Whether or not it has been hijacked or not, if you don't care or do not take necessary measures, it will sooner or later. so be prepared from now on. the following suggestions may help you stay away from malware as much as possible.
- Install the latest Android system. However, updates may require the cooperation of hardware vendors based on device differences.
- In security settings, "Install apps from unknown sources" (Allow installation of apps from unknown sources) is prohibited ).
- Ignore the suspicious apps. If you are tossing, it will throw you.
- Before installing the app, check the Internet to see if someone has reported any problems with the app.
- Each app has permission settings to access devices and resources of the Android system, check the permissions, and do not grant excessive permissions to a game.
- Email? Be careful about the connections and do not click them at will. This is the same as in windows. Email carrying is also highly risky.
- Set your android password.
- Do not explicitly store the password, although it seems that your android is only used by yourself.
- Once an abnormal phenomenon is found, even if the battery time is short, a malicious software may be secretly running, so be careful.
- Anti-virus software, such
- Rising, Kingsoft, 360 mobile
- ESET
- AVG
- Avast (free)
- Kapersky (14.95)
- Lookout (free)
- Norton (free)
- Zoner (free)
- For the system administrator, give your users an app suggestion list, which not only allows you to remotely control the device, but also is your responsibility.
- In an enterprise environment, it is best to select software with central control capabilities, such as maas360, boxtone, and Citrix.
And so on.
- A friend who knows about Android or the industry, or regularly checks the Internet for any security risks, latest virus warnings, etc. register an account on your trusted android technology forum to ask questions at any time.
- You need to understand that if you root your device, you are more likely to be infected.
- Prepare to redo your android, and think about how to back up your data and how to restore the data.