Connect with us

Technology

Your phone shares data at night: Here’s how to stop it

Published

on

Your phone shares data at night: Here’s how to stop it

NEWYou can now listen to Fox News articles!

If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

What data your phone sends while you sleep

Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

Legitimate system data

This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

Advertisement

Tracking and advertising data

This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

What we know about phone tracking today

Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

Advertisement

There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

How to protect yourself from overnight data sharing

You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

1) Review app permissions

Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

How to review app permissions on iPhone 

Advertisement
  • Open Settings
  • Tap Privacy & Security
  • Tap Location ServicesMicrophoneCamera or Tracking
  • Select an app from the list
  • Choose While Using the App or Never when available

For tracking controls:

  • Go to Settings
  • Click Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

How to review app permissions on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy 
  • Click More privacy settings 
  • Tap Permission Manager
  • Select LocationMicrophoneCamera or Sensors
  • Tap an app and choose Allow only while using the app or Don’t allow

To review background access:

  • Go to Settings
  • Click Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data if the app does not need constant access

This limits silent data transfers when the app is not actively open.

2) Limit background activity

Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

Advertisement

How to limit background activity on iPhone

Turn off Background App Refresh

  • Open Settings
  • Tap General
  • Tap Background App Refresh
  • Tap Background App Refresh at the top
  • Select Off or Wi-Fi

To disable it for specific apps:

  • Stay on the Background App Refresh screen
  • Toggle off apps that do not need to update in the background

This prevents apps from quietly syncing data when they are not open.

How to limit background activity on Android 

Settings may vary depending on your Android phone’s manufacturer.

Restrict background data

Advertisement
  • Open Settings
  • Tap Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data

Restrict background battery usage

  • From the app’s settings screen, tap Battery
  • Select Restricted or Limit background usage

This reduces background syncing and prevents apps from running silently when you are not actively using them.

3) Turn off personalized advertising

Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

How to turn off personalized ads on iPhone

  • Open Settings
  • Tap Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

To limit Apple ads:

  • Go to Settings
  • Click Privacy & Security
  • Tap Apple Advertising
  • Turn off Personalized Ads

This reduces ad targeting based on your activity within Apple services.

TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

How to turn off personalized ads on Android

Advertisement

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy
  • Click More privacy settings
  • Tap Ads or Advertising
  • Tap Delete advertising ID or Opt out of Ads Personalization
  • Click Delete advertising ID

You can also reset your advertising ID from this menu to break the link between past activity and future ads.

This limits how apps and advertisers track behavior across apps and websites.

4) Consider a VPN

A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Remove your data from broker sites

Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

Advertisement

Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Use airplane mode or power off at night

If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

Advertisement

How to turn on airplane mode on iPhone

  • Open Control Center by swiping down from the top right corner
  • Tap the airplane icon so it turns orange
  • Confirm that cellular, Wi Fi and Bluetooth turned off

How to turn on airplane mode on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Swipe down from the top of the screen to open Quick Settings
  • Tap the airplane mode icon
  • Check that mobile data, Wi Fi and Bluetooth are disabled

If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

Advertisement

Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Advertisement

Technology

Time’s running out to get a free gift card when you preorder a new MacBook

Published

on

Time’s running out to get a free gift card when you preorder a new MacBook

This has been a week to remember here at The Verge. MWC 2026 in Barcelona lead straight into Apple’s week of product announcements. There was truly something for everyone, whether you’ve been wanting a company to make a phone that can start fires, or had your fingers crossed for a brand-new MacBook model that costs just $599.99. It was also a great week for gaming, with the launch of Slay the Spire 2 on Steam as an early access game, plus Pokémon Pokopia on Nintendo Switch 2, and Marathon on PC and PS5.

It was also a pretty good week when it comes to deals, especially if you’re in the market for new hardware. You can nab a free gift card with a preorder of early 2026’s most anticipated tech launching on March 11th, including Apple’s new MacBooks, plus Samsung’s lineup Galaxy S26 phones. Let’s not forget that Google’s Pixel 10A launched this week, and the gift card promo for that is happening through March 11th.

Here are this week’s best deals.

