4 Ways to Keep Your Smartphone From Getting Hacked

By on

This post comes from Adam Levin at partner site Credit.com.

By now, most of us know that when surfing the Web we shouldn’t click on ads promising us new ways to lose weight without dieting, read emails about magic pills to boost our “egos” or even click on Twitter links about the “shocking” pictures some friend supposedly found of us online.

That is, we know not to do those things from our computers. And hackers and cybercriminals know we know this, too. That’s why they’re targeting our smartphones.

A study by Trend Micro suggests that there are nearly 750,000 malware apps for Android users alone — and that’s just apps.

A security company called Bitdefender documented a nearly 300 percent rise in Android-focused malware in 2012, though that’s not limited to apps. And a Cisco security study issued recently showed that 99 percent of all the mobile malware out there targets Android users, who encounter malware through apps, email phishing, “smishing” (the use of text messages to distribute malware) or other forms of social engineering.

Why the relentless focus on Android users? Well, for one, Android represents more than 80 percent of the new smartphones on the market, which makes it a better investment of a hacker’s time. Next, the Trend Micro study found that the toolkits for creating this malware are readily available on the black market.

Finally, several security researchers have identified a specific exploit malware makers can use to get into Android devices, which Google and Samsung identified not as a flaw, but as a “legitimate Android [function used] in an unintended way.”

That keeps me up at night … and I don’t even have a cellphone. (Kidding.)

So what’s the average Android user to do?

1. Treat your smartphone like a computer

If you wouldn’t click on it, open it, download it or go to great efforts to get it for free (like trying to pirate it) on your super-expensive laptop, don’t do it on your smartphone. That “free” version of a legit app is something you might end up paying for when your phone starts spamming other users with texts you didn’t send, and that “link” to supposed pictures of yourself is more likely a malware downloader than memories of spring breaks past.

We all know what not to do “on the Internet” but, with a smartphone, you’re always on your computer and on the Internet even when you’re not at your desk.

2. Wait until later

Just because it’s delivered to you with the immediacy of a smartphone doesn’t mean you have to open it on the run. If it looks iffy, wait until you get home and use a URL expander to check where shortened links really lead, or call or email the friend who sent something that looks fishy. Nothing is that much of an emergency.

3. Download apps only from verified providers

Malware developers may simply take apps people want (but maybe don’t want to pay for), update them with malware and upload them to the Google Play store for unsuspecting users to download.

If you don’t see a little blue icon next to the company’s name in the Google Play store, they aren’t a verified developer. And if you don’t see a bunch of positive reviews of an app or you’ve scrolled through many pages of potential 99-cent apps to find this “great” free one, you might want to consider what, if anything, you’ll really be saving if you download malware.

4. Keep an eye on your bill

If you do download malware by mistake, even deleting the app might not end the infection. You should be checking your data and text usage to watch for spikes, as most malware is designed to send texts, steal and transmit data, or serve you with extra ads.

If you notice usage spikes even if your behavior hasn’t changed, have dropped calls that didn’t used to drop or a battery that runs down faster than normal, these are other signs that you should back up your photos and factory reset (i.e., delete everything on) your phone.

Finally, if you think you may have been victimized by a malware attack on your phone or anywhere else, your personal information could be at risk. Monitor your accounts closely, check your credit reports (you can do that for free once a year), and use free tools like Credit.com’s Credit Report Card to monitor your credit and credit scores every month.

If you see something out of the ordinary, jump on it. The hackers are hoping you won’t.

More on Credit.com:

Sign up for our free newsletter

Like this article? Sign up for our newsletter and we'll send you a regular digest of our newest stories, full of money saving tips and advice, free! We'll also email you a PDF of Stacy Johnson's "205 Ways to Save Money" as soon as you've subscribed. It's full of great tips that'll help you save a ton of extra cash. It doesn't cost a dime, so why wait? Click here to sign up now.

Check out our hottest deals!

We're always adding new deals and coupons that'll save you big bucks. See the deals to the right and hundreds more in our Deals section.

Click here to explore 1,267 more deals!

Comments & discussion

We welcome your opinions, but let’s keep it civil. Like many businesses, we reserve the right to refuse service to anyone. In our case, that means those who communicate by name-calling, racism, using words designed to hurt others or generally acting like an uninformed bully. Also, comments that include links to email addresses or commercial websites typically aren't posted. This isn't a place to advertise your business.