Top 4 Ways to Keep Your Cellphone From Getting Hacked

PHOTO: Here are ways to protect your cellphone from getting hacked.
Getty Images

By now, most of us know that when surfing the Web we shouldn't click on ads promising us new ways to lose weight without dieting, read emails about magic pills to boost our "egos" or even click on Twitter links about the "shocking" pictures some friend supposedly found of us online. That is, we know not to do those things from our computers. And hackers and cybercriminals know we know this, too. That's why they're targeting our smartphones.

A study by Trend Micro suggests that there are nearly 750,000 malware apps for Android users alone -- and that's just apps. A security company called Bitdefender documented a nearly 300 percentrise in Android-focused malware in 2013, though that's not limited to apps. And a Cisco security study issued last week showed that 99% of all the mobile malware out there targets Android users, noting that the fully 71 percent of Android users encounter some form of malware, either through apps, email phishing, "smishing" (the use of text messages to distribute malware) or other forms of social engineers.

Why the relentless focus on Android users? Well, for one, Android represents more than 80 percent of the new cellphones on the market, which makes it a better investment of a hacker's time. Next, the Trend Micro study found that the toolkits for creating this malware are readily available on the black market. Finally, several security researchers have identified a specific exploit malware makers can use to get into Android devices, which Google and Samsung identified not as a flaw, but as a "legitimate Android [function used] in an unintended way."

That keeps me up at night… and I don't even have a cellphone. (Kidding.)

So what's the average Android user to do?

1.
Treat Your Smartphone Like a Computer

If you wouldn't click on it, open it, download it or go to great efforts to get it for free (like trying to pirate it) on your super-expensive laptop, don't do it on your smartphone. That "free" version of a legit app is something you might end up paying for when your phone starts spamming other users with texts you didn't send, and that "link" to supposed pictures of yourself is more likely a malware downloader than memories of Spring Breaks past. We all know what not to do "on the Internet" but, with a smartphone, you're always on your computer and on the Internet even when you're not at your desk.

2.
Wait Until Later

Just because it's delivered to you with the immediacy of a smartphone doesn't mean you have to open it on the run. If it looks iffy, wait until you get home and use a URL expander to check where shortened links really lead, or call or email the friend who sent something that looks fishy. Nothing is that much of an emergency.

3.
Download Apps From Only Verified Providers

Malware developers may simply take apps people want (but maybe don't want to pay for), update them with malware and upload them to the Google Play store for unsuspecting users to download. If you don't see a little blue icon next to the company's name in the Google Play store, they aren't a verified developer. And if you don't see a bunch of positive reviews of an app or you've scrolled through many pages of potential 99-cent apps to find this "great" free one, you might want to consider what, if anything, you'll really be saving if you download malware.

4.
Keep an Eye on Your Bill

If you do download malware by mistake, even deleting the app might not end the infection. You should be checking your data and text usage to watch for spikes, as most malware is designed to send texts, steal and transmit data, or serve you with extra ads. If you notice usage spikes even if your behavior hasn't changed, have dropped calls that didn't used to drop or a battery that runs down faster than normal, these are other signs that you should back up your photos and factory reset (i.e., delete everything on) your phone.

Finally, if you think you may have been victimized by a malware attack on your phone or anywhere else, your personal information could be at risk. Monitor your accounts closely, check your credit reports (you can do that for free once a year), and use free tools like Credit.com's Credit Report Card to monitor your credit and credit scores every month. If you see something out of the ordinary, jump on it. The hackers are hoping you won't.

This article originally appeared in Credit.com.

This work is the opinion of the columnist and in no way reflects the opinion of ABC News.

Adam Levin is chairman and cofounder of Credit.com and Identity Theft 911. His experience as former director of the New Jersey Division of Consumer Affairs gives him unique insight into consumer privacy, legislation and financial advocacy. He is a nationally recognized expert on identity theft and credit.

Join the Discussion
You are using an outdated version of Internet Explorer. Please click here to upgrade your browser in order to comment.
blog comments powered by Disqus
 
You Might Also Like...
See It, Share It
PHOTO: Firefighters rescue a woman who got stuck in a chimney in Thousand Oaks, Calif.
Ventura County Fire Department
PHOTO: Apple Pay is demonstrated at Apple headquarters on Oct. 16, 2014 in Cupertino, Calif.
Marcio Jose Sanchez/AP Photo
PHOTO: Up in Ash: Mount Sinabung Erupting
Tibt Nangin/Anadolu Agency/Getty Images
PHOTO: Defendant Jodi Arias testifies about killing Travis Alexander in 2008 during her murder trial in Phoenix, Feb. 20, 2013.
Charlie Leight/The Arizona Republic/AP Photo
PHOTO: Kim Kardashian, Kanye West, their daughter North West and Delphine Arnault attend the Givenchy show as part of the Paris Fashion Week Womenswear Spring/Summer 2015, Sept. 28, 2014 in Paris.
Bertrand Rindoff Petroff/French Select/Getty Images