HARD reset of Android phones

Your Modern Android Phone comes equipped with a robust Factory Reset feature. How to do a factory reset varies slightly for different manufacturers and operating systems / version. This write up will show you some examples of how to activate a hard reset on several popular devices. Other devices are likely to have similar options.

The menu structure of Samsung phones and Tablets are not the same. But if your device is running Android 9, below, is the procedure to hard reset it.

How to Hard Reset SAMSUNG GALAXY Phones and Tablets running on ANDROID 9

1. Run the Settings app.

2. From the main Settings menu, click on General Management.

3.     Click on Reset.

4. Click on Factory Data Reset.

5. Next Click Reset, Follow the instructions presented with the relevant warnings.

Hard Resetting Android Phones Running on Android 8 and below. 

The way to hard reset android phones varies based on phone manufacturer , android operating system and version. You can follow the steps below to reset your phone

1. Run the Settings app.

2. From the main settings menu, click on System.

3. In the System menu, click on Reset.

4. In the Reset menu, click on Factory Data Reset.

5. Confirm by clicking Reset, then Follow the instructions to continue.

How to Bank Online Safely

Online banking is unavoidable despite its security concerns. We are in the 21 century and online banking is smarter and easier banking. Here are some things you can do to improve your security as you bank online:

1. Use a strong password

 Your online banking password should be unique and strong. Commit to memory, that is remember it off hand. Do not store it in your phone or computer. If you like, you can write it on a piece of paper and store it in a safe place.

2. Choose a random PIN for your ATM   

It is good practice to choose a random Personal Identification Number (PIN) for your ATM card and/or phone identification. The PIN should not be related to any information that you know such as your name or other passwords. Do not write down your PIN or store it in your computer or phone. Do not tell your PIN to strangers, bank employees and people you don’t trust.

3. Log in to your online banking using trusted devices

Log in to your online banking using your phone or personal computer. Make sure the security features of your phone and computer are up to date. It is best to use your personal internet/ WiFi connecting. Avoid public WiFi networks because they can be unsafe.

4. Activate alerts for your bank account

Sign up for alerts from your bank. You should enable your bank account to be alerted by text message and/or email any time a transaction takes place with respect to your account.

5. Do not allow your browser store your online banking password

When you use your online banking password on a browser, your browser will normally request to store it for you. Reject the offer. This will safeguard against someone else easily logging in to your bank account. It is good practice to always enter the URL of your bank every time you visit the bank on the web.

Malware; What it is and How it Works.

Malware, also called malicious software, is a general term for software that is created for the purpose of causing damage on its users. The victims have no idea they are running it on their computer systems.

Malware includes computer Trojans, worms, viruses, scareware, ransomware, spyware, adware, cryptocurrency miners, and other programs intended to exploit computer resources for nefarious purposes.

Viruses

Computer viruses are programs that replicate their own code into computer systems when executed. They infect the computers  through  software. For instance, a virus can be included in the executable file of a microsoft word document. So that when the word document is executed or run, the virus is executed alongside without one knowing.viruses can also infect the boot sector of an harddrive.

Because virus can spread on their own, if not checked will eventually render the computer system unusable

Viruses need a host or software to spread, that is to say , once the infected software or program is not run. The virus cannot run as well.

Worms

Computer worms are pieces of malicious  programs  that can propagate themselves without a host.they often attack computer networks and internet connections looking for vulnerabilities.

Worms can consume large amounts of network bandwidth slowing down internet connections in the process.  Worms can steal information without modifying program data.

Trojans

Trojans (named after the  historical Trojan horse) is a malicious software that disguises itself as genuine. It can also be hidden within a non malicious software. Trojans can be spread by tricking people into installing an app, clicking on a link or some email attachment sent into your inbox.

Unlike viruses and worms which can self propagate, trojans propagate through the mistakes of humans.

Ransomware

Ransomware as the name implies, is  a malware that steals sensitive information, or encrypts files then tells the victim to pay some ransom to some criminal before stolen information can be returned or decrypted. 

Scareware

Scareware  is a malicious program that scares people into taking some action. For example a message can suddenly appear on your phone stating it has a virus and  tricks you into clicking a link to download antivirus. But that link actually leads to the malicious program. 

Spyware

Spyware is  a software that, without permission, collects information from your device. Information collected can include, keylogger, screen images, videos, audio from a microphone, and so on.

Cryptocurrency miners

Cryptocurrency miners are malware that steals cryptocurrency by infecting the CPU of its victims. 

Adware

Adware is software that generates revenue for the party operating. It displays adverts on your device usually after download of a free software. The adware is installed and run without permission.  

Blended malware

Blended malware refers to a technology that uses different types of malicious programs to run. For instance, a software comprising viruses, worms and trojans.

Zero day malware

Zero day malware is any malicious program that exploits a loophole not previously known to the public or to the creators/sellers of the technology containing the defect.