5 Simple Steps To Keeping Your Smartphone (And Data) Safe | Hacking Is Magic

Smartphones have evolved from being able to just check email and has now allowed us to do somany other things when paired with other devices. Nowadays, we can pay with our smartphones with digital wallet apps are able to store multiple credit cards. Most of our private information(together with other contact information) can be found in the apps on our smartphone through chatlogs, pictures, calendars, and notes.
Mobile Security
This is why we rely so much on our smartphones and store so much sensitive data on it to make our lives easier. With all these sensitive data onboard a tiny device, we should pay more attention to keeping it safe and away from anyone unwanted. Here are some precautions to help you.

1. Set Lockscreen Security That Self-Destructs

Leaving your phone unattended on a desk for a few minutes could lead to someone accessing it to extract lots of vulnerable information. Which is why enabling lockscreen security is essential to keeping your smartphone away from unwanted users.
This is the easiet way to defend you and your data, and pretty much every smartphone has this feature. Manufacturers know privacy is important to users.
Some thieves would try breaking the lockscreen by trying out passwords but to really keep your data safe from brute force hacking, you could enable a feature that erases all data from your smartphone after a preset number of failed attempts.
On the iPhone, it can be enabled under Settings > General > Passcode Lock > Erase Data.
iPhone Lock
By default, this kind of feature is not available on the Android, but you can enable a similar effect with a free app like Autowipe .
Autowipe

2. Turn Off Settings When Not In Use

Hackers are able to do all sorts of things that will surprise you. Turning off phone settings likeBluetooth, Location Services, Near Field Communication (NFC), Wi-Fi and even Cellular Datawhen not in use not only conserves smartphone battery but also gives hackers less access to your device.
Location Services and Bluetooth should not be turned on when not in use as apps can use lots oflocation data without you knowing it. As Bluetooth is constantly transmitting your devices’ location and presence, it is possible for hackers to use it to gain access and extract any kind of information found on your device.

3. Don’t Download Shady Apps

Apps are probably the only thing that can harm you by stealing your personal data. When downloading an app, make sure that all the details of the app comes from the original ‘company’ or correct developer. Some sneaky apps might even trick people to download a "New and improved HD version" of a legitimate app, so make sure you check a few app details before downloading.
For instance a mobile banking app (or any app that handles financial accounts) should come from the bank itself as seen here on the iOS App Store, and not some other seller or developer.
Apps
App ratings and comments can also tell a story. If it’s a popular bank or financial service (PayPal) app that has no rating or comments, chances are it might be fake and you should be careful about downloading it and logging in. So be sure to download apps only if it has been rated many times and has multiple comments.
Rating

4. Be Wary Of Fishy Apps And Links

Viruses on mobile platforms can be present in many ways. It can be in the form of a ‘dirty’ app that runs in the background transmitting user data. As the Android system allows third-party apps or programs to be installed (very easily), Android users may open their mobile system up to attacks if they are not wary of the apps they download to their phone.
There are however anti-virus scanning apps and other tools on Android that can detect and remove anything that can harm your privacy.
Mobile Security
iOS users do not have anti-virus scanning apps, basically because there isn’t a pressing need for it.Apple is very strict with what gets on the App Store and will take down apps that harm its users in any way. Skip clicking on links in SMS, MMS, or even email attachments from unknown or unauthorised senders. Avoiding anything fishy altogether is very simple and should be practiced.

5. Do Not Lose Your Smartphone!

Not losing your smartphone is sometimes easier said than done. Of course no one wants to lose their smartphone, but unfortunate circustances might happen. You might have left it in a bar, in public transport, someone pickpocketed you during your vacation or you might have grabbed someone else’s phone by mistake. In all accounts, chances are your phone is good as gone.
Lost Smartphone
If these things have a tendency to plague your life (some of us are serial phone-losers), installing apps that can locate your smartphone on your iOS or Android device is essential. These apps can help you locate your phone and some have the option to wipeout the data on the phone so you don’t become a victim of identity theft.

Conclusion

To be fair, there is no one mobile platform that is safer than another. With so many devices but only a handful of platforms to choose from, attackers are able to target any platform they desire and the repercussions can be quite devastating to power users. We, as users have to be cautious with what we do to and with our smartphones.
If you work extensively on with your smartphone, you might want to look to BlackBerry phones as they have encryption features in their devices. Finally, because Android is an open source platform, it is more vulnerable to attacks as hackers can easily find vulnerabilities on each device; iOS or Windows Phone are less vulnerable because their system codes are not openly shared to  the public.
Read More...

Send Encrypted Emails Easily With SecureGmail | Hacking Is Magic

Security is a hot issue these days. With the recent issues of internet tracking, more and more internet users want to safeguard their online privacy. Many of us are looking for a way to safety transfer data and that includes information transferred via email.
We covered how to send an encrypted email using SafeGmail before, but unfortunately SafeGmail is no longer in service. But, fret not we have found another, even better tool which can help you to encrypt your emails.
SecureGmail
SecureGmail is a Chrome extension which allows users to send encrypted emails and is compatible with your Google accounts.

