Be careful when using other app sources. Verifying trusted sources provides a level of assurance that you will not receive spam messages or have personal information such as your phone number or email exposed.
Apps may want access to information such as your phone and email contacts, call logs, calendar information, location data, and the unique identification number of your device.
Locking your device will ensure that a password is required to gain access to personal information on your device – including information that your apps have collected.
An out of date app which hasn’t been patched can be dangerous. It can allow for hackers to exploit a security vulnerability and compromise personal data on your mobile device.
Many of us have downloaded an app and only used it once. If you no longer use an app, uninstall it.
You should be able to erase information stored on your device by using a ‘factory reset’ option in the device settings.