Browse Internet on Mobile or Tablet Smartly to Protect your Privacy

No comments
Safe Internet Browsing
Few decades ago, mobile phones and personal digital assistants (PDAs) were luxury items with limited functions which everyone could not afford it. Now, almost every adult and teenager have them and use them to keep calenders and phone directory, play games, media files, send emails, browse internet, exchange messages and sometimes phone calls too. These email and web browsing features are feasible because many cell phones and PDAs are equipped with wireless technologies such as Wi-Fi and Bluetooth which permit them to connect with other similar devices and the internet. But unfortunately, these wireless technologies make these devices vulnerable to the same kind of threats which computers, laptops face, such as malware and data theft. Nowadays, folks use smartphones to browse the web for downloading apps, shopping online, social networking and so because of which mobile devices suffer increasingly from malware, although device manufactures continue to release patches to fix privacy and security gaps. Yo must be meticulous to protect your privacy when surfing the internet from a mobile or tablet. Many websites ask you to enter personal information to recognize oneself, but there are ways for people to record this data secretly and use them without your consent and maybe against you. It is essential for you to protect your personal details like mobile number, credit card number and other sensitive info from getting stealth and keep them private. Below are few essential ways which can help you to achieve complete privacy -

Downloading Unknown Apps

While surfing the internet from mobile you may visit a webpage that triggers the automatic download of virus-infected apps. In many cases, such infected webpages encourage you to open the downloaded app to actually infect your smartphone with spyware, malware, which may send your personal data like phone contacts, messages and so. Cyber crooks may use malvertizing to publicize fun apps like gaming, social or antivirus apps which need internet to run them an direct you to app store which may be fake or virus-infected to install them. Once you reach to their desired  website, what you download is actually malware. It's needless to say that mysterious app stores are not the best place to get apps from.

Visiting Unkown Websites? Go for https

Lock Icon
It's always advisable to download, shop or do anything online from known websites which are secure. But even if you come across an unknown website, make sure it is genuine & providing you downloads from 'https://' servers which are certified, legal and secure. If any website asks your personal information like credit card number, mobile number or any sensitive information, check the beginning of it's web address in address bar, it it is secure it should be 'https://'. During online transactions make sure there is lock icon somewhere at the bottom or top corner because cyber crooks can spoof the 'https://'. Lock icon indicates the information shared between parties is encrypted, clicking on it a dialog box appears which has security  details like digital identity certificate, encrypted coding, sharing of information, storing of cookies on your device and others.

Avoid Clicking Unknown Links

Usually spam messages contains suspicious links in them. Don't click on such unknown links if you don't trust the source, clicking on them may redirect you to some other malicious website or trigger some download which can be malware or can steal personal details from mobile phone without warning you. Nowadays, shortened links or URLs are used to make bigger URLs compact. Visit only those URLs which you trust.

Unsafe links can be any of these links -
  • Malicious links - clicking on it, redirects you to websites developed be cyber crooks which are infected with viruses. Any file downloaded from those website will harm your gizmo & fill it with malwares.
  • Compromised links - This are links to legitimate and reputable sites which cyber crooks have ruptured and placed either malicious code or ads on their site.
  • Phishing links - Generally sent by email on behalf of winning lottery, claiming your prize and asks you to provide personal details like name, address, phone number, bank account number or sometimes link may redirect you to cyber crooks website that asks you for personal data to log in.
You may find this links in your browser search results or spam emails. Sometimes, you might find them in your Facebook timeline, tweets from unknown person. Be vary, although, installing a antivirus software can be very much useful.

Lock your Gizmo when not in use

Most folks have habits to keep their user names, email id and password stores in the mobile phone browsers like opera, safari, bolt, blazer & others to give you one click access to your various web accounts like Gmail, YouTube, Facebook, e-banking. It is recommended to turn internet connectivity off and lock the phone when not in use. The locks vary in complexity from alphanumeric codes to even face recognition in some high-end mobile phones. Android users can install APP-LOCK app from Google play store to lock the device while others can find the similar app or at least start up by Turing ON the auto-locking feature on your gizmo. If feasible, lock the browser with password. This will keep your personal information safe and secure when your gizmo is in unsafe hands or stolen.

Avoid Spammy Apps

You may come across suspicious links or URLs, may be in spam emails, social media accounts or when you visit unknown website in search of apps which might contain virus, malware, avoid clicking & downloading them. Most mobile phones have an app store or play store for downloading apps, productivity utilities which are genuine. Before purchasing or downloading any new app from anywhere, do your research, look for ratings, popularity, demo version. An application from unknown developer or website can be fake or modified one by cyber crooks which might collect details like contacts, messages on your phone and use them to attack you

Cautious while Sharing Photos

If you are sharing your daily life on social networking, make sure you have locked down your privacy settings. Sharing personal photos publicly means you rub the risk of exposing yourself to entire world. Moreover, if you're moving too fast and not paying attention to photos shared, you may share the wrong photo from your tablet, revealing something that was meant to be private. Be safe & keep too-private photos in separate folder. Be meticulous in what to share & what not as your online reputation is dynamic.

