The NSA says you’re doing these 5 things with your phone right now
Can’t remember the last time you turned off your phone? Is Bluetooth always on? Do you plug into any charger you can find?
Win $329 Ray-Ban Meta Smart Sunglasses. Enter hereno purchase necessary!
If you answered yes to any of these questions, the NSA says you’re playing crapshoot with your privacy. The purpose of the National Security Agency is to listen and collect communications from satellites, cell phones and anywhere else.
THESE MISTAKES CAN IMPACT YOUR CREDIT
Let’s take a closer look at the five rules of smartphone use that you can do, too.
1. Restart your phone once a week
It’s easy and totally worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works against zero-click exploits where a hacker can get in by sending you the correct code.
Note: Restarting will not work for some types of malware. If your phone gets infected, you will need to do a factory reset.
2. Disable Bluetooth if you don’t need it
Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it is not 100% secure.
Hackers and scammers need to be close to you to use Bluetooth to hack your phone. But in almost any public place, you stay away from strangers.
NSA advice: Turn off Bluetooth when you’re not using it. It will help battery life, too.
- On iPhone, go to Settings > Bluetooth and change it turned off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.
- The same steps apply to Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and change it is turned off. (Note: The steps may vary depending on your phone model. Check or search for Bluetooth if these steps do not match your phone.)
Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works less — but you won’t receive calls or texts.
THE STEP I TAKE IS TO CLEAR MY INBOX EVERY JANUARY
3. Skip public USB ports
In spaces like an airport or a coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice hacking are rare in the US but they are still a real threat. They come with a USB connection, so if the kiosk has actual outlets to charge your phone using your adapter, you’re good to go.
Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using the kiosk.
More and more public kiosks have wireless charging pads instead of USB ones. This method does not exchange data directly with your phone, so it is automatically virus-free.
If you want juice, you can safely use a USB connection … with the right cable. Pack only the charging cable for your trip. They are cheap and compact, and do not allow data transfer.
4. Don’t use public Wi-Fi
It is a playground for snoopers. Public Wi-Fi is open to everyone, and every device is affected, whether it’s your smartphone, laptop or tablet.
Just because a public Wi-Fi network appears and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “Coffee Shop” or “Hotel Guest” to make you believe you are connected to the real thing when, in fact, you are not.
Here’s a good rule of thumb: If it requires a username and password to log in, you should access that site from your private network. If you need to access sensitive sites or information on a public network, do not do so without a VPN enabled.
AI IS NOT A PLACE: POTENTIAL TO MAKE LIFE EASIER
5. Cover your microphone and camera
The NSA says it’s best to use a protective case that covers your microphone and covers your camera when you’re not using it.
In a “hot-miking” attack, hackers use your microphone without your knowledge to listen in on your conversations. It happens when your device is compromised in some way, usually by malware or an app that exploits the permissions you’ve granted. Most people aren’t targeted for attacks like this, but I’d rather be safe than sorry.
Start with app permissions to check what access you’ve granted:
- Apple iPhone: Go to Settings > Privacy and Securitythen look at the list of apps and what permissions they have.
- Google Pixel: Open it Settings > Security and privacy > Privacy > Permission manager.
- Samsung Galaxy: Go to Settings > Security and privacy > Permission manager.
Hackers aren’t the only ones we have to worry about. Most of what you write, say, search and buy is tracked in one way or another.
The only immovable layer of security is literally blocking audio or camera feed. There are expensive cases out there that do the job, or you can buy a microphone blocker for about $10.
Slide into your headphone jack to stop recording. You will need an adapter unless your phone still has an audio jack. For a cheap DIY option, grab your old wired headphones, unplug them and plug them into the adapter.
Pro tip: If your phone’s microphone is on or recently accessed, you’ll see a small orange dot at the top of the screen. You will see a green dot if your camera is in use or has been recording recently.
While this is on your mind, move on. Here’s a quick 5-minute phone cleaning that I like to do a few times a year.
CLICK HERE FOR THE FOX NEWS PROGRAM
Get the smartest technology for your schedule
Award-winning host Kim Komando is your secret weapon for navigation technology.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Source link