Mobile phones are incredibly powerful communication tools, but they are inherently insecure. We can do most of the things which we do on computer on our mobile phones and its equally important to keep it secure. Learn how you can keep yourself, your personal information, and your friends and family safer.

Don’t Wait, Update!

When you update your mobile phone’s software or applications, it fixes problems and removes the security holes.

Learn More


Your phone can identify you whether it’s a dumb phone or a smartphone.

Learn More


As long as you are connected to a cellular tower, your location can always be tracked.

Learn More


you might think your phone is just for talking or chatting with your friends. But did you know your phone is also listening to you?

Learn More


Earlier the chinese government used to sent spies to steal our informations, but now they have Wechat. It’s like welcoming them in our community.

Learn More


Installing a malicious application your phone can steal away your information.

Learn More


Few of the other security tips for mobile phones

Learn More

Make your Smartphone a Strong phone too – Keep it updated!

Smartphones will ask you to update their built-in software every now and then, and, more frequently, you will be prompted to update your apps.

Like computers, Apple iOS, Android and Windows Phone operating systems and apps have security vulnerabilities in them that are discovered over time. These weaknesses, when known to the companies that make the software, are fixed (or “patched”) through a software update sent over the Internet and mobile networks

When ‘System Update Available’ notifications pop up on a smart phone, most users have the tendency to either ignore or swipe them away. Doing this means increasing the risk that the phone may be successfully compromised as most hacking attacks target old and out-of-date versions of the built-in software


Your Sim card and your mobile phone can identify you

This happens in two main ways:

  • Your SIM card stores identifying information. Each SIM belongs to a specific mobile provider, who knows what phone number it is associated with, and any information you provided when you bought the SIM card.
  • Your phone handset also has a unique number. It is called the IMEI number, and it can be tracked at all times. You can dial #06#  or look inside the battery compartment of your phone to find the IMEI number.

Stay safer:
1. If you don’t want to be identified, change your  SIM Card AND your phone. Changing only one of them is not enough.
2. Use pre-paid SIM cards that aren’t registered in your name.
3. Buy a cheap, low-tech mobile phone that you don’t mind throwing away if necessary

Your phone is designed to give out information about your location.

As it tries to find the strongest network signal, your phone is constantly connecting to every mobile network tower near you, identifying your location and registering your SIM and IMEI numbers. By figuring out how far away you are from each tower, your location can be pinpointed.

Many phones also now have GPS, which identifies your location even more precisely. This location information can also be embedded in other data such as photos, SMS and internet requests that are sent from the phone.

Stay safer:

  • Take your battery out of your phone when you don’t want your location or movement patterns to be broadcast. Switching your phone off is not enough.
  • Turn off GPS if you are concerned about your location being identified.

You might think your phone is just for talking or chatting with your friends. But did you know your phone is also listening to you?

Mobile phone providers have full access to the calls and text messages you make on their networks, which can be listened to and recorded. Governments can also usually access this information.

Your phone can be remotely set to act as a microphone for others to listen to your conversations, even if you are not using your phone at the time.

Stay safer:

  • Be aware of what you are saying in calls and text messages. Try to avoid sharing sensitive information or speak in code if you need to.
  • To prevent your meetings or conversations from being heard, take the battery out of your phone or leave it somewhere far away. Switching your phone off is not enough.

Installing WeChat on your phone is like inviting the Chinese government to spy on you

Records about you, your contacts, and  your calls, messages, and other communications are accessed and stored on WeChat’s servers in China. Like any Chinese company, the owners of WeChat must give the Chinese government access to all of this data.


Stay Safer:

  • If you have WeChat on your phone, be aware that everything you do could be monitored and that you could be putting your contacts at risk. Be very careful about doing or saying anything sensitive.
  • Try deleting WeChat and using a safer messaging app like Kakao Talk instead.


Don’t install bad applications on your phone which are suspicious.

Do you ever read the permissions you give an app before you install it? Most of us do not have the habit of doing so and if even if we do, we would be baffled by the kind of permissions apps ask that have nothing to do with how it functions.

For example,  flashlight’s purpose is to provide light. So it would definitely require access to our camera since it uses the camera flash for the light. But why would a flashlight need access to our phone records, photo gallery, and contacts?

Many of these apps act similarly to malicious software, they are more interested in our data.

More mobile security tips

A few more things to remember to help you stay safer on a smartphone:

  1. All the data you store on your phone is vulnerable – photos, videos, contact list, emails, messages. Be careful what you keep on your phone.
  2. Turn off and disable your WiFi and Bluetooth whenever you aren’t using them so they aren’t broadcasting.
  3. What keeps you safer on a computer keeps you safer on a phone, too:
    • Think Before You Click! Don’t just click on random attachments and links.
    • Detach from Attachments! Use file sharing services like Dropbox instead of emailing attachments.
    • Make Your Passwords Long and Strong. Use at least 12 characters with unpredictable combinations of upper and lower case letters, numbers, and symbols. Set up a swipe lock or long password to access your phone.
    • HTTPS Keeps you Secret – Safe – Secure! Choose email providers and other websites that use HTTPS encryption at all times.

Use reputable, secure app alternatives like those from