Avoid Geo-Location Tools

Avoid Location Sharing
Whenever you post anything on any social networking site you may be sharing you current location too, if you have enabled geo tagging or location tool. It can be worse if you're sharing it publicily. Every time you login or post anything means you are telling the world preciously where you're present & on filp side, exactly where you are absent. As thieves get more tech savvy, there is a possibility that that location sharing could lead to home burglary, if you share that you are not at home for few days. The matter of cyber stalking is also a concern, especially when kids are concerned.

Read Privacy Policy

Registering or doing business with a web site like online shopping, social networking, play store or any multimedia sharing sites just based on its features, secure connections, free offeres is not enough. Equally imperative is its web security. What do they do with your private data? Do they share your personal details like phone number, address, email id and so with third parties? Do they have prominent policy? If yes, what's written? Just calling it a privacy policy doesn't provide guarantee that it will protect you completely. Read it patiently for yourself. If you're satisfied with it, go ahead otherwise leave it. Even when you install apps on your gizmo and open an account, it has privacy policy. Apps like Facebook, whatsapp, hike, line are among few of them which accesses contact directory on your device, don't believe? Have a look at their policy

Few more tips to browse the web smartly -
  • Avoid internet browsing through unknown and public Wi-Fi  networks. Cyber criminals can attack mobile or tablets by creating phony Wi-Fi hotspots.
  • On your home Wi-Fi network enable encryption.
  • Think twice before adding your phone number on unknown websites, cyber crooks can use certain software to accumulate them from websites and target those numbers.
  • If you come across any suspicious link or a winning prize mail, don't click on it, it contains phishing links or may redirect you to website which doesn't exist, thereby stealing your personal details.
  • Keep all applications, operating systems on your tablet or mobile phone up-to-date.
  • Research a bit before installing an app. Do not install an app which requires permissions beyond what usually an app requires, it could be some virus like Trojan horse.

No comments :

Post a Comment

How to Save a Wet Mobile Phone or Tablet

No comments
Wet Phone
So you have just dropped your gizmo in a puddle of water may be in swimming pool, fish tank or getting caught in a hefty shower and you are worried that it may be damaged or completely dead. But don't panic, you can still rescue your gizmo if you act quick.

First & Foremost - Turn it off & Disassemble it

Disassemble Phone
Be quick to remove gizmo from puddle of water and TURN IT OFF immediately without wasting a second. Now, you have stopped the power supply, so further damage to gizmo cannot be done. If you wish to dip it into water again then you can, it won't cause damage anymore till power supply is NOT resumed. Dismantle any add-on like battery, Sim card,  memory card, cords. If feasible, try to unscrew entire body parts for quick and perfect drying.

Time to Dry

Its time to dry the circuit board, wires, buttons and processors inside which can be achieved by various ways like -

Silica Gel Packets
1. Silica gel packets - Usually silica gel packets are found in brand new products like bags, shoes and also in food, grocery items. You can also buy them separately from stores for few dollars. Place your wet mobile phone or tablet with lots of silica gel packets in a box or plastic bag. Silica gel is a drying agent which is specially used to absorb moisture effectively. Leave it for 2 to 3 days to achieve efficient drying.

2. Using uncooked rice - Alternately, bury the wet tablet or parts in a big bag/bowl of uncooked rice such that it covers all sides of gizmo by at-least an inch or so and leave it for 1 to 2 days. Rice will soak up almost all the moisture like silica over-nite.

3. Blow air to Dry - Air is obviously helpful to dry out things perfectly, but that doesn't mean you should leave the wet mobile phone under the fan in an open room, instead, hold the wet gizmo in front of the air conditioner's vent for few minutes. Also, it is not recommended to use a hair dryer because hot or unrefined air isn't good for any wet gizmo, it may damage the circuit board. But if you don't have any other option at that very moment other than using a hair dryer, keep the settings low and hold your wet mobile phone enough far away from dryer.

Wet Phone in Oven
 4. Oven - Other way to dry out moisture from internal components of gizmo is by keeping your wet mobile phone in oven in a oven tray but setting the oven to its lowest setting. 110-120 degrees Fahrenheit temperature won't cause any damage to gizmo, but you'll have to keep on trying this method many times to achieve complete dryness.
 
5. Alcohol - If above solutions doesn't work then try this extreme alcohol solution. Dip the switched off device into a bowl or glass of PURE alcohol. Alcohol will take place of water & entire water will drain out. When the device is taken out, the alcohol will evaporate leaving your device dry.

Conclusion

All of these techniques relies on chance and a bit of luck. The most imperative part is to act quick in removing the gizmo from puddle of water and switching it off before water hits & causes any major damage to circuit board. Even if you revive your device there are possibilities of water-contact parts getting corroded over time, so after few months or so your gizmo may slow down, face circuit problem, therefore its desirable to service your gizmo at least once. After trying out this techniques when you feel it has dried completely, wait for few hours. Check whether your gizmos- slots, components are clean & dried. Turn on the device, if your phone doesn't starts, remove the battery & head to your nearest service center. And don't lie to service-man when asked about phone getting wet because many smartphones have a water indicator which tells the technician it had a bath or swim.

For example iPhone 5S's water indicator changes color from white to red when it gets wet.  The best option is to keep your gizmo in a secure place where it is improbable to be exposed to any water damage.

No comments :

Post a Comment