{"id":40720,"date":"2015-01-19T06:00:41","date_gmt":"2015-01-19T14:00:41","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=40720"},"modified":"2025-08-07T00:48:59","modified_gmt":"2025-08-07T07:48:59","slug":"6-mobile-myths","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/","title":{"rendered":"Don\u2019t Believe These 6 Mobile Security Myths"},"content":{"rendered":"<p>Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don\u2019t think it applies to ourmobile device. Here are some of the most common mobile security myths.<\/p>\n<ol>\n<li>\n<h2><strong>\u201cAntivirus protection isn\u2019t worth it for a smartphone.\u201d<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Just because this device fits in the palm of your hand doesn\u2019t mean it\u2019s not worthy of as much protection as your computer. It should have comprehensive security that includes, antivirus, anti-<a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\">malware<\/a> and anti-<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/spyware-a-major-identity-theft-threat\">spyware<\/a>. Think of how often and indiscriminately you use that little thing, even while you\u2019re in between bench press sets or stuck in line somewhere. The more you use it, the more important protecting the information on it becomes.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong>\u201cIf I lose my phone I\u2019ll just call it to find it.\u201d<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>A better way to locate it is to use an app with global positioning system (GPS), like McAfee\u00ae Mobile Security. With GPS, you can see the location of your device on a map, much easier than trying to hear your ringtone.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong>\u201cSmartphones don\u2019t get phishing scams.\u201d<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Actually, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/phishing\">phishing<\/a> scams can occur via text (also known as <a href=\"https:\/\/www.mcafee.com\/learn\/what-is-smishing\/\">SMiShing<\/a>\u00a0) and social media apps. Plus, the mobile device\u2019s smaller screen makes it harder to detect suspicious links.<\/p>\n<ol start=\"4\">\n<li>\n<h2><strong>\u201cApps for my phone are safe if they\u2019re from trusted brands.\u201d<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Fraudsters can easily make a malicious app look safe, and can even find its way into a reputable app store. McAfee Labs\u2122 found that over 80% of Android apps track you and collect your personal information. Apps are also the main way that malware can be downloaded to your smartphone or tablet.<\/p>\n<ol start=\"5\">\n<li>\n<h2><strong>\u201cAs long as my phone has PIN protection, it\u2019s fine to have apps automatically log into my accounts.\u201d<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>A PIN is incomplete protection because hackers may guess the PIN code or use software to nail the four-digit sequence. You\u2019d be surprised how many people\u2019s PINs are 1234 or 2222. Even if you have a longer PIN or passcode on your device, it\u2019s good practice to not have your apps automatically log you in, even though this may be convenient. You don\u2019t want something to be able to easily access your bank accounts or post random messages on your social accounts.<\/p>\n<ol start=\"6\">\n<li>\n<h2><strong>\u201cSMS\u201d adds protection.<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>The short message service does not provide protection or monitoring of any kind. This means that text messaging is not secure and in fact, it\u2019s often subject to spam.<\/p>\n<p>Keep your mobile device safe with McAfee\u00ae Mobile Security, available on both <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141397\">Android<\/a> and <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141398\">Apple<\/a> devices. The Android version includes antivirus and anti-malware software, an app manager, anti-theft features, and web protection. The Apple version includes Secure Vault to protect your pictures and videos from prying eyes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits&#8230;<\/p>\n","protected":false},"author":674,"featured_media":16619,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,3944,180,214],"coauthors":[3973],"class_list":["post-40720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-antivirus","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-19T14:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T07:48:59+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Don\u2019t Believe These 6 Mobile Security Myths\",\"datePublished\":\"2015-01-19T14:00:41+00:00\",\"dateModified\":\"2025-08-07T07:48:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\"},\"wordCount\":490,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg\",\"keywords\":[\"android\",\"antivirus\",\"malware\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\",\"name\":\"Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg\",\"datePublished\":\"2015-01-19T14:00:41+00:00\",\"dateModified\":\"2025-08-07T07:48:59+00:00\",\"description\":\"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg\",\"width\":\"660\",\"height\":\"480\",\"caption\":\"phone warning mobile security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Don\u2019t Believe These 6 Mobile Security Myths\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog","description":"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog","og_description":"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-01-19T14:00:41+00:00","article_modified_time":"2025-08-07T07:48:59+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Don\u2019t Believe These 6 Mobile Security Myths","datePublished":"2015-01-19T14:00:41+00:00","dateModified":"2025-08-07T07:48:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/"},"wordCount":490,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg","keywords":["android","antivirus","malware","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/","name":"Don\u2019t Believe These 6 Mobile Security Myths | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg","datePublished":"2015-01-19T14:00:41+00:00","dateModified":"2025-08-07T07:48:59+00:00","description":"Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time).","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/06\/phone_Warning1.jpg","width":"660","height":"480","caption":"phone warning mobile security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/6-mobile-myths\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Don\u2019t Believe These 6 Mobile Security Myths"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=40720"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40720\/revisions"}],"predecessor-version":[{"id":214147,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40720\/revisions\/214147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/16619"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=40720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=40720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=40720"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=40720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}