Students and smartphones come hand-in-hand. Usually, some level of computer literacy also comes along. But what is frequently absent is security skills- the ability to tell what downloads are safe, what sources can be trusted, and the knowledge of how to use the tools that are developed to provide a second line of defense against security intrusions. Malware developers know this, and a recent report says that they’ll target smartphones and related technologies more than ever in 2016. On compromised phones, criminals may even be able to get access to mobile payment systems, such as Apple Pay or Android Pay.
On Android phones, these threats are becoming more sophisticated (new malware may gain root access to the device, making them immune to virus removal software), but the way they get onto the system remains the same. Users should make sure to keep the “Install Software from Unknown Sources” setting unchecked except for when specifically installing software from outside the Google Play Store. Additionally, users should make sure that these outside sources are trustworthy before installing anything from those sources.
In addition, students should be aware that extra devices that they use carry extra security risks. Internet-connected devices of all kinds confer ways that personal information can be stolen, or methods for hackers to gain access to other devices. And as the Internet of Things develops, these methods of intrusion will only become more prominent.
For more information on this topic visit the article here.