With this material, we continue to discuss the issues of data security on modern mobile devices. The article "iOS Device Security: Viruses, problems and Solutions" has already been published on the site.

Android's main problem is fragmentation. The fact is that it is used on a variety of devices by manufacturers from all over the world. At the same time, the difference in their technical characteristics is sometimes significant. Not only the screen sizes may differ, but also resolutions, processors, RAM volumes and much more. Inevitably, there are differences in the installed systems. As a result, the Android OS used on Samsung or Sony smartphones is very different from the one installed on some Chinese-made model.

In addition, manufacturers often supply the installed system with all kinds of add—ons and pre-installed applications, which can eventually cause a wide variety of problems - from simple "brakes" to security holes (this topic was raised in more detail in the article "Which of the branded shells for Android smartphones is better?").

According to statistics, Android is most susceptible to the threat of malware,
despite the fact that many have not had to deal with this

But the main problem of fragmentation is the lack of normal support from manufacturers. It often happens that users do not receive updates for their devices (or receive them very late), as a result of which they are forced to go with outdated versions of the system containing whole sets of identified vulnerabilities. This is especially true for owners of devices from little-known manufacturers. Quite large companies usually tend to release updates, at least for top-end solutions. But even they are often simply unable to cover their entire model range, sometimes including dozens of models.

As a result, Android smartphones cannot compete with Apple's creations in security issues. But on the latter side there is a limited model range, the problem of fragmentation cannot arise simply by definition, as there are no problems with timely updates. In addition, Apple has a very strict policy that restricts many user actions, preventing them from performing some potentially dangerous actions. The creators of Android cannot do this by definition, because then they will have to abandon the ideas inherent in the very psychology of this system. Do not forget that many users choose it precisely as a solution that does not limit their capabilities, does not keep them in strict limits.

One of the important problems is the lack of normal support from manufacturers. Often, users do not receive updates for their devices (or receive them with a long delay), as a result of which they are forced to go with outdated versions of the system

But additional freedom also implies additional responsibility. Accordingly, some attention will have to be paid to security issues. After all, the vast majority of problems are usually associated with incorrect user actions.

What you need to do to not be afraid of anything

There is a statement according to which the main virus is sitting behind a computer monitor. The same can be said about modern smartphones. But a little care and some simple settings will allow you to avoid most security problems.

1
Never install suspicious applications from unknown sources. In most cases, all problems arise due to the fact that users mindlessly install all kinds of applications. Use only verified sources — it's best if it's Google Play. Avoid unknown sites distributing software. The probability of "catching" a virus there is too high. By the way, you can make it so that the very possibility of installing software from unverified sources is disabled. To do this, go to "Settings" — "Security", disable "Unknown sources" and enable "Check applications".
 
2
You should always install programs from trusted developers. If the creators are unknown, then it is not superfluous to get acquainted with the reviews and ratings left by other users who have already had experience using this software. It is not difficult to find specialized resources and forums on the Web where various applications are discussed and consulted and reviews are written about them.
 
3
Be sure to pay attention to what applications are allowed. Before installing the programme, they always tell you exactly what they want to access. And here you need to show minimal care. So, if the game wants to deal with contacts, identification data or SMS, then this, at least, should alert.
 
4
Delete everything you don't need. If you have received a bunch of pre-installed applications bundled with the device (sometimes their number can be measured in dozens), then do not be lazy and delete all those that you do not need. In addition to the vacant space, you will be sure that these programs will not do anything "left". This is especially true for owners of devices from little-known Chinese manufacturers.
 
5
Be careful with messages from unknown senders. It's hard to even imagine how many malicious programs were installed by users who clicked on links from messages received from unknown people. We are talking about both E-Mail and SMS. Moreover, even if a message with an incomprehensible link came from a well-known contact, it is better to clarify whether he really sent it to you personally. A malicious programme could have done it for him.
 
6
Install all updates in a timely manner. Each update carries not only additional features, but also eliminates the identified security problems. The newer your operating system version is, the better. However, as noted above, little-known manufacturers sometimes do not deal with such issues at all and do not release any updates.
 
7
Be careful with wireless networks. It is strongly recommended to avoid open public Wi-Fi networks that you don't know anything about. They are often deployed by intruders in order to steal user data. It also doesn't hurt to go to "Settings" — "Wi-Fi" — "Advanced Settings", where to disable "Always search for networks". And it's better to disable the Wi-Fi module altogether when you're not using it.
 
