Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

The NSA says to do these 5 things with your phone right now


I don’t remember the last time you turned around your phone off? Is Bluetooth always on? Do you plug in any chargers you can find?

Win a $329 pair of Ray-Ban Meta Smart glasses. Enter hereno need to buy!

If you answered yes to any of these questions, the NSA says you’re playing shit with your privacy. The purpose of the National Security Agency is to listen to and collect communications from satellites, cell phones, and everywhere else, really.

These Mistakes Could Rack Up Your Credit Score

Let’s take a deeper look at five smartphone-using rules that you can too.

1. Reboot your phone once a week

It’s completely simple and worth doing. Turn off your phone, wait 10 seconds, then turn it on again. This works to combat zero-click exploits where a hacker can get in by simply sending them the correct code.

Email: A reboot will not work for other types of malware. If your phone gets infected, You will have to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works Likewise to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it is not 100% secure.

Driver holding iced coffee and phone in car

A driver is shown holding an iced coffee and a mobile phone while in the car. (Istock)

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in almost any public space, you’re within arm’s length of strangers.

The NSA’s advice: Turn off Bluetooth when you’re not using it. It will also help battery life.

  • On an iPhone, go to Settings > Bluetooth and change it off. You can also swipe down from the top right of your screen to open the control center and tap the Bluetooth icon.
  • The same steps work for Android phones. Gonna Settings > Connected devices > Connection preferences > Bluetooth and change it off. (Note: The steps may vary depending on your phone model. Search or search for Bluetooth if these steps do not match your phone.)

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch, but you won’t receive calls or texts.

The step I take to clean out my inbox every January

3. Skip Public USB Ports

In spaces like airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice are rare in the United States, but it remains a real threat. They happen over USB connections, so if a kiosk has actual power outlets to charge your phone using its own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling abroad. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USB. This method does not exchange data directly with your phone, so it is virus-free.

If you’re desperate for juice, you can safely use a USB connection… with the right cable. Pack a charge only cable for your trip. They are cheap and compact, and do not allow data transfers.

Close-up of hands of business person working on computer, man using internet and social media

A business person is seen working on a laptop. (Istock)

4. Don’t use public Wi-Fi

It’s a playground for Snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network appears and asks if you want to join, doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers sometimes create networks called “coffee shop” or “hotel guest” to make you think you’re connecting with the real thing when, in reality, you’re not.

Here’s a good rule of thumb: If you require a username and password to log in, you should only access that site from your own private network. If you need to access sensitive sites or information on a public network, don’t do it without a VPN enabled.

AI is not going anywhere: tips to make life easier

5. Cover your microphone and camera

The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when not in use.

In “calotes” attacks, hackers activate your microphone without you knowing so they can listen to your conversations. It occurs when your device has been compromised in some way, usually through malware Or an app that is exploiting permissions you granted. Most people aren’t targets for attacks like this, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve given:

  • Apple iPhone: Gonna Settings > Privacy and securityand look through the list of apps and what permissions they have.
  • Google Pixel: Open Settings > Security and privacy > Privacy > Permit manager.
  • Samsung Galaxy: Address Settings > Security and privacy > Permit Manager.
A woman uses her phone in an airport

A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

It’s not just hackers to worry about. Most of what you type, say, search for, and buy is being tracked in one way or another.

The only layer of unbreakable security is to physically block sound or power from the camera. There are expensive cases that do the job, or you can purchase a microphone blocker for about $10.

Slides into your headphone port to stop recording. You will need an adapter unless your phone still has an audio jack. For a cheaper DIY option, take your older wired headphones, remove them, and plug them into an adapter.

For the advice: When your phone’s microphone is on or recently accessed, you will see a small orange dot At the top of the screen. You will see a green dot If your camera is in use or was recording recently.

While this is in your mind, take it a step further. Here is a 5 minute quick phone cleaning I like to do it several times a year.

Click here to get the Fox News app

Get Tech-Smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating technology.

Copyright 2025, Weststar Multimedia Entertainment. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *