Technology
The NSA says do these 5 things with your phone right now
Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really.
THESE MISTAKES COULD TANK YOUR CREDIT SCORE
Let’s take a deeper look at five smartphone rules they use that you can, too.
1. Restart your phone once a week
It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.
Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.
2. Disable Bluetooth when you don’t need it
Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.
A driver is pictured holding an iced coffee and a mobile phone while in the car. (iStock)
Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.
The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.
- On an iPhone, go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.
- The same steps work for Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and switch it off. (Note: Steps may vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)
Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.
THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY
3. Skip public USB ports
In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.
Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.
More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default.
If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.
A business person is seen working on a laptop. (iStock)
4. Don’t use public Wi-Fi
It’s a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.
Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “Coffee Shop” or “Hotel Guest” to make you believe you’re connecting to the real thing when, actually, you’re not.
Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.
AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
5. Cover your mic and camera
The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.
In “hot-miking” attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.
Start with app permissions to check what access you’ve handed out:
- Apple iPhone: Go to Settings > Privacy & Security, and look through the list of apps and what permissions they have.
- Google Pixel: Open Settings > Security and privacy > Privacy > Permission manager.
- Samsung Galaxy: Head to Settings > Security and privacy > Permission manager.
A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)
It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.
The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10.
It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.
Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording.
While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Technology
Figma adds more Photoshop-like AI tools for image editing
Figma is launching three new AI-powered creative tools to help users edit their images without jumping to another platform. The new tools are available in Figma Design and Figma Draw, and can be used to quickly remove objects from an image, isolate objects so they can be repositioned, and extend images beyond their previous dimensions.
The Erase object and Isolate object tools are designed to work alongside Figma’s existing lasso tool, which allows users to draw around specific sections of the image they want to edit. Any objects or people within these selections can then be instantly erased from the image while filling in the background behind them, or separated from the background layer to reposition or edit them directly.
The Expand image tool expands the background of an image to fit new aspect ratios “without distortion,” according to Figma. It sounds similar to Adobe’s Generative Expand tool for Photoshop, using generative AI to fill the extended space in a way that blends into the original image. Adobe also has similar AI tools for erasing and isolating objects — Figma doesn’t size up to the vast suite of creative tools available across Adobe’s apps, but introducing its own native features gives Figma users fewer reasons to use other platforms for those editing requirements.
Figma is also launching a new image editing toolbar to house these editing features in one place, alongside existing capabilities like the Remove background tool. These new features are available to Figma users with “Full Seat” access, which is the subscription tier required to unlock all of Figma’s design products. Next year, Figma says it plans to make the new editing tools available across other apps within its platform.
Technology
Why your holiday shopping data needs a cleanup now
NEWYou can now listen to Fox News articles!
If the ads you see in December feel a little too accurate, you are not imagining it.
The holiday shopping season is the busiest time of the year for retailers and for data brokers. These companies quietly track, collect and sell your personal information. Every search, click, cart add and purchase feeds a digital shopping profile tied to your name, phone number, email and address.
If you do not clean it up before the year ends, that profile will follow you into 2026. It fuels more scam calls, targeted ads, identity theft attempts and privacy risks you never agreed to. Here is how your profile forms, why data brokers want it and how to erase it fast.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE
Your digital shopping profile forms every time you browse, click or buy during the holiday season. (iStock)
Your digital shopping profile forms the moment you shop online
Your profile starts forming the second you browse Amazon, Target, Sephora, Walmart or any online store. Every interaction adds new data points, including:
- Items you viewed
- Items you added to your cart
- Purchases and near-purchases
- Shipping and billing addresses
- Total spending
- Preferred brands
- Device type and browser
- IP address and physical location
Activity spikes in November and December. You are searching for gifts, deals, decorations and electronics. Data brokers watch this surge and collect more aggressively.
How data brokers get your information
Data brokers gather your personal information from several places at once. Here are the most common sources.
1) Retailers send your shopping data to third parties
Most retailers use analytics, advertising or measurement partners. These partners are often data brokers. The more companies that handle your information, the higher the risk of exposure.
Marketing tools may analyze personal details such as age, race, gender, location and shopping habits. Even without clear consent, partners often receive:
- Full purchase histories
- Timestamps
- Product categories
- Loyalty account details
Some stores even share in-store behavior when you scan a loyalty card.
2) Shopping apps track far more than what you buy
Apps from Amazon, Temu, Walmart, SheinTarget and others track everything you do. They often collect:
- Real-time location
- Device data
- Contact lists if allowed
- Swipe patterns
- Time spent viewing specific items
This behavioral data becomes extremely valuable to data brokers. It also helps scammers understand how to target you.
Data brokers collect this activity from retailers, apps and tools to build a detailed record of your habits. (iStock)
3) Price-comparison tools copy your browsing habits
Browser plugins that offer price drops or deal matching often collect far more than you expect. An FTC investigation revealed that they can capture details from location and demographics to mouse movements.
Data points like these get packaged, sold and added to your digital shopping profile. Scammers can then build highly targeted attacks.
What scammers can do with your digital shopping profile
Scammers use these profiles to run more convincing attacks during the holiday season. With access to your data, they can:
- Send fake order confirmations
- Launch refund scams
- Send fraudulent delivery texts
- Commit identity theft
- Resell your information to other criminals
If you interact with a scam even once, your profile may be marked as verified. That makes you a priority target for future attacks.
PROTECT YOUR DATA BEFORE HOLIDAY SHOPPING SCAMS STRIKE
Why December is the best month to delete your data
Each January brings a surge in scams, including refund scams, account update scams, IRS scams, Medicare scams and subscription renewal scams. Many of these attacks rely on the holiday shopping data collected in the weeks before.
If you delete your data now, you reduce:
- Scam calls
- Spam emails
- Targeted phishing attempts
- The number of companies holding your personal information
Data brokers must delete your information once you request it. Acting now limits how much of your 2025 activity they can store and resell.
WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE
However, removing your data manually is nearly impossible. You would need to contact and send opt-out requests to:
- People-search sites
- Marketing data brokers
- Retail data aggregators
- Ad-targeting vendors
- Shopping analytics platforms
- Credit-linked identity brokers
One at a time.
The fastest way to delete your digital shopping profile
This is why I recommend using an automated data removal service. They remove your exposed data from hundreds of data broker sites and continue to monitor new threats.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Clearing your data in December reduces scams, cuts targeted tracking and protects your privacy heading into the new year. (iStock )
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Kurt’s key takeaways
Your digital shopping profile may feel invisible, but it shapes the ads you see, the scams you receive and how exposed your personal information becomes. The holiday season gives data brokers more information in two months than they collect during the rest of the year. Use December to clean it up. With a few smart steps and an automated data removal service, you can enter 2025 with fewer scams, fewer trackers and more control over your privacy.
What part of your digital shopping profile surprised you most after learning how data brokers track you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The AI industry’s biggest week: Google’s rise, RL mania, and a party boat
This is an excerpt of Sources by Alex Heath, a newsletter about AI and the tech industry, syndicated just for The Verge subscribers once a week.
Reinforcement learning (RL) is the next frontier, Google is surging, and the party scene has gotten completely out of hand. Those were the through lines from this year’s NeurIPS in San Diego.
NeurIPS, or the “Conference on Neural Information Processing Systems,” started in 1987 as a purely academic affair. It has since ballooned alongside the hype around AI into a massive industry event where labs come to recruit and investors come to find the next wave of AI startups.
I was regretfully unable to attend NeurIPS this year, but I still wanted to know what people were talking about on the ground in San Diego over the past week. So I asked engineers, researchers, and founders for their takeaways. The list below of responses includes Andy Konwinski, cofounder of Databricks and founder of the Laude Institute; Thomas Wolf, cofounder of Hugging Face; OpenAI’s Roon; and attendees from Meta, Waymo, Google DeepMind, Amazon, and a handful of other places.
I asked everyone the same three questions: What’s the buzziest topic from the conference? Which labs feel like they’re surging or struggling? Who had the best party?
The consensus was clear. “RL RL RL RL is taking over the world,” Anastasios Angelopoulos, CEO of LMArena, told me. The industry is coalescing around the idea that tuning models for specific use cases, rather than scaling the data used for pre-training, will drive the next wave of AI progress. What’s clear from the lab momentum question is that Google is having a moment. “Google DeepMind is feeling good,” Hugging Face’s Wolf told me.
The party circuit was naturally relentless. Konwinski’s Laude Lounge emerged as one of the week’s hotspots — Jeff Dean, Yoshua Bengio, Ion Stoica, and about a dozen other top researchers came through. Model Ship, an invite-only cruise with 200 researchers, featured “a commitment to the dance floor that is unprecedented at a conference event,” one of the organizers of the cruise, Nathan Lambert, told me. Roon was dry about the whole scene: “you can learn more from twitter than from literally being there … mostly my on-the-ground feeling was ‘this is too much.’”
Here’s what attendees had to say about NeurIPS this year:
What was the buzziest topic among attendees that you think more people will be talking about in 2026?
Which labs feel like they’re surging in momentum, and which ones feel more shaky?
What was the best party you attended or had FOMO over?
Yes, some people thought keynotes were parties. I guess academia lives on at NeurIPS after all.
-
Alaska5 days agoHowling Mat-Su winds leave thousands without power
-
Politics1 week agoTrump rips Somali community as federal agents reportedly eye Minnesota enforcement sweep
-
Ohio7 days ago
Who do the Ohio State Buckeyes hire as the next offensive coordinator?
-
News1 week agoTrump threatens strikes on any country he claims makes drugs for US
-
World1 week agoHonduras election council member accuses colleague of ‘intimidation’
-
Texas5 days agoTexas Tech football vs BYU live updates, start time, TV channel for Big 12 title
-
Iowa4 days agoMatt Campbell reportedly bringing longtime Iowa State staffer to Penn State as 1st hire
-
Miami, FL4 days agoUrban Meyer, Brady Quinn get in heated exchange during Alabama, Notre Dame, Miami CFP discussion