!privacy_agreement!
!privacy_agree!

Mi Zone

[Tips] 5 Threats to your phone; Learn to protect it now!

2017-11-21 00:24:00
4160 16
Hello Mi Fans!
The dangers of cyber security have always lurked around us. The following passage was featured in the Straits Times earlier a few months ago!
French life insurance company AXA sent out notices informing some 5,400 customers that their personal data had been stolen in a cyber attack. In particular, the customers' e-mail addresses, mobile numbers and dates of birth were exposed after the attack on its Health Portal. The affected customers would also be susceptible to phishing, where cyber criminals try to trick victims into revealing data such as e-banking usernames and passwords.

Thus, I'd like to share the 5 threats that make our phone vulnerable to hackers, and simple steps to take to avoid potential troubles! Our phones are extremely valuable to us and may contain much sensitive information and it is important we take precautionary measures to protect it!

Threat 1: Unsecured Wifi
Users are easily drawn to connect to wireless hotspots when they are available so as to prevent excessive drainage of their mobile data plan, however, do take note that free Wi-Fi networks are usually unsecured. Recently, according to a research by V3, 3 British politicians who agreed to be part of a mobile experiment were easily hacked by experts and attained information such as their social media accounts and Paypal detail.

To prevent your phone from being vulnerable, avoid using free unsecured Wi-Fi on your phones, and never use it to perform sensitive transactions such as bank transfers or relaying credit information over such networks!


Threat 2: Network Spoofing

Network Spoofing is when hackers set fake networks (connections that look like WiFi but are actually traps!) in dense locations, such as libraries, coffee shop and airports. Such networks are usually titled to attract unsuspecting users to connect to it. Examples include "Free Airport Wi-Fi"! Some of these networks require users to register an account with a password - give that many users employ the same email and password combination for multiple services, this may allow hackers to have the chance to hack to users' accounts, which may include e-commerce shops and other sensitive information. When connecting to such networks, never provide your personal information. If you are asked to create a login, use a unique password.

In Singapore, WirelessSG is rather safe, but do keep an eye out of dubious Wi-Fi networks! It only takes one misstep to lose everything!!


Threat 3: Suspicious Mobile Applications
Suspicious mobile apps are often the cause of unintentional data leakage. Have you ever noticed that a notification that often pops up to ask you giving permission to a particular app? If permissions are unchecked on a mobile application, they potentially send data to remote servers, where they are mined by advertisers or even hackers. To avoid this problem. only give apps permissions that are necessary, and forgo any other permissions that are irrelevant.

Threat 4: Outdated Operating Systems (OS)
Have you ever heard of the Android Security Patch? And constant updates from MIUI? The reason why there so so many of these updates because it contains essential changes to ensure that its operating system is robust from security threats! Updating your phone constantly may be irritating, troublesome and an intrusive process. However, these updates contain patches to prevent the new alternatives that hackers are constantly innovating to get your sensitive information!

Hint: Update your MIUI OS for your Xiaomi Phones ASAP!

Threat 5: Single authentication Mode
Users should always have a double authentication mode to your phone. I strongly encourage users to register for the double authentication mode from Google! Even if you forget your password, and have lost your phone, you will still be able to unlock it! If you're on pattern lock (if you have the older phones), its always good to have double authentication to prevent people from accessing your phones (sometimes patterns on the phone can be seen from the finger marks of the screen).

Leave down below what you think! Have you had your phone hacked before? What other types can you share with other users!
Do check out these following threads as well for more informative threads!

2017-11-21 00:24:00
Favorites14 RateRate

Rookie Bunny

Dul My_Liek | from MI MAX

#1

Very helpful tips & information. Thanks a lot
2017-11-21 01:40:38

Rookie Bunny

Sarrie | from Redmi 4X

#2

Thanks for letting me know how to protect myself from cyber attacks
2017-11-21 01:44:36

Pro Bunny

Kopio | from Redmi 4

#3

yes, very helpful tips and also reminder for those who already know
2017-11-21 01:48:21

Rookie Bunny

1731317625 | from MI MAX 2

#4

Thank you, very good advice
2017-11-21 02:14:46

Rookie Bunny

IsaiahMahen | from Redmi Note 3

#5

Thanks JJ. Appreciate your advice
2017-11-21 02:50:49

Rookie Bunny

Quah Siew Ghee | from Redmi Note 4

#6

There ought to be a way to get these problems out of the way. All the hi tech we have also wasting our time worrying over it. What a shame.
2017-11-21 05:05:38

Advanced Bunny

Mrsx Jinn Toro | from Redmi Note 5A Prime

#7

Thank you for sharing
2017-11-21 16:22:45

Rookie Bunny

Liza melayo | from Redmi Note 4

#8

Hw to protect my phone
2017-11-22 03:02:28

Rookie Bunny

Chrisvin | from Redmi Note 4

#9

yes is very very helpful thanks Mi
2017-11-24 03:28:02

Master Bunny

Chinito | from Mi A1

#10

Nice one JJ!
2017-11-25 06:12:10
please sign in to reply.
Sign In Sign Up
  • Followers

    411

  • Threads

    197

  • Replies

    2047

  • Points

    7479

3 días seguidos
7 días seguidos
21 días seguidos
New Home
100 replies in a month
100 replies in a month
100 replies in a month
Newbie Member
10K Members
Mi MIX 2
2018 Medal
Throwback with Mi Community
Big Change
Wang Cai Medal
CNY Medal
Red Photography Medal
New Home
Facebook Medal
Mi Community Update Medal
Top 10 April Photos
April Photography Medal
2K Member Milestone

Copyright©2016-2018 Xiaomi.com, All Rights Reserved
Content Policy
Quick Reply To Top Return to the list