SELECT LANGUAGE BELOW

The NSA says do these 5 things with your phone right now

Can't remember the last time you turned off your phone? Is Bluetooth always on? Plug it into a charger you can find?

Win a pair of Ray-Ban Meta smart glasses for $329. Please see hereno need to buy!

If you answer “yes” to any of these questions, the NSA says you are playing crap with your privacy. The purpose of the National Security Agency is to listen and collect communications from satellites, cell phones, and other locations.

These mistakes can tank your credit score

Let's take a closer look at 5 smartphone rules that you can follow too.

1. Restart your phone once a week

It's simple and definitely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits, which hackers can get in by simply submitting the appropriate code.

Heads up: Restart doesn't work with other types of malware. If your phone is infected, You will need to do a complete factory reset.

2. Disable Bluetooth when not needed

Bluetooth works similarly to Wi-Fi and Cellular Networks, but has a shorter range and performs simpler tasks. No cellular signal or network connection is required to use Bluetooth. No data is used. And like any connection, it's not 100% secure.

The driver is pictured holding an iced coffee and a mobile phone in the car. (istock)

Hackers and scammers need to be near you to use Bluetooth to hijack your phone. But in almost every public space, you're at arm's length from strangers.

NSA advice: Turn off Bluetooth when not in use. Battery life also helps.

  • I'm going on my iPhone setting > bluetooth switch off. You can also swipe from the top right of the screen to open Control Center and tap the Bluetooth icon.
  • The same steps work for Android phones. I'm going setting > connected device > Connection settings > bluetooth switch off. (Note: Steps may vary based on your phone model. If these steps don't match your phone, look up or search for Bluetooth.)

Airplane mode also disables things like Bluetooth and Wi-Fi, so while it works in a pinch, it doesn't receive calls or texts.

Steps to clear your inbox every January

3. Skip public USB ports

In spaces like airports and coffee shops, hackers can use them to install malware or steal data. Although actual cases of juice jacking are currently rare in the United States, it is still a real threat. They happen through a USB connection. So if your kiosk has an actual power outlet to charge your phone using its own adapter, you're good to go.

Stay away from USB ports of any size, especially when traveling abroad. The USB standard is international, and foreign hackers can target a hotel or rental USB port and steal data, even if you're not using a kiosk.

More and more public kiosks have wireless charging pads instead of USB. This method does not exchange data directly with your phone, so it is virus-free by default.

If you're desperate for juice, you can safely use the USB connection. Use the right cable. pack a charging only cable for your travels. They are cheap, compact, and do not allow data transfer.

Computer, male hand using internet and social media, close up

A businessman is seen working on a laptop. (istock)

4. Don't use public Wi-Fi

It's a snooper's playground. Public Wi-Fi is open to everyone, and all devices are susceptible, including smartphones, laptops, and tablets.

Just because a public Wi-Fi network pops up and asks if you want to join, doesn't mean it's legal. If you're at a coffee shop or hotel, ask the employee for the specific name of the Wi-Fi network. Scammers sometimes create networks of so-called “coffee shops” or “hotel guests” to make you believe you are connecting with the real thing when in fact you are not.

A good rule is: If a username and password are required to log in, you should only access that site from your own private network. If you need to access sensitive sites or information on a public network, do not do so without a VPN enabled.

AI isn't going anywhere. inspires you to make life easier

5. Cover the microphone and camera

The NSA says it's best to drown the microphone and use a protective case to cover the camera when it's not in use.

In a “hot miking” attack, a hacker activates your microphone without your knowledge so that they can listen to your conversations. This occurs when your device is compromised in some way, usually through malware or an app leveraging permissions. Most people aren't targets of attacks like this, but better safe than sorry.

Start with app permissions and check the access you have distributed.

  • Apple iPhone: I'm going setting > Privacy and securityand examine the list of apps and the permissions they have.
  • Google Pixel: open setting > Security and privacy > privacy > Permission manager.
  • Samsung Galaxy: I'm heading to setting > Security and privacy > permission manager.
A woman is using a phone at the airport

A woman uses a smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

Hackers aren't the only ones to worry about. Most of what you type, for example your searches and purchases, is tracked in some way.

The only impossible layer of security is physically blocking the sound or camera feed. There are expensive cases to work with. microphone blocker About $10.

Slide into the headphone port to stop recording. An adapter is required unless your phone already has an audio jack. For an inexpensive DIY option, grab your oldest corded headphones, cut them up, and plug them into the adapter.

Pro tips: If your phone's microphone is turned on or has been accessed recently, you'll see a small orange dot at the top of the screen. you will see a green dot If the camera is in use or has recently recorded.

While this is in your mind, take it a step further. Here is this: Quick 5 minute phone cleanup I like to do it a few times a year.

Click here to get the Fox News app

Get Tech-Smarter on your schedule

Award-winning host Kim Commando is your secret weapon for navigating technology.

Copyright 2025, Weststar Multimedia Entertainment. Unauthorized reproduction is prohibited.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News