Hackers, Scammers, and Advertisers Are After You: 5 Smartphone Security Steps You Should Take Right Now



[ad_1]

Go anywhere online and you’ll feel like someone is watching you. It’s because, well, they are.

Did you know that there is a secret announcer number that hides your smartphone? It can easily be traced directly to you and reveals things like your physical address and IP address. Tap or click the steps to stop this intrusive tracking.

This is just one of the many trackers, IDs, maps, and settings that collect your information. Most often, this data is all packaged and sold to the highest bidder. (Sorry, you don’t get a cut.) Tap or click for 8 cards and trackers you need to know about.

If you want to take security seriously, you need to go beyond the usual steps.

1. Activate the USB restricted mode

Have you ever charged your iPhone or iPad in a public place, on a plane, or at work? You need to enable USB Restricted Mode. Why is this important? This helps prevent what is called “juice jacking”, which is when malware can be installed on a device or information can be stolen through the USB charging port.

To activate USB restricted mode, select Settings > Facial identity and access code > enter your password. Scroll down to the section titled “Allow Access When Locked” and make sure the option titled “USB Accessories” is enabled. disabled.

Public charging stations in places like airports and coffee shops are convenient, but they put your data at risk. Tap or click for a solution if you’re charging on the go and don’t want to turn off your USB settings.

HIGH SCHOOL STUDENT BUILDS WHEELCHAIR STROLLER TO HELP FATHER WALK HIS NEWBORN

2. Automatically clear data

You must also enable Clear data. With this option enabled, iPhone will erase all data after ten failed password attempts, making it unlikely that someone could break into your phone.

To select Settings > Facial identity and access code > enter your password. At the bottom of the menu you will see “Clear data”. Toggle the switch to the right to activate this setting.

Disclaimer: If you have children, backing up regularly is essential. Otherwise, you could lose everything if a little one picks up your phone and tries to unlock it without success more than ten times.

To make sure your iCloud backups are turned on, go to Settings > [your name] > iCloud > ICloud backup. Turn on ICloud backup. To perform a manual backup, press Save now.

3. Stop snoopers

A password or passcode protecting your phone is essential, but did you know you can do the same for individual apps? It’s clear with Android and a bit more complicated if you have an iPhone.

For Android, third-party apps like Smart AppLock let you use your fingerprint or choose between pattern locks or a PIN code to restrict access. Smart AppLock also sends you burglary alerts when someone tries to open an app with an invalid code. Convenient! Tap or click here to access direct download links and other options.

If you have an iPhone, your best bet is a little-known feature called Guided Access. It takes a few steps to get this up and running. Once you’ve done that, the Guided Access start screen will appear, allowing you to turn off or lock particular parts of your screen or the entire screen. Locking the whole screen will be the easiest way to lock an app.

Tap or click for full steps and one more tip to limit app access, screen time limits.

Istanbul, Turkey - February 2, 2019: Woman using smart phone on wooden desk.  The smartphone is an iPhone 8. The iPhone is a touchscreen smartphone developed by Apple Inc.

Istanbul, Turkey – February 2, 2019: Woman using smart phone on wooden desk. The smartphone is an iPhone 8. The iPhone is a touchscreen smartphone developed by Apple Inc.

TEEN BROTHERS STARTS A FREE ONLINE TUTORING SERVICE FOR CHILDREN WHO FIGHT WITH DISTANCE LEARNING

4. Remove prying apps

Almost every app these days tracks at least a few things about you. The best thing you can do to keep your data private is to avoid sharing it. Yes, apps collect information directly from your device, but you can make a dent by leaving as many fields blank on your profiles as possible or even including fake information.

Perform a privacy check on your smartphone to make sure apps aren’t collecting data they don’t need.

On an iPhone:

  • Open Settings, then scroll down and press the Privacy icon.
  • Select a permission, such as Calendar, Location services, or Camera.
  • Choose which apps should have access to this permission and remove the permissions for the apps you don’t want access to.

On an Android phone:

  • Open Settings, then tap Apps and notifications, followed by Advanced app permissions.
  • Select a permission and choose which apps should have access to that permission. Remove permissions for any apps you don’t want to keep tabs on.

THE MORE YOU KNOW: 10 apps you should remove from your phone now

CAN CELLULAR PHONES CAUSE CANCER? 5 STEPS TO MINIMIZE RISK

5. Password security

You know you need strong passwords, but the appeal of easy-to-remember passwords that you’ve used multiple times is strong. Don’t just hope for the best. Find your bad passwords and banish them for good.

Keychain password reuse audit (for iOS)

Safari stores your passwords in Keychain, which you can access from your Apple or iCloud devices. Your passwords are checked against a list of broken passwords. This feature is enabled by default with iOS 14.

Go to Safari > Preferences > Passwords and look under “Security recommendations” to see if any of your passwords have been compromised. If so, you will be prompted to update your password with a stronger password.

Google password verification for Android

Chrome’s password checker is built into the password manager. Here you can see if your passwords have been compromised and which are weak and need to be changed. Go to passwords.google.com and select Password verification > Check passwords.

Every year a list of the most used bad passwords is posted, and every year I shake my head. Tap or click to see if any of yours are in the top 20. If they did, change them!

Bonus tip: is your boss watching your every move?

Check out my “Kim Komando Explains” podcast on Apple, Google Podcasts or your favorite podcast player.

With invasive software, businesses can track your every click, keystroke and movement, even outside of working hours. In this episode, security researcher Cooper Quintin reveals how so-called bossware works, what it tracks, and just how bad things can go when organizations use it to see everything you’re doing.

CLICK HERE TO GET THE FOX NEWS APP

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen or watch The Kim Komando Show on your phone, tablet, TV or computer. Or tap or click here for Kim’s free podcasts.

Copyright 2021, WestStar Multimedia Entertainment. All rights reserved. By clicking on the purchase links, you are supporting my research. As an Amazon Associate, I earn a small commission on qualifying purchases. I only recommend products that I believe in.

Check out all the latest tech on The Kim Komando Show, the nation’s biggest weekend radio talk show. Kim takes calls and gives advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacking. For her daily tips, free newsletters and more, visit her website at Komando.com.

[ad_2]

Source link