Interesting Article

News image

IBM Exascale Future

IBM Exascale Future Super Computer To Store 1500 Petabytes Per Year Despite everything that’s known and theorized about space, anyone can ... READMORE

News image

Famous Movie Scenes

READMORE

News image

Top 16 Most Expensiv

  READMORE

News image

Emma Watson

  Emma Watson (born 15 April 1990) is an English actress and model. Watson rose to prominence playing Hermione ... READMORE

News image

Beautiful Miley Cyru

  The beautiful, the gorgeous hollywood actress Miley Cyrus here in this pictures. see more pics after the ... READMORE

News image

Anu Smirthi in Black

READMORE

News image

Rapunzel's Uncut Hai

12-year-old Natasha Brazilian Moraes de Andrade, who has never cut her hair in her life or went to th... READMORE

News image

Shriya Spicy Photo G

READMORE

News image

Sleeping with Snakes

Photo ERIK DE CASTRO/REUTERS Manila's zoo owner, Emmanuel Tangco, not only handles snakes for a living, he also sleeps with them on ... READMORE

News image

Orsos: A Moveable Fl

Orsos Islands is a luxury floating island that has the ability to be moved and re-anchored. I should clarify that ... READMORE

News image

Behringer outs three

READMORE

News image

Gutta Jwala Photo Ga

READMORE

News image

The World Famous Cap

Is it a cat? Is it a dog? Is it a hamster? These are just some of the question... READMORE

News image

30,000 Swarming Pa

Based in Mexico city, Carlos Amorales is an artist who embraces many art forms, including large installations, performance, drawing, ... READMORE

News image

Monal Gajjar from Su

READMORE

Loading...

Recent News

News image

Amazing Portraits Ma

American artist Zac Freeman forms unique portraits out of all kinds of small and used materials. Each of his objects... READMORE

News image

Adjustment in Life

READMORE

News image

Earth’s Most Incredi

Although as far as planets are concerned Earth is relatively moderate with regards to its climate and geography (good thing ... READMORE

News image

Maria Sokolovski — S

Italian beauty Maria Sokolovski is the face of a famous Indian fashion brand name " Seasons" these are some of her unforg... READMORE

News image

Alan Friedman’s Phot

Alan Friedman is a fascinating guy. By day he’s a maker of greeting cards and a lover of hats, but in his ... READMORE

News image

Anastasia Luppova

  Anastasia Luppova is a Russian billiards player, the two-time European champion in Russian pyramid, the champion of Moscow ... READMORE

News image

Toy Robots Made from

Portugese product designer Marco Fernandes built some fun robots out of electrical components salvaged from the trash heap. So far Fern... READMORE

News image

Creative Handbags By

These bags are going to blow your mind off. Kathleen Dustin, who is Master of Arts, designs and makes very wei... READMORE

News image

10 Things a Girl Pro

READMORE

News image

United States Map Ma

U.S.A. (burnt/unburnt) is a 2011 installation by Paris-based artist Claire Fontaine. Art of “Evidence of Bricks” at the 2011 Time-Based Art Festiv... READMORE

News image

Kawazu-Nanadaru Loop

Photo — Link How do you build a bridge on a mountainside when the grade is so steep that a linear ... READMORE

News image

Shreya Mishra

  Beautiful Shreya Mishra photoshoot pictures, more pics after the ... READMORE

News image

9 Best Edible Natura

9 Best Edible Natural Oil Around the World Gone are the days when all you had to do was choose ... READMORE

News image

Chair Sculpture For

It took the artist around five days to build 'Chairs For Abu Dhabi' sculpture. Visitors are invited to walk through the ... READMORE

News image

Hilary Duff — Shoppi

  Making some additions to her wardrobe as she loses the baby weight, Hilary Duff shopped in Beverly Hills on Tuesday ... READMORE

Loading...
Secure Your Android from Virus Attacks PDF Print E-mail
Written by Sandip   
Tuesday, 10 April 2012 10:19
Tablet or Smart Phone with operating system commonly used in the exchange files via browsing or other media such as bluetooth is highly vulnerable to virus attacks (malware). Not only in personal computers, in Android is also frequently found in various virus / malware. Android users will certainly upset caused by the virus, that making the performance of your tablet or smart phone android is not optimal.

image: tekno.kompas.com
Even practitioners of virus in the hardware, has been detected three false installer to update an application for Android, which Androidos_ADSMS.A, Androidos_Dordrael.l, and Androidos_crusewin A. So is latest Android Malware, called Droid Dream Light (DDLight). Malware has managed to outwit 30000-120000 Android users. Outside it's still a lot of viruses or other malware.
Here are some tips from tekno.kompas.com for your favorite Android device so safe from virus attacks or malicious malware:

1. Take advantage of standard safety features in Android device
Go to menu> Settings, then Select> Location & Security> and enter data such as PIN and Password to lock the phone. This is useful for securing personal data when the phone is lost physically.

2. Do not select the Auto setting Connect to Wi-Fi
Go into the menu> Wireless & Network, and select> WiFi Settings, disable the function Auto Connect to Wi-Fi. Especially if you are using Internet banking.

Android devices are usually connected to the wifi even more vulnerable to hackers compromised (hackers). Weak security as experienced by the applications using named ClientLogin authentication protocol that runs on Android OS version 2.3 and
previous versions.
With ClientLogin, users only need to enter username and password required. Further application authentication process will take from the data stored on the ClientLogin. ClientLogin authentication data is stored on security that has a vulnerable system. Hackers can access data stored on the ClientLogin authentication is when a user connects to the network Unencrypted Wifi.

The solution, avoid the use of unencrypted wifi network (wifi network is open). But if the choice of open wifi networks only, it is better to use additional applications for the security of wifi connections such as SSH Tunnel. This application can create secure connections between your Android handset devices with unencrypted wifi network server.


3. Avoid installing application other than Android Market
To avoid the Trojan Android, install only the applications in the Android Market. Recently discovered Trojan Android from a third party application service provider in China.


4. Be careful when an application for permission to open access to personal data
If the application is installed for permission to open some of the data, make sure you do not give access permission to enter personal data, such as phone contact list.


5. Use the special security applications your Android device
In addition to installing and vigilant when opening a particular link, you are advised to also install security applications for mobile phones. Trend Micro Mobile Security for Android for example, not only do we have secure passwords, but also all of our mobile banking transaction data.



source: tekno.kompas.com