Skip to main content Skip to main menu Skip to footer

Seguridad de los teléfonos móviles

Seguridad de los teléfonos móviles

Disminuir el tamaño del texto Aumentar el tamaño del texto

Page Article

How to Protect Yourself from Common Cybersecurity Threats

This section outlines various cybersecurity vulnerabilities and practical advice to protect your devices and data from potential risks.

  • Spearphishing (To Install Malware) - Avoid clicking suspicious links and update apps regularly to prevent spearphishing.
  • Malicious Apps - Download only from official stores and use trusted accessories to avoid malicious apps.
  • Zero-Click Exploits - Reboot your phone weekly and avoid public networks to mitigate risks.
  • Malicious Wi-Fi Network/Close Access Network Attack - Turn off Wi-Fi/Bluetooth when not in use and use encrypted communication apps.
  • Foreign Lawful Intercept/Untrusted Cellular Network - Avoid connecting to foreign networks and reboot your device regularly.
  • Room Audio/Video Collection - Use microphone covers and avoid sensitive conversations around devices.
  • Call/Text/Data Collection Over Network - Use encrypted apps to protect communication data.
  • Geolocation of Device - Turn off location services to prevent unauthorized tracking.
  • Close Access Physical Attacks - Keep physical control of your device and use a secure PIN.
  • Supply Chain Attacks - Use trusted accessories and download apps from reputable sources.

Protect Your Privacy: How to Disable Your Phone’s Advertising ID

What is Happening? Mobile devices use an advertising identifier (Ad ID) to track users' activities, which can be sold to third parties and expose personal data.

How to Protect Yourself:

  • Disable Advertising ID
    For Android: Settings > Security & Privacy > Privacy > Ads and delete the advertising ID.
    For iOS: Turn off Personalized Ads under Settings > Privacy & Security > Apple Advertising.
  • Limit Location Services - Only grant location access to trusted apps.

Common Cybersecurity Threats: A Comprehensive Guide

In today's connected world, our devices are exposed to countless cyber threats. This guide breaks down various cybersecurity vulnerabilities and offers practical advice on what you can do to prevent or mitigate these risks.

Spearphishing (To Install Malware)

Attackers use emails or messages that appear to come from trusted sources to trick users into installing malware.

Preventive Measures:
  • Update Software & Apps: Regular updates fix security vulnerabilities, making it harder for spearphishing attempts to succeed.
  • Only Install Apps from Official Stores: Trusted sources reduce the risk of installing malware through phishing attempts.
  • Turn Off Cellular, WiFi, Bluetooth: Helpful but not a strong defense for spearphishing.
  • Do Not Click Links or Open Attachments: Avoid clicking on suspicious links and attachments that could download malware.

Malicious Apps

Malicious apps often appear as legitimate software but contain harmful code designed to steal data or damage systems.

Preventive Measures:
  • Only Install Apps from Official Stores: Downloading from reputable sources minimizes risk.
  • Turn Off Cellular, WiFi, Bluetooth: Prevents apps from accessing the internet but won’t stop them from being installed.
  • Use Trusted Accessories: Using certified accessories mitigates the risk of malicious apps accessing your data.

Zero-Click Exploits

Zero-click exploits are sophisticated attacks that require no user interaction, exploiting vulnerabilities in messaging apps or operating systems.

Preventive Measures:
  • Do Not Connect to Public Networks: Avoid public networks to reduce risk.
  • Turn Device Off & On Weekly: Rebooting weekly can mitigate malware that relies on memory foothold.

Malicious Wi-Fi Network/Close Access Network Attack

These attacks occur when users connect to untrusted Wi-Fi networks, making devices vulnerable to man-in-the-middle attacks or Wi-Fi snooping.

Preventive Measures:
  • Turn Off Cellular, WiFi, Bluetooth: Turn these off to avoid compromised networks when not in use.
  • Do Not Connect to Public Networks: Avoid unsecured public Wi-Fi for safer connections.
  • Use Encrypted Voice/Text/Data Apps: Encryption ensures attackers cannot read messages even if a network is compromised.
  • Maintain Physical Control of Device: Keep your device secure to prevent tampering.

Foreign Lawful Intercept/Untrusted Cellular Network

Connecting to foreign or untrusted networks can expose devices to monitoring or malicious attacks.

Preventive Measures:
  • Only Install Apps from Official Stores: Reduces the chance of malicious apps accessing your device.
  • Do Not Connect to Public Networks: Avoiding these networks minimizes risks of data surveillance or attacks.
  • Turn Device Off & On Weekly: Rebooting regularly can help with network-based vulnerabilities.

Room Audio/Video Collection

Malicious actors can exploit a device’s microphone or camera to collect sensitive information without user knowledge.

Preventive Measures:
  • Use Mic-Drowning Case, Cover Camera: Physical covers prevent unauthorized access to your device’s audio and video features.
  • Avoid Carrying Device/No Sensitive Conversations Around Device: Keep devices out of sensitive rooms and conversations to prevent eavesdropping.

Call/Text/Data Collection Over Network

Attackers can intercept your communication data over networks to collect sensitive information.

Preventive Measures:
  • Use Encrypted Voice/Text/Data Apps: Encryption is your best defense to protect communications.
  • Turn Off Cellular, WiFi, Bluetooth: Limiting connectivity can help prevent unauthorized data collection.

Geolocation of Device

Many apps and services track location, sometimes without explicit consent from users.

Preventive Measures:
  • Turn Off Cellular, WiFi, Bluetooth: Disabling these features prevents devices from broadcasting locations.
  • Turn Off Location Services: This is the most direct way to prevent tracking of your location.

Close Access Physical Attacks

Physical attacks, like stealing or tampering, can lead to data breaches or loss.

Preventive Measures:
  • Maintain Physical Control of Device: The best way to prevent physical attacks is to keep your device secure.
  • Lock Device with PIN: A secure PIN or password acts as a barrier against unauthorized access.
  • Use Trusted Accessories: Only use certified accessories to avoid hardware-based compromise.

Supply Chain Attacks

Supply chain attacks occur when malicious actors compromise software or hardware before it reaches the end user, making it difficult to detect.

Preventive Measures:
  • Use Trusted Accessories: Purchase accessories from reputable sources to mitigate supply chain attack risks.
  • Only Install Apps from Official Stores: Apps from trusted sources are less likely to be compromised.

Protect Your Privacy: How to Disable Your Phone’s Advertising ID

What is Happening? Mobile devices use an advertising identifier (Ad ID) to track users' activities, which can be sold to third parties and expose personal data.

How to Protect Yourself:

  • Disable Advertising ID
    For Android, go to Settings > Security & Privacy > Privacy > Ads and delete the advertising ID.
    For iOS, turn off Personalized Ads under Settings > Privacy & Security > Apple Advertising.
  • Limit Location Services - Only grant location access to trusted apps.

How to Protect Yourself from Common Cybersecurity Threats: A Comprehensive Guide

In today's increasingly connected world, our personal devices are exposed to countless cyber threats. From malicious apps to sophisticated network attacks, it's more important than ever to understand how we can protect our devices and data. This guide breaks down various cybersecurity vulnerabilities and offers practical advice on what you can do to prevent or mitigate these risks.

Spearphishing (To Install Malware) - Spearphishing is one of the most common and dangerous cybersecurity threats. Attackers use emails or messages that appear to come from trusted sources to trick users into installing malware.

Preventive Measures:

  • Update Software & Apps: Regular updates fix security vulnerabilities, making it harder for spearphishing attempts to succeed.
  • Only Install Apps from Official Stores: Trusted sources reduce the risk of installing malware through phishing attempts, though it’s not foolproof.
  • Turn Off Cellular, WiFi, Bluetooth: While helpful, this isn’t a strong defense for spearphishing.
  • Do Not Click Links or Open Attachments: Don’t open unfamiliar attachments, emails, or text messages from unknown sources. Avoid clicking on suspicious links and opening attachments that could download malware.

