
If you notice your smartphone is behaving badly pay attention. Smartphones are prime targets for hackers out to steal your personal information.
How can you tell if your phone has been compromised? Here are some things to look for.
Running Hot and Battery Drain
Is your battery draining more quickly? Does your phone feel hotter than normal, even when you are not using it? If so, that can be a sign of malware running in the background.
Unexplained Data Usage
Malware installed by hackers can up your data usage. Malicious software running in the background can be using data without your knowledge. Another sign that something isn’t right is that your GPS or internet (Wi-Fi or mobile data) becomes enabled or disabled by itself. Keep an eye on your monthly phone bill for any unusual charges.
Unexplained Apps
If you notice apps you didn’t install that’s a big red flag. Hackers can install trojans on your smartphone and the trojans can then automatically install other malicious apps.
Also be careful when installing apps yourself. Criminals clone legitimate apps that look very similar or identical to genuine apps tricking you into installing them.
Popups
If you notice popups or shortcuts on your home screen that were not there before you may be infected with malware or ransomware.
Performance Issues
If you notice your phone is running slower, locking up, shutting off unexpectedly, or if you see a record of calls or text messages you did not send, or you have trouble making calls or sending text messages. That can all point to a malware infection.
What Can You Do to Prevent an Infection?
Install Antivirus Software
Install a reputable antivirus software app on your phone. Keep it up to date and run regular scans.
Stay Up to Date
Keep your OS and all the apps on your phone up to date. Updates to the OS and apps address security issues and keep your phone running well by fixing know issues and providing new features and services.
Use a Strong Secure Password
Use a strong, unique password for your phone and all the websites you visit. Never use the same password more than once and change your passwords and security questions regularly. Use a password manager to keep a record of all your login information.
Backup
Enable automatic backups. This is extremely important. If your smartphone is ever compromised or you are the victim of a ransomware attack you could potentially lose everything you have on your phone. Having a backup ensures that you can recover your data if necessary. Backups are important not just in the event your phone is infected with malware but phones break, hardware failures happen, phones get stolen or lost. In each of those cases you would need a backup to recover your data.
Avoid Public Charging Stations
Public charging stations can be dangerous. Criminals use what is called “Juice Jacking” to steal data and install malware on devices that are connected to charging stations. This means that while you charge your phone “Juicing Up” the hackers use the connection to “Jack” your data and infect your phone.
Don’t Leave your Phone Unattended
Keep your phone on you at all times. Even though we pay hundreds and sometimes thousands of dollars for our smartphones we are often careless with them. Leaving them laying around. Not only can that lead to the loss of your device but if your phone falls into the wrong hands it can lead to data loss and identity theft as well. Both Apple and Android have tracking and remote wiping options. Be sure you have those options turned on. That way if your phone is ever lost or stolen you may be able to track and recover it and wipe your device of personal information if necessary.
Use SIM Card Lock
The SIM card in your smartphone is used to identify you and establish a connection to your mobile provider. When you lock the SIM card you are preventing your phone from being used on any network but your own.
Install Only Trusted Apps
Get your apps directly from the Apple Store or Google Play. Never install any third-party apps. Apple and Google both have procedures in place that ensure the apps they provide meet safety and security standards. Third-party apps may not have that process in place. Some third-party apps are malicious.
Disable Wi-Fi and Bluetooth and Turn off your Phone
Turn off Wi-Fi and Bluetooth when you are not using those services. If they are not enabled a hacker cannot get in. You can also turn your phone off when you are not using it like at night while you are sleeping.