How you can protect your computer and mobile devices from malware and data theft

Research output: Chapter in Book/Published conference outputChapter

Abstract

Security specialists tend to advice that you install security tools and adapt to a list of safe-use guidelines to protect your personal devices, this is especially important when you are targeted, such as in the case of cyberstalking. Typical questions you might still ask include: how can I select a good security product for my device? Do I need an anti-virus for my phone? And what security features I should be aware of to keep my data secure? This chapter aims at helping you answering these questions and encourages further research and security awareness on how you should use your devices. Many examples are given to demonstrate features of a particular device, but expect minor differences between different versions of a single operating system (e.g. Android). However, all the features shared in this chapter should be available in all recent versions.
Original languageEnglish
Title of host publicationA Practical Guide to Coping with Cyberstalking
Chapter11
Pages114-25
Number of pages8
Edition1st
Publication statusPublished - 20 Apr 2015

Fingerprint

Dive into the research topics of 'How you can protect your computer and mobile devices from malware and data theft'. Together they form a unique fingerprint.

Cite this