Malicious Apps - Malicious apps often appear as legitimate software but contain harmful code designed to steal data or damage systems.

Preventive Measures:

  • Only Install Apps from Official Stores: Downloading from reputable sources like the App Store or Google Play minimizes risk.
  • Keep your apps and device software up to date.  Hackers work diligently to discover new vulnerabilities in our apps or the software that operates our phones. Device manufacturers and app developers frequently update their software to fix newly exploited security gaps, but if you don’t download and install these updates your information is still at risk.
  • Turn Off Cellular, WiFi, Bluetooth: This helps prevent apps from accessing the internet but won’t stop them from being installed.
  • Use Trusted Accessories: Using certified accessories mitigates the risk of malicious apps accessing your device’s data.

Zero-Click Exploits - Zero-click exploits are sophisticated attacks that require no user interaction. They exploit software vulnerabilities in messaging apps or operating systems.

Preventive Measures:

  • Do Not Connect to Public Networks: Public networks are prime targets for hackers; avoid them to reduce your risk.
  • Turn Device Off & On Weekly: Rebooting weekly can mitigate certain types of malware that rely on a memory foothold.

Malicious Wi-Fi Network/Close Access Network Attack - These attacks occur when users connect to untrusted Wi-Fi networks, making devices vulnerable to man-in-the-middle attacks or Wi-Fi snooping.

Preventive Measures:

  • Turn Off Cellular, WiFi, Bluetooth: If not in use, turning these off helps avoid connecting to compromised networks.
  • Do Not Connect to Public Networks: Avoid unsecured public Wi-Fi for safer connections.
  • Use Encrypted Voice/Text/Data Apps: Encryption ensures that attackers cannot read messages even if a network is compromised.
  • Maintain Physical Control of Device: Keep your device secure to prevent tampering.

Foreign Lawful Intercept/Untrusted Cellular Network - Connecting to foreign or untrusted networks can expose devices to monitoring or malicious attacks.

Preventive Measures:

  • Only Install Apps from Official Stores: This reduces the chance of malicious apps accessing your device.
  • Do Not Connect to Public Networks: Avoiding these networks minimizes risks of data surveillance or attacks.
  • Turn Device Off & On Weekly: Rebooting regularly can help with network-based vulnerabilities.

Room Audio/Video Collection - Malicious actors can exploit a device’s microphone or camera to collect sensitive information without user knowledge.

Preventive Measures:

  • Use Mic-Drowning Case, Cover Camera: Physical covers prevent unauthorized access to your device’s audio and video features.
  • Avoid Carrying Device/No Sensitive Conversations Around Device: Keep devices out of sensitive rooms and conversations to prevent eavesdropping.

Call/Text/Data Collection Over Network - Attackers can intercept your communication data over networks to collect sensitive information.

Preventive Measures:

  • Use Encrypted Voice/Text/Data Apps: Encryption is your best defense to protect communications.
  • Turn Off Cellular, WiFi, Bluetooth: Limiting connectivity can help prevent unauthorized data collection.

Geolocation of Device - Many apps and services track location, sometimes without explicit consent from users.

Preventive Measures:

  • Turn Off Cellular, WiFi, Bluetooth: Disabling these features prevents devices from broadcasting locations.
  • Turn Off Location Services: This is the most direct way to prevent tracking of your location.

Close Access Physical Attacks - Physical attacks, like stealing or tampering, can lead to data breaches or loss.

Preventive Measures:

  • Maintain Physical Control of Device: The best way to prevent physical attacks is to keep your device secure.
  • Lock Device with PIN: A secure PIN or password acts as a barrier against unauthorized access.
  • Use Trusted Accessories: Only use certified accessories to avoid hardware-based compromise.
  • Auto-lock your phone.  They’re small, we carry them everywhere, and unfortunately, mobile phones are lost or stolen all too often. If your phone falls into the wrong hands, a password is the first line of defense for your personal data. To keep your information private, create a strong password for your phone and set your screen to auto-lock within five minutes. Arrange phone settings so a password is required to wake up your phone after an inactive period. Use a password that’s different from your others (ATM, email accounts, online bill-paying accounts). Encrypt smartphones used for sensitive business communications, activate a timeout password, and install an updated anti-malware program and on-device personal firewall.

