RISMedia
  • News
  • Premier
  • Reports
  • Events
  • Power Broker
  • Newsmakers
  • More
    • Publications
    • Education
No Result
View All Result
  • Agents
  • Brokers
  • Teams
  • Marketing
  • Coaching
  • Technology
  • More
    • Headliners New
    • Luxury
    • Best Practices
    • Consumer
    • National
    • Our Editors
Join Premier
Sign In
RISMedia
  • News
  • Premier
  • Reports
  • Events
  • Power Broker
  • Newsmakers
  • More
    • Publications
    • Education
No Result
View All Result
RISMedia
No Result
View All Result

Your Smartphone Is a Target, So Make It Secure

Home Consumer
By Troy Wolverton
May 20, 2015
Reading Time: 4 mins read

Businessman holds smart phone with open lock(TNS)—Consumers beware: Your smartphone represents a uniquely valuable and vulnerable target for hackers, scam artists and other bad actors.

But don’t panic. While the security threats to your smartphone are real and growing, they’re nowhere near crisis levels. And you can protect your device and your data from many of the biggest security threats fairly easily.

“Remember, this is a computer in your pocket,” says Cooper Quintin, a staff technologist at the Electronic Frontier Foundation, a civil liberties nonprofit. “Treat it as such — Use the common sense security practices that you would use on your computer.”

Like your wallet, your smartphone carries your personal information and oftentimes stores your bank account and credit card numbers. Smartphones have similar processing power to PCs and similar potential vulnerabilities, but unlike many computers, smartphones have an always-on connection to the Internet.

With the number of smartphones in use rivaling PCs, they have become an increasingly tempting target for bad guys who are catching on to their worth. Some 3.1 million smartphones were stolen in 2013, nearly double the number from 2012, according to Consumer Reports.

The amount of malicious software, known as malware, targeted at devices running Android — by far the most popular smartphone operating system worldwide — is growing rapidly. So too is the amount of so-called adware, code that typically displays what appear to be system alerts, but are actually advertisements that urge consumers to download software.

“It’s getting worse and worse, to be honest,” says Peter Stelzhammer, who works with AV-Comparatives, a firm that reviews and rates anti-malware products.

And it’s not just the hackers and criminals who pose a security threat to users. Even legitimate apps collect plenty of personal data on users and frequently demand access to lots more information and sensors than they really need. App makers can use that data for marketing purposes and share it widely without consumers even realizing what they’ve collected. Smartphones also tend to have a whole lot more sensors than PCs, which can be used to track your location and activities and even listen in on your conversations.

Meanwhile, documents leaked by Edward Snowden indicate that the National Security Agency is able to tap into some of the data transmitted by smartphones to cloud-based computers and can secretly use smartphones to spy on their users.

“The cell phone is the most effective surveillance device out there,” says Bruce Schneier, chief technology officer at Resilient Systems, an Internet security firm.

You may not be able to completely protect yourself from the NSA or from tracking by legitimate apps, but you can take steps to make your smartphone more secure.

Prevent unauthorized access to your phone if it’s lost or stolen by establishing a passcode. On an iPhone, activating a passcode has a second benefit: It serves as a lock for the device’s encryption feature, which by default scrambles all the data on it. On Android devices, you frequently have to turn on encryption separately.

Both iPhones and devices running Android now come with software preinstalled and turned on by default that allows you to find them if they are lost and remotely delete personal data from them if they are stolen. Make sure to activate the feature when you set up your phone.

You can avoid the vast majority of smartphone malware by sticking to the official app stores. Most of the bad apps out in the wild are being listed on third-party stores, mostly in places like China and Russia. Apple closely scrutinizes all iPhone apps for security and other issues before they are listed in its store. While the Google Play store is more open, Google also is reviewing the apps within it fairly closely.

Anti-virus programs, which you can run on Android devices but not iPhones, may not be necessary, but they won’t hurt to have in place, security researchers say.

You can also limit how much data you share with apps. That’s relatively easy on the iPhone, where apps have to ask for permission the first time they attempt to access the camera or contact lists. It’s more difficult on Android, where users typically only have one chance to say no to granting access to such data and features—when they install the app. Still, security researchers recommend that consumers look closely at what permissions apps are asking for—and avoid apps that ask for too much.

“If you’re installing a game, it shouldn’t have access to everything that’s on your phone,” says Ragib Hasan, assistant professor in the University of Alabama Birmingham’s computer and information science department. “If there’s something fishy, you should not install it.”

