mobile security
TRANSCRIPT
![Page 1: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/1.jpg)
![Page 2: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/2.jpg)
![Page 3: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/3.jpg)
![Page 4: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/4.jpg)
Source: Wikipedia
![Page 5: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/5.jpg)
Source: Bitdefender
![Page 6: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/6.jpg)
![Page 7: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/7.jpg)
![Page 8: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/8.jpg)
![Page 9: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/9.jpg)
![Page 10: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/10.jpg)
![Page 11: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/11.jpg)
Source: Bitedefender
![Page 12: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/12.jpg)
![Page 13: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/13.jpg)
![Page 14: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/14.jpg)
![Page 15: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/15.jpg)
CONCLUSIONThe best way to protect yourself from cell-phone viruses &
threats is the same way you protect yourself from computer viruses:
Never open anything if you don't know what it is?
Here are some steps you can take to decrease your chances of
installing a virus:
Turn off Bluetooth discoverable mode. Set your phone to "hidden"
so other phones can't detect it and send it the virus.
Check security updates to learn about file names you should keep
an eye out for.
Security sites with detailed virus information include: Bitdefender,
McAfee & Symantec
![Page 16: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/16.jpg)
Plan B BullGuard Trend Micro
Examples for security software are as follows:
Trust Port Quick Heal
kaspersky NQ Avast 360 Avira
AVG CM
& many more …Bitdefender
![Page 17: Mobile security](https://reader030.vdocuments.us/reader030/viewer/2022032616/55a6af8d1a28ab475c8b460b/html5/thumbnails/17.jpg)
Where to find me..
/chd.naveen
@saini_naveen87
/NaveenKumar11
www.elixir-india.com