-->

10 ways to protect your Android smartphone from hackers | KumarJeeru

How to prevent smartphone from hacking


Hello friends we have already discussed about lot of technology tricks through this website.but now i  am going to provide you some tips and tricks how to protect from hackers while using any kind of technology.

Take more care  on social media and online accounts

Where don't login your social media or online account by any short links or unknown website . always use Google or any popular search engine to find whether website is truth or fake .

where some hackers uses phising trick to create dummy website looks like original website to get victims username and password . Hackers uses some password cracking techniques  to cracking username and password of any app or website using some information gathering tools.

Also Read:6 Most Common Password Cracking Methods And Their Countermeasures


Only use password with combinations of numbers,alphabets,symbols  like this  UC80gs#h/e&c#f$&#@/hjes&.it's better to use double step verification while  using  payment related online accounts like Internet banking  to secure our bank accounts.


they can hack your online accounts if you use  simple password like iloveyou,123456789 or any other easy password . Don't put your personal details as password like your wife name,your country name like that.

SIM JACKING

Where hackers can also inject some spy softwares even in simcards without our permission .if you insert that sim in simslot in either smartphone or java or symbian phone . what ever device you use its not required for hackers . even devices without Internet connection AlsoHackers could hack sms,call logs,contacts .

Also Read:6 Android Hacks You Can Do Without Rooting Your Phone


Process behind sim jacking

They uses a special browser to monitor all activities done by you through that simcard.where they injects a small code  in place of bug of the simcard to do survelliance by hackers .


where every simcard like airtel,jio,idea etc contains operator tool kit  like( airtel live,idea live etc ) gets automatically installed into the device whatever you use.where every simcard contains some phone numbers pre installed like police,ambulance,customer care etc .

Also Read:How To Hack Someones Phone Remotely

there's a special browser in every sim regards sim services where hacker exploits that software and injects some code in vulnerability of that simcard.they uses this trick to monitor your location,sms logs including messages ,call logs,then can also block calls on your simcard.


they could also show a popup screen regards  offer like get free3months unlimited calls,sms,Internet like that) even that message won't save and asks yes or no at footer part.if you click on yes then hacker can able  call to some anonymous person using your mobile number remotely.where victim may feel panic during this situation where victim can listen call ringing sound without doing any call to certain user. Without victim permission They can also install dangerous spyware/virus application by using your web browser  remotely in your device.

JEWS JACKING

Whenever we go to railway stations, travelling buses,5 star restaurants we may charge our devices when there is insufficient

Charge  our device.its better to use power sockets to do charging . When in some cases they provide USB Ports or USB sockets for charging. We basically charge our deviceby connecting Usb cable on one side and charging pin on other side .

Also Read:

Difference Between HDMI, VGA, DisplayPort, DVI, Thunderbolt, And MHL

where usb can do data transmission.after connecting usb cable pop up screen appear in our device and  it asks for three choices
1)charging only
2)media transfer only
3)both media transfer and charging
You have to select charging only . If you would selected any other option your data would be transferred to anonymous person.

What's behind Jews Jacking 

Where they basically provide some usb port on onside of the wall and behind the wall they uses some computers/laptops to do surveillance on users data

If above pop up is shown on your device means some device is behind that wall is going to monitor your phone . where they can monitor call logs,sms,WhatsApp messages,photos,videos,whatever data in your device.they  can also use data for illegal purposes.

Also Read:How to protect keyboard from Hackers

so don't store your email&passwords or any personal information in your notes,memos or as any file format in your device.
You have to select charging only to  overcome this problem.

SIM SWAPPING

Suppose hacker want to hack online payments account . Then the  hacker send a phising link to the victim then the victim believes it as orginal website and  provides his username and password .now hacker needs otp from the victim simcard.then the hacker gathers all personal information including Aadhar card number of victim.

by using some information gathering tooos he aquires all victim`s data. Then the hacker calls the customer care of that sim company and says that someome had stolen  that simcard number kindly block that number and then and provide a duplicate sim.

Also Read:FRANKENSTEIN – A Virus that will destroy your Android Device within a Second


Then hacker calls the victim and say we are calling from telecom company we are upgrading your simcard from 4G to 5G please press 1 then believe it's a call being receiving from telecom company and clicked one in dialpad then old sim will be deactivated and new sim will be activated.

so he already got your online banking details now he got otp then he simply transfer that money to hackers personal account.
Recently in a case study a victim from bombay,India had lost 4crore rupees from a business man by this trick.


If you send a small SMS message to any mobile, the SIM card will be in full possession. Obviously every SIM card we use has a special software framework called the SIM Application Tool Kit (STK). As part of this, a browser called S @ T Browser is also an integral part of the SIM card. What SIMJacker malware does is take control of this browser. It will then open up dangerous websites, read SMS messages to your phone, and prevent any communication from your phone.



This has been the method used by hackers for a long time. Your name, date of birth, Aadhaar card details and other important information will be collected from various places and based on them, the telecom company will compile them on your behalf. Even if all your credentials are correct, telecom companies will soon give them a duplicate SIM card without identifying the thief. This will no longer leave banking OTPs and other important information to your phone. Your sync will deactivate completely. Using this method should be careful so that they took up  large sums of money from the bank account.

Be safe with Credit Cards

Where you may receive some calls  or messages or mails from anonymous persons says



CASE1:we are calling some specific bank where your credit card or debit card is banned today

CASE2: we are calling some specific bank your credit card is going to expire soon kindly share your credit card details we will send a new atm card through postal services

In first two cases they get all details on atmcard from victim.now then can hacker can use those details for shopping and to do online money transactions.

CASE3:Your account is hacked please change your online banking account password to secure it.click below link to continue

Also Read:Secure Your Credit Cards From Hackers (Definitive Guide)


In case three hacker got victims username and password of online payment account then hackers use SIM SWAPPING technique as i explained above to move all his money to hackers account.

CASE4:Just pay 1$ and watch life time all channels for free.
 In case four victim click the link and trusts that it's a real

ATM Cloning or Card Cloning 

These incidents are mostly done in first week of the month . because most of people tries for withdraw money easily.where they choose atm in small streets to withdraw money . It's a major mistake.
My advice is only use atm with heavy crowd,security guard and a surveillance camera . because hackers choose least security atm for their own purpose like to equip atmcards details by some special techniques.hackers uses card skimming technique here.

where they put a fake swiping slot inplace of   atm swiping slot and a transparent layer type device on keypad of atm which works like  a keylogger.where both of them stores all information like whatever pin user types on key pad and also it extracts data from magnetic strip of atmcard while swiping through swiping slot and stores all data . later hacker do verification and do combination of card details and pin at specific time by combining data in a sequence.now they copy all atm card details on a dummy atm card and they use  for any purposes.
 where he can also sell them through darkweb.

can we able to design a unhackable website/app /software /device /anything

It's impossible to create such things . for example if i am working in software development of macintosh operating system. With my capability of programming languages i made few software programmes like felt they are working good . Like task bar,paint,excel,power point,typing master etc
after completion of development of that software  with 80-90% accuracy  will be published in new macintosh software .

But some hackers try to exploit that software and finds some bugs.by using that bugs he  get admin  rights in that mac os and destroy whole computer . that's why mac or windows or Android founds lot of security patches in the software and provide software updates.if we neglect updating software of our device then hacker can easily hacks our device . It's our mistake not by company . don't use pirated software from torrents or third party sources use only from orginal software updates.

Never Use Mod Apps 

Do you use GB WhatsApp,OG Insta or any other mod app you may got it without paying a single penny.
People may feels happy while using some mod apps by getting all features of that application without paying even a single dollar of money.But Doing such things is offense and crime . some people tries to crack paid apps using softwares like lucky patcher, apk editor,android studio etc . but you should never do like this .

Also Read:Download Google Play Store Paid Apps For Free

You shouldn't download any kind of mod apps from third party websites and app . They can remotely inject malware or virus inside the app to erase all information inside your device they could also do survelliance on your smartphone.Where App developers are not responsible if any errors done through app on your smartphone.



Never Use Public wifi

You might got free Internet through Railwire,Bus stops,Restaurants,cafes or else anywhere.You may Surf on Internet whatever you want without any hassles.

Also Read:5 Steps Wifi Hacking – Cracking WPA2 Password using Kali Linux

but hackers could exploit your smartphone or pc whatever you use without your permission they could spy your device remotely even your smartphone couldn't detect that if you won't use any anti virus app.

Use Antivirus app

Where antivirus app can helps you to scan whole smartphone and detects hidden malware and Trojans,spyware,adware inside your device.it restrict you to open phising sites,porn sites.You can also protect your device by Anti theft,play sound,locating your device . 

Also Read:What Is RAT Or Remote Access Trojan ?

It's better to use software inbuilt anti virus apps rather than third party apps . I recommend you to use Antivirus apps like MCAFEE,Bitdefender,Kapersky ,malwarebytes,eset, panda.
Where you can get all features of that anti virus applications.

TURN off wireless connections when not in use

There are three types of wireless connections accessed through smartphone . Through Bluetooth,wifi,Usb tethering.



Stop using them whenever they are not in use . where hackers use tools like kali Linux,Blueborne attack to hack you smartphone.

Also Read:What Is The Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN ?




Never use QR code for payments


You may found somewhere that qr codes are shown before merchant shops like paytm,google pay,phonepe,Amazon pay,paypal etc .you might use them for doing upi transactions . 

be safe while doing such things.hackers could also inject malware in your smartphone and exploit all data . some hackers also sends 999rupees or 15$ request money qr codes to us . If we scans them then money from our account will be transferred to hackers account.



Don't click fake advertisements 



Some hackers also post some fraudulent advertisements on social media,news papers,websites like quirk . where those advertisements appears like trusted but theyare fake . check whether company has official website,head office,phone number,email . search on Google whether they are true or fake.



Don't miss any smartphone or pc OS update 

Where app developers provides Os updates to solve vulnerabilities in that Os or app update to protect users from exploiting by hackers . Never miss any software update which protects you from attacking malware, petya ransomware,trojans,virus etc . mainly 

Also Read:How to Hack car lock using HackRF


Software update should be done in IOT (Internet of Things),smart device,self driving cars and tractors,smart tv's . not only this software update is provided for every gadget works with Internet connection . Then you can surf on your device without any hassles.

〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰

Hope you love this cool post don't forget to check out advertisements on my websites and share this post to all your friends and groups . Have a nice day wait for the upcommimg post Until take care good bye.

Also Read

Post a Comment