{"id":829,"date":"2020-01-24T12:34:30","date_gmt":"2020-01-24T12:34:30","guid":{"rendered":"https:\/\/www.retrocube.com\/blog\/?p=829"},"modified":"2020-09-14T18:39:49","modified_gmt":"2020-09-14T18:39:49","slug":"basic-practices-of-security-in-mobile-applications","status":"publish","type":"post","link":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/","title":{"rendered":"Basic practices of security in mobile applications"},"content":{"rendered":"<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">Smartphones have changed the way we communicate and connect with the world. The smartphone, which has been in the market for ten years, has had such growth and modernization that sometimes we wondered how we could live without it before.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">More and more are the elements of our daily life that pass through the mobile, and these devices, which make our daily tasks easier, also concentrate a lot of information about us. Every year more than 140,000 malicious programs are detected for smartphones or tablets *, which are intended to obtain information from our mobile.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">We already talked to you about some of the strategies that criminals use to obtain information for fraudulent purposes. On this occasion, we have prepared some tips that will help you prevent you from having malicious applications installed on your mobile phone.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Use official applications<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">This may seem obvious, but not everyone is aware that there are &#8220;pirate&#8221; applications that copy the image of the official applications of other companies, so you can download them and steal your information. Normally these applications are offered on unreliable web pages.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">It is very important that you make sure you have downloaded the application from the official stores of both Google Play for Android and the Apple Store for IOS. These platforms have security measures to verify the authenticity and reliability of the applications they host.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Review the details of the application you are downloading<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">The reviews and comments of the application in the App Store can give you an idea of \u200b\u200bthe degree of security of the application you are downloading. Check the publication date, the developer, and the ratings. Above all, check that the developer is the company that owns the application, which is the most important thing.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">Regarding the ratings, take the time to read them. They give a lot of information about the correct functioning of the app, but they also allow you to verify the authenticity of the application: if there are very few opinions, or many but all excellent, distrust.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">It is also important that you review the permissions requested by the application. In the case of applications for IOS, you can regulate them and decide what access you give through the configuration of the phone. For Android, when you load the application, it tells you through an external link, what are the permissions that the developer is requesting. In any case, check them before downloading to know exactly which parts of your mobile you are giving access to.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Keep the application updated<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">It is important to verify that you have downloaded the latest version of the application. Normally, app updates, in addition to including improvements and new tools, also include security optimizations that cover new possible threats.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Activate alerts<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">Find this option in the application always to be aware of the movements that are made in your profile, especially if it is an application linked to a credit card, such as Spotify, Amazon or iTunes, or a banking application.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Log out<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">This point is basic, but unfortunately, we do not have the habit of closing sessions when we leave an application. In the case of applications that have important user information, such as email or social media, if our phone falls into the hands of another person, it is crucial that there is no access to personal data that may be in that application.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">In other applications, such as banking or those that contain payment information, they are configured for security so that the session is automatically closed after a period of inactivity.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">Activate your phone&#8217;s location and screen lock<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">Some mobiles have the option from the &#8220;Activate location&#8221; menu, and for those who do not, there are applications that allow you to find the device by GPS. This functionality is very useful in the case of loss or theft, because it allows, in addition to locating the phone and reporting it to the manufacturer, blocking or deleting the data it contains so that they are not accessible.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">In addition to this, the screen lock with PIN or password is highly recommended. It may sound obvious, but putting a password to access the device will prevent someone from obtaining your data in the event that it is lost or stolen.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"margin: 0in; margin-bottom: .0001pt;\"><strong><span style=\"color: #1c1e29;\">How to detect if I already have a malicious application installed on my mobile?<\/span><\/strong><\/h2>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">The signals can be several: noises in telephone conversations, messages and emails that are deleted or appear as already read, increase in data consumption, shorter battery life, etc.