Password or fingerprint protection, avoiding facial recognition
In 2018, a face was 3D printed to try to circumvent high-end facial recognition. Guess who was saved? Whether we like it or not, Apple’s Face ID is the most advanced facial recognition system, while on Android, most of them (with few exceptions) only use the mobile’s camera to unlock the terminal.
This is because, with a photograph or a 3D model of our face, it is not too complicated to unlock the phone. Going further, the Pixel 4 itself can be unlocked with your eyes closed, literally. For this reason, we recommend using other biometric methods, such as fingerprint, PIN, or password. These methods can also be mocked, although less easily.
Use some additional third-party application
Although applications focused on phone protection are usually quite demanding in terms of resources, using them may not be a bad idea in case of loss of the phone. Lookout is an example. The application is focused on being an antivirus, but it has quite an interesting phone tracking system.
How to put a password to an app on your phone
In case of losing the phone, the application is able to send us the last location of the device by email. The interesting thing here is that, if they turn off the phone and turn it on again, as long as it has a network, we will be notified at the precise moment the phone connects, sending its last position. In the same way, on paper, it is capable of taking a photo of the person who has it and sending it by mail, although the operation of this tool is somewhat more erratic.
These types of applications are not infallible, but they are an extra layer of protection that we do not need, and that we can always have installed in case of wanting maximum security on our phone.
Add an extra step of protection to important apps
Activating two-step verification in all applications that allow it, as well as blocking those applications that allow it by means of a PIN, password or fingerprint is an additional measure, but it is important if we want to protect our data. The safest thing is to protect our applications with different PINs and passwords, so that, in case they manage to find one, the rest of the apps continue to be protected.
There are several applications to do this, so all you have to do is choose the one that most convinces you and install it on your terminal. The more diverse the credentials of each app, the more security is added Guest posting sites.
How to protect your phone from hackers
Your cell phone contains some of your most sensitive personal information. Things like your passwords and account numbers, emails, text messages, photos, and videos. If your phone ends up in the wrong hands, someone could steal your identity, buy things with your money, or hack into your email or social media accounts. Here’s what you can do to protect your phone.
Lock your phone
Set your phone to lock when you’re not using it, and create a PIN or passcode to unlock it. Use an access code of at least 6 digits. You could also unlock your phone with your fingerprint, your retina, or your face.
- Apple Support: Use a passcode on your iPhone, iPad, or iPod touch
- Android Help: Set up a screen lock on your Android device
2. Update your software
Updates to your operating system often include patches and crucial protections against security threats. Set your phone to update automatically. Otherwise, keep an eye out for updates and don’t delay in running them. Also, update your apps.
- Apple Support: Update your iPhone, iPad, or iPod touch
- Android Help: Check and update your Android version
3. Back up your data
Back up your phone data regularly to the cloud or to your computer. That way, if you lose your phone, you’ll still have access to your personal information.
- Apple Support: How to back up data on your iPhone, iPad, and iPod touch
- Android Help: Back up or restore data on your Android device
4. Get help finding a lost phone
Mobile device operating systems have a program that helps you find your phone if you lose it, or allows you to lock the device or wipe its data if you think it was stolen. Go to the settings section and enable this feature.
- Apple Support: Set up Find My on your iPhone, iPad, iPod touch, or Mac
- Android Help: Prepare to find a lost Android device
Mobile payment apps can be a convenient way to send and receive money with your smartphone. These apps have become very popular — and scammers may try to use them to steal money from you. Find out how mobile payment apps work and how to avoid sending money to a scammer.