fbpx
Founder Institute Lagos Founder Institute Lagos Founder Institute Lagos
  • Home
  • About
  • Partners
  • Advertise
  • Contact
  • Signup to receive updates
Innovation | Startups | Funding | Tech Blog in Africa
Advertisement
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
Innovation | Startups | Funding | Tech Blog in Africa
No Result
View All Result
Home General

Protecting Your Device From Apps That Steal User Data

by TechBuild.Africa
2018/12/13 - Updated on 2020/12/21
in General
device protection

device protection

Share on FacebookShare on Twitter
Tweet
Share
Share

We live in a very connected world today and our devices are at the center of our digital existence. These devices enable us to socialize, connect, transact business and get important stuff done on the go.

In recent times, however, users data getting exposed, leaked, or, even, stolen online are becoming more common. This growing concern has led device manufacturing companies, social media platforms, app makers and indeed, everyone to start taking measures to curb this trend.

At the least, as an individual, it is important to take steps to protect one’s device from these data leaks and theft online. Here are some measures that one can take to protect one’s device from data theft and leaks:

1. Avoid Using Your Social Media Profiles To Sign In To Third Party Platforms

RelatedPosts

Twitter Blue goes Global, Legacy Verified Badges to be removed on April 1st

Rwanda to host AWIEF 2023 Conference in November

6 Ways YouTube and Google Can help You celebrate Ramadan

The Interesting Relationship between Women and Mobile Money in Africa

A lot of websites, platforms and applications try to make it easy for new users to sign up on their platforms by allowing them use their social media profiles, such as Facebook, LinkedIn and Google to log/sign in.

As simple, easy and helpful as this may seem, it has it’s own downside and dangers. One of these, is the fact that, the more you use your social media profile to sign up on a third party website or application, the more prone that profile is open to hacks, leaks, breaches and attacks.

It is advisable to choose the alternative option to “Sign Up With Email”, as this will not expose your social media profile to unsecure platforms, data theft or attackers.

2. Limit Apps That You Grant Access To Your Contacts, Media Files, Location, etc

These days, mobile apps on smartphones require users to grant them access to read their Contacts, Media files, Location, Call Logs, etc., before they can fully enjoy the features they present.

As harmless as this action might look, it does have its downside. Apps that have access to your Contact information, Media files, Location and the likes, may very well expose same to unwanted third parties in the event of a breach.

A similar scenario was said to have occurred in 2014, when a quiz app which feed data off of Facebook was reported to have sold users data to Cambrige Analytica. It is wise to be cautious with the apps that you grant access to read your data on your device.

3. Avoid Installing Antivirus Apps on Mobile

Doing a search on the different app stores, you will find quite a number of applications offering protection from viruses and malware on your device. The interesting thing is that, some of these apps, which acts as antiviruses and “phone cleaners”, can pose a huge risk to the data on your device.

Some phone cleaning apps, which regularly conduct scans on files, data and software on devices, often get breached and have been reported to leak sensitive user data to third parties.

4. Be Careful With Privacy and VPN Apps

With growing internet privacy concerns, a lot of internet users have resorted to using Virtual Private Networks, (VPN), in order to shield them from intruders and spies.

Reports, however, exist, showing evidence that some VPN and privacy applications end up mining user data and even selling same off to third parties.

Best to be careful when opting to use a VPN for security or privacy reasons.

5. Install Only Keyboard Apps From Trusted App Makers

Another very unlikely culprit that stealthily collects users data without anyone, even, knowing are keyboard apps.
With the phasing out of keypads and the emergence of the touchscreen, keyboard apps have become essential to be able to type text or make inputs on mobile devices.

One striking requirement that almost every keyboard app has, is that, they usually require users to allow them to store, save or retrieve the data typed through them. What this means, is that, every stroke of your keypad, including texts, numbers, PINs, Codes, etc., typed through them are stored somewhere on its database.

Using a keyboard app that is not secure or from a vendor that is not trusted means that, any sensitive information typed and stored on the keyboard app’s database is prone to breaches, leaks and theft.

Are there any other ways to protect your devices from apps that steal user data? Please share your thoughts via the comments section.

Join @techbuildafrica on Telegram
Tweet
Share
Share
ShareTweetShareSendShare

Subscribe us

Recent Posts

  • Twitter Blue goes Global, Legacy Verified Badges to be removed on April 1st
  • Rwanda to host AWIEF 2023 Conference in November
  • LG Displays Innovative Home Appliance line-up at MEA 2023 Showcase
  • 6 Ways YouTube and Google Can help You celebrate Ramadan
  • Market Intelligence Startup Rwazi secures $4M Seed Funding
  • The Interesting Relationship between Women and Mobile Money in Africa
  • WhatsApp Desktop’s Latest Update enhances Group Calls and speeds up Load Time
  • Apply for Reckitt Lead2030 SDG6 2023 Challenge ($50K)
  • Monitoring Nigeria’s Cyberspace Before, During, and After the 2023 Gubernatorial and State Assembly Elections
  • AVEVA commits to Subscription Transition to promote Adaptable Industrial Innovation
Innovation | Startups | Funding | Tech Blog in Africa

© 2013-2021 techbuild.africa. All Rights Reserved.

Navigate Site

  • About
  • Contact
  • WE-Forum
  • Privacy
  • Sitemap
  • Terms
  • Blockchain
  • CleanTech

Follow Us

No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain

© 2013-2021 techbuild.africa. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In