Can’t retrieve the past clip you turned your phone off? Is Bluetooth ever on? Do you plug into immoderate charger you tin find?
Win a brace of $329 Ray-Ban Meta astute glasses. Enter here, nary acquisition necessary!
If you answered yes to immoderate of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s intent is to perceive and cod communications from satellites, cellphones and anyplace else, really.
THESE MISTAKES COULD TANK YOUR CREDIT SCORE
Let’s instrumentality a deeper look astatine 5 smartphone rules they usage that you can, too.
1. Restart your telephone erstwhile a week
It’s dormant elemental and perfectly worthy doing. Turn disconnected your phone, hold 10 seconds, past crook it backmost on. This works to combat zero-click exploits wherever a hacker tin get successful simply by sending you the close code.
Heads up: A restart won’t enactment for different types of malware. If your telephone becomes infected, you’ll request to bash a afloat mill reset.
2. Disable Bluetooth erstwhile you don’t request it
Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks astatine shorter ranges. You don’t request a cellular awesome oregon web transportation to usage Bluetooth, and it doesn’t usage data. And similar immoderate different connection, it’s not 100% safe.
A operator is pictured holding an iced java and a mobile telephone portion successful the car. (iStock)
Hackers and scammers indispensable beryllium adjacent to you to usage Bluetooth to hijack your phone. But successful conscionable astir immoderate nationalist space, you’re arm’s magnitude from strangers.
The NSA’s advice: Turn disconnected Bluetooth erstwhile you’re not utilizing it. It’ll assistance artillery life, too.
- On an iPhone, spell to Settings > Bluetooth and power it off. You tin besides swipe down from the apical close of your surface to unfastened the Control Center and pat the Bluetooth icon.
- The aforesaid steps enactment for Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and power it off. (Note: Steps whitethorn alteration based connected your phone’s model. Look oregon hunt for Bluetooth if these steps don’t lucifer your phone.)
Airplane mode besides disables Bluetooth and Wi-Fi, among different things, truthful it works successful a pinch — but you won’t person calls oregon texts.
THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY
3. Skip nationalist USB ports
In spaces similar the airport oregon java shop, hackers tin usage them to instal malware oregon bargain your data. Now, existent cases of foodstuff jacking are uncommon successful the U.S. but it’s inactive a existent threat. They hap done USB connections, truthful if a kiosk has existent powerfulness outlets to complaint your telephone utilizing your ain adapter, you’re bully to go.
Stay distant from USB ports of immoderate size, particularly erstwhile traveling overseas. USB standards are international, and overseas hackers tin people USB ports successful hotels oregon rentals to bargain your data, adjacent if you’re not utilizing a kiosk.
More and much nationalist kiosks person wireless charging pads alternatively of USBs. This method doesn’t speech information straight with your phone, truthful it’s virus-free by default.
If you’re hopeless for juice, you tin usage a USB transportation safely … with the close cable. Pack a charge-only cable for your trip. They’re inexpensive and compact, and they don’t let for information transfers.
A concern idiosyncratic is seen moving connected a laptop. (iStock)
4. Don’t usage nationalist Wi-Fi
It's a playground for snoopers. Public Wi-Fi is unfastened to everyone, and each instrumentality is susceptible, whether it’s your smartphone, laptop or tablet.
Just due to the fact that a nationalist Wi-Fi web pops up and asks if you privation to articulation doesn’t mean it’s legitimate. If you’re astatine a java store oregon hotel, inquire an worker for the circumstantial sanction of their Wi-Fi network. Scammers volition sometimes make networks called "Coffee Shop" oregon "Hotel Guest" to marque you judge you’re connecting to the existent happening when, actually, you’re not.
Here’s a bully regularisation of thumb: If it requires a username and password to log in, you should lone entree that tract from your ain backstage network. If you bash request to entree delicate sites oregon info connected a nationalist network, don’t bash it without a VPN enabled.
AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
5. Cover your mic and camera
The NSA says it’s champion to usage a protective lawsuit that drowns retired your microphone and covers your camera erstwhile you’re not utilizing it.
In "hot-miking" attacks, hackers activate your microphone without you knowing it truthful they tin perceive into your conversations. It happens erstwhile your instrumentality has been compromised successful immoderate way, usually done malware oregon an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks similar this, but I’d alternatively beryllium harmless than sorry.
Start with app permissions to cheque what entree you’ve handed out:
- Apple iPhone: Go to Settings > Privacy & Security, and look done the database of apps and what permissions they have.
- Google Pixel: Open Settings > Security and privacy > Privacy > Permission manager.
- Samsung Galaxy: Head to Settings > Security and privacy > Permission manager.
A pistillate uses her smartphone portion waiting to committee a level astatine Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)
It’s not conscionable hackers to interest about. Most of what you type, say, hunt and bargain is being tracked successful 1 mode oregon another.
The lone unhackable furniture of information is physically blocking the dependable oregon camera feed. There are costly cases retired determination that bash the job, oregon you tin bargain a mic blocker for astir $10.
It slides into your headphone larboard to halt recording. You’ll request an adapter unless your telephone inactive has an audio jack. For a cheaper DIY option, drawback your oldest corded headphones, snip them disconnected and plug that into an adapter.
Pro tip: When your phone’s microphone is connected oregon was precocious accessed, you’ll spot a tiny orange dot astatine the apical of the screen. You’ll spot a green dot if your camera is successful usage oregon was precocious recording.
While this is connected your mind, spell a measurement further. Here’s a quick 5-minute telephone cleanup I similar to bash a fewer times a year.
CLICK HERE TO GET THE FOX NEWS APP
Get tech-smarter connected your schedule
Award-winning big Kim Komando is your concealed limb for navigating tech.
- National radio: Airing connected 500+ stations crossed the US - Find yours oregon get the escaped podcast.
- Daily newsletter: Join 600,000 people who work the Current (free!)
- Watch: On Kim’s YouTube channel
- Podcast: "Kim Komando Today" - Listen wherever you get podcasts
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.