Skip to content

How to Protect Your iPhones and Androids from Malicious Malware, Spyware, Trojans, Worms, Virus Attacks, and Theft of Your Identity πŸ˜ŽπŸ˜ŽπŸ˜ŽπŸ˜ŽπŸ˜ŽπŸ˜ŽπŸ˜Ž

January 26, 2015

😎 An important question for YOU… Is Your ο£Ώ iPhone Susceptible to Cyber-Hacking… Answer: Your iPhones and Smartphones are Vulnerable to Malicious Virus Attacks according to Declassified FBI, NSA and Homeland Security Reports.

😎 Question: How susceptible is Your Smartphone to Cyber-Hacking? Truth: All smartphones are Vulnerable to Cyber Attack; however, there are a few simple steps you can take to Minimize these Threats. Older Smartphones are even more susceptible; newer smartphones are less susceptible, but are vulnerable to attack.

😎 This is Your How to Guide to Protect Your iPhones and Androids from Malicious Malware, Spyware, Trojans, Worms, Virus Attacks, and Theft of Your Identity

😎 Your iPhone and Smartphone are susceptible to Cyber-Hacking, rendering all of your very Personal Information, Photos, and Selfies exposed to devious folks. News Reports have exposed “Celebrity Photographs” that outraged those “exposed.”

😎 My iPhone has lots of Personal & Confidential Information more than is housed in my Office File Cabinets. My friends have similar levels of comprehensive information about their personal and financial matters too. Some use passwords, but most do not.

😎 Not using Passwords or using Simple Passwords is very similar to
♦ Not locking your Car
♦ Not locking the Glove-box
♦ Not locking the Front Door
♦ Not locking Deposit Box
♦ Exposing Family’s Security
♦ Exposing your Guns
♦ Exposing Art, Jewels, Cash

😎 Confidential Information. Talk about Identity Theft. My iPhone is packed with all my private stuff, everything. I remember loosing my Wallet 20 years ago; It put me into a panic because someone I do not know has my personal stuff, my Cash, Drivers License, Brokers License, and several Credit Cards. In reaction to this, the CC Companies were called to cancel all the CC, then had my Licenses reissued. No harm, but a major annoyance.

😎 Everything has changed with the iPhone. In recent years, my iPhone for example is storing all my very important and confidential information pertaining to
♦ Bank Accounts
♦ Credit Cards access
♦ Contacts List
♦ Documents & Letters
♦ Photographs
♦ Tax Returns
♦ Driver License
♦ Broker License
♦ Insurance Cards
♦ Insurance Policies
♦ Social Security Card
♦ Personal Calendar
♦ Business Calendar
♦ Private eMails
♦ SMS Messages

😎 iPhone 5S, iPhone 6, and iPhone 6 Plus all have Finger-Print Biometric Authentication in its hardware make-up, that permits me to use a very Complex Password to back-up the FingerPrint ID. The only time I need to re-Input my complex password is when the iPhone is Turned-ON, following a Hard-turn-OFF, when one depresses the sleep-button for 5 seconds then Slides the OFF-Graphic to the Right, which I perform at least weekly, as a “memory cleaning” chore.

😎 Hacked Image Proliferation (Celebrities experienced this recently) is due to owner’s failure to properly password protect their Smartphone
♦ properly password protect their iCloud Account
♦ properly password protect their iTunes Account
♦ promptly Update the Operating System when the manufacturer like Apple releases a new iOS software update.

😎 There are thousands of individuals globally, its been reported, spending their time creating malicious malware in attempt to Aggravating everyone. Some create malicious malware to gain intrusions to our privacy, and to be Annoying, by deleting or corrupting files.

😎 Many Cyber Criminals imbed Malicious Malware, Spyware, Trojans, Worms and Viruses for more devious and devastating purposes namely: identity theft, monetary & property theft, break-ins & burglary, fraud, to mention a few.

