Probable Things, You May be Doing Wrong on Your Android Device

You can do so much on your Android smartphones from texting to your friends using chat applications, writing down the notes, clicking selfies with the camera, preparing for a board presentation, or much more tasks. You can do so much with your Android operating smartphones so it is a great idea to keep the track of what all mistakes you may be doing on your device.

android-marshmallow

These days, you may have received many advice from tech experts like how to improve your Android device’s performance, battery life, avoid threats, etc. However, do you know that every change may not be compatible to your devices and may do more harm than improvements? Here are some probable mistakes that you might be doing unintentionally for optimizing Android smartphone:

Using Task Killers or Killing Apps Manually

android-task-kill

Most of the users don’t know or don’t realize that killing apps through third-party task killer apps or using the recent apps button might be worsening for your Android device’s performance. In the recent versions of Android, these apps are not necessary, but because of the misconception, current version users also use these apps without knowing that Android has evolved a lot and now it can handle those tasks more efficiently which are running in the background.

In Android, it is important to note that idle sitting RAM is just wasting your resources. Means it is not useful if it 600 MB of free RAM with no background apps. Actually, it is worse than 200 MB of free RAM along with running apps in the background. It is because the RAM management is different in Android in comparison to Windows. When required, Android automatically kills less priority background apps to feed RAM.

So, in Android, always kill only those apps, which are misbehaving or draining too much battery and do not use various task killer apps on the Play Store. It will make sure that you will experience better performance of your Android device.

Using More Than One Security Applications

android-security-audit

Your Android phone may not required antivirus app on your Android phone because it take a lot of resources on the phone and always work in the background. It drains considerable battery also. Google has already covered you against viruses or malware.

The fact is, if you are installing apps from Play Store and no third party apps are side-loaded on your device, Google has you covered against any malware or viruses. However, if you are suspicious about the by default safety provided to your device, use single antivirus app instead of multiple applications. Otherwise, you will face many complications because one antivirus app detects another as a potential threat.

Use a security app on your Android device definitely, if you are not using an antivirus app because it brings features like anti-theft, app permission manager, VPN, etc.

Side-loading Apps from Untrustworthy or Unknown Sources

unknown-sources

If you do not have antivirus protection, and download, and install application from untrustworthy or unknown sites, you Android device may give you tough time. But if you do so, security protection is necessary because Android APK files can be easily tampered malicious codes can be injected to them. Once your device catches the infection, it can easily invade your privacy and you may be victim of identity theft. So, before installing any application, verify that you only install it from trusted sources.

No Rebooting

no-rebooting

Rebooting your phone once in a while may be a good step. Some of the smartphone vendors have already introduced this as a new feature. Otherwise, the better option is schedule your phone to reboot automatically, at the time when you are go to sleep. This will clear up the entire mess holding on to your memory and give almost a fresh start to your device. It will be better that you reboot your phone once in a fortnight or every week.

Use of App Cleaners for Cache Clearing

app-cleaner

It is a good practice that you use app cleaners occasionally, but it is important to limit the usage of such app cleaners. It is enough to use them once in a week to delete unnecessary photos and videos from the gallery and leftover-cached data from uninstalled apps. But don’t use these apps to clean app cache to release just a few extra MBs of data because it will leave you in more troubles if you delete some important cache data that makes an app to function.

For snappier performance, apps keep a local copy of frequently used data. For instance, social media applications caches data like the media shared to contacts and profile picture of contact is saved in the cache to make sure users don’t need to load it up every time if they open the app. So, to keep the apps snappy on your smartphone, stop deleting cache data and start rebuilding cache again if you have cleared it.

If anyone facing problem with your android device then contact our android technical support team and for more latest updates regarding android operating system and devices keep reading PCTECH24 upcoming post.

What is Macro Targeted Malware or Macro Virus and How to stay safe from it?