Beyond that, take some of the same precautions you would take on a PC. Think before you click on emailed links or attachments, and be careful what sites you visit.

“Common sense is always the best line of defense,” the EFF’s Quintin says.

Protecting Your Phone

Security threats to your smartphone are proliferating. Here are six ways to protect your device and data.

—Use a passcode: A PIN or password can prevent others from unlocking your device.

—Use encryption: Encryption scrambles phone data so it can’t be read by unauthorized users. iPhones encrypt data by default when you turn on a passcode. On Android devices, you often have to turn on encryption separately.

—Scrutinize permission requests: Many apps, particularly on Android, ask for more permissions than they necessarily need. On iPhones, you can block apps’ access to particular features or data. On Android, you may have to simply avoid certain apps.

—Stick to official app stores: Most smartphone malware is being distributed through third-party app stores, typically in places like Russia and China. Apple and Google, by contrast, have done a good job of keeping bad apps out of their stores.

—Use ‘find my phone’ features: Apple’s Find My iPhone and Google’s Android Device Manager help users locate lost phones and allow them to delete data from stolen ones.

—Run anti-virus software: You can’t run anti-virus programs on iPhones, but you can on Android devices, often for free. The best ones will catch as much as 99 percent of known smartphone malware.

—Source: Mercury News Research

Troy Wolverton is a technology columnist for the San Jose Mercury News.

©2015 San Jose Mercury News
Distributed by Tribune Content Agency, LLC.

ShareTweetShare

Related Posts

Fathom
Agents

Fathom Acquires Residential Brokerage START Real Estate

October 16, 2025
Rechat Announces Integration with Loft47 to Launch a Commission Management Platform
Industry News

Rechat Announces Integration with Loft47 to Launch a Commission Management Platform

October 16, 2025
Leading With an Agent-First Vision
Brokers

Leading With an Agent-First Vision

October 16, 2025
Is Your AI Strategy Safe and Secure—or Are You at Risk?
Industry News

Is Your AI Strategy Safe and Secure—or Are You at Risk?

October 16, 2025
Now Is the Time to Define Your ‘Why’ in Real Estate
Agents

Now Is the Time to Define Your ‘Why’ in Real Estate

October 16, 2025
Mortgage Rates Slide Slightly
Industry News

Mortgage Rates Slide Slightly

October 16, 2025
Please login to join discussion
Tip of the Day

What to Watch Out for When Editing Listing Photos

Learn the tricks of the trade to nail down many ways to photograph properties, from snapping quick pics with a smartphone to shooting on a proper camera mounted on a tripod. Read more.

Business Tip of the Day provided by

Recent Posts

  • Fathom Acquires Residential Brokerage START Real Estate
  • Rechat Announces Integration with Loft47 to Launch a Commission Management Platform
  • Leading With an Agent-First Vision

Categories

  • Spotlights
  • Best Practices
  • Advice
  • Marketing
  • Technology
  • Social Media

The Most Important Real Estate News & Events

Click below to receive the latest real estate news and events directly to your inbox.

Sign Up
By signing up, you agree to our TOS and Privacy Policy.

About Blog Our Products Our Team Contact Advertise/Sponsor Media Kit Email Whitelist Terms & Policies ACE Marketing Technologies LLC

© 2025 RISMedia. All Rights Reserved. Design by Real Estate Webmasters.

No Result
View All Result
  • Home
  • Premier
  • Reports
  • News
    • Agents
    • Brokers
    • Teams
    • Consumer
    • Marketing
    • Coaching
    • Technology
    • Headliners New
    • Luxury
    • Best Practices
    • National
    • Our Editors
  • Publications
    • Real Estate Magazine
    • Past Issues
    • Custom Covers
  • Events
    • Upcoming Events
    • Podcasts
    • Event Coverage
  • Education
    • Get Licensed
    • REALTOR® Courses
    • Continuing Education
    • Luxury Designation
    • Real Estate Tools
  • Newsmakers
    • 2025 Newsmakers
    • 2024 Newsmakers
    • 2023 Newsmakers
    • 2022 Newsmakers
    • 2021 Newsmakers
    • 2020 Newsmakers
    • 2019 Newsmakers
  • Power Broker
    • 2025 Power Broker
    • 2024 Power Broker
    • 2023 Power Broker
    • 2022 Power Broker
    • 2021 Power Broker
    • 2020 Power Broker
    • 2019 Power Broker
  • Join Premier
  • Sign In

© 2025 RISMedia. All Rights Reserved. Design by Real Estate Webmasters.

X