😎 Hackers often have little problem breaking through user passwords to gain access to personal or private information, News reports revealed. This is not necessarily due to lax security measures at most web sites

😎 1 out of 5 iPhone, eMail, and Internet users, are using Passwords in the Top 500 most used. In many cases, a hacker generally knows your email address or username, and then starts trying passwords from the list displayed below. If you are using one of these top 500 passwords, hackers won’t have any problem getting into your accounts. The partial-list of the Top-200 is shown at the bottom of this Article, with a link for the Top-500 most used passwords.

😎 Roughly 85% of all iPhone Users are Cyber-Naked figuratively speaking, because these users do Not use any passwords whatsoever, or use very simple passwords, that even a beginner Cyber-Criminal can “crack” with ease.

😎 There’s no reasonable justification for not locking your iPhone, perhaps these folks think they’ll never loose their iPhone. Oh Really, tens of thousands are lost yearly; Lets not forget the iPhones that are Stolen or Pick-Pocketed, thousands of these occur yearly too. Not Locking your iPhone is like leaving your “Front Door to your home, Open and Unlocked.” You would likely not use a Clothes-Pin to Lock your Front Door either, the equivalent of using a simple password.

😎 PRIMARY MEASURE – Anti-Malware practice – Use Complex PassWords. Analysts and the Cyber-Criminals are shocked by the number of folks (reportedly about 60%) that do NOT use a Password to Lock their iPhones, or smartphones. Also analysts and Cyber-Criminals are amazed that the 40% of the folks that use Passwords about two-thirds of them (about 25%) use very simple passwords.

😎 Password Security Summary. Recent extensive surveys show that 40% of the iPhone owners use Passwords, however, about two-thirds of the 40% (about 25%) use very simple passwords. Therefore, only 15% of iPhone owners use Complex alpha-numeric passwords. Conversely, a massive 85% of iPhone owners, use either Simple passwords or No passwords whatsoever. In Sum, about 6 of 7 iPhone Users are UNSAFE because they don’t use passwords or use very simple passwords, which is like not using a password from the Cyber-Criminal perspective.

😎 To Protect your valuable and confidential, Perform all the series of Steps on your “Settings” screens.

😎 Password Security Setting. There is one more thing… that iPhone owners must do to protect their iPhone’s contents

➑️ FIRSTLY: In the Settings Menu tap the line named Passcode or Touch ID & Passcode enter this submenu, enter your current password

➑️ SECONDLY, in the next submenu, scroll down to the Bottom of all the settings, Turn OFF the TODAY setting (which if selected permits use of the iPhone for the entire day without having to re-enter your password, a very bad idea

➑️ THIRDLY Next, at the bottom of this menu is Erase Data, this switch should be turned ON, displaying GREEN. With this switch activated, if a Bad Guy, or anyone finding your lost iPhone, when they start experimenting with PASSWORDS, trying to guess yours, AFTER their 10th ATTEMPT, all your DATA on your iPhone is ERASED, therefore safe.

Erase All Data after 10 Attempt, explained. If this switch was not turned on, the Cyber Intruder would be free to continually enter passwords attempting to guess yours. With the Erase Data after the 10th Attempt, the Cyber-Criminal only has 10 tries to open your iPhone, then the iPhone’s Memory auto-erases, and your Private Information is safe.

➑️ FOURTHLY Make sure you are Backing-Up your iPhone every night to the iCLOUD. There is an arrow symbol showing you where the iCloud Settings menu is located; you may turn ON to Backup to iCloud, this will AUTO-Backup your entire iPhone’s Settings, Ring Tones, Photos, emails, text messages, and all other Data on your iPhone every night as you charge your iPhone.

😎 SECOND MEASURE – Anti-Malware practice – Update your Operating System Promptly, once Apple’s iOS or Android’s Operating System Upgrades become available for DOWNLOAD. One of the primary components in Operating System Updates is the installation of the most current Anti-Malware algorithms, which is part of the iOS update. Promptly updating the iPhone’s iOS is a very effective step in minimizing Malware Attacks.

😎 THIRD MEASURE – Anti-Malware practice – ONLY Open or DownLoad Images, Videos, Attachments, Objects, eMails from known trusted Sources. Oftentimes Malware is imbedded or connected internally to eMail Attachments, or reside in Spurious Web-Sites where Worms and Trojans will wiggle into your hand-held device without you doing anything other than arrive at the Website page.

😎 Android Targeted by an astonishing 79% of all SmartPhone Malware, because it is more vulnerable to Viruses, according to U.S. Department of Homeland Security and FBI surveys. According to this survey the U.S. Department of Homeland Security and the FBI, uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was successful directly against Android devices, because its Operating System is highly fragmented rendering it more vulnerable to attack and has less Security Capability.

😎 Fragmentation of Android’s Operating System, is a major contributor to successful Malware attacks. Fragmentation generally is a phenomena where smartphone users either refuse to update, or intentionally elect not to update their smartphones’ operating system, OS, when new released are published.

😎 Fragmentation is Rampant with Android Users, because there are over 11,000 different android handsets models and brands in circulation, where older models do not have sufficient hardware capabilities, processors, memory, etc, to effectively install the Newer OS updates; Accordingly of Three Android users, only One-In-Three Android users update to the New Android Operating System. Conversely, TWO out of THREE Android Users do not Update periodically, therefore do NOT have the most current Anti-Malware software protection.

😎 Most Smartphone users simply do not understand that smartphone OS updates contain Anti-Malware algorithms as well as improvements to the hand-sets’ general operation. Other smartphone users elect Not to upgrade their OS, as the Upgrade may cause their smartphone to Freeze, or many of its Apps may become inoperable.

😎 When Spyware & Malware Attack a Smartphone, a frightening scenario. Without getting into the weeds too far here’s what happens. An unsuspecting smartphone user opens a seemingly safe eMail from a familiar Retail chain. Unfortunately, the Cyber-Criminal created an email using the Retail Store’s graphics and other appearances to trick the unsuspecting browser.

😎 Using your smartphone, you click onto an interesting retail offerBLAM! you’ve triggered an invisible Spyware-Algorithm that begins to RECORD all your KEY-STROKES silently in the background, you’d not know this is happening; the Spyware, periodically sends the Key-Strokes containing your logins, passwords, and other keystrokes you routinely used, to the “Russian Mafia” for example. Days later, your Bank Accounts are emptied. Thousands of folks experience these losses every week. We have a family member that experienced this same Spyware attack recently, and had $thousands taken from his Bank Account.

😎 Apple’s iPhones have some vulnerabilities too, but they were with the NSA according to a recently Declassified documents. The infamous former National Security Agency contractor Edward Snowden, responsible for leaking thousands of pages of classified intelligence documents from the NSA, the USA’s secretive spy Agency, reportedly believed that the iPhone contains “special software” that can be remotely activated by the NSA for intelligence gathering purposes.

😎 Apple was one of the first companies accused of participation in the NSA’s secret PRISM data mining initiative, following Snowden’s release of thousands of classified NSA documents. The PRISM project is said to have involved the extraction of “audio, video, photographs, e-mails, text messages, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”

😎 Apple immediately denied the accusation, saying that they “have never heard of PRISM” and that “Apple does not provide any government agency with direct access to our servers.”

😎 The “Snowden leaks” revealed that NSA had created spyware targeted at SmartPhones and iPhone, which would have given intelligence services access to SMS messages, on-board data, live microphone feeds, and GPS and WiFi location-positioning information. It remains unclear how successful the program was.

😎 Apple vehemently denied any involvement, and recently announced that its iOS software has been, and continues to be periodically updated make absolutely certain that iPhones and iPads are protected with the latest Anti-Malware software, and to assure that there are “No Back Doors for entry into one’s iPhone.”

