How to protect your smartphone from hackers and intruders

Your smartphone knows all your secrets. Put it on lockdown with these tips

Having your smartphone hacked kind of feels like someone robbed your house — or maybe even worse. It’s a massive invasion of privacy, a violation of your personal space, and it may take a while to figure out what is missing. Your smartphone doesn’t just hold your valuables; it signals to intruders which of your valuables are the most important to you. If something is on the phone you always have with you, then by definition, it rates.

Smartphones are small devices that can easily get lost or stolen, and they are constantly online sending and receiving signals, so they are always a target for criminals. To keep your phone and its contents away from prying eyes and sticky fingers, you need to develop a strategy for protecting your valuable information. Here are some tips on how to protect your smartphone from hackers and intruders.

Update your OS and apps

Software companies are constantly updating software, and not only for cosmetic reasons. Many software updates and bug fixes contain security improvements that help guard your smartphone against data breaches and intrusions, and close off vulnerabilities, making it harder for hackers to break through. When an update is announced for your smartphone’s operating system or for any of the apps you use, install it without delay.

Avoid public Wi-Fi

By now, everyone should know about the dangers of using open Wi-Fi for anything, because free public Wi-Fi in shopping centers, cafes, airports, or any other public venue, is open season for all kinds of online mischief. Try to use only your private cell connection whenever possible and switch off Wi-Fi on your mobile phone altogether whenever you are in a public place. If that is not possible, consider using a VPN app, a utility that tunnels network communications through an encrypted connection. But choose carefully — not all VPNs are equal in quality. Also consider disabling Bluetooth while you’re out and about, unless you are wearing a smartwatch that requires it.

Lock your smartphone

Always engage a four or six-digit passcode to enter your device. Passcodes may not be super convenient, but peace of mind dictates that if your smartphone falls out of your pocket while you’re trying out new sofas at Ikea, the first person who picks it up should not be able to get your life story from your email, contacts, photos, and banking information. Consider setting an even longer passcode with both numbers and letters. Not a big passcode fan? No worries. Fingerprint scanning and Face ID are easy, fast alternatives to punching in numbers. While you’re at it, make sure apps with personal information are also locked behind passwords.

Use two-factor authentication

Here’s another obnoxious security measure that most people can’t stand. Two-factor authentication (2FA) is hated because it requires an extra step, and it’s really a pain if you forget to have your phone or watch nearby. But like passwords, it serves a purpose by providing an extra layer of protection in case someone gets a hold of your password.

Use strong passwords

password generator

Everyone hates passwords. But when it comes to assigning them, don’t take half measures. Use only strong passwords that are not easily cracked by hackers. They should contain 16-20 characters with a mix of letters and numbers, upper and lowercase letters, and symbols. Brute force password crackers will still dismantle many strong passwords, but making it easy for hackers by using your birthday, your pet’s name, or the same password for everything is a truly terrible idea.

There are plenty of secure password generators online, so you don’t have to think them up for yourself. Change your passwords every six months to a year, or as soon as you hear about a data breach of any program you use. Oh, and a word about security questions: Lie. Do not answer security questions honestly, and change your answers for different setups. This makes it harder for hackers to figure out how to break into your phone based on public information about you online.

Beware of spam and phishing emails

One of the easiest ways for hackers to invade your phone and access your information is through your email inbox. Phishing scams are designed to trick you into handing over access to your accounts. Avoid clicking on links in promotional emails, opening suspicious attachments, or running app updates prompted through email. Do not try to access financial accounts through random emails, but instead, go directly to the financial institution website and sign in with a proper username and password.

Use built-in device protections

They’re not called “smartphones” for nothing. If your phone gets lost or stolen, you can contain the damage using device tracking services, such as Find My iPhone and Android’s Find My Device, that can locate your missing phone on a map and, in some cases, automatically erase it. These services can also make your phone ring to help you locate a device you have temporarily misplaced. You can also arrange for the phone to delete all information after a set number of false passcode tries.

Use an antivirus app

Hackers favor malware to steal passwords and account information. But you can combat that with a smartphone antivirus app — some of which are offshoots of popular desktop apps like Avast, McAfee, and Panda. The smartphone app variations provide enhanced security by ensuring apps, PDFs, images, and other files you download aren’t infected with malware before you open them.

Manage app permissions

Check the apps on your phone to determine whether they have more privileges than they need. You can grant or deny permissions like access to the camera, microphone, your contacts, or your location. Keep track of which permissions you gave to your apps, and revoke permissions that are not needed. For iPhones, go to Settings > Privacy, where you’ll see a list of all apps and the permissions you’ve granted to them. The exact path to app permissions on an Android device depends on the device, but on a Google Pixel you’ll find them in Settings > Apps & notifications > Advanced > Permission manager or on a Samsung Galaxy look in Settings > Apps > App permissions (via the three vertical dots at the top right).

Back up

One thing you need to be vigilant about is being prepared for the worst by making sure your phone is backed up to protect critical documents and images in case your phone is lost or stolen. We have a guide on how to back up your Android smartphone and also how to back up your iPhone. At least that way, if your phone is lost or wiped, you can still access those precious photos or files.

Know where your apps come from

Don’t just download any old app to your phone. While your choice of iPhone apps is limited to Apple’s App Store, which vets all apps sold on the platform, it is easy to sideload apps on Android, which simply means downloading and installing them from a source other than the Google Play Store. However, you do have to dig into the settings and allow it. The best way to avoid malware on Android is to stick with the selection available from the Google Play Store, which are vetted by Google. Never download apps via text message, as that is an infamous method hackers use to inject malware directly into your phone.

Steer clear of public chargers

Only charge your phone on trusted USB ports like your computer and in your car. Criminals can hack public USB charging ports, like the ones you’d encounter in a coffee shop or airport, to steal personal information. Bring your outlet adapter along in addition to your USB cable if you’re traveling. Hackers can’t access your phone data through your USB adapter.

Don’t jailbreak

While jailbreaking lets iPhone owners access apps and software not available in Apple’s App Store (a real no-no in Apple Land), it also exposes your phone to viruses and malware. A jailbroken phone that malfunction will get you no sympathy from Apple — it will, however, void your warranty, and Apple personnel will probably not assist you if something bad happens.

Bottom line

If you take positive steps to protect your smartphone from hackers and intruders, you should feel confident you’ve done everything possible to shield your critical information. This makes it much less likely that thieves will be able to steal your identity, delve into your personal life, siphon off your money, control your phone, and generally make your life miserable.

Product Review

Samsung Galaxy Note 10 Plus Review in progress

Samsung’s Galaxy Note 10 Plus is here, and it’s the biggest and best Samsung phone ever. Its key feature is its looks, as it has an attractive rear design, highlighted by the new Aura Glow color, but little else has changed.
Mobile

How to use recovery mode to fix your Android phone or tablet

If you’re having a problem you can’t seem to resolve with your Android device, or maybe you want to update it or wipe the cache, recovery mode could be what you’re looking for. Here's how to get your Android phone into recovery mode.
Gaming

How to connect your phone to an Xbox One using the smartphone app

Microsoft's Xbox allows you to access your profile information and launch media content directly from your mobile device. Check out our quick guide on how to connect your smartphone to an Xbox One.
Mobile

How to root Android phones and tablets (and unroot them)

Wondering whether to root your Android smartphone or stick with stock Android? Perhaps you’ve decided to do it and you just need to know how? Here, you'll find an explanation and a quick guide on how to root Android devices.
Computing

The best free antivirus platforms for Mac in 2019

Malware protection is more important than ever, even if you eschew Windows in favor of Apple's desktop platform. Thankfully, protecting your machine is as easy as choosing from the best free antivirus apps for Mac suites.
Mobile

Fitbit Versa 2 will reportedly roll out September 15 with OLED display, Alexa

Leaked images confirm that the Fitbit Versa 2 will come with an OLED display and Alexa integration, with more than four days of battery life. A source claims that the Fitbit Versa successor will be released on September 15.
Social Media

Twitter’s latest effort to tackle abusive content focuses on Direct Messages

Twitter launched a new feature designed to filter out abusive Direct Messages from people you don't follow. The content is collected in one place and can still be viewed if you want to periodically check what's coming in.
Mobile

3 to beam up: Xiaomi, Oppo, and Vivo collaborate on new file transfer feature

Xiaomi, Oppo, and Vivo are working together on a new device-to-device file transfer feature for Android. The unnamed feature will be used instead of Android Beam when it's retired from Android in the near future.
Mobile

Nokia 7.2 case renders reveal a round triple-lens camera design

According to the latest rumors, we can expect the Nokia 7.2 to be a phone with a large screen over 6 inches and a triple-camera system. Here's all the news and rumors about the Nokia 7.2.
Mobile

MediaTek and Huawei’s partnership may mean cheap 5G phones in early 2020

Huawei has reportedly made a deal with MediaTek to use its new 5G SoC in a low-cost 5G smartphone expected to launch in early 2020. MediaTek launched the 5G SoC in May, and indicated the first phones to use it would come next year.
Mobile

Huawei gets another short reprieve from ban, but the future doesn’t look hopeful

Huawei has been given another 90-day extension to the Temporary General License, which holds off the ban imposed on it by the U.S. government in May, meaning it’s allowed to continue trading with U.S. companies for now.
Mobile

Miami public transportation is getting Google Pay — and it could save you money

Google and the Miami-Dade Transit public transportation system have announced that the system will now support Google Pay -- meaning you can tap to pay at turnstiles, instead of having to buy a ticket for each ride.
News

Google was sharing Android user location data with carriers worldwide

Google quietly ended a service providing cell carriers with location data from customers. The service provided user data from Android devices on any carrier. Data was aggregated and anonymous, and carrier names weren't disclosed.
Mobile

How to perform a reverse image search in Android or iOS

You can quickly use Google to search, and reverse search, images on a PC or laptop, but did you know it's almost as easy to do in Android and iOS? We explain how to do it here, whether you want to use Chrome or a third-party app.