2 startlingly simple tips to prevent and recover from poisonous software (malware) on your phones and such!

Posted on November 23, 2015 in hntbh - 0 comments - 0
malwareIn a galaxy far far away …
Android and Apple devices (yes that precious iPad too) can be victims to poisonous software (“malware”) that can invade our personal lives. Malware can…
  • Take pictures and videos at will and post them on the internet (but it is ok, because you are never are with your phone in the bathroom or in a compromising position 😉
  • Read and use text messages, Facebook posts, contact details, and listen to your phone calls
As technology has increasingly become embedded in our lives (cars, phones, pacemakers, computers), the speed of poisonous software also continues to keep pace. There are principles you can adopt now that apply to ALL your connected devices. In this piece, I highlight one of these below:
Tip #1 (safety):
  •   Never click on a link
Malware is installed in most cases because we humans receive a message (text message, email, instagram message) and click on a link. The link has disguised itself as a legitimate link, but the click allows malware to be installed on your device. From there bad things happen.
Tip #2 (sanity!!):
  •  Backup your data OFF the device
There are many methods, but simply be sure what you care about is saved on another device. This way when malware happens (or loss, theft, or dropping phone into a lake), you can restore the default software and replace your backup onto the device. The only recommended way to recover from a malware event.
If this was helpful to you or your family, please check out the other principles and 63 additional tips by freely exploring How Not To Be Hacked online using Amazon’s ‘peak inside’ feature. Feel free to message me online anytime with questions. Together we can protect our community and enjoy technology safely and securely.

About The Author

Author avatar

jjd

James has been in technology and information security since 1996, and has worked at both the hardcore technical areas (installing the wires and boxes), and has spent the last decade building and leading global information security professionals. James is a published inventor (encryption privacy related patent), a regular speaker, a leader in the information security field, and a passionate father.

Leave a Comment

Your email address will not be published. Required fields are marked *