1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Unofficial application stores
Platforms where users can download apps not vetted by official developers, increasing risks of malware and data breaches.
Developer mode
Enables developer-specific settings for mobile devices, such as USB debugging and memory statistics.
Rooting
The process of gaining root access to the core of an Android OS, allowing modification of files and system settings.
Jailbreaking
The process of removing software restrictions imposed by Apple on iOS and related devices.
Application spoofing
Installation of apps that appear legitimate but are actually malicious; always verify the source.
High network traffic
Refers to higher than normal network use, which may indicate problems or malware.
Data-usage limit notification
Alerts users when they approach or exceed their data cap, potentially leading to reduced speeds or additional charges.
Limited/no internet connectivity
Occurs when a device cannot establish a stable connection to the network, often due to router or ISP issues.
High number of ads
Large number of advertisements - a symptom of potential malware; running an anti-malware utility can help remove the source.
Fake security warnings
Legitimate-looking alerts that trick users into installing additional malware; users should avoid downloading prompted software.
Unexpected application behavior
Manifestations include crashing, slow performance, or unusual error messages; updating or reinstalling the app is recommended.
Leaked personal files/data
Loss of data that indicates potential security breaches; remediation involves performing scans, factory resets, and changing passwords.