A “virus” is a program that replicates itself by attaching to another program. The outcome can be destructive and may result in your device not working.
Stick to known brand names and always research before installing/purchasing.
there are a number of useful websites that review security regularly such as:
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system. Malware has been used to steal passwords and account numbers from mobile phones, put false charges on user accounts and even track a user’s location and activity without their knowledge.
A type of malicious software designed to block access to a computer system until a sum of money is paid.
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
Have I been Pwned
Passwords & Password Locker/Manager
Is chrome saving my passwords? https://boot-it.org.uk/passwords-and-security/
Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).
Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users’ claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.
A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.
Two other examples are to supplement a user-controlled password with a one-time password (OTP) or code generated or received by an authenticator (e.g. a security token or smartphone) that only the user possesses.
Two-step verification or two-step authentication is a method of confirming a user’s claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are. An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system.
Keeping up to date
Is your device up to date? Settings and normally “about”.
Google Play Protect
Check and see if Google Play Protect is installed on your device. It should be if you have the latest version of the play store. Go to settings, google, security, security status.
Secure your Android device
Just accept that you are being watched (and followed and tracked etc)
Try this link to see what common apps might be doing…