8
Set a password. So that no one can access your data in your absence, it's ok to protect the device with a password, and not with a PIN code or a graphic key, which are easy to spy on. To do this, go to "Settings" — "Security" — "Screen Lock" and specify "Password" as the way to lock the screen. A good password should be long enough to contain both letters and numbers. Although you should not get too carried away either, because you may get tired of entering this every time you unlock the device. For additional protection, you can also go to "Settings" — "Security" and disable "Show passwords" there. After setting the password, you can encrypt the data, after which only the user with the correct credentials can access the data. To do this, go to "Settings" — "Security" — "Encrypt phone". If you are using a memory card, then also enable "Encrypt SD card". Not all devices have the ability to encrypt.
 
9
Turn off notifications. When various messages come to your phone, by default they are displayed even on the locked screen. At the same time, they can be read by random people who are just nearby. To avoid this, go to "Settings" — "Applications" and there disable "Show notifications" for each of the programs separately.
 
10
Users who really fear for their safety can try various antiviruses. You should be careful — there are many "Trojans" in the app store that pose as security programs. It is best to focus on such proven applications as Norton Mobile Security, Lookout Mobile Security, McAfee Antivirus & Security or avast! Mobile Security. Their functionality is approximately the same, the choice depends more on personal preferences.
 
Before installing the mobile application, carefully study the list of resolutions

Well, finally, we note that issues related to Android security are no longer as relevant as they were a few years ago. Other users can do without the procedures described above and at the same time never face problems and data theft. A lot here depends on the value of the data. And if corporate users really should be afraid of hacker attacks, then ordinary people who use a smartphone only for communication and games do not need to worry too much. However, additional precautions have not bothered anyone yet.

Smartphones with maximum protection

The Turing Phone smartphone comes with special software
to increase user security

Knowing that many modern users are very concerned about security issues, some smartphone manufacturers produce models with a high level of protection. For example, Turing Robotics Industries (TRI), a little-known company in our latitudes, recently introduced the Turing Phone.

The smartphone comes with pre-installed software specifically designed to enhance user security. Be prepared to have to constantly enter passwords and deal with encrypted data. It is also interesting that the device is well protected not only inside, but also outside — the case has protection from moisture or dust penetration and is made of special alloys capable of withstanding solid loads.

It's hard to say how popular Turing Phone will become. Nevertheless, it is quite possible to expect the appearance of a number of similar devices in the future. After all, the more we begin to depend on the Internet, the more data security is valued.

Interesting. Unlike iOS, there are many anti-virus applications for Android, and perhaps as many more will be created in the near future. Many people are trying to earn money on the user's desire to secure their data and money, for some of them the desire to earn is the only motivation. In this regard, the history of the Virus Shield antivirus is very instructive, which one "fine" day appeared on Google Play and, according to the description, allowed to prevent the installation of malware, scan already installed software and files in real time, as well as protect personal data. The application was as easy to use as possible — the interface, in fact, consisted only of a single "Activate protection" button. This joy cost $ 3.99, had a rating of 4.7 stars, and the number of downloads exceeded 10,000 — such characteristics only contributed to its popularity. But after studying the programme code by several specialized media, it turned out that changing the colour of a single button is all its functionality. At the moment, the application has been removed from Google Play due to mass petitions. But the important thing in this story is not that the application is no longer there, but that it and its like can easily appear on Google Play and cause double harm to users — to pull money for the purchase of "air" and give false confidence that their devices are reliably protected from viruses. Be careful, pay attention to the manufacturer, read reviews, look for additional information on the Web.
 
See also:
Player in the cloud: comparing Apple Music and other music services
We compare popular streaming services to find out what their pros and cons are, as well as features.
How to avoid cheating by buying goods online
A few basic tips that will help you avoid fraud under the guise of online trading.
High-Resolution Audio: new impressions of old music
We understand how and on what you can listen to High-Resolution Audio recordings, as well as where to get them.
Learning to take pictures with a smartphone
A few simple rules that will improve the quality of photos taken on a smartphone.
Learning to save: how to use electrical appliances wisely
A few simple rules will significantly reduce your energy bills.