How to secure phone from virus

How to secure phone from virus | Type of virus

Posted by

How to secure phone from virus

How to secure phone from virus

How to secure phone from virus: Malware is an acronym for software that is software designed specifically to steal or damage data from any computer. Malware also includes viruses along with other types of software such as Trojans, spyware, computer worm, and adware.

How is information stolen?

Fishing is actually a fraud email, with the help of which you are asked for data. It looks real. Hecker tries to assure you through phishing emails that he is asking for bank account information or other data for your benefit.


For example, an email comes from your bank stating that your debit card has been canceled and a new card will be issued to you only after stating the card number or Aadhaar number. You may think that the bank has asked for this information from you, but it can be a hacker.

How to secure phone from virus

There is a link in the phishing email on which you are taken to a fake web page. If you get caught in their deception, then you enter your account information there and it goes to the hacker’s server. After this, the hacker can use this information to blow money from your bank account or credit card.

The second way is that you are sent an attachment in an email, which is asked to download. As soon as you download it, and open it, a mail ware is installed in your system. This is a hacker’s access to your device and data, allowing it to access your account.

How to stay safe from viruses?

1. Note the spelling mistakes in the domain name or email address. Cyber ​​Criminals usually use the kind of email that belongs to well-known companies, they just manipulate it a little to make it look genuine.

2. Think twice before clicking on any such link. If you see any suspicious email, do not click on it.

3. Cyber ​​Criminals usually threaten you with a safety hazard. Do not fall into such a trap. Set your mind on the situation and then talk to your financial institution.

What is MalWare?

It is software designed to steal information or data from a system. This program performs activities like stealing sensitive data, deleting it, changing the way the system works, and keeping an eye on the person working on the system.

This program can be installed in your system in many ways. An out-dated operating system or pirated OS, unintentionally clicking links, or installing fake software, may cause mail ware to be installed.

Types of malware virus:

Virus: It is able to affect the functioning of the system from affecting any software. It is capable of transforming itself like a data file/program or boot sector. This makes it difficult to access the file/system by going to the computer hard disk.

Trojan: It goes beyond your security system to create a back door so that a hacker can monitor your system. It shows itself as software and is found in tempered software.

Spyware: This is designed to spy on you. It checks your online activity by hiding itself in the background. It reads your ID, password, credit card number, and habit of running the net. It can record keyboard, video, and microphone, etc.

Key Logger: This is an alternative to Spy that records your keywords. These logs are sent to the attacker. With his help, the hacker gets your password, chat, credit card number, or other information.

How to stay safe from viruses?

  • Install good anti-virus software
  • Do not download any fake software, through these mail ware can come into your system.
  • Never click on fake pop-ups of anti-virus
  • Always keep your system operating system updated.
  • Always avoid pirated apps or software. They may contain mail ware.

How to avoid apps virus:

  • Check permission before downloading an app.
  • Pay attention to its reviews and ratings
  • Do not install apps with less than 50,000 downloads
  • Do not take the app from a third-party app store
  • Do not download pirated/cracked apps

How does a thief take information:

By using social engineering, someone asks for your personal information from you and you give it to him. In this, information is taken from you using your trust. The attacker can ask you for anything from an online password to bank account details or OTP / CVV. Once the data is received, he can use your information in many ways.

Physical Hazards Related to Safety

1. Taking your laptop, every disk, or mobile and stealing confidential information from it actually comes in such danger.

2. It is considered to be of lesser importance than technical hazards. It is a case of extracting data from a stolen device and using it. This can happen anywhere, in your home or office.

Avoid Physical Hazards Related to Safety

1. Keep your information safe. If the computer/smartphone has this kind of information, then protect it with a password or pattern.

2. Do not get used to writing passwords. Come out only after shutting down the system or logging out from the banking site. Lock the phone. If your device gets lost, in that case, you can erase the data sitting at home, make such a system

Unsecured Network:

Hackers can easily steal the personal information of customers using public Wi-Fi. The information that hackers try to steal include credit card details, password, chat message, email ID, PAN number, Aadhaar number, and other information. It is commonly called Identity Theft. To protect your information, you should not do any activity like shopping or net banking from these places.

Stay safe Unsecure Network:

  • Do not do financial transactions with an open internet network at all.
  • Make home Wi-Fi secure and keep passwords difficult.
  • Your safety is in your hands. Be careful and be vigilant at all times.
  • A hacker keeps an eye on your data all the time, so vigilance is the only protection

Recent Posts



Leave a Reply

Your email address will not be published. Required fields are marked *