Supply Chain Attacks

Supply chain attacks occur when malicious actors compromise software or hardware before it reaches the end user, making it difficult to detect.

Preventive Measures:

  • Use Trusted Accessories: Purchase accessories from reputable sources to mitigate supply chain attack risks.
  • Only Install Apps from Official Stores: Apps from trusted sources are less likely to be compromised.
  • Use discretion when downloading apps.  One of the most exciting things about getting a new Smartphone is downloading all the great apps that are available. Unfortunately, even the most innocent-looking app can contain software designed to steal personal data, make fraudulent charges or even hijack your phone. Only download apps from sites you trust, check the app’s rating, and read reviews to make sure they’re widely used and respected before you download.
  •   They’re likely to be harmful. 
  • Be judicious about the type of applications that you download. Many apps come with spyware or other malicious software. Consider using a more secure computer for sensitive tasks such as online banking.
  • Stick to window-shopping on public WiFi.  Public WiFi networks have become ubiquitous, but security for these networks is scarce. Be careful what you do on public WiFi networks as there may be others watching network traffic. In particular, stay away from making purchases and banking transactions—any communication that conveys a password, account number, or credit card number—unless you are certain that you are on a secure connection.
  • Protect your phone like you protect your PC.  Most people already use software to shield their PC from viruses and spyware. With so much personal data on our phones and mobile malware on the rise, our mobile devices now need the same attention. Protect yourself and your private data from malware, spyware, and malicious apps by downloading a reputable security app.
  • Password-protect your mobile device and voicemail with a PIN.  Make the password strong and hard to guess by using numbers, upper- and lower-case letters, and at least one symbol. Memorize your PIN. Don’t record it on anything you carry with you. Change your PIN periodically. Use “strong” PINs that are hard to guess. These will have numbers, upper- and lowercase letters, and at least one symbol. Never use a PIN (or password) with the last four digits of your Social Security number, your date of birth, your middle name, or anything else that’s easily guessed or subject to ready access via other sources
  • Keep records.  Make a physical list of everything on your Smartphone—all the accounts and documents (or types of documents) it can access.
  • Don't Save Information.  Delete voice and text messages with financial or personal information.
  • Software.  Take advantage of software that locks the phone or erases the data remotely if the phone is lost or stolen.
  • Financial Institution. Tell your financial institution immediately if you change your phone number or lose your mobile device.

Uso de dispositivos móviles en público

Dado que la gente utiliza cada vez más las tabletas en lugares públicos, los usuarios corren el riesgo de compartir más de lo que quisieran con las personas que les rodean. Si los demás pueden ver claramente lo que estás haciendo con tu dispositivo, esto puede poner en riesgo tu privacidad.

Proteja su dispositivo inteligente

  • Ten en cuenta tu entorno y utiliza el dispositivo con discreción en los lugares en los que te sientas inseguro.
  • Nunca dejes tu dispositivo sin vigilancia en un lugar público. No lo dejes a la vista en un coche sin vigilancia; guárdalo en la guantera o en el maletero.
  • Write down the device's make, model number, serial number, and unique device identification number - either the International Mobile Equipment Identifier (IMEI), the Mobile Equipment Identifier (MEID) number, or the Electronic Serial Number (ESN) - which you may find in your device settings or printed on a label affixed to your device underneath the battery. The police may need this information if the device is stolen or lost.
  • Revisa tu contrato de garantía o servicio para saber qué ocurrirá si te roban o pierdes el teléfono. Si la póliza no es satisfactoria, puedes considerar la posibilidad de contratar un seguro para el dispositivo.

Cómo proteger los datos de su teléfono

Establish a password to restrict access. Should your device be stolen or lost, this will help protect you from both unwanted usage charges and theft and misuse of your personal data.
  • Install and maintain anti-theft software.

    Apps are available that will:
  1. Localiza el dispositivo desde cualquier ordenador;
  2. Bloquea el dispositivo para restringir el acceso;
  3. Borra los datos confidenciales del dispositivo, incluidos los contactos, los mensajes de texto, las fotos, los correos electrónicos, los historiales de los navegadores y las cuentas de usuario como Facebook y Twitter;
  4. Haz que el dispositivo emita un sonido fuerte ("grito") para ayudar a la policía a localizarlo.
  • Haz que la pantalla de bloqueo muestre información de contacto, como una dirección de correo electrónico o un número de teléfono alternativo, para que el teléfono pueda ser devuelto si se encuentra. Evita incluir información sensible, como la dirección de tu casa. Ten cuidado con la información que almacenas. Las redes sociales y otras aplicaciones pueden permitir el acceso no deseado a tu información personal.

Qué hacer si le roban el dispositivo inalámbrico

  • Si no está seguro de si le han robado el dispositivo o si simplemente lo ha extraviado, intente localizarlo llamándolo o utilizando el localizador GPS del software antirrobo. Incluso si sólo has perdido el dispositivo, deberías bloquearlo a distancia para estar seguro.
  • Si has instalado un software antirrobo en tu dispositivo, utilízalo para bloquear el teléfono, borrar la información sensible y/o activar la alarma.
  • Denuncie inmediatamente el robo o la pérdida a su operador. Serás responsable de los cargos incurridos antes de que denuncies el robo o la pérdida del dispositivo. 
  • Si proporcionas a tu compañía el número de IMEI, MEID o ESN, tu compañía puede desactivar el dispositivo y bloquear el acceso a la información que contiene. Solicita a tu operador una confirmación por escrito de que has denunciado la desaparición del dispositivo y de que éste ha sido desactivado.
Si el dispositivo ha sido robado, también hay que informar inmediatamente del robo a la policía, incluyendo la marca y el modelo, el número de serie y el número IMEI, MEID o ESN. Algunas compañías exigen una prueba de que el dispositivo ha sido robado, y una denuncia policial proporcionaría esa documentación.

Encuentra tu teléfono

Know how to track and recover a lost or stolen phone, and even remotely erase its contents if necessary.  It’s likely that you already enabled Find My iPhone or Device when you set up your phone. Check your phone’s settings if you’re unsure.
Be prepared. Test out Find My iPhone ahead of time so that you know how to use it if you ever lose your phone. Thieves will try to prevent a lost or stolen device from connecting to the internet as soon as possible - but quickly marking your device as stolen, before it goes offline, can make it more difficult for others to use your phone, even if it is reset.

Salvaguardar el monedero de su teléfono móvil

  • Tenga en cuenta su entorno y utilice su Smartphone o dispositivo móvil con discreción.
  • No utilice los servicios de monedero móvil para realizar transacciones financieras a través de una red Wi-Fi no segura.
  • Nunca dejes tu Smartphone sin vigilancia en un lugar público. No lo dejes visible en un coche sin vigilancia; guárdalo en la guantera o en el maletero.
  • La policía puede necesitar los datos de identificación exclusivos de su teléfono inteligente en caso de robo o pérdida. Anote la marca, el número de modelo, el número de serie y el número de identificación exclusivo del dispositivo (el número de identificación internacional de equipos móviles (IMEI) o el número de identificación de equipos móviles (MEID)). Algunos teléfonos muestran el número IMEI/MEID cuando se marca *#06#. El IMEI/MEID también puede encontrarse en una etiqueta situada debajo de la batería del teléfono o en la caja que viene con él.
  • Revise el acuerdo de servicio de la cuenta financiera utilizada en su monedero móvil para saber qué ocurrirá y con quién debe ponerse en contacto si le roban o pierde su teléfono inteligente, o si la aplicación de su monedero móvil es pirateada.
  • Supervise la cuenta financiera utilizada en su monedero móvil para detectar cualquier cargo fraudulento.
  • Elija una contraseña única para su monedero móvil. En caso de pérdida o robo de su smartphone, esto puede ayudarle a protegerse tanto de cargos no deseados como del robo y el uso indebido de sus datos personales.
  • Instalar y mantener el software de seguridad. Las aplicaciones están disponibles para:
  1. Localiza tu Smartphone desde cualquier ordenador;
  2. Bloquea tu Smartphone para restringir el acceso;
  3. Borrar la información personal sensible y las credenciales del monedero móvil de su Smartphone; y
  4. Haz que tu Smartphone emita un sonido fuerte ("grito") para ayudarte a ti o a la policía a localizarlo.
  • Ajuste la visualización de la "pantalla bloqueada" para que muestre su información de contacto, de modo que pueda devolverle su Smartphone si lo encuentra.
  • Tenga cuidado con la información que almacena. Las redes sociales y otras aplicaciones pueden suponer un riesgo para la seguridad y permitir el acceso no deseado a tu información personal y a los datos del monedero móvil.

