Our cooperation partner Watchlist Internet provides tips on the topic: Installing secure applications on your smartphone

Criminals use fake apps to try to install malware on someone else’s smartphone. If they succeed, they have access to the mobile device and can steal sensitive data from victims.

To prevent this from happening, you may only download applications from official stores.

Criminals want to install malware on other people's smartphones using fake emails, SMS messages or infected websites.

In order to achieve their goal, they claim in the news, for example, that there is a frequency update or that online banking customers have to install a security certificate.

To do this, the criminals provide a link through which recipients can access the program.

Anyone who downloads and installs it will infect their smartphone with malware. Criminals have access to it and can steal important data or make money transfers. We'll show you how you can prevent this:

1. Do not install apps from unknown sources

Set your smartphone to not allow you to install applications from unknown sources. This makes it impossible for criminals to deposit manipulated malware on your mobile device via external sources. If you need applications, get them exclusively from

  • Google Play on Android smartphones,
  • iTunes App Store for Apple iPhones,
  • BlackBerry World on BlackBerrys or
  • in the Microsoft Store for Windows Phones.

Downloading from these providers brings security because the companies check the applications offered on them in advance before they are available.

2. Read customer reviews

Before downloading an application from the official app store, read customer reviews or test reports. This allows conclusions to be drawn about what problems or disadvantages there are with an application. In the best case scenario, this will help you detect hidden spy software without you having it installed.

3. Control access rights

Before installing an application, make sure you know how a program handles your personal information and whether it shares it with third parties. For example, it is suspicious if a calculator requests access to your contact information, your calls, your messages, your microphone or your location. If access rights are conspicuous or unclear, do not install the application. Use a safe alternative product.

4. Protect your smartphone

If necessary, install an antivirus program on your mobile device. It analyzes your smartphone and detects suspicious processes/applications. If the protection software detects malicious apps, it sounds the alarm and informs you about what measures you can take to prevent damage.

The Internet Watchlist recommends:

Do not install apps from unknown sources and find out in advance about the advantages and disadvantages of an application. This minimizes the risk of you installing malware on your smartphone!

via Watchlist Internet

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )