Everything You Need to Know About Mobile Security

From securing your iPhone or Android to spotting spyware and avoiding phishing texts — 20 expert articles covering every aspect of smartphone security for Hong Kong users.

Mobile security threats in Hong Kong

Explore the Full Mobile Security Library

1The Threat Landscape

Why Your Smartphone Is a Prime Target for Cybercriminals

Your smartphone is no longer just a communication device — it's a digital vault. It holds your banking credentials, personal photos, health data, business emails, and authentication codes for every online account you own. For cybercriminals, compromising a smartphone delivers far more value than hacking a desktop computer, because phones are used constantly, carried everywhere, and connected to a greater range of sensitive services.

In Hong Kong, where smartphone penetration exceeds 90% and mobile banking is ubiquitous, the attack surface is enormous. Attackers use a diverse toolkit: smishing (SMS phishing) campaigns impersonating Hongkong Post, HSBC, and government agencies; fake apps distributed via unofficial channels; malicious WiFi hotspots in MTR stations and shopping malls; and sophisticated spyware that can operate silently without any visible symptoms.

The threat landscape in 2026 has shifted significantly. Pre-installed malware on budget Android devices, zero-click exploits targeting iMessage and WhatsApp, and AI-generated phishing messages that perfectly mimic legitimate communications are now common threats. Understanding these risks is the essential first step to protecting yourself.

  • Smishing attacks: SMS phishing messages impersonating banks, HKPOST, and government agencies are the most common mobile threat in HK.
  • Spyware and stalkerware: Applications that silently record calls, track location, and exfiltrate messages without user knowledge.
  • Malicious apps: Fake or trojanised apps on unofficial app stores that steal credentials or mine cryptocurrency.
  • Public WiFi attacks: Man-in-the-middle attacks on unsecured networks in MTR stations, cafes, and hotels.
  • SIM swapping: Attackers convince mobile carriers to transfer your number, bypassing SMS-based 2FA on banking apps.
  • Zero-click exploits: Sophisticated attacks that compromise devices without requiring any user interaction.
See the full breakdown of mobile threats in Hong Kong →
Mobile security threats in Hong Kong
2Device Security

Hardening Your Device: From Lock Screen to Encryption

Securing a smartphone starts with the fundamentals: a strong lock screen, full-disk encryption, and keeping your software updated. These three measures alone close off the vast majority of physical and remote attack vectors. An unencrypted phone left in a taxi can expose every message, photo, and credential to anyone with basic forensic tools; an encrypted phone is practically impenetrable without the correct passphrase.

Both iOS and Android now encrypt device storage by default, but the strength of that encryption is only as good as your lock screen PIN or password. A 6-digit PIN has 1 million possible combinations — a forensic brute-force tool like GrayKey can crack it in minutes. A strong alphanumeric passphrase, combined with a short auto-lock timer and biometric authentication as a convenient secondary method, provides robust protection without sacrificing usability.

Software updates are equally critical. The majority of malware attacks exploit known vulnerabilities that have already been patched — attackers simply target users who haven't installed updates. Enabling automatic updates on both your OS and apps eliminates this vulnerability. On Android, pay particular attention to Google Play system updates and security patches, which are delivered separately from major Android version updates.

  • Strong passcode: Use a minimum 8-digit PIN or alphanumeric password — avoid birthdays, sequential numbers, and patterns.
  • Auto-lock: Set your screen to lock after 30 seconds of inactivity to minimise the window for physical access.
  • Full-disk encryption: Enabled by default on modern iOS and Android — verify it's active in your security settings.
  • Automatic updates: Enable auto-updates for both the OS and all installed apps to close known vulnerabilities immediately.
  • Find My Device: Ensure Find My iPhone or Find My Device (Android) is enabled so you can remotely locate or wipe a lost phone.
  • USB restricted mode: On iPhone, enable USB Restricted Mode to block data transfer over Lightning/USB-C when locked.
Follow the complete smartphone security checklist →
Securing your smartphone guide
3App Security

App Security: Permissions, Sources, and What to Watch Out For

Apps are the primary attack surface on modern smartphones. Each app you install is a potential vector for data theft, surveillance, or malware. The app permissions system — which controls what each app can access — is your first line of defence. Granting a flashlight app access to your contacts, microphone, and location is not just unnecessary; it's a significant privacy and security risk.