March 11th is a big day for tech launches. That’s when every product that Apple announced this past week will ship and hit shelves, including its M5-powered MacBook Air, its MacBook Pro models equipped with the M5 Pro and M5 Max processors, its affordable new MacBook Neo, the M4 iPad Air, plus two new Studio Displays. But wait, there’s more! Samsung’s Galaxy S26, the S26 Plus, and S26 Ultra launch that day, too.

With a couple exceptions (the Studio Displays and the iPad Air), you can get a gift card when you buy any of those products right now. Best Buy is the source for gift cards on most of Apple’s latest gear (including $25 with the MacBook Neo, $50 with the MacBook Air, or $100 with the MacBook Pro), while you can get one with any of Samsung’s new Galaxy S26 phones at Amazon (ranging from $100 to $200, depending on the model). Let’s not forget about the Google Pixel 10A, which launched March 5th and includes a $100 gift card through March 11th at Best Buy and Amazon.

Advertisement

Spring is in the air, and that means the return of many things: warmer weather, beautiful green leaves on trees, and bugs. Alright, I’m not excited about bugs, but I am excited about the return of the creatures who feast a lot of them — birds! I’m tempted to get a camera-equipped bird feeder this year, in part to let my toddler get a close look at hummingbirds, and one of the most appealing models out there is 37 percent off. Birdbuddy’s Smart Hummingbird Feeder Pro Solar is down to $189 at Birdbuddy and just $10 more at Chewy.

This model is powered by its solar panel, which works even on cloudy days (it can be recharged via USB-C if where you place it doesn’t get enough sun). Its motion-activated camera can capture 5-megapixel stills, slow motion footage, and HDR video of hummingbirds doing their thing. While these birds are often too quick to fully appreciate with the naked eye, this feeder will give you access to view them leisurely from the company’s companion app. There’s a Birdbuddy Premium subscription that starts at $69.99 per year that lets you name birds and track returning visitors, plus other features, but the base bird-viewing experience doesn’t cost extra.

If you’re into first-person shooters, you’ve probably heard of — and possibly already own — Marathon, Bungie’s anticipated PvPvE multiplayer title that’s a modern remake of one of the studio’s first games in the 1990s. The game just launched on PlayStation 5 and PC for $39.99, and you can get a small deal on the Steam PC version. Fanatical is selling Steam keys for $34.39, which is a 14 percent discount. Nothing huge, but it’s a nice price cut.

Several of us here at The Verge are playing Marathon, and are digging it so far. Its art style is unlike any other game, and admittedly, it has me strongly considering buying an OLED gaming monitor to enjoy. I need to see those neon colors pop.

Other great deals you might have missed this week

Advertisement
Continue Reading

Technology

Fake Spotify voting scam exposed

Published

on

Fake Spotify voting scam exposed

NEWYou can now listen to Fox News articles!

It started with a simple favor. A friend asked for help voting so he could co-host a major podcast event with Spotify and Google. The first message looked casual. It felt personal. It even had urgency.

“Hey, I need a quick favor,” the message read. “I’m in the running to co-host a major podcast event with Spotify & Google. It’d mean a lot if you could drop a vote for me. Appreciate you!”

I almost clicked. Then I noticed the link. That one detail likely saved multiple accounts. Then came a follow-up text that turned up the pressure: “Please vote for me, I would really appreciate it as the voting will be ending today.”

A final message read, “Thanks, please send me a screenshot after you voted.”

Advertisement

That is when it stopped feeling like a favor and began to feel like a setup. Let’s break down what is really going on here.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

The scam unfolds in stages, starting with a friendly request and escalating to pressure and a demand for a screenshot to confirm you took the bait. (Kurt “CyberGuy” Knutsson)

What this Spotify voting text scam looks like

The message claims someone needs your vote to co-host a podcast event with Spotify and Google. It includes a link that looks official at first glance. But look closely.

The URL reads: spotifyprime-hub.ct.ws

Advertisement

That is not spotify.com. Major companies do not run events on random domains like ct.ws. Scammers register cheap lookalike domains because they are easy to create and hard to notice in a quick scroll. That tiny detail is the first red flag.

