Connect with us

Technology

The NSA says do these 5 things with your phone right now

Published

on

The NSA says do these 5 things with your phone right now

Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really. 

THESE MISTAKES COULD TANK YOUR CREDIT SCORE

Let’s take a deeper look at five smartphone rules they use that you can, too.

Advertisement

1. Restart your phone once a week

It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.

Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

Advertisement

A driver is pictured holding an iced coffee and a mobile phone while in the car. (iStock)

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.

  • On an iPhone, go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.
  • The same steps work for Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and switch it off. (Note: Steps may vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

3. Skip public USB ports

Advertisement

In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. 

If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.

close up of hands of business person working on computer, man using internet and social media

A business person is seen working on a laptop. (iStock)

4. Don’t use public Wi-Fi

Advertisement

It’s a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “Coffee Shop” or “Hotel Guest” to make you believe you’re connecting to the real thing when, actually, you’re not.

Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

5. Cover your mic and camera

Advertisement

The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.

In “hot-miking” attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve handed out:

  • Apple iPhone: Go to Settings > Privacy & Security, and look through the list of apps and what permissions they have.
  • Google Pixel: Open Settings > Security and privacy > Privacy > Permission manager.
  • Samsung Galaxy: Head to Settings > Security and privacy > Permission manager.
A woman uses her phone at an airport

A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.

The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10. 

Advertisement

It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.

Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording. 

While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.

Get tech-smarter on your schedule

Advertisement

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Technology

Netflix’s ad tier is growing really fast — and that means more ads

Published

on

Netflix’s ad tier is growing really fast — and that means more ads

Amy Reinhard, Netflix’s president of advertising, said the streaming service has “the most engaged audience anywhere,” with subscribers on its ad-supported tier spending an average of 41 hours per month on the service.

The new ad formats are part of Netflix’s in-house advertising platform, which is now live in the US after arriving in Canada. It plans to bring the platform to all 12 countries with ad-supported plans by June. “The foundations of our ads business are in place,” Reinhard said. “And going forward, the pace of progress will be even faster.”

Continue Reading

Technology

Fake PayPal email let hackers access computer and bank account

Published

on

Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.

Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.

Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”

John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Advertisement

Fake PayPal scam email (Kurt “CyberGuy” Knutsson)

How this scam works

This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer. 

Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

Advertisement
hacker on laptop

A hacker at work (Kurt “CyberGuy” Knutsson)

THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE

Key takeaways from John’s experience

John’s close call highlights several important lessons.

Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.

Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.

Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.

Advertisement

Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

laptop

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

How to protect yourself from remote access scams

Taking simple but strong security steps can protect you from falling victim.

1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.

Advertisement

2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.

3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.

5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.

6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.

Advertisement

7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.

8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.

9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.

10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

PROTECT YOURSELF FROM TECH SUPPORT SCAMS

Advertisement

Kurt’s key takeaways

John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.

Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta’s beef with the press flares at its antitrust trial

Published

on

Meta’s beef with the press flares at its antitrust trial

Long-simmering tension between Silicon Valley and the press that covers it is surfacing during the Federal Trade Commission’s antitrust trial against Meta.

During a heated cross-examination of the FTC’s key economic expert, Scott Hemphill, Meta’s lead attorney, Mark Hansen, noted that Hemphill joined Facebook co-founder Chris Hughes and former Biden official Tim Wu in pitching regulators on an antitrust probe of the company back in 2019. The pitch deck for the probe that was shown in court included “public recognition” of the company’s aggressive acquisition strategy from two reporters: Kara Swisher, who currently hosts two podcasts for The Verge’s parent company, Vox Media, and Om Malik, the founder of the early tech blog GigaOm who is now a venture capitalist.

In an attempt to undercut Hemphill’s credibility, Hansen caught Swisher and Malik in the crossfire. He called Malik a “failed blogger” with an axe to grind against Meta. He then suggested that Swisher, whom he referred to as a Vanity Fair columnist (she last wrote for the site in 2015), was similarly biased against the company. In court, he projected a headline about her recently calling Mark Zuckerberg a “small little creature with a shriveled soul.”

The 2019 pitch deck shown at court by Hansen also cited a Post story to support that Facebook should be investigated as a monopoly. Meta’s Hansen asked if Hemphill agreed that “The New York Post is a scandal sheet,” to which he replied that he didn’t “have a view one way or another.” Hansen showed the infamous Post front page headline, “Headless Body in Topless Bar,” to make his point.

The exchange resurfaced years-old tensions between the press and tech titans. After experiencing relatively positive coverage during the early, aspirational days of Silicon Valley, Facebook and a handful of startups grew to become the largest platforms in the world. Along the way, they’ve chafed at increasingly critical coverage of their businesses.

Advertisement

Malik and Swisher have indeed both criticized Meta and its executives. In 2016, Malik critiqued Facebook’s intentions for offering free access to its apps and others in India, after board member Marc Andreesseen blamed local resistance to the program on “anti-colonialism” in a later-deleted tweet. “I am suspicious of any for-profit company arguing its good intentions and its free gifts,” Malik wrote at the time.

It was not the first time Meta has pointed a finger at the media while at trial

Tuesday’s exchange was not the first time that Meta has pointed a finger at the media while at trial. When discussing major scandals like Cambridge Analytica from the witness stand, company leaders have chalked up downswings in user sentiment to negative media attention and testified that Meta’s services haven’t seen comparable declines in engagement.

The FTC has argued that this fact is a sign of monopoly power because people can’t leave Facebook and Instagram without viable alternatives. A judge will ultimately decide if that is true or not. In the meantime, Meta’s grudges with the press are on full display.

Advertisement
Continue Reading
Advertisement

Trending