Protect Your Privacy: 5 Smartphone Habits Recommended by the NSA
How many times do you reboot your mobile device? Does your Bluetooth ever stay off? Do you just use the first charger you find? If you answered yes to any of these, the National Security Agency (NSA) cautions you that you might be compromising your privacy. As a surveillance and communications collector, the NSA is very familiar with all those vulnerabilities that can be exploited.
To help keep your data safe, here are five key smartphone security habits you should adopt:
A simple effective habit is restart your phone weekly. Switch your phone off. Wait for something like 10 seconds. This will turn back on your cell phone. And this will really help counter all zero-click attacks, which may allow hackers in without any requirement of you reacting to the issue. But other types of malware will not remove by a hard reset. Hence, if malware has entered it, a device may need complete factory reset before using it once again.
Bluetooth, like Wi-Fi and cellular networks, allows for easy connections, but it also presents security risks. Hackers and scammers in close proximity can exploit Bluetooth vulnerabilities to hijack your phone.
– On an iPhone, go to Settings > Bluetooth and toggle it off. Alternatively, swipe down from the top right corner and tap the Bluetooth icon.
– On an Android, go to Settings > Connected Devices > Connection Preferences > Bluetooth and turn it off. (Steps may vary depending on your phone model.)
– Airplane mode also disables Bluetooth and Wi-Fi, but keep in mind that it will also block calls and texts.
Aside from security, turning off Bluetooth can also help conserve battery life.
The public USB charging stations you see at the airport, in a hotel lobby, or a cafe are great ways for hackers to execute “juice jacking,” installing malware or extracting data from USB connections. It is not often done, but it can be done.
Use your own charging adapter at a power outlet instead of a public USB port.
– If you have to use a USB port, carry a charge-only cable, which prevents data transfer while charging.
– Use wireless charging stations, as they do not transfer data, making them a safer option.
Public Wi-Fi is a playground for hackers. It is mainly not secured as well, where the cyber thieves will easily read all your details. Scammers often set fake networks named in terms of, “Free Wi-Fi” or “Hotel Guest” that convinces you into getting connected in exchange for divulging sensitive details.
Attackers can turn on your microphone or camera without your consent in a “hot-miking” attack. This typically occurs via malware or apps taking advantage of permissions granted.
– Carry a phone case that physically covers the camera and muffles the microphone when the phone is off.
– Review and limit app permissions:
– iPhone: Open Settings > Privacy & Security to check permissions for every app.
– Google Pixel: Go to Settings > Security and privacy > Privacy > Permission manager
– Samsung Galaxy: See Settings > Security and privacy > Permission manager.
– Use a mic blocker, a small device that plugs into your headphone jack to prevent unwanted audio recording. If your phone lacks a headphone jack, you may need an adapter.
Pro Tip: Your phone provides visual indicators when the microphone or camera is in use. A small orange dot appears when the microphone is active, while a green dot indicates the camera is in use or was recently accessed.