Breaking News

The NSA says to do these 5 things with your phone now


I can’t remember the last time you turned around Your phone off? Is bluetooth always on? Do you plug into any charger you can find?

Win a $329 pair of Ray-Ban Meta Smart Glasses. Come in hereno purchase necessary!

If you answered yes to any of these questions, the NSA says you’re playing crap with your privacy. The purpose of the National Security Agency is to listen and collect communications from satellites, cell phones and anywhere else.

These mistakes could kill your credit score

Let’s take a deeper look at five smartphone rules that you can use too.

1. Restart your phone once a week

It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat exploit exploits where a hacker can simply get in by sending you the right code.

Heads up: Rebooting won’t work for other types of malware. If your phone gets infected, You will need to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works Similar to Wi-Fi and mobile networks, but performs simpler tasks in shorter ranges. You don’t need a mobile signal or network connection to use Bluetooth, and it doesn’t use data. And like any other relationship, it’s not 100% secure.

The picture shows the driver holding an iced coffee and a mobile phone while in the car. (iStock)

Hackers and scammers need to be close to you to use Bluetooth to hijack your phone. But in almost any public space, you’re an arm’s length away from strangers.

NSA tip: Turn off Bluetooth when not in use. This will help battery life as well.

  • On iPhone, go to Settings > Bluetooth And transfer it beyond. You can also swipe from the top right of the screen to open the Control Center and tap the Bluetooth icon.
  • The same steps work for Android phones. Go Settings > Connected devices > Connection settings > Bluetooth And transfer it beyond. (Note: The steps may vary depending on your phone model. Please see or search for Bluetooth if these steps do not match your phone.)

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch—but you won’t receive calls or texts.

The step I take to clean out my inbox every January

3. Skip public USB ports

In spaces like airport or coffee shop, hackers can use them to install malware or steal data. There are now real cases of juice fortification in the US, but it’s still a real threat. These happen via USB connections, so if the kiosk has actual outlets to charge your phone using its own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling abroad. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USBS. This method does not exchange data directly with your phone, so it is virus-free by default.

If you’re desperate for juice, you can safely use a USB connection … with the right cable. Pack a charging cable only for your trip. They are cheap and compact, and do not allow data transfer.

A business person is seen working on a laptop. (iStock)

4. Don’t use public Wi-Fi

It’s a playground for Snoopers. Public Wi-Fi is open to everyone and every device is vulnerable, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network pops up and asks if you want to join, doesn’t mean it’s legit. If you’re in a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “cafe” or “hotel guest” to make you believe they are connecting to the real thing when, in fact, they are not.

Here’s a good rule of thumb: If it requires a username and password to log in, you should only access it from your own private network. If you need to access sensitive websites or information on a public network, do not do so without VPN enabled.

AI isn’t going anywhere: it’s looking to make life easier

5. Cover the microphone and camera

The NSA says it’s best to use a protective case that drowns out your microphone and covers the camera when you’re not using it.

In “Hot-Miking” attacks, hackers activate your microphone without you knowing so they can listen to your conversations. This happens when your device is compromised in some way, Usually through malware or an app that takes advantage of permissions you’ve granted. Most people aren’t targets for these kinds of attacks, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve granted:

  • Apple iPhone: Go Settings > Privacy and securityand see the list of apps and what permissions they have.
  • Google Pixel: Open Settings > Security and privacy > Privacy > License Manager.
  • Samsung Galaxy: Head towards Settings > Security and privacy > License Manager.

A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

It’s not just hackers to worry about. Most of what you type, say searches and purchases, is tracked in one way or another.

The only tireless layer of security is physically blocking the camera’s audio or feed. There are expensive cases that do the job or you can buy a microphone blocker for about $10.

It plugs into your headphone jack to stop recording. You’ll need an adapter if your phone still doesn’t have an audio jack. For a cheaper DIY option, grab your oldest headphones, wring them out and plug them into an adapter.

Pro Tip: When your phone’s microphone is on or recently accessed, you’ll see a little orange dot At the top of the screen. You will see a green dot If your camera is in use or has recently recorded.

With this in mind, take it a step further. Here is a Quick 5-minute phone cleaning I like to work several times a year.

Click here to get the Fox News app

Get a technician

Award-winning presenter Kim Komando is your secret weapon for navigating technology.

Copyright 2025, Weststar Multimedia Entertainment. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Social Media Auto Publish Powered By : XYZScripts.com