Composing Encrypted Email

To send an encrypted email for Gmail, first you need to install SecureGmail on Chrome. After installing, you will see a lock icon beside the ‘Compose" button. Click it before composing the email you want encrypted.
compose encrypted
Compose the email like how you normally do and when you are done click on Send Encrypted. A pop up will prompt you to set a password and a hint to your password for your encrypted email.
set password and hint

Decrypting Your Email

Before decrypting, the content of the email is unreadable. To decrypt the encrypted email, the receiver needs to install SecureGmail on their Chrome browser too.
When they receive the encrypted email, there will be a clickable ‘Decrypt message with password‘ link.
decrypt message
Click on the link and it will ask for the password that the sender set earlier.
input password
After putting in the correct password it will display the email content.
decrypted email

Limitation & Conclusion

SecureGmail is a good alternative to replace SafeGmail but SecureGmail still has some limitations. Some of the limitations are:
  • SecureGmail only works on Chrome browser for now
  • The recipient needs to install the extension too, in order to decrypt (a small hassle)
  • You can’t directly reply to the encrypted email. To reply to that email you need to compose a new email.
  • The email cannot be saved as draft when composing in encrypted mode.
In conclusion, SecureGmail is a good replacement to send encrypted emails. And compared to SafeGmail, SecureGmail has an easier way to decrypt the encrypted email as you do not need to leave the page to decrypt it.
Read More...

Free Top 10 Spy Apps For Android | Hacking Is Magic

We wrote about spy apps for the iPhone previously and think that it is about time to list down some for Android devices as well. This list features some of the more creative uses of smart Android devices from sending secret messages or calls to tracking down someone’s location.
                                          Again, don’t take this as a challenge to go on imaginary missions like a wannabe spy and getting yourself into trouble for all the wrong reasons. These apps can be used for many legitimate reasons that have little to do with turning into James Bond and getting into fights on top of a train, chasing down bad guys and kicking their butts like Bourne, or wearing amazing disguises and using mind-blowing gadgets like Ethan Hunt.

It doesn’t sound that much fun now, does it? No matter, onwards to the list!
10 Best Free Spy Apps For Your Android Devices

1. Cell Tracker

Have someone you need to track? Like a delivery guy or a sales rep for your business? If you give them a company phone, having cell tracker on it can log down their location, where and when they have been to a place, every half hour. Cell Tracker automatically collects the location of the device holder through WiFi/GPRS. Tap on ‘View Now’ to see the list of location the target device had visited.
Cell Tracker

2. Children Tracker

Environments change and a parent’s worse nightmare is finding that their community’s crime levels have risen and their children could be victims of crime. Paranoid or not, if you are not against the idea of tracking your child’s whereabouts (for their safety), Children Tracker is a fine trackingsolution to have. All you need is to install the app to the phone, run it and lock/hide the app thentrack the phone online.
Children Tracker

3. Ear Spy

Ear Spy lets you appear immersed in your music but in secret, it amplifies the sounds around you via your device microphone all the way to your earphones. Have your earphones in your ears and under your hoody, but leave your smartphone bare to pick up conversations in its surroundings. The app also has an equalizer to enhance the listening conditions of your surroundings.
Ear Spy

4. Mobile Hidden Camera

What spy list can be complete without a hidden camera app. Activate it then tap on the black screen to grab a fast snapshot with no one the wiser. You can also capture videos on it. Once you enter video mode, it will automatically record the feed until you stop it. This app covers a variety of camera features while still keeping the app minimal and easy to use.
Mobile Hidden Camera

5. Sneaky Cam

Appear like you are working on something else on your camera with this sneaky cam. Choose and fix a background of your choice to show when Sneaky Cam is on. The background image can be a browser or even a shot of a music player. Tap on any part of the screen to start capturing images, and not worry about anyone catching you in the act.
Sneaky Cam

6. Spy Message

Want to send a confidential message to your business partner but doesn’t want it to be kept in his/her phone? Time your message to be automatically deleted over time without leaving a trace. Spy Message allows you to exchange secretive messages and appointments, then have the message self-destruct (minus the explosions) after a configured time frame.
Spy Message

7. Secret Calls

Protect your contacts and keep your call activities safe with Secret Calls. This app can easily hide your phonebook contact icon to prevent anyone from seeing them, and automatically delete all outgoing and incoming call logs so no one can trace them, even they have your phone.
Secret Calls

8. Spy Video Recorder

As a spy, you would want your recording device to be appear turn off to avoid anyone knowing they are being monitored. This app does that on top of keeping you updated with before and after pictures of the place you are monitoring, e.g. when there is unauthorized movement.
Spy Video Recorder

9. Secret Agent Fake Call

If you want to create a fake call that comes in in an opportune time, this app is for you. Secret Agent Fake Call ‘calls’ you and prepares pre-recorded conversations, customized messages and you can even schedule when the call can come in. Complete the illusion by selecting the secret agent identity you want to be, and use it to prank your friends.
Secret Agent Fake Call

10. Secret Agent

This last app is Secret Agent, a complete toolbox that every spy should have. It contains useful tools and sensor features for you e.g. a spy torch, a fun (fake) infrared-style camera filter, a compass, a spectrum analyzer, secret audio recording, sensor data and many more!
Secret Agent
Read More...