Qué hacer si le roban el teléfono inteligente con monedero móvil

  • Si no está seguro de si su Smartphone o dispositivo móvil ha sido robado o si simplemente lo ha extraviado, intente localizar el Smartphone llamándolo o utilizando el localizador GPS del software de seguridad. Incluso si sólo ha perdido el Smartphone, debería bloquearlo a distancia para estar seguro.
  • Si ha instalado un software de seguridad en su smartphone, utilícelo para bloquear el dispositivo, borrar la información personal sensible y/o activar la alarma.
  • Immediately report the theft or loss to your wireless carrier. You will typically be responsible for any charges incurred prior to when you report the stolen or lost Smartphone. If you provide your carrier with the IMEI or MEID number, your carrier may be able to disable your Smartphone, and your mobile wallet services, and block access to your personal information and sensitive mobile wallet data. Request written confirmation from your carrier that you reported the Smartphone as missing and that the Smartphone was disabled.
  • If your Smartphone or mobile device was stolen, also immediately report the theft to the police, including the make and model, serial, and IMEI or MEID number. Some carriers require proof that the Smartphone was stolen, and a police report can provide that documentation.
  • Si no puede bloquear su Smartphone robado o perdido, cambie todas las contraseñas de los servicios de monedero móvil y de las cuentas bancarias a las que haya accedido mediante su servicio de Smartphone.

Aplicaciones móviles

If you have a smartphone or other mobile device, you probably use apps – to play games, get turn-by-turn directions, access news, books, weather, and more. Easy to download and often free, mobile apps can be so much fun and so convenient that you might download them without thinking about some key considerations: how they’re paid for, what information they may gather from your device, or who gets that information.

Fundamentos de la aplicación móvil

What’s a mobile app?  A mobile app is a software program you can download and access directly using your phone or another mobile device, like a tablet or music player.

¿Qué necesito para descargar y utilizar una aplicación?

You need a smartphone or another mobile device with internet access. Not all apps work on all mobile devices. Once you buy a device, you’re committed to using the operating system and the type of apps that go with it. The Android, Apple, Microsoft, and BlackBerry mobile operating systems have app stores online where you can look for, download, and install apps. Some online retailers also offer app stores. You’ll have to use an app store that works with your device’s operating system. 

¿Por qué algunas aplicaciones son gratuitas?

  • Algunas aplicaciones se distribuyen gratuitamente a través de las tiendas de aplicaciones; los desarrolladores ganan dinero de varias maneras:
  • Algunos venden espacios publicitarios dentro de la aplicación. Los desarrolladores de la aplicación pueden ganar dinero con los anuncios, por lo que distribuyen la aplicación de forma gratuita para llegar al mayor número de usuarios posible.
  • Algunas aplicaciones ofrecen sus versiones básicas de forma gratuita. Sus desarrolladores esperan que la aplicación te guste lo suficiente como para actualizarla a una versión de pago con más funciones.
  • Algunas aplicaciones permiten comprar más funciones dentro de la propia aplicación. Normalmente, estas compras dentro de la aplicación se facturan a través de la tienda de aplicaciones. Muchos dispositivos tienen ajustes que permiten bloquear las compras dentro de la aplicación.
  • Algunas aplicaciones se ofrecen gratuitamente para que te intereses por otros productos de la empresa. Estas aplicaciones son una forma de publicidad. 

