Last Updated: May 18, 2018
Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S8. Most Android Smartphone users as well as most of the pubic at large do not think very much about security.
If your phone is not running the latest Android security patches, you are open to attack. A recent Wall Street Journal article showed that only 2.8% of Android devices have the latest security patches. Compare that to 79% of iPhones due to Apple’s uniform eco-system.
Google Play Protect
- Be sure your device is running Google Play Protect. It scans for Malware and bad apps. This was release in July 2017 and runs on Google Play Services 11 or higher. This is a unification of Android security systems like Verify Apps, browser protection, and anti-theft measures.
Most Up to Date Android Smartphone
This flagship phone runs the latest Android version and is patched regularly. Sold directly from Google or from a couple wireless carriers.
Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”
Last Updated: 5/18/2018
Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a great article discussing Secure Computing – Desktops vs Smartphones, iOS vs Android and more..
Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security. Our tutorial covers the iPhone through iPhone 7 Plus and iOS through iOS 11.
0. Obsolete Hardware
If you have an iPhone or iPad that no longer gets updates, we would recycle it and buy a new one RIGHT away. Keep in mind that iOS 10.3.3 is the first version that fixed a Huge Broadcom Wi-Fi bug. Without that fix, you can get hacked by just having a Wi-Fi signal nearby.
1. iPhone Software Updates
Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.
Always update to the latest iOS software available as soon as possible.
Continue reading “iPhone Security, How to securely use your iPhone”
Last Update: 4/23/2017
Security has become an important part of using a personal computer. Gone are the days of just installing anti-virus and not worrying any further. Increasingly, the headlines include news of companies and websites getting hacked and personal date stolen. It is important to learn how to secure Windows and apply Internet Security, whether it is a notebook or desktop. Microsoft Windows remains the most popular personal computer operating system around. Because of its ubiquity, Windows has become a prime target for cyber criminals intent on stealing your information. This article focuses on how to secure your Windows-based PC so that you do not become part of the statistics. Our other tutorials help you secure your Firefox or Chrome Browser, e-mail, secure your wireless network, online shopping, iPad, smartphone and more.
Before you make any changes to your system, always back it up.
We recommend booting from a Linux CD or USB key when performing mission critical applications such as online banking, online trading, or online shopping.
Physical Hardware Security
If the computer is located in a location accessible by others, it needs to be physically secured. Prevent others from stealing the machine, installing key loggers into the machine’s ports, or other foreign, unapproved devices into your personal computer’s USB interface ports. Consider disabling your USB ports for safety sake. Obviously, if the computer is located in a home, physical hardware security is not as important. Never, plug in a USB flash drive or device that you find on the ground or that unexpectedly arrives.
Consider buying a secure flash drive such as Lok-it that requires a PIN to be entered before it allows access.
Securing the Windows Vista and Windows 7 Operating System.
Continue reading “How to: Windows Internet Security and Windows Security Made Easy”