<\/span><\/p>\n<p style=\"margin: 0in; margin-bottom: .0001pt;\"><span style=\"color: #1c1e29;\">For these cases, <a href=\"https:\/\/www.retrocube.com\/\">Retrocube<\/a> experts recommend making backup copies of the device and cleaning it, changing all passwords from another device, removing all unnecessary applications and installing an antivirus before restoring data to the mobile. In addition, for Android, the Conan Mobile application lets you know the degree of security of a mobile device.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones have changed the way we communicate and connect with the world. The smartphone, which has been in the market for ten years, has had such growth and modernization that sometimes we wondered how we could live without it before. More and more are the elements of our daily life that pass through the mobile, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Basic practices of security in mobile applications -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Basic practices of security in mobile applications -\" \/>\n<meta property=\"og:description\" content=\"Smartphones have changed the way we communicate and connect with the world. The smartphone, which has been in the market for ten years, has had such growth and modernization that sometimes we wondered how we could live without it before. More and more are the elements of our daily life that pass through the mobile, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-24T12:34:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-14T18:39:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1210\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/#\\\/schema\\\/person\\\/80a4d45d1a8fa007d7a73852236139b2\"},\"headline\":\"Basic practices of security in mobile applications\",\"datePublished\":\"2020-01-24T12:34:30+00:00\",\"dateModified\":\"2020-09-14T18:39:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/\"},\"wordCount\":818,\"commentCount\":2,\"image\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/security-in-mobile-applications.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/\",\"url\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/\",\"name\":\"Basic practices of security in mobile applications -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/security-in-mobile-applications.jpg\",\"datePublished\":\"2020-01-24T12:34:30+00:00\",\"dateModified\":\"2020-09-14T18:39:49+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/#\\\/schema\\\/person\\\/80a4d45d1a8fa007d7a73852236139b2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/security-in-mobile-applications.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/security-in-mobile-applications.jpg\",\"width\":1210,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/basic-practices-of-security-in-mobile-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic practices of security in mobile applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/\",\"name\":\"\",\"description\":\"RetroCube Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.retrocube.com\\\/blog\\\/#\\\/schema\\\/person\\\/80a4d45d1a8fa007d7a73852236139b2\",\"name\":\"admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Basic practices of security in mobile applications -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/","og_locale":"en_US","og_type":"article","og_title":"Basic practices of security in mobile applications -","og_description":"Smartphones have changed the way we communicate and connect with the world. The smartphone, which has been in the market for ten years, has had such growth and modernization that sometimes we wondered how we could live without it before. More and more are the elements of our daily life that pass through the mobile, [&hellip;]","og_url":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/","article_published_time":"2020-01-24T12:34:30+00:00","article_modified_time":"2020-09-14T18:39:49+00:00","og_image":[{"width":1210,"height":555,"url":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#article","isPartOf":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/"},"author":{"name":"admin","@id":"https:\/\/www.retrocube.com\/blog\/#\/schema\/person\/80a4d45d1a8fa007d7a73852236139b2"},"headline":"Basic practices of security in mobile applications","datePublished":"2020-01-24T12:34:30+00:00","dateModified":"2020-09-14T18:39:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/"},"wordCount":818,"commentCount":2,"image":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/","url":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/","name":"Basic practices of security in mobile applications -","isPartOf":{"@id":"https:\/\/www.retrocube.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","datePublished":"2020-01-24T12:34:30+00:00","dateModified":"2020-09-14T18:39:49+00:00","author":{"@id":"https:\/\/www.retrocube.com\/blog\/#\/schema\/person\/80a4d45d1a8fa007d7a73852236139b2"},"breadcrumb":{"@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#primaryimage","url":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","contentUrl":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","width":1210,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retrocube.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Basic practices of security in mobile applications"}]},{"@type":"WebSite","@id":"https:\/\/www.retrocube.com\/blog\/#website","url":"https:\/\/www.retrocube.com\/blog\/","name":"","description":"RetroCube Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retrocube.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retrocube.com\/blog\/#\/schema\/person\/80a4d45d1a8fa007d7a73852236139b2","name":"admin"}]}},"_links":{"self":[{"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/posts\/829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/comments?post=829"}],"version-history":[{"count":2,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/posts\/829\/revisions"}],"predecessor-version":[{"id":1005,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/posts\/829\/revisions\/1005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/media\/830"}],"wp:attachment":[{"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/media?parent=829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/categories?post=829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retrocube.com\/blog\/wp-json\/wp\/v2\/tags?post=829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}