What the fake voting page looks like

The site looks clean. It feels polished and official. It even claims to be powered by Google. Then it gives you three options:

  • Continue with Instagram
  • Continue with Email
  • Continue with X

That is when you need to stop. This is not about voting. It is about collecting your login credentials.

ROBINHOOD TEXT SCAM WARNING: DO NOT CALL THIS NUMBER

The fake voting page looks convincing, but the login buttons reveal it is designed to steal your social media credentials. (Kurt “CyberGuy” Knutsson)

What gives this scam away?

If you slow down and look closely, several clear red flags jump out right away.

Advertisement

1. The web address

The domain is wrong. It is not spotify.com or google.com. Instead, it uses a random third-party address. That alone should stop you in your tracks.

2. The urgency

“Voting ends today.” “It would mean a lot.” Scammers rely on emotion and pressure. When you feel rushed, you stop analyzing. That is the goal.

3. The login buttons

A real voting page would not require your Instagram, email or X login. The moment a site asks you to sign in with unrelated platforms, you should assume credential harvesting, which is when scammers trick you into entering your username and password so they can steal your account.

What actually happened to someone who fell for it?

Here is what one victim shared after clicking:

“So I got that Twitter DM from a friend last week. I signed in to vote for him. It didn’t work. Then, a day later, they hacked my account and locked me out before I could change my password. I am still locked out, and it is apparently doing it to other people. Another friend got it from me and also got hacked and is locked out. They are trying to extort him to get access back. And today they tried to get into my bank accounts. It has been miserable.”

Advertisement

This is how fast it spreads. One login becomes 10. Ten becomes hundreds. It turns into a chain reaction.

What the scammers do after you log in?

The process is simple and brutal. First, you enter your username and password. Next, the scammer logs into your account within minutes. Then they change your password and recovery email. After that, they send the same “vote for me” message to everyone in your contacts.

If you reuse passwords, they may try those credentials on email, banking or shopping sites. This is a classic account takeover phishing scam.

Why do scammers ask for a screenshot?

This part is clever. After you “vote,” they ask for proof in the form of a screenshot. Here is why. First, it confirms you completed the login. Second, screenshots can expose usernames, email addresses or other visible details. Third, it keeps you engaged so you do not immediately realize something went wrong. However, the damage usually happens the moment you enter your credentials.

“We’re aware of phishing messages falsely claiming to be associated with Spotify and other brands,” a Spotify spokesperson told CyberGuy. “These messages are not from Spotify, are not connected to any official Spotify event or activity, and are not occurring on the Spotify platform. We encourage people to remain vigilant and avoid clicking on suspicious links.”

Advertisement

Meanwhile, a Google spokesperson pointed us to the company’s online guide for spotting and avoiding scams.

MICROSOFT ‘IMPORTANT MAIL’ EMAIL IS A SCAM: HOW TO SPOT IT

The Spotify logo is displayed on a screen on the floor of the New York Stock Exchange in New York on May 3, 2018. (REUTERS/Brendan McDermid/File Photo)

How to protect yourself from the Spotify voting scam

Now let’s talk prevention.

1. Always check the full URL

Look beyond the brand name in the message. If the domain is not the official company domain, do not click.

Advertisement

2. Slow down when you feel urgency

Scammers manufacture pressure. Real friends can wait.

3. Turn on two-factor authentication (2FA) 

Use app-based two-factor authentication (2FA) whenever possible. It adds a critical barrier.

4. Use strong antivirus software on your devices

Strong antivirus software can block known phishing sites, warn you about suspicious links and help prevent malicious downloads before damage is done. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

5. Never reuse passwords

Use a password manager to generate unique passwords for every account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

6. Verify with the person directly

If a friend sends something unusual, call or text them separately and ask if they meant to send it.

Advertisement

7. Check login activity regularly

Most social platforms let you review active sessions. If you see a login from an unfamiliar location or device, log out of all sessions immediately.

What to do if you already clicked

  • If you did not click, delete the message and warn your friend.
  • If you did click and enter credentials, act fast.
  • Change the password immediately.
  • Enable two-factor authentication.
  • Review login activity.
  • Change any other accounts that use the same password.

Time matters here, so don’t put this off.

Kurt’s key takeaways

There is no Spotify and Google podcast voting event running on a random ct.ws domain