Skip to main content

Top 10 common mistakes that will kill your android phone!!!




 1. Closing Apps Frequently

Android has an effective mechanism to manage all the processes running simultaneously on your device. When you close an app manually, it is removed from memory and takes longer to open the next time.

2. Using Fake Cleaning and Battery or RAM Booster Apps

There are tons of apps on Google Play that claim to clean your phone or boost its battery and RAM. The bad news is that a lot of these apps don’t do much at all. In fact, some of them might actually consume your phone’s resources, negatively affecting its performance.

3. Allowing third-party app installations from unknown sources

It is highly recommended that you turn off app installation from unknown sources in the Settings menu.

4. Not updating your phone to the latest Android version

If your phone receives security updates or Android version updates, never ignore them. While it may take a while to install the updates, it is always worth it. This is because malware creators are quick at creating hacks to exploit known vulnerabilities.

4. installing Apps from Unknown Sources

Apps from third-party websites are not verified by your phone, potentially exposing you to security and privacy threats. It is recommended that you use Google Play Store

5. Giving Unnecessary Permissions to Apps

it is necessary to read the permissions pop-ups carefully and only allow the ones that are relevant to the proper functioning of the app

 6. Not Configuring the Find My Device Feature

Find My Device has some powerful features that allow you to locate your lost device remotely.

7. Using random adapters to charge your phone

Always use high-quality adapters or the one that you have with your phone to charge it. Phones with 5,000mAh batteries have become common and it could be dangerous to use any random adapter to charge such big batteries.

8. Not deleting old or unused apps

Keeping old or unused apps simply occupies memory and may also attract malware infection as it would not be updated.

9. Leaving Bluetooth on

Leaving your Bluetooth on all the time can be dangerous and an avenue for hackers to access private information spread malicious software, and do so much damage.

 10. Overcharging of phones (overnight charging)

Although there is a setup on phones that allows them to stop charging when it is full, constant overnight charging of phones is wrong.

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

Unlocking the secrets of Information Security.

  In an increasingly interconnected and digital world, the protection of sensitive information has become paramount. Our lives, both personal and professional, are intricately woven into the fabric of the internet and digital technologies. From financial transactions and personal conversations to critical business data, the digital realm houses a wealth of information that is highly valuable – not only to us but also to cybercriminals Welcome to my blogs, where I embark on a journey to demystify the complex and often intimidating world of information security . My aim is to equip you with the knowledge, and strategies to safeguard your digital world against the growing threats of the digital age. We'll explore the ever-evolving landscape of information security, unveiling the principles, and practices, that underpin this critical field. Whether you're an individual seeking to protect your personal information or a business owner responsible for safeguarding sensitive custo...

Information security simplified.

Information security can be simply seen as the state of well-being of information from any threat. Just like in our day-to-day interactions, we say something is secure if its safety is guaranteed. In this case, information security is said to have been achieved when a system, implements a comprehensive set of measures to protect its digital assets and sensitive information from various threats . This calls for complete awareness and understanding of threats to information security. A threat is anything that has the potential to cause damage or disrupt normal operations to information In this article, we are going to define the threats to information security Malware : Malicious software, including viruses. Phishing : Deceptive emails or messages that trick individuals into revealing sensitive information like passwords and financial details. Insider Threats : Disgruntled or negligent employees or individuals within an organization who misuse or mishandle sensitive data. Denial of...