Your phone notifications show a preview of new messages
Even when your phone is locked, new messages are previewed on your locked screen and anyone near your phone can read them. To disable this feature:
iPhone: WhatsApp settings > Notifications > Show Preview – and turn it off.
Android: WhatsApp settings > Notifications > Pop up notification > No pop up
Automatically saving images and videos that you receive
Mobile phones are getting smarter, but are we? You might want to take these simple steps to secure your phones.
1. Set the magic number
Setting up a passcode is the easiest way to protect the data stored inside your phone.
Location Based Services (LBS) is a technology widely used to identify a smartphone device’s geographical location. Smartphones have a built-in feature which uses GPS and cell tower locations to pinpoint your approximate location. This allows you to post your exact location through social media or other apps.
There are growing locations-based applications (apps) and games that allow you to tell others where you are and what you are doing. For example, many social media apps allow you to type in your location or post your position on a map.
Passwords are the first line of defense to keep other people out of your computer, mobile phone, data and online accounts and this is why we must learn how to create strong passwords to protect ourselves. Unfortunately, many of the passwords people use are short and simple or have been used for a long period of time and for multiple accounts. Think of your password like a house key – it enables you to lock up your house, but you have to keep the key in a safe location.
Basic guide to creating strong passwords
Phones and tablets contain a large amount of personal information. Lost or stolen devices can be used to gather information about you and potentially others. Protect your phone like you would your computer. If your phone can browse the web and check email, you have probably already been targeted by the same malicious attacks and scams that go after your computer.
What are the risks?