions. If her grandmother and download it, unless you find the objections of the first people who used it.
2. Use passwords (secret) strong. And be sure to use a combination of letters, numbers and special characters consisting of 8 or more characters, and should avoid the use of Alqamosah words, but the use of abbreviations for the first Kalahrv favorite songs and restaurants. And change the password several times, at least once every six months. If you are not witty enough to compose a special word of your passing, there are programs such as the "robo form" RoboForm do the job.
3. Do not change the controls and security arrangements in the majority of pre-existing Android phones browsers, iMac, iPhone and Blackberry, as Nocera notes that they are good and honest, including enough.
4. avoid public wireless networks, such as non-coding "Wi - Fi" that do not require verification of identity, or a password before entering it, which means the possibility of access to everyone, including the pirates. In some cases, the hackers to install their own network to the rhythm of the innocent in Hrkha. As it is encrypted networks that require a password to enter it, and that you may find in hotels and cafes. But such networks are two different types of security: WEP and WPA. The latter is the safest. But even encrypted networks have its dangers, the bad guys may be able to access the encrypted networks at the hotel, for example, so you should be careful here, too.
No comments:
Post a Comment