Android Smartphone Security, How to securely use your Android Smartphone or Tablet

Last Updated: January 30, 2017

Android Smartphone,Samsung Galaxy 2, T-Mobile

Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S7. Most Android Smartphone users do not think very much about security.

If your

You need to test your Android Device for Vulnerabilities

Here are the major security holes that you need to test your phone against.  If it fails any of these, get it updated or buy a new phone.

QuadRooter – Learn more about this issue. August 2016

DroidJack Remote spying – Learn more about this issue. August 2015

Stagefright MMS Flaw- Learn more about this issue. August 2015

Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”

iPhone Security, How to securely use your iPhone

Last Update: 10/21/2016

Apple iPhone 3GS

Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security.  Our tutorial covers the iPhone through iPhone 7 Plus and iOS through iOS 10.

1. iPhone Software Updates

Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.

Always update to the latest iOS software available as soon as possible.

If you Jailbreak your iPhone, you need to be extra careful with regards to security as iOS updates are much more difficult for you. Be careful where you obtain your Jailbroken Apps as malware is much more prevalent.

2. iPhone App Security

Apple’s App Store reviews all submissions before adding them. All iPhone apps must be authenticated and signed which helps to ensure they haven’t been tampered with or altered. This helps prevent malicious apps from infecting the App Store. (This is not 100% foolproof)

Continue reading “iPhone Security, How to securely use your iPhone”