Preguntas sobre su privacidad

¿A qué tipo de datos pueden acceder las aplicaciones?

Cuando te registras en una tienda de aplicaciones o descargas aplicaciones individuales, es posible que te pidan permiso para permitirles acceder a la información de tu dispositivo. Algunas aplicaciones pueden tener acceso:

  • sus contactos telefónicos y de correo electrónico
  • registros de llamadas
  • datos de internet
  • datos del calendario
  • datos sobre la ubicación del dispositivo
  • los identificadores únicos del dispositivo
  • información sobre el uso de la propia aplicación

Some apps access only the data they need to function; others access data that are not related to the purpose of the app.

Si proporcionas información cuando utilizas el dispositivo, alguien puede estar recopilándola, ya sea el desarrollador de la aplicación, la tienda de aplicaciones, un anunciante o una red de publicidad. Y si recogen tus datos, pueden compartirlos con otras empresas.

How can I tell what information an app will access or share?  It’s not always easy to know what data a specific app will access, or how it will be used. Before you download an app, consider what you know about who created it and what it does. The app stores may include information about the company that developed the app if the developer provides it. If the developer doesn’t provide contact information – like a website or an email address – the app may be less than trustworthy.

Si utilizas un sistema operativo Android, tendrás la oportunidad de leer los "permisos" justo antes de instalar una aplicación. Léelos. Es una información útil que te indica a qué información accederá la aplicación en tu dispositivo. Pregúntate si los permisos tienen sentido teniendo en cuenta el propósito de la aplicación; por ejemplo, no hay razón para que una aplicación de libro electrónico o "fondo de pantalla" lea tus mensajes de texto.

Why do some apps collect location data?  Some apps use specific location data to give you maps, coupons for nearby stores, or information about who you might know nearby. Some provide location data to ad networks, which may combine it with other information in their databases to target ads based on your interests and your location.

Una vez que una aplicación tiene tu permiso para acceder a tus datos de localización, puede hacerlo hasta que cambies la configuración de tu teléfono. Si no quieres compartir tu ubicación con las redes publicitarias, puedes desactivar los servicios de localización en la configuración de tu teléfono. Pero si lo haces, las aplicaciones no podrán darte información basada en tu ubicación a menos que la introduzcas tú mismo. Tu teléfono utiliza datos generales sobre su ubicación para que tu operador telefónico pueda enrutar las llamadas de manera eficiente. Incluso si desactivas los servicios de localización en la configuración de tu teléfono, puede que no sea posible impedir completamente que transmita tus datos de localización.

Questions About Advertising.  Why does the app I downloaded have ads in it?  Developers want to provide their apps as inexpensively as possible so lots of people will use them. If they sell advertising space in the app, they can offer the app for a lower cost than if it didn’t have ads. Some developers sell space in their apps to ad networks that, in turn, sell the space to advertisers.

Why do I see the ads I do? Advertisers believe you’re more likely to click on an ad targeted to your specific interests. So ad networks gather the information apps collect, including your location data, and may combine it with the kind of information you provide when you register for a service or buy something online. The combined information allows the mobile ad network to send you targeted ads – ads that may be relevant to someone with your preferences and in your location.

Malware and Security Concerns.  Should I update my apps?  Your phone may indicate when updates are available for your apps. It’s a good idea to update the apps you’ve installed on your device and the device’s operating system when new versions are available. Updates often have security patches that protect your information and your device from the latest malware.

Could an app infect my phone with malware?  Some hackers have created apps that can infect phones and mobile devices with malware. If your phone sends email or text messages that you didn’t write, or installs apps that you didn’t download, you could be looking at signs of malware.  If you think you have malware on your device, you have a few options: you can contact customer support for the company that made your device; you can contact your mobile phone carrier for help; or you can install a security app to scan and remove apps if it detects malware. Security apps for phones are relatively new; there are only a few on the market, including some with free versions.

