00:00Hey everyone and welcome back to the channel. Today, we're diving deep into a topic that's more important than ever.
00:06Digital security. How can you be sure your phone or computer isn't compromised? We're going to walk through a full
00:12security audit, step by step, to help you hunt down potential spyware or vulnerabilities on your devices. This is for
00:20educational purposes, to empower you to protect your digital life.
00:23First things first, let's talk about the initial signs of trouble. Is your device suddenly running incredibly slow? Is the
00:30battery draining much faster than usual? Are you seeing unexpected pop-ups or apps you don't remember installing? These can
00:37all be red flags. Another big one is increased data usage. If your data consumption has skyrocketed without a change
00:44in your habits, something might be running in the background and sending information out. Keep an eye on these symptoms,
00:50as they're often the first clue that something's amiss.
00:53Alright, let's get hands-on. We'll start with your mobile device, whether it's Android or iOS. The first place to
01:00check is your list of installed applications. Go through it meticulously. If you see an app you don't recognize or
01:06one that looks suspicious, investigate it. A quick search online for the app's name can reveal if it's known malware.
01:13On Android, you should also check your device administrator apps. Go to Settings, then Security, and find Device Admin Apps.
01:20Suspicious apps will sometimes grant themselves
01:23admin privileges to prevent you from uninstalling them. If you see anything there that shouldn't have that level of control,
01:29like a simple game or utility app, that's a major warning sign. Disable its access immediately, and then proceed to
01:36uninstall it. For both Android and iOS users, pay close attention to app permissions. Your flashlight app doesn't need access
01:43to your contacts, and a calculator doesn't need to use your microphone. Go into your settings and review the permissions
01:49for each app. Be ruthless.
01:51If an app is asking for permissions that don't make sense for its function, revoke them. Modern operating systems make
01:57this process quite straightforward. This simple step can prevent a legitimate but overly intrusive app from harvesting your data, and
02:05it can stop a malicious app in its tracks.
02:07Now let's move on to your computer. Whether it's a Windows PC or a Mac, the principles are similar. Start
02:14by checking your installed programs. On Windows, go to Apps and Features, and on Mac, check your Applications folder.
02:21If you find software you didn't intentionally install, get rid of it. Be careful, as some system-critical files might
02:28have unfamiliar names.
02:29When in doubt, search the program name online before deleting. Also, check your browser extensions. Malicious extensions are a common
02:37way for spyware to get onto your system.
02:39They can monitor your browsing, steal passwords, and inject ads. Go through your browser as extensions or add-ons menu,
02:46and remove anything you don't recognize or no longer use.
02:49A crucial step for any computer audit is to run a thorough scan with reputable anti-malware software. Don't just
02:56rely on the quick scan. A full, deep system scan is what you need.
03:00There are many excellent free and paid options out there, like Malwarebytes, Bitdefender, or Norton. Make sure your security software
03:08is fully updated before you run the scan, so it has the latest definitions to detect new threats.
03:13It's also a good idea to get a second opinion. You can run a scan with your primary antivirus and
03:19then use a different, on-demand scanner to see if it catches anything the first one missed.
03:24Let's dig a bit deeper into network activity. This is a more advanced technique, but incredibly effective. You can use
03:31tools to monitor your device's network traffic on a computer.
03:34Software like Wireshark or GlassWire for Windows and Little Snitch for Mac can show you exactly which applications are connecting
03:41to the internet and where they race sending data.
03:44You're looking for strange connections to unknown servers, especially if they're happening when you're not actively using an application.
03:50If you see an app sending a constant stream of data to a weird IP address, that's a huge red
03:56flag.
03:57This can be complex, but even a basic look can reveal a lot about what's happening under the hood.
04:02Another critical area to check is your system's startup processes.
04:06Malware often configures itself to launch automatically when you turn on your device.
04:10On Windows, you can check this in the Task Manager under the Startup tab.
04:14On a Mac, you can find it under Login Items in your User Settings.
04:18Disable any unfamiliar or suspicious programs from starting automatically.
04:23This won't remove the malware, but it will prevent it from running, making it easier to find and delete.
04:28While you're there, look at the running processes or activity monitor.
04:32If you see a process with a bizarre name or one that has using an unusually high amount of CPU
04:37or memory, investigate it.
04:39A quick search can tell you if it's a legitimate system process or something malicious.
04:44Now, let's talk about rooting and jailbreaking.
04:47If your Android device is rooted or your iPhone is jailbroken, it's significantly more vulnerable to attack.
04:53These processes remove the built-in security protections of the operating system.
04:57Well, it allows.
04:59For more customization, it also opens the door for malware to gain deep system access.
05:04If you suspect you have a persistent infection and your device is rooted or jailbroken,
05:09the best course of action is often to perform a full factory reset and restore the original, unmodified operating system.
05:16This is a drastic step, as it will erase all your data.
05:19So make sure to back up your important files first photos, documents, and contacts, but not the apps themselves,
05:26as you might back up the malware along with them.
05:28Speaking of factory resets, this is your nuclear option.
05:32If you've tried everything else and you still suspect your device is compromised,
05:36a factory reset is the most reliable way to ensure it's clean.
05:39It will wipe your device and return it to its out-of-the-box state.
05:43Before you do this, as I said, back up your essential, non-executable data.
05:48After the reset, be very careful about what you reinstall.
05:51Only install apps from official sources like the Google Play Store or Apple App Store.
05:56And stick to well-known, reputable developers.
05:59This process ensures you're starting from a clean slate and haven't reintroduced the problem.
06:04Finally, prevention is always better than a cure.
06:07To keep your devices secure moving forward, always keep your operating system and applications updated.
06:13These updates often contain critical, security patches.
06:17Use strong, unique passwords for all your accounts and enable to factor authentication wherever possible.
06:22Be skeptical of unsolicited emails and messages, especially those with links or attachments.
06:28Don't install software from untrusted sources.
06:31Regularly backing up your data is also a lifesaver.
06:34If the worst happens, you can reset your device without losing your precious memories and files.
06:39Conducting a security audit might seem daunting, but taking these steps can give you peace of mind and control over
06:45your digital life.
06:47Stay vigilant, stay informed, and you'll be much safer online.
06:50I hope this guide was helpful.
06:52If you have any questions, drop them in the comments below.
06:56And don't forget to like and subscribe for more content on digital security and tech.
07:01See you in the next one.
Comentarios