How to Ensure Your Android Phone Is Up-to-Date and Secure
Pinterest Stumbleupon Whatsapp
Advertisement

Everything about you is on your smartphone. Your personal details, contacts list, internet history. Mobile banking apps reveal who you bank with; your contacts list and social networks identify who you are. And then there’s the personal photos, email accounts, online shopping… the list goes on.

A device is only as secure as the person using it, and adopting good practices The Complete Guide to Improving Your Online Security and Defending Your Privacy The Complete Guide to Improving Your Online Security and Defending Your Privacy Everyone wants your data, reputable companies and criminals alike. If you want to build up your defenses and protect yourself online, let us guide you through how to improve your security and safeguard your privacy. Read More will always help. But when it comes to Android, there’s an important step you can take: make sure your phone or tablet (or whatever Android device you’re using) is up-to-date.

Unfortunately, thanks to Android fragmentation, this is easier said than done.

Why Mobile Security Is Important

Losing your phone, or having it stolen, can be a bit of a disaster for your personal data. Sure, there are tools like Prey, which can be used to remotely lock and wipe your hardware. If your data is backed up to a cloud drive, and your apps and settings are mirrored in the Google cloud, remote deletion shouldn’t be too painful.

But smartphone theft isn’t the only way someone might attempt to access your phone. Sure, there are plenty of physical tricks hackers might try to gain access to your phone (such as guessing your login PIN Should You Use a Fingerprint or a PIN to Lock Your Phone? Should You Use a Fingerprint or a PIN to Lock Your Phone? Should you secure your phone with a fingerprint or a PIN? No one is likely to guess your fingerprint, but is it really more secure? Could a PIN be more secure? Read More or spotting your login pattern Pattern Locks Are NOT Secure on Android Devices Pattern Locks Are NOT Secure on Android Devices Android's pattern lock isn't the best method for securing your device. Recent research has found that patterns are even easier to crack than before. Read More ), but mobile devices are also susceptible to remote attacks. Vulnerabilities in the operating system, apps, or even in third-party services, can open your hardware to intrusion.

One such example is the KRACK attack Your Wi-Fi Connection Isn't As Secure As You Think Your Wi-Fi Connection Isn't As Secure As You Think The WPA2 encryption security protocol that protects your Wi-Fi connection has a flaw. This is a potentially catastrophic vulnerability that could adversely affect almost anyone connected to the internet. Read More , which exploits a vulnerability (only discovered in 2017) in the WPA2 wireless encryption protocol. The ramifications of this are concerning: connecting to a network also used by someone exploiting the KRACK weakness will share with them all of your online transactions, including usernames and passwords.

Although there are ways to mitigate the impact You're at Risk From a KRACK Attack: Everything You Need to Know You're at Risk From a KRACK Attack: Everything You Need to Know An exploit called "KRACK" (Key Reinstallation Attack) is making headlines. But what exactly is a KRACK attack? Can it be fixed? And what can you do about it? Let's take a look. Read More , Android devices (along with Linux) are most at risk. KRACK isn’t the only threat targeting Android Malware on Android: The 5 Types You Really Need to Know About Malware on Android: The 5 Types You Really Need to Know About Malware can affect mobile as well as desktop devices. But don't be afraid: a bit of knowledge and the right precautions can protect you from threats like ransomware and sextortion scams. Read More , either.

5 Online Risks to Android

Over the years there have been several online threats to Android. Among the most notorious you’ll find:

  1. Android-targeted ransomware FBI Ransomware Hits Android: How To Avoid Getting It, And Remove It FBI Ransomware Hits Android: How To Avoid Getting It, And Remove It Learn how to keep your Android device safe from FBI Ransomware with these tips. Read More , which is malware that demands money in exchange for not reporting illegal material on your phone to the FBI.
  2. Clicker Trojans How Android Porn Malware Steals Your Data How Android Porn Malware Steals Your Data Malicious porn clicker Trojans are masquerading as duplicate apps, waiting to infect your Android device. How prevalent are they? What happens if you download one, and most importantly, how can you avoid them? Read More that increase ad revenue for criminal app developers.
  3. The Xavier malicious adware Has Xavier Malware Infected Apps on Your Android Device?  Has Xavier Malware Infected Apps on Your Android Device?  A new vulnerability, Xavier, has been discovered on Android -- and it has been exploited for some time. Are your devices affected? And what can you do about it? Read More , which impacts Android via adverts. This 2017 attack exploits your phone’s ability to display ads.
  4. Fake Pokemon Go apps, capable of running Remote Access Tools on your phone, which essentially surrenders control of your device to a malicious user.
  5. The Pokemon Go threat is really the tip of the iceberg, with a number of repackaged apps hiding malware Cracked Android Apps and Games: Read This Before Downloading Cracked Android Apps and Games: Read This Before Downloading The statistics don't lie: Most Android malware comes from outside Google Play. Downloading cracked apps -- or any type of app -- from a shady website or untrustworthy third-party app store is the way most... Read More , and available freely on the web.

What can you do? Well, while you should install security tools 8 Great Android Apps That Protect Your Privacy and Security 8 Great Android Apps That Protect Your Privacy and Security If you want to keep your Android device safe and secure, we recommend these apps. Read More , it’s also vital to ensure that your smartphone is running an up-to-date operating system. This will ensure your device is robust, and capable of resisting most intrusion attempts.

Check for Updates

One of the most important aspects of managing a computer, phone, or tablet, is ensuring updates are installed. Not only do they include enhancements to the user interface, these updates apply security fixes. In the case of high-profile security issues affecting Android, security fixes might be issued independent of the main updates.

ensure android phone is up-to-date and secure

It’s easy to check for updates on your Android device. Begin by ensuring Wi-Fi is enabled, then open Settings > About device. Tap Software Update > Check for updates, and wait as your phone checks online. (These steps may differ depending on your device manufacturer.)

If an update is available, tap Update. Follow the on-screen instructions to install the update.

If updates are found, then they should be downloaded and installed. However, it’s best to do this over a Wi-Fi network, rather than use your mobile data Saving Mobile Data: 5 Clever Ways To Reduce Data Usage Saving Mobile Data: 5 Clever Ways To Reduce Data Usage If you’re on a limited mobile data plan, you may find opening your bill to be harrowing experience. Is there an overage charge? How much? And why was there so much data used? While the... Read More plan. Once the update is installed, your phone or tablet will be up-to-date.

Remember to Update Your Apps Too

Although not as important to the underlying integrity of your Android device, it is also wise to update your apps. Many developers add security fixes to their apps, and it’s a good idea to ensure the best versions of the apps you use are installed.

ensure android phone is up-to-date and secure

In the Google Play Store, open the menu, and find Settings. Here, tap Auto-update apps and ensure that the Do no auto-update apps option is not selected. Instead, use the Auto-update apps at any time… or Auto-update apps over Wi-Fi only options. As before, this selection will depend on the size of your mobile internet plan.

No Updates? Download and Install via PC

But what if there is no update?

The answer here is to head to the manufacturer’s website and check. This may take some time, so if there is a search feature, use this. Otherwise, head to the support pages and look for your phone model.

Here, you’ll find the information you need. Often, this will indicate that you need to download some manufacturer-specific device management software. These are provided to enable updates, as well as to make syncing data to and from your phone simpler.

Once installed, you’ll have two options. Either there will be an update feature built into the management tool, or you’ll need to manually download the update from the website. Whichever case applies to you, the update cannot be applied to your device unless it is connected to your PC via USB.

Unsupported Phone? Here Are Your Options

What if your phone doesn’t have any official updates available? Perhaps it’s old, or the company producing it no longer provides support. Whatever the situation, you’re unable to get those all-important security updates.

Probably the only way around this is to install a custom ROM. This is a customized version of Android, often intended to include features and user interface tweaks that the official release doesn’t. Custom ROMs are completely unofficial, but often include the updates that your phone is missing. Counter-intuitively, you’ll need to reduce your device security by unlocking the bootloader, before installing a custom ROM.

Be aware, however, that this can run both ways. Finding a ROM that tightens your security is great, but will it be maintained? ROMs that are simply left to die will not enjoy regular updates. There’s no point plugging the leak today only for another to spring tomorrow. The answer? Find a ROM with an on-going maintenance and release schedule. CyanogenMod and LineageOS are just two examples LineageOS Replaces CyanogenMod: How to Try It on Android Right Now LineageOS Replaces CyanogenMod: How to Try It on Android Right Now CyanogenMod was shut down at the end of 2016, but its successor LineageOS is now available to try. Here's where to get it and what you should know. Read More .

Case in Point: My Phone

Here’s an example. I own a Meizu Pro 5, which originally shipped with Ubuntu Touch Meizu Pro 5 Ubuntu Edition Smartphone Review Meizu Pro 5 Ubuntu Edition Smartphone Review When a phone is released only to a select few enthusiasts, you wonder whether or not the hype is genuinely worth it. Let's look at one of the first phones to run Ubuntu Touch. Read More , with the crDroid custom ROM. The reason for this is because the Meizu user interface, Flyme, feels far too much like iOS. Sadly, crDroid doesn’t have an OTA update option, which leaves it running an older, unpatched version of Android.

Unfortunately, few custom ROMs are available for the Meizu Pro 5, which was launched in 2015. At the time of writing, it is two years old.

ensure android phone is up-to-date and secure

If you do take this path, be aware that custom ROMs are typically rooted. This means that the root directory of the Android operating system is unlocked, which is a potential security risk. You’ll need to un-root your phone once the ROM is installed to maintain the system integrity. Our guide to rooting Android The Complete Guide to Rooting Your Android Phone or Tablet The Complete Guide to Rooting Your Android Phone or Tablet So, you want to root your Android device? Here's everything you need to know. Read More will help here.

How to Avoid a Lack of Updates in Future

Can’t find an update? No custom ROMs, or you’re unsure about flashing one to your phone or tablet? You’re not alone, but this does simply things somewhat. Now your only option is to buy a new Android device. But how can you do this and avoid a repeat of the scenario? Will your new Android device receive updates?

The answer is invariably “Yes” — the new Android device will receive updates. The question you should be asking, however, is “How long will my new device receive updates?”

As with many thing, this is tricky to answer. Usually, devices are supported for around two years. This means that the manufacturer will provide updates for two years after the device’s release. It may not seem long, but in that time, the same company might release half a dozen devices. In short, if you wish to ensure you have a phone that receives regular updates across its lifespan, you’ll need to buy a new phone. Typically, Sony, Google, and HTC offer support for two years. If you can find a manufacturer offering longer support, by all means try their phones.

Get the Update as Soon as You Can

Updating your phone as soon as the update is released is a good idea, but failing this, manually downloading and installing should do the trick. Rely on a custom ROM only as a last resort.

But what if no updates are available, anywhere? The smart answer, from a security point of view, would be to buy a new phone. Perhaps there is a free device upgrade available to you? Or maybe you’ve been considering a switch to a different mobile platform? Now is the time!

Have you had trouble getting updates for your Android device? Was it simple, or did you have to install a custom ROM? Perhaps your smartphone was so old you ended up swapping for an iPhone? Tell us in the comments.

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. David
    November 7, 2017 at 11:50 pm

    One of the most annoying questions I hear is "are there real hackers?" or "Can i get a real hacker?" or "Where can I get a hacker ?" Well, I'm going to tell you this TOP SECRET thing I found, and trust me he is the answer to all your questions, he is an ethical hacker, reliable and affordable, no other than Scott. I know this because I've made use of his services a lot such as hacking a cell phone, hacking into a website, helping me boost my credit score and clearing my bank debt and he has never disappoint me for once. I have also referred him to my friends who also required services of a genuine hacker in hacking his partner's mobile phone remotely to see the text messages, Whatsapp, Facebook, twitter, Viber and they've been testifying to his good works. Email s c o t t c y b e r l o r d 1 1@ g m a i l . . . com text +1 850 6 31 55 97 or whatsapp : + 1 6 2 8 2 0 4 3 5 8 8 Stop being scammed by these fake hackers and contact a real one.