Friday, 28 November 2014

7 Steps to Avoid Malware on Android

As the most popular platform, with a market share reaching around 85 percent based on data from the second quarter of 2014 from Strategy Analytics, Android became a favorite target of malicious programs or malware makers.

Google's Android as the owner of implementing security measures at the Play Store app store to keep in order not to enter the malware.

Still, Android owners are not 100 percent safe and be smart in order to keep the device does not infiltrated by malicious programs.

Well, to minimize the possibility of malware infection, there are a number of tips that can be applied. Here's more, as summarized from Phone Arena and Cnet:

1. Just download the app from the Play Store

This one is the main advice to avoid malware. Google constantly monitors the applications in the store Play Store and quickly take action if there is a problem.

2. Use the services of a trusted application catalog

What if owner of an Android device can not access the Play Store, such as the Nokia X? Fortunately, Android applications can be obtained from other sources which are equally reliable, like the Nokia Store, Galaxy Apps (Samsung), and Amazon App Store

3. Avoid suspicious apps / app stores

Just because there are other applications
sources, it does not mean everything is safe to try. Avoid application that looks "suspicious" as it reaps bad reviews, explores the grandiose promise, or ask permissions are not according to its function.

4. Do not use pirated applications results

Download paid applications without spending a dime is lucrative. However, this action saves a great risk because of pirated applications which usually comes in the form of Android Application Package (APK) is very easy to insert malware.

If you want to install the application side loading, make sure the APK file is obtained from reliable sources.

5. Keep your phone software updated

The more update the version of the software, usually the better the protection it provides against malware. On Android version 4.2, for example, Google embed overcharge protection caused by malware premium SMS sender. Each new Android release provides improved in terms of security.

6. Use the Google malware scanner

Every Android version 2.2 and above equipped with malware scanner. Before installing applications obtained from sources outside the Play Store, Google will scan the relevant application to ensure its safety.

This feature is enabled by default and can be accessed from the Settings menu in the app drawer Google. Devices running Android 4.2 or later can enable malware scanner to enable the option "Verify Apps" of security in the settings menu.

7. Consider anti-virus

Unlike Windows PCs which are in absolute need antivirus, Android could reduce the danger of malicious programs via isolation Application Sandbox. However, anti-virus applications can still improve safety further.

There are hundreds of anti-virus applications which are available in the Play Store, you should select the names that have a good reputation as Avast, AVG, BitDefender, Kaspersky, Sophos, Symantec, and Trend Micro. There are also several popular new entrants such as Lookout and TrustGo.

Wednesday, 19 November 2014

In 24 countries, Windows Phone Beats iPhone

Microsoft and Nokia's efforts in improving the Windows Phone ecosystem is not in vain. Microsoft said that smartphones based on Windows Phone beat Apple's iPhone market share in 24 countries.

This claim refers to the research firm IDC for the third quarter of 2013. To the tech site The Next Web, Microsoft gave a list of 24 countries, namely Chile, Colombia, Czech Republic, Egypt, Ecuador, Finland, Greece, Hungary, India, Italy, Kenya , Kuwait, Malaysia, Mexico, Nigeria, Pakistan, Peru, Poland, Saudi Arabia, South Africa, Thailand, Ukraine, United Arab Emirates, and Vietnam.

Unfortunately, Microsoft does not provide the data in detail the percentage of market share with the iPhone in 24 countries.

"In the third quarter of 2013, according to IDC, Windows Phone to strengthen its position as the three major smartphone operating system is the best and fastest growing platform among other leading operating systems, with 156 percent of profits from year to year," said Microsoft spokesman.

In addition, he also revealed that the Windows Phone operating system is the second largest in 14 countries, namely India, Mexico, Italy, Chile, Thailand, Vietnam, Malaysia, Poland, South Africa, Ukraine, Hungary, Finland, Czech Republic, and Greece.

The growth of the Windows Phone operating system has seen since the fourth quarter of 2012. At that time, IDC said, Windows Phone beat the iPhone in seven countries, namely Argentina, Russia, South Africa, Ukraine, India, Poland, and a bunch of smaller countries, including Croatia .

Meanwhile, Google's Android operating system is still the most popular operating system for mobile devices in most countries in the world.

Wednesday, 12 November 2014

10 Dangerous Behavior on Using Smartphone

Smartphones today are already attached to its users. Each daily activities also involve more and more in smartphones, such as messaging, check e-mail, news, weather, traffic, and so on.