😎 Apple Confirmed it has never worked with the NSA to create a “backdoor in any of our products, including iPhone,” the company said following news of the project. “Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security.”

😎 Android’s lack of security is due to Android Operating System Fragmentation. More than 50% of Android users are using Older OS Versions, because users fear that their smartphones or the Apps may become inoperable, even though these users are significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malware.

😎 Android Security. Newer versions of Android’s operating system have become more secure, but a significant percentage of its user-base is not updating to new OS versions. There are roughly 11,800 different Android devices in operation today.

😎 Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many. Too many Android brands with too many Android models, about 11,800 different versions of hardware are in circulation. Wonderful to have all these Choices, but all these hardware configurations and chop-sets is a Major Headache for OS Software Engineers. Conversely, Apple currently has SIX models of iPhones 4S, 5, 5S, 5C, 6, 6 Plus, and FIVE models of iPads, all of which represent 97% of all of the iOS users.

😎 Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device. Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.

😎 According to a survey conducted by the U.S. Department of Homeland Security and the FBI and uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended for Android. Indeed, Android was targeted by an astonishing 79 percent of all smartphone malware. The following is an excerpt from the Unclassified report from a survey conducted by the U.S. Department of Homeland Security and the FBI.

😎 (U//FOUO) Android mobile operating system (OS) continues to be a primary target for malware attacks due to its market share and open source architecture.

😎 Industry reporting indicates 44% of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread, which were released in 2011, and have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The following are some known security threats to mobile OS and mitigation steps.

😎 Android was targeted by an astonishing 79% of all smartphone malware that year far more than any other OS. The agencies found that Apple’s iOS was targeted by 0.7% of malware attacks, Windows Phone and BlackBerry by 0.3% and Symbian OS by 19%.

😎 DHS and FBI note in their memo, citing the research circulated nationwide to law enforcement, security and emergency personnel, that a significant number of Android users continue to run older versions of the OS that leave them open to a number of security vulnerabilities β€” something companies with rival operating systems love to point out.

😎 Recall that over 94% of Apple iOS users, about 400 million of them, have updated to the iOS7 and iOS8 which contains the latest Protection against Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware. This is largely why Apple’s iOS has experienced less than 1% of such vulnerabilities.

😎 Most Common PassWords – the 3 graphics below display the Top-500 of the Most Used PassWords – These Passwords you should NOT use – Protect your Web-site, eMail Accounts, Bank Accounts, SMS Messages, Calendars, Contacts from being Hacked; The “Bad-Guys” try these PassWords first to unlock your Smartphone.

Link takes you to the Top 500 Most Used PassWords:
http://www.bmyers.com/public/1958.cfm



Pleased you’re reading, with about 75,000 readers world-wide, growing by thousands each month, giving motivation as new topics are published every day. Spread the Word to your friends, family, and associates; Forward the link below, post it on Facebook, Twitter, LinkedIn, Social Networks for their review,, Anyone may subscribe, its secure and confidential; Every time I publish an article, WordPress will send a reminder (no Ads of course) with a link to my new Article: http://FAU4U2.WordPress.com/

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 25,900,000 visits as of January, 2015: http://www.416-1100.com.

If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU: http://www.416-1100.com/FAU-Classes/Principles-of-Digital

When I do what I do… I usually do it here.

As a "Health Nut" for Health & Wellness; http://www.Jim.Wilson.Isagenix.com

As many of my friends, family and students know, I am an avid iPad adopter since its release April, 2010. With Apple’s release of the Retina-Display iPad Air 2, (I sold iPad 4 to Gazelle.com) applied the proceeds to purchase the "mini" with 128GB of Storage, AT&T connectivity, plus added Logitech’s UltraThin Keyboard Cover, and a DECODED natural leather thin slip-over protective case.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: