Table of Contents
Can't remember that you have switched off your phone? Is Bluetooth always on? Are you plugging on a charger that you can find?
If you have answered yes to one of these questions, the National Security Agency (NSA) says that you play a nonsense with your privacy.
The aim of the NSA is to collect, analyze and report intelligence to support national security. It is definitely worth listening to the desk of the agency.
Let us look at the five smartphone rules that the NSA has provided deeper to keep the American public safe.
Restart your phone once a week
The NSA says that switching off your phone and restarting once a week is a simple, effective habit that can help to fl-up the kind where hackers infiltrate your phone without clicking on something.
To restart your phone in the right way: switch it off completely, wait for at least 10 seconds and turn it on again.
Although this will not remove continuing malware, the certain exploits can disrupt and give you a new start. For deeper problems you must do a complete factory reset.
Experts revealed that your iPhone may contribute to fatal weather events due to the emissions of carbon dioxide released from each state of the production process and the use
Extra privacy step: the NSA recommends that you regularly check your phone for updates. Security patches repair vulnerabilities that attackers are happy to exploit. Update:
· IPhone: Settings> General> Software update.
· Android: Settings> System> System update.
Switch off Bluetooth when you are not using
Bluetooth is useful, but also a potential gateway for hackers, especially in public spaces where attackers can be close enough to use vulnerabilities. To protect yourself, you simply turn off the function.
Why it matters: hackers have tools such as 'bluesnarfing' to steal data or even listen to conversations.
You will also save the battery life by eliminating Bluetooth when it is not necessary.
Pro -tip: Reduce your device to something generic (eg 'Device 123'). This makes it harder for hackers to identify your phone in public spaces.
Save public USB ports
The NSA warns of public USB loading gates that are found at airports, coffee shops and hotels because they can come up with an invisible risk: SAP Jacking.
This happens when Hackers use USB connections to install malware or to steal your data.
How you can protect yourself:
· Avoid public USB ports: choose regular power outlets instead.
· Use the correct cable: grab a cable with loading only for your trip. These cables do not transfer data, so that your phone will only be charged.
· Invest in a portable power bank: these small devices allow you to be charged along the way without trusting public points of sale.
Many public loading kiosks now offer wireless charging blocks. These are safer because they do not entail data transfer. Keep your phone clean by using reputable chargers where possible.
Do not use public WiFi
Public Wi-Fi is open to everyone and every device is susceptible, whether it's your smartphone, laptop or tablet.
It is a playground for Snoopers. Public Wi-Fi is open to everyone and every device is susceptible, whether it's your smartphone, laptop or tablet.
Only because a public Wi-Fi network pops up and asks if you want to participate does not mean that it is legitimate. Here is how you can stay safe:
· Check the network: ask an employee at the location for the official WiFi name to prevent you from connecting to malignant networks such as 'Free coffee WiFi'.
· Enable a VPN: a virtual private network encrypts your connection, making it almost impossible for hackers to intercept your data.
· Use your mobile data: for sensitive tasks such as online banking or access to work emails, the mobile network of your phone is much safer.
Pro-tip: Keep WiFi out if you don't use it. This prevents your phone from automatically connecting to uncertain networks.
Cover your microphone and camera
The NSA says it is best to use a protective case that drowns your microphone and covering your camera when you do not use it.
In 'Hot-Miking' attacks, hackers activate your microphone without knowing it so that they can listen in your conversations. It happens when your device is in one way or another, usually via malware or an app that makes permission you have granted. Most people are not a target for attacks such as these, but I prefer to be safe than regret.
Start with App, authorizations to check which access you have handed out:
● Apple iPhone: Go to Settings> Privacy and Security and look through the list of apps and which permissions they have.
● Google Pixel: Open Settings> Security and Privacy> Privacy> consent manager.
● Samsung Galaxy: Go to Settings> Security and Privacy> Prosecution Manager.
They are not only hackers to worry about. Most of what you type, say, search and buy is followed in one way or another.
The best unmanageable layer of security physically blocks the sound or camera crew. There are expensive cases that do the work, or you can buy a microphone blocker for around $ 10.
It slips into your headphone gate to stop recording. You need an adapter unless your phone still has an audio connection. For a cheaper DIY -the -self -option, take your oldest cord headphones, snip them and connect them to an adapter.