{"id":6030,"date":"2015-07-27T06:57:14","date_gmt":"2015-07-27T10:57:14","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=6030"},"modified":"2019-11-22T10:13:32","modified_gmt":"2019-11-22T10:13:32","slug":"security-tips-for-kids-4","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-4\/6030\/","title":{"rendered":"It&#8217;s time to secure your mobile devices"},"content":{"rendered":"<p>We all know that cybercriminals would love to <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-1\/\" target=\"_blank\" rel=\"noopener\">infect your PC or Laptop with a virus<\/a> or trick you to install a malware. What you might not know is that they would also like to get at your mobile device. Cyber villains know how to make a pretty penny out of hacking your smartphone, <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/hackers-smartphone-infographic\/\" target=\"_blank\" rel=\"noopener\">ranging from direct theft to rather geeky stuff like bitcoin mining<\/a>.<\/p>\n<p>There are special Trojans that are disguised as mobile games or useful mobile apps. Once installed, they start stealing money from your account by <a href=\"https:\/\/www.kaspersky.com\/blog\/podec-vkontakte-bypasses-captcha\/\" target=\"_blank\" rel=\"noopener nofollow\">making paid calls or subscribing you to premium sms-services which you do not need<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security do\u2019s and don\u2019ts: Keeping weirdos aside <a href=\"https:\/\/t.co\/zLx7VTMqUE\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/zLx7VTMqUE<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/parenting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#parenting<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/safekids?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#safekids<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/internettips?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#internettips<\/a> <a href=\"http:\/\/t.co\/foTFp4GsKZ\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/foTFp4GsKZ<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/623130470419664896?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 20, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>You would probably prefer to spend your money on things that you really want instead of losing it to thin air. With that in mind, here\u2019s four tips to help you secure your mobile device:<\/p>\n<p>1. Don\u2019t forget to put a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-2\/\" target=\"_blank\" rel=\"noopener\">password<\/a> on your mobile so other people can\u2019t access your stuff.<\/p>\n<p>2. Avoid unknown Wi-Fi connections \u2013 especially free ones \u2013 because they could easily be used to collect the information you send. If there isn\u2019t a password to get online, that\u2019s one sign that it might be a dangerous network.<\/p>\n<p>3. You can look after your device even if it is lost or stolen. Enable the \u2018remote management\u2019 and \u2018backup copying\u2019 functions, either by using the features built into the phone (such as the \u2018Find iPhone\u2019 setting) or <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-phound\/\" target=\"_blank\" rel=\"noopener nofollow\">install a special program<\/a>.<\/p>\n<p>4. Don\u2019t forget, your phone is also at risk from viruses. Don\u2019t download unknown apps, even from the official store. Always check what permissions an app asks for \u2013 such as access to your contacts or photos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.<\/p>\n","protected":false},"author":40,"featured_media":6031,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2412,105,109,1150,89,434,516,192,97,45,131,698],"class_list":{"0":"post-6030","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-advice","9":"tag-android","10":"tag-apps","11":"tag-ios","12":"tag-kids","13":"tag-mobile-devices","14":"tag-mobile-malware","15":"tag-protection","16":"tag-security-2","17":"tag-smartphones","18":"tag-tips","19":"tag-trojans"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-4\/6030\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-tips-for-kids-4\/5666\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-tips-for-kids-4\/5839\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-4\/6491\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-tips-for-kids-4\/6375\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-tips-for-kids-4\/8422\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-tips-for-kids-4\/9388\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-tips-for-kids-4\/4727\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-tips-for-kids-4\/5547\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-tips-for-kids-4\/8300\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-tips-for-kids-4\/8422\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-tips-for-kids-4\/9388\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-tips-for-kids-4\/9388\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/advice-2\/","name":"advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6030"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6030\/revisions"}],"predecessor-version":[{"id":17887,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6030\/revisions\/17887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6031"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}