The distinction between official and unofficial app sources matters enormously. Apple's App Store and Google Play both screen apps for malware, though neither is perfect. Sideloading apps on Android — installing APK files from websites, Telegram channels, or third-party stores — removes these protections entirely. In Hong Kong, fake banking apps, investment apps, and government service apps distributed via WhatsApp and Telegram are a growing problem, often used in romance scams and pig butchering schemes.

Even legitimate apps can overstep their permissions. Regular audits of which apps have access to your camera, microphone, location, contacts, and health data are essential. On iOS, the Privacy and Security settings screen provides a comprehensive view; on Android, the Permission Manager in Settings lets you review and revoke permissions by category. A useful rule of thumb: if you haven't used an app in 30 days, either revoke its sensitive permissions or uninstall it entirely.

  • Download from official stores only: Never install APKs from unofficial sources — sideloaded apps bypass all malware screening.
  • Review permissions at install: Scrutinise every permission request and deny anything that isn't clearly necessary for the app's function.
  • Regular permission audits: Monthly review of which apps have access to your location, camera, microphone, and contacts.
  • Location permission: Grant location access only while using the app — never always-on — unless there's a specific justified need.
  • Delete unused apps: Every dormant app with permissions is a security liability; uninstall apps you no longer actively use.
  • Check app developer credentials: Research the developer before installing — look for a company website, privacy policy, and legitimate reviews.
Master app permissions on iOS and Android →
App permissions security guide
4Mobile Privacy

Taking Control of Your Mobile Privacy in Hong Kong

Privacy on a smartphone goes beyond security settings. Your phone is constantly generating data — location history, app usage patterns, browsing behaviour, communication metadata — that is collected by app developers, advertising networks, your mobile carrier, and device manufacturers. In Hong Kong, where digital services are tightly integrated into daily life via apps like Octopus, MPF providers, and HKTVmall, the data footprint of a typical smartphone user is extensive.

The advertising identifier — called IDFA on iOS and GAID on Android — is the mechanism advertisers use to track you across apps. Both iOS and Android now allow you to reset or opt out of ad tracking, but this must be enabled manually. On iOS 14.5 and later, Apple's App Tracking Transparency framework requires apps to request explicit permission before tracking you across other companies' apps and websites; denying this permission for all apps significantly reduces cross-app surveillance.

Secure messaging is a crucial component of mobile privacy. Standard SMS and phone calls are transmitted unencrypted and can be intercepted by carriers, law enforcement, and attackers with appropriate equipment. Signal provides end-to-end encryption for both messages and calls by default, with no data retention on its servers. For Hong Kong users who need to balance privacy with the practicality of staying in contact with friends and family on WhatsApp, enabling disappearing messages and being selective about what is shared in chats are important minimum measures.

  • Disable ad tracking: On iOS, go to Settings → Privacy → Tracking and disable cross-app tracking; on Android, opt out of Ads Personalisation in Google settings.
  • Use a secure messaging app: Signal offers the strongest privacy guarantees — end-to-end encryption, no metadata retention, and open-source verification.
  • Mobile VPN: Route all traffic through an encrypted VPN tunnel, especially on public WiFi networks in Hong Kong.
  • Location history: Disable Google Location History and Timeline on Android; review and clear Significant Locations on iPhone.
  • Browser privacy: Use Safari with Intelligent Tracking Prevention enabled on iOS, or Firefox Focus on Android, for private browsing.
  • Review app privacy reports: iOS's App Privacy Report shows exactly which apps accessed your location, camera, and microphone in the past week.
Take control of your mobile data privacy →
Mobile data privacy protection
Start Securing Your Smartphone Today

Start Securing Your Smartphone Today

Follow our step-by-step guide to lock down your iPhone or Android against the threats that matter most in Hong Kong.