HomeScience & EnvironmentThe NSA says do...

The NSA says do these 5 things with your phone right now

Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really. 

THESE MISTAKES COULD TANK YOUR CREDIT SCORE

Let’s take a deeper look at five smartphone rules they use that you can, too.

1. Restart your phone once a week

It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.

Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

A driver is pictured holding an iced coffee and a mobile phone while in the car. (iStock)

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.

  • On an iPhone, go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.
  • The same steps work for Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and switch it off. (Note: Steps may vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

3. Skip public USB ports

In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. 

If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.

close up of hands of business person working on computer, man using internet and social media

A business person is seen working on a laptop. (iStock)

4. Don’t use public Wi-Fi

It’s a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “Coffee Shop” or “Hotel Guest” to make you believe you’re connecting to the real thing when, actually, you’re not.

Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

5. Cover your mic and camera

The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.

In “hot-miking” attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve handed out:

  • Apple iPhone: Go to Settings > Privacy & Security, and look through the list of apps and what permissions they have.
  • Google Pixel: Open Settings > Security and privacy > Privacy > Permission manager.
  • Samsung Galaxy: Head to Settings > Security and privacy > Permission manager.
A woman uses her phone at an airport

A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.

The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10. 

It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.

Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording. 

While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.

CLICK HERE TO GET THE FOX NEWS APP

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Source link

- A word from our sponsors -

spot_img

Most Popular

More from Author

- A word from our sponsors -

spot_img

Read Now

Paris Hilton raves about hubby on Father’s Day

On Father’s Day, Paris Hilton is celebrating her kids' father, who is also her husband, Carter Reum.On Instagram, she...

Bajaj Finance Shares To Trade Ex-Bonus, Ex-Stock Split Today; Key Details For Investors

Last Updated:June 16, 2025, 07:54 ISTShares of Bajaj Finance Ltd., one of India’s largest non-banking financial companies, will be closely watched on Monday; Key detailsBajaj Finance Bonus And Split Record DateBajaj Finance Share Price: Shares of Bajaj Finance Ltd., one of India’s largest non-banking financial companies, will...

‘Materialists’ | Anatomy of a Scene

“Hi, My name is Celine Song and I’m the writer-director of “Materialists.” I wanted to choose this scene as the Anatomy of a Scene because it’s the first scene that I wrote. And this shot is, it’s a very long take, and it begins with Harry, played...

‘Forever chemical’ TFA found in all but one of tested UK rivers

A chemical that scientists worry might have an impact on human reproduction has been found in rivers across the UK.Researchers from York University analysed samples from 32 rivers in all the UK's 4 nations and found traces of trifluoroacetic acid (TFA) at 98% of the test locations.TFA...

EU Struggles For Trade Deal With US By July 9 Amid Tariff Tensions | Economy News

New Delhi: European Commission President Ursula von der Leyen has reiterated the European Union's (EU) commitment to reach a "good" trade deal with the US before July 9 during a phone call with US President Donald Trump. In a post on social media platform X, von der Leyen...

Army vet wins $1.3 million lottery jackpot a month after making a long-distance move

Your support helps us to tell the storyFrom reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines...

Your home address is exposed online through people finder sites

NEWYou can now listen to Fox News articles! Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish...

The Beach Boys’ Brian Wilson and his summer of milestones

For half a century, Beach Boys songs like "Fun, Fun, Fun" have promised unending summers of fun in the sun -- not at all like the life founding Beach Boy Brian Wilson actually led for many years, as Anthony Mason tells us...

Glasgow-raised Nationwide and Greggs bosses among businesswomen honoured

Your support helps us to tell the storyFrom reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines...