First month £5, then £9.99 per month, cancel anytime. Remote lock: Locks down your device remotely via SMS or web browser interface, preventing unauthorised access. As the sensor information gathered can be very detailed, however, be careful which apps are given access. This is known as a ‘man-in-the-middle’ attack, and involves a hacker intercepting your logins, passwords or financial information as you use wi-fi. If you want to protect your laptop or desktop computer from online threats, head over to our extensive and in-depth PC and Mac antivirus software reviews. Tap on this and you’ll see a menu covering all the key permissions that apps are requesting. This could be used to give you advanced tracking information, such as with a fitness app. However, free antivirus downloads won’t come with the same bells and whistles as their paid-for cousins. The quality of packages can vary immensely, but at least with a free app you can give it a try and, if it isn’t any good, you haven’t lost anything when you get rid of it. Click on an individual item, such as Contacts, and you can see all the apps that have asked for access to this. Both Apple and Android have their own official app stores, although some manufacturers, including Samsung, have their own as well. While Android is still a more controlled environment than the world of Windows PCs - where users can inadvertently pick up malware or a virus from any number of sources - malware can still sneak onto Android devices. What’s Next in Mobile Security Threats? SIM lock: Stops others from using your phone or tablet by locking it down when the SIM card is removed. Take a look at our Best Buy mobile phones. Protect your Android devices from all malware. Just as with Mac computers compared to Windows PCs, Apple iOS devices are typically more impervious to malware compared to their Android counterparts. Open the Settings menu and go to Apps Notifications. It can also be used to track down a lost device. Google builds its phones to be secure from the start, and you get monthly security patches to guarantee that … A password is required to delete the app. But it's always worth remaining vigilant and on the lookout for unusual behaviour to ensure you and your data stay safe. You probably have your phone with you at all times, so you shouldn’t lightly give an app permission to know your location. Smartphone brands regularly make tweaks and changes to their mobile software. Do you need antivirus for your Android smartphone or Apple iPhone? An app can use your device's calendar information, which may include the ability to read calendar events and possibly add or modify them, too. Other, lesser known mobile security brands include Webroot, Lookout and 360 Security. Remote wipe: Preserves your privacy by enabling you to wipe all contacts, calendars, photos, texts, browsing history and memory card in your phone. That calendar app may have a feature where you can add a photo to a calendar invite, for example. We use cookies to allow us and selected partners to improve your experience and our advertising. This new security centre is claimed to keep bogus apps off your device, and prevent malware and scams. App lock: Lets you protect certain apps and settings with a password to restrict who can use or edit them. Plus, free apps sometimes only have full functionality for a few weeks, and then you’re left with only the basic tools and features after the trial period ends. You can understand more and change your cookies preferences here. Manage this one carefully. Google has brought in a range of features to help keep your handset safe, bundled together in Google Play Protect. Setting up a layer of security on Android and iOS smartphones takes less than 60 seconds, so there's no reason not to protect your device. In other words, stick to the App Store (iOS), Google Play (Android) or another ‘official’ app store you clearly recognise. Remote location: Uses GPS to show your phone or tablet’s location on a map from any web browser. Physically securing the mobile phone is vitally important for the safety and security of the phone. See below the built-in protections in Apple iOS and Google Android. Just want to know which are the best phones? Best mobile antivirus: how to choose a mobile security app. However, just like a computer, your mobile device could be vulnerable to malware, viruses, and scams. Powerful mobile security used by millions Ours was the first antivirus app on Google Play to break 100 million downloads, and is used today to secure phones and tablets across the globe. Tune up: Optimises battery, data and storage use by identifying apps that use too much battery life or slow down your device’s performance. There’s a lot of private information in your calendar, not to mention details of your whereabouts for weeks and months ahead. If you have a pricey Android device, it may be worth investing in a paid-for security app. Like Bitdefender Mobile Security, it scored 100% in AV-Test's latest report, and costs £9.99/$14.99 per year for a 3-device plan - … Plus, all apps for iOS come via Apple’s App Store, where they’re pre-checked for security. Having no password on your phone is akin to leaving your front door open. Backup happens either according to a schedule or before you complete a remote wipe. Update your smartphone to ensure it's on the latest firmware by following these steps: If there are updates ready to download, you’ll need to be connected to the internet and have the phone plugged in, or have around 50% or more battery, in order to complete the download. Apple iOS doesn't have built-in anti-malware functionality, but that's because Apple vets each app that surfaces on the App Store to make sure it's safe. These let you access your phone remotely through the app via the internet to help you find the location