With the use of high intensity, have we ever thought that we have been using smartphones in a safe manner? Both face the threat of danger in the real world and the virtual.

An insurance firm, Protect Your Bubble, as quoted from Phone Arena (Sunday, 02/02/2014), released a list of 10 activities that involve risk for smartphone users. What are these activities?

1. Do not use "password"
Research conducted by Protect Your Bubble showed that 62 percent of smartphone users do not protect their device with a password. In fact, 33 percent of smartphone users vulnerable to data theft.

2. "Auto sign-in"
The second error risk is to enable the sign-in automatically to the significant account, such as banking. In addition, storing the password in the smartphone also done a lot of users, about 32 percent.

3. Naked Photos
As many as 20 percent of users adolescence turns sending their photos naked through messaging message or upload them to the internet. As for the 17 percent of recipients exciting photos usually receives continuing photos to others.

4. "E-mail" trap
Data theft can also occur if a person clicks on the link the link included in the e-mail, without verifying it first. This fraud occurs by 4 percent. While out there are 156 million phishing e-mails are sent each day.

5. "Post" photo while on vacation
From research conducted by Protect Your Bubble, 75 percent of thieves who were caught claimed that other thieves take advantage of social media to target the user.

6. "Post" photo with the "geotagging" active
Most users do not disable geotagging or
geolocation when uploading photos to the Internet. Currently there are approximately 500 million photos uploaded to social media every day.

7. Sharing of personal data by fraudsters
Data theft is also done by fraudsters who call on behalf of certain parties, such as banks. Fraud with modes like this happen as much as 27 percent according to Protect Your Bubble.

8. Do not install "case"
About 25 percent of users do not use the chassis for their smartphones. Case is useful to protect smartphones from impact, scratches, or to the weather.

9. Connect to vulnerable
According to the survey, approximately 52 percent of smartphone users connected to an open WiFi network, or unsafe. This increases the risk of data theft.

10. Do not use insurance
Protect Your Bubble revealed that approximately 60 percent of smartphone owners do not insure their devices. Abroad, smartphone insurance is usually offered when a user makes a purchase.

Friday, 31 October 2014

Android Phone Star N9500 Shipped with Virus

A smartphone is usually infected with malware as a source of outside parties. However, recently discovered Android smartphones that have malware from its factory in China.

Star N9500, 5-inch screen Android smartphone with quad-core processor, reported by Phone Arena, Sunday (06/15/2014), have malware such as trojans "Uupay.D". The Trojan acts like the Google Play Store, which collect and copy the personal data of its users.

In addition, the microphone will also be broadcast in the smartphone users and their phone call conversation to another listener. Meanwhile, the SMS will be charged more expensive.

Star N9500 currently reported by Phone Arena is located on the site eBay and sold for about 202 dollars. Such devices to date has sold over 55 units.

A security researcher at Kaspersky told the Star N9500 Phone Arena that seems to be a device that is used to perform espionage program.

Therefore, users are advised to buy a smartphone from vendors who have believed and have a good reputation.

However, the threat of malware still will not be gone. Smartphones can still be attacked by malware, especially when using applications that are downloaded from sources that are not reliable.

The Android operating system is an easy target for malware spreaders which are used widely in the community. Earlier this year, an estimated 97 percent of malware has its main target is the Android smartphone.

Thursday, 30 October 2014

Computer Virus Circulating since 2008

Symantec, a leading computer security company, said it had discovered one of the most malicious software ever. Bugs or fleas named Regin, said Symantec, may be created by the government of a country and has been used for six years with various targets throughout the world.

As reported by the BBC's technology matters, Rory Cellan-Jones, Regin circulating since 2008 can perform many functions, such as taking screenshots, stealing keywords, or redial the documents that have been deleted.

"Experts say, computers in Russia, Saudi Arabia, and Ireland experienced the worst impact," reported by Cellan-Jones.

According to experts, Regin has been used for spying on government agencies, companies, and individuals.

The sophistication of the software, the researchers said, showing Regin is cyber espionage tool that was developed by a country.

It may take months, even years, to develop Regin. The creators are working hard to cover their tracks.

Symantec stated Regin as "Stuxnet" computer software that aims evil, which is expected to be developed by the United States and Israel to attack Iran's nuclear program.