One thing to add up in here is that, the greatest risk you could have when dealing with applications is upon right after installing it. To be exact, the permissions that we are allowing the application is what makes us be in danger. You know why? Our operating system in desktop or in mobile is actually doing their part to protect us, but let us do our part to keep ourselves secured by just allowing trusted permission request for them to be limited in accessing our information.
There are also cases that hackers are doing spear-phishing, in which they try to target certain individuals for them to hack. One lesson about this is to keep on track of our social media accounts and to limit posting information that might catch the eye of hackers. Use the privacy features provided by the applications.