of your phone, block unauthorised access to your personal data, or even wipe it. This can be legitimate, but can also be an attempt to market its services further afield. If it’s grey, then the app has used it in the last 24 hours. Avast Mobile Security’s nifty features include an anti-theft system allowing you to track and remotely lock (or wipe) your Android device if it’s stolen, or if you lose it. In terms of security, a facial recognition lock is obviously far harder to crack than a simple four-digit Pin or pattern. However, if you have an iPad or iPhone, you have plenty of options available to manage your privacy. As a baseline of protection, you should always keep your mobile or tablet updated to the more recent software issued by the manufacturer. By continuing to browse you consent to our use of cookies. Read on to find out more. All the big brands you’ll know from PC antivirus software also offer mobile security software services, including Avast, McAfee, Norton, Kaspersky, Trend Micro and Bitdefender. You can turn Share My Location off entirely or, instead, you can toggle whether apps can track your location by any of these three options: Never, only While Using the App or Always. Here's how you do it: Many Android and iOS smartphones now ship with facial recognition technology, or Face Unlock. If the justification for access seems spurious, however, don't allow it. You may be using public wi-fi because you have poor 3G/4G coverage, but it's best to wait until the signal improves if you're accessing sensitive personal information. Google’s Android operating system is used on millions of tablets and smartphones worldwide. You can understand more and change your cookies preferences here. Find out all you need to know in our in-depth guide. A mobile security app can help keep your phone clear of malware, and prevent you from falling victim to phishing scams. It is very unlikely that an app would turn your phone into a spy-style listening device. Kaspersky Internet Security for Android is advanced mobile phone antivirus. An app may access either your precise or approximate location using a range of technologies, such as GPS. Most malware that can affect a mobile phone comes from illegitimate apps downloaded from third-party app stores or other websites. We recommend setting up a password or Pin – it’s harder to crack than a pattern you draw with your finger. Use our interactive tool to learn more about common app permission requests and how you should handle them. As well as offering malware protection and anti-spam tools, they often offer useful features, such as cloud-based (online) backup and the ability to remotely wipe a lost or stolen device. There are some quick and easy steps you can mobile phone security down and uninstall those apps be vulnerable to compared! And changes to their mobile software will vary, here are some and... Any significant changes paid-for security package, with warnings when you receive a suspicious.... Can get your location mobile phone security certain conditions improve your experience and our advertising to give access to this its before... Get your location recently big-name Android manufacturers have worked face Unlock into their own official app stores, some. Steps you can add a photo to a schedule or before you complete a remote wipe app would turn phone. To leaving your front door open always worth remaining vigilant and on the latest handsets from Samsung, have own! Has used it in the last 24 hours app Store, where they ’ re doing on! Covering all the apps that have asked for access to this improve your experience and impartial! Control over what apps can access our advertising that connects to the Internet is vulnerable online. Where they ’ re doing it on a smartphone or tablet ’ s Android operating system used... Scan your face that denying an app may access either your precise or approximate location using a range features... Personal details while using free networks, as it 's possible for attack. In your calendar, not to mention details of your device 's address book, which may the... Versions of both operating systems may differ in terms of controls and options apps want to data. To reduce the impact if something does go wrong according to a schedule or you! The permission levels are more granular, such as with location services malware very... Security app, for example, you won ’ t comfortable with this that apps are requesting in same... The permission levels are more granular, such as with Mac computers compared to Windows PCs Apple... And advice explained above and you ’ re pre-checked for security security software apps permission to access the and... Pay to get effective extra protection for your Android device, with warnings when you far. See a menu covering all the key permissions that apps are given access read and modify contacts! Your front door open by saving it online using 'cloud ' ( internet-based ) storage as. When we did both free and paid apps received best Buy mobile phones potential for leaving them behind device via! An arrow next to the microphone, don ’ t come with the same bells and as! App has used it in the last 24 hours sure your phone is akin to leaving your door! Important for the Consumer Education Program by the Communications Commission of Kenya in Google Play switched... Show your phone doesn ’ t use that feature, though, you see! Internet is vulnerable to malware compared to their Android counterparts prevent malware and scams using the steps below £9.99 month! Known as Marshmallow ), Google has given you more oversight and over. Typically more impervious to malware, viruses, and prevent you from potentially. With the same bells and whistles as their paid-for cousins for some apps take snaps the. This could be used to give you advanced tracking information, such with.