Ever since the rudiments of the computers, many types of viruses and malware have been created and distributed. Initially back in the days of QDOS, it was just for fun, but now computer viruses and malware creation and distribution has become a full-time business for the hackers and cyber-criminals. Hackers have made it a business to earn profit. The macro virus is also a type of virus that may leave your system vulnerable.

This write-up is about what “macro virus” or “macro targeted malware” is and how to stay safe from this infection?

Step-1

Microsoft Office applications like the Microsoft Word or Excel run macros and these macros are targeted by the viruses to take the advantages. Often cyber criminals send their macro-infested document to the computer users by attaching them in an email and use an attractive subject line that grasp the users’ attention and provoke them to open that mail and the document attached to the email.

As soon as you download and open that macro-infected document, a macro runs and executes the task the criminal wanted to run. Macros are specifically designed to install malware on your computers and perform particular activities. Or it may be possible that a macro itself creates a malware on your computer that may duplicates itself and spread from there to all the users of your contact list.

After detecting the vulnerability, Microsoft deactivated the macro functioning by default. Means, no macro would run in the Microsoft Word unless you turn on macros or run them manually. This applies with the other applications of Microsoft often used by the computer users. There are other applications also that cyber-criminal may target, but because of the popularity, Microsoft applications are targeted by cyber-criminal.

For your understanding, in a Microsoft Office document, a macro in Office refers to a series of commands and instructions that are clubbed together to run as a single command in order to accomplish a task automatically.

To “Disable” all macros with notification, Microsoft has now set the default settings in Office. Now, when the settings of macros are disabled or off, the intrusive program will compel you to turn on the malicious macro. For instance, you may receive an email saying that your software package is ready; open the attachment for shipping details, etc. As soon as you open the attached media, you will see a notification that says Macros have been disabled. Enable Content.

Step-2

If you turn on the macro, it executes the task for which it was created. It runs a malicious code on your computer.

Macro settings in Word are like: Open Word document > Options > Trust Center > Trust Center Settings > Macro Settings.

Step-3

Here four settings will be available:

  • Disable all macros without notification
  • Disable all macros with notification (default setting)
  • Disable all macros except digitally signed macros
  • Enable all macros.

What to do to stay safe from Macro Virus?

The first thing you need is your awareness. If you receive any attachment, it’s better to open it for the first time in read-only mode. Most of the popular email clients like Outlook open your documents in read-only mode and disable macros, etc. so that you are not affected. If you receive a message to turn on macros, use your reasoning if there is any need to turn-on macros or not?

If you get a message asking you to turn on the macros, understand why the message is there and if macros really need to be enabled. For example, documents like an invoice don’t need to turn on macros as there is nothing programmable. This is just a way of baiting the innocent computer users. You also should never open attachments sent by untrusted sources. If you receive any message that your software package is ready even if you haven’t ordered it ever, don’t open the attachment.

If you have ordered something, the information about the product will be the main body of the email not in the attachments.

It may also possible that any of your contact on your contact list has been prey to such a macro virus and you have received the email from that infected computer. Open only those emails, which are sent by known and trustworthy resources. Don’t open an attachment without any message in the email body. Verify from your contacts if the email has nothing other than an attachment with the subject line like “See the attachment” or so.

In most of the cases, the attachment is usually a Word document. If any of your contacts has sent you the email, he/she must be aware about what the attachment is about. So if you see an attachment without any message or saying “Open the attachment”, as a precautionary measure, ask your contact for the further details of the attachment. If you are not cautious, macro targeted malware can be easily acquired and even your regular antivirus cannot help you much about it.

Way to remove Macro Virus

  • Microsoft suggests that run a good antivirus to prevent macros from installing malware or sending unintended information.
  • If you have doubts that any document may contain macros while opening Word documents, press Shift key while opening the document. This step will prevent the running process of any macro because your Office document will be open in Safe Mode.
  • Next, you may check out what all macros are there in the document. If you find something suspicious, remove it before using the document.