advanced equipment can be modified to be a host to a virtual security criminals.But how users can avoid the ‘infection’ and ‘spread’ happens in a smart phone or tablet computer? Normally, when you think about viruses, spyware or any other cyber security threats, of course you think of the personal computer. For the majority of cyber attacks usually occur in the personal computer. Malware on a mobile phone? Or tablet computer? Can it? Indeed, it can happen especially if you are using a mobile device operating systems such as Android. According to Juniper Networks, for example Android malware increased sharply up to 472 percent in the period from July until November 2011. Hackers have declared war on Android and the user might they hit tempiasnya. To quote Sun Tzu in The Art of War, ‘if you know your enemy, you can win hundreds of battles without defeat “. Here are the five main enemy to Android users know and how to defeat them in this game. SMS Trojans
According to Juniper the same report, almost half of the application as if the malicious Android is now circulating Trojan that sends SMS text messages in background (without the user) to a number of phone numbers belonging to the attacker.As a result, the users you burdened with inflated monthly bills. The best way to stop the SMS Trojan is to avoid contact with infection. So use the Android security assistance specifically designed to combat all attacks that pose a threat. Do not use applications that looks suspicious or looks very well and good. Carrier IQ
The end of 2011, researchers found rootkits Carrier IQ software developers operating on millions of mobile devices.Although not look suspicious, reported record the location of the code including the password. Unfortunately, all this happens without the user and without the option disable its use. In order to control those threats get Carrier IQ Test, a free application that can detect and remove unauthorized software. Preloaded Applications
Usually the smart phone or tablet comes with bonuses such as applications, software not included with Android, but was added by the manufacturer.December last year, researchers found that preloaded applications that expose the safety of consumers, such as commonly used to steal personal data or eavesdropping on telephone conversations. Or even worse because most applications ‘blended’ with the OS and can not be removed. If the user using the Android 4.0 (Ice Cream Sandwich), they can hide and disable applications bloatware. Just by going to Settings, Device, Apps, go to All later applications that want to dump and press Disable. false Google Shop Play
Early years, Google has changed the Google Android Market to Play in which they combine several services such as applications, music, e-book.However, cybercriminals began to create a Google domain Play fake to trick users into installing malicious applications. How to fight those threats is to become more intelligent. Google Play Do not install the application by downloading their own, but follow the normal rules for updating the OS tools. Android security software can detect and remove any suspicious applications that may be installed without the knowledge. So better to use anti-malware on mobile devices. Warning false If you get a message from the bank says’ Your account is in trouble! Update your password. ‘ Go to the link takes the user on the same website that you frequently visit the bank. If the user entry to the account, it will pave the way for victims of cyber crime to steal all the user’s personal data. Never enter the link in the e-mail or text messages whilst appearing to do the same. Make sure you go roaming and connect to the financial institution directly and make sure the URL begins with https://, and now some financial institutions have a variety of security measures to protect consumer rights. And if the user is still in doubt about safety, contact the financial institution to deal directly.