Mobile App User Reviews.  Can I trust all the user reviews I read about an app?  Most app stores include user reviews that can help you decide whether to download. But some app developers and their marketers have posed as consumers to post positive comments about their own products. In fact, the Federal Trade Commission recently sued a company for posting fake comments about the apps it was paid to promote.

Seguridad del iPhone de Apple

Para evitar pérdidas relacionadas con aplicaciones fraudulentas, sugerimos a todos los usuarios de iOS que lean las reseñas y comprueben las calificaciones antes de comprar una aplicación. No creas en funciones mágicas que no existen en tu teléfono, ninguna app es capaz de hacer cosas que Apple no permite.

Si has sido víctima de este tipo de aplicaciones, puedes intentar pedir a Apple que te devuelva el dinero, siguiendo estos pasos:

  1. Abre iTunes y selecciona el enlace de iTunes Store en la columna de la izquierda;
  2. Cerca de la esquina superior derecha, haga clic en la flecha situada junto a su nombre de usuario (dirección de correo electrónico) y, a continuación, seleccione Cuenta;
  3. Aproximadamente a la mitad de la pantalla, haga clic en el botón Historial de compras;
  4. En la parte inferior de la pantalla, verás tu historial de compras en el App Store: haz clic en el botón Informar de un problema;
  5. Localiza la factura de iTunes con la aplicación que deseas reembolsar y haz clic en el enlace Informar de un problema
  6. Rellene el siguiente formulario y asegúrese de ser lo más detallado posible; cuando termine, haga clic en Siguiente
  7. Si la razón por la que solicitas el reembolso es válida, Apple debería responder en unos días y procesar tu reembolso en una semana.

Seguridad de las aplicaciones Android

Cuando se instala una aplicación, el sistema siempre muestra los permisos solicitados. El usuario puede utilizar esto de un vistazo para evaluar las intenciones de una aplicación. Si una aplicación relativamente sencilla, como una envoltura para un sitio web, pide permiso para enviar y recibir mensajes SMS, es una seria señal de alarma. De hecho, un gran número de los llamados "troyanos SMS" circulan por las partes más sucias de la web. Cuando se instalan, envían mensajes de texto a números de tarificación adicional para acumular cargos. La misma preocupación existe para las aplicaciones que incluyen permisos de llamadas telefónicas; podrían llamar a números de tarificación adicional sin el conocimiento del usuario.

Permisos de Android

  • Another important permission to be on the lookout for is access to the contact list, and Google accounts. If an app has no business looking at this data, there is a chance that it’s just malware designed to harvest user data for spamming or phishing scams. The only time one might expect to see this permission is in apps that autocomplete contact names or handle legitimate messaging actions.
  • Of less concern financially, but still a sign of shady behavior, is the location permission. This can come in either Fine (GPS) or Coarse (Network) varieties. An app that doesn’t need this data for its essential function could be using it for something as innocuous as location-aware ads, but there is a darker possibility as well. A questionable app could harvest a user’s exact location, store it over time, and sell that to advertisers.
  • The best way to stay safe on Android is to just stick to established apps from the official Android Market or the Amazon Appstore. While bad apps do occasionally show up in the Market, Google removes them swiftly and can remotely kill the apps on phones.
  • Most of the truly dangerous threats have been detected on forums and third-party websites masquerading as well-known apps. Basically, don’t install a version of “Cut the Rope” obtained from a Chinese pirated software forum. By leaving the Unknown Sources option disabled in the Android settings, apps cannot even be sideloaded from other sources, which blocks this vector completely.
  • It just takes a little forethought to avoid the most serious Android malware threats out there. Sticking to the official application repositories is a good policy, as is checking out the permissions for an app. Users might even prefer to leave the Unknown Sources option disabled. There is now good evidence that free Android antivirus apps just don’t work, and could even cause users to believe they are protected, and thus take more risks. Paid antivirus apps work better, detecting more threats, but still fall short of the mark. In the end, it is still very much up to the user to be on the lookout for suspicious behavior in order to stay safe.



Page Footer has no content