3 crucial security settings for your Android

unlock pattern on smartphone - 3 crucial security settings for your Android

If the notion of your device falling into the wrong hands, allowing access to strangers frightens you or keeps you awake at night worrying, there are additional steps you can implement to safeguard against this situation. Spending a bit of time enabling three crucial security settings on your Android can help protect your data and have you sleeping like a baby.

As with any instructions, note the following may vary depending on your device, manufacturer and the version of the operating system you are running.

Enable the Smart Lock feature for better security

Enabling this built-in feature is a must for protecting your Android. With the options of On-body detection, Trusted places, Trusted devices, Voice match, and Trusted face, Google has set the bar for smartphone protection. Here is how each one can help safeguard your device and data.

To enable Smart Lock, you must have a secure lock screen set first.

Here’s how to activate Smart Lock.

Go to device Settings and tap on Lock screen. Click on Smart Lock, your enter password/PIN, and enable the options you wish to utilize.

By Christa Geraghty

See Full Story at www.komando.com

Forgot Pattern or password? Guide to Bypass Android’s Secured lock screen

Forgot Pattern or password  Guide to Bypass Androids Secured lock screen 1 - Forgot Pattern or password? Guide to Bypass Android's Secured lock screen

Forgot Pattern or password? Guide to Bypass Android’s Secured lock screen

Here are our 7 methods which you can try to bypass Android’s Secured Lockscreen. So without wasting any more time, let us take a look at our first method, should we?

Method 1: Using ‘Forgot Pattern’ Option

In order to bypass the Android’s Secured lock screen using this method, you need to follow these steps carefully:

  • First of all, try 5 attempts until you see an option saying Forgot Password?. Once you get such popup, just tap on it.
  • Now here, choose Enter Account Details option.
  • Enter your Google’s Account (the one linked with the Google Play Store) Email and Password.
  • Tap on Sign In button.
  • Now enter a new password, pin or a pattern and remember it.

That’s it, you have successfully bypassed the Android’s Secured lock screen. Now, let us take a look at our next method.

Method 2: Using ADB to delete the Password File

This is one of the best methods to bypass the Android’s Secured lock screen. You need a PC and an Active Internet Connection to use this method. Now, in order to bypass the Android’s Secured lock screen using this method, you need to follow these steps carefully:

  • First of all, make sure that you have ADB set up on your PC. If you don’t know how to set up ADB on PC, then you can follow our guide on Download ADB, Fastboot – Android SDK Platform Tools.
  • Make sure you have USB Debugging enabed on your Android Device. You can follow these steps to enable USB Debugging:


See Full Story at www.getdroidtips.com

How to properly secure your Android to keep snoops out

Android Security - How to properly secure your Android to keep snoops out

For others out there, I’m sure there’s a different reason why their gadget’s security (or lack thereof) doesn’t cause them to lose sleep at night. It’s probably because they’re not aware of just how many threats are out there that can impact Android tablets and smartphones. For example, did you know there’s currently a mobile wireless flaw that allows hackers to pinpoint your exact location? And that’s just the beginning. Click here to discover more security risks every smartphone user should be aware of.

Lock your device properly

This seems obvious. Although it may place one extra step between you and your gadget’s content, it also adds a barrier for an unwanted visitor.

There are multiple ways to lock your Android device, including passwords, patterns, fingerprints and PINS. Most of these options offer great protection, however, we don’t recommend that you use a pattern. This is because patterns are much easier to guess or crack since your fingers leave smudges on the screen that can be traced back by hackers.

We also don’t recommend that you use any type of facial recognition as a security measure, especially since this feature on the Galaxy S8s can be fooled by holding a photo of you in front of your phone’s camera.

While we’re talking about lock screens, there’s also another related setting you should probably avoid. It’s called “Smart Lock On-body detection,” and it basically leaves your phone unlocked whenever it’s on your person. Which won’t be a problem unless you get pickpocketed. If someone can snatch your gadget from your back pocket or backpack, you’ve basically just given them free access to everything you have stored on it.

By Kelli Uhrich

See full story at www.komando.com

Android Security Bulletin: Everything you need to know

google pixel keys security - Android Security Bulletin: Everything you need to know

Fixing the latest bugs and exploits in Android every month.

Google has detailed the latest Android Security Bulletin and released the fixes for Nexus and Pixel devices.

These are exploits and other security concerns that affect Android as a whole. Issues with the operating system, kernel patches, and driver updates may not affect any particular device, but these need to be fixed in the Android base by the folks maintaining the operating system code. That means Google, and they’ve detailed the things they have improved for this month.

Updated factory images for Pixel and Nexus devices that are supported are available, and over-the-air updates are rolling out to users. If you don’t want to wait, you can download and flash the factory image or OTA update file manually, and here are some handy instructions to get you started.


See full Story at www.androidcentral.com

Stagefright bug changes Android security

stagefright bug changes android security 300x197 - Stagefright bug changes Android security

It’s been 10 days since Zimperium’s Joshua Drake revealed a new Android vulnerabilitycalled Stagefright — and Android is just starting to recover. The bug allows an attacker to remotely execute code through a phony multimedia text message, in many cases without the user even seeing the message itself. Google has had months to write a patch and already had one ready when the bug was announced, but as expected, getting the patch through manufacturers and carriers was complicated and difficult.

But then, something unexpected happened: the much-maligned Android update system started to work. Samsung, HTC, LG, Sony and Android One have already announced pending patches for the bug, along with a device-specific patch for the Alcatel Idol 3. In Samsung’s case, the shift has kicked off an aggressive new security policy that will deploy patches month by month, an example that’s expected to inspire other manufacturers to follow suit. Google has announced a similar program for its own Nexus phones. Stagefright seems to have scared manufacturers and carriers into action, and as it turns out, this fragmented ecosystem still has lots of ways to protect itself.

It’s still early, and most devices won’t receive the patch until later this month, but Android security head Adrian Ludwig is optimistic that most Android users will be protected by existing mitigation systems, and expects patches to be deployed before attackers can break through. “The early reports triggered a very, very strong response,” Ludwig told The Verge. “The OEMs are now really understanding and the ecosystem is really understanding how to react more quickly, because we all see that it’s necessary.”

At the same time, the wave of negative publicity around Stagefright seems to have spurred manufacturers into action. Samsung’s VP of partner solutions Rick Segal says the move to rolling updates has been in the works at Samsung for six months. Enterprise customers have long lobbied for better security on the devices, and when a vulnerability in Samsung’s Swiftkey keyboard was discovered earlier this summer, the company was impressed by the positive customer response to the quick patch. The widespread public alarm over Stagefright was enough to tip the scales on the new feature. “Really, it’s the right thing to do,” Segal told The Verge, “and you’re not going to see any pushback from carriers or partners or anything because everybody knows it’s the right thing to do.”

by Russell Brandom

See Full Story on theverge.com

Bolster Android’s Security with a Larger Pattern Unlock Grid

zcyfrnfxgybwmgnew66r - Bolster Android's Security with a Larger Pattern Unlock Grid

Android (rooted): Pattern Unlock is just one of the ways you can keep your Android protected. It’s a pretty secure option, but to make things a bit tougher, this Xposed module can increase the grid size.

By default, Pattern Unlock uses a relatively small 3 by 3 grid on which you can draw your lock pattern. Although there is very large number of possible patterns that can be drawn between the nine points, there is obviously potential for increasing security by using a larger number of dots. Android doesn’t offer this setting, but if you’re comfortable rooting your phone and are happy to use the Xposed Framework, you can push the grid size all the way up to 6 by 6. The larger grid presents scope for more pattern combinations and much higher security.

The extra features come courtesy of CyanLockScreen, which you can either grab directly ordownload through the Xposed Installer app. We’ve looked at using the Xposed framework before, and while it may not be something that everyone is happy to tackle, it does open up a new world of possibilities and apps. Don’t forget to activate the module before restarting your phone.

See Full Story on lifehacker.com

Future Android security apps will learn from your phone to catch out the bad guys

zISP Android Security - Future Android security apps will learn from your phone to catch out the bad guys

Malicious software might not be as huge of a problem as some reports would like you to believe, but that doesn’t mean that we shouldn’t take the time to protect our smartphones from potential attacks.

Fortunately, Zimperium, a new mobile security startup, seems to be taking mobile security seriously and is showing other developers the way forward.

Its new Android app, named zIPS or Zimperium intrusion prevention system, aims to keep Android devices secure by learning how they typically operate and identifying when something strange is happening. This kind of technique has been used to spot malware on PCs for quite a while, but implementing a similar system on Android is more difficult, as we’re constantly connecting to new networks and regularly installing and updating our software.

The bad news is that Zimperium is currently only offering its software to business clients, although the company expects to roll out a consumer version at some point in the future. But for interest’s sake, let’s see how this technology works.

As already mentioned, the app installed on the device scans, in real-time, for threats by monitoring any changes to your handset’s behaviour. If, for example, a malicious app attempts to self-modify, or a device on your wireless network attempts to intercept your data, zIPS will notice this departure from normal operations and notify the user. Common Android security, on the other hand, relies much more heavily on simply checking incoming file signatures that can be compared with known bad code, and therefore struggles to respond to some of the more advanced threats.

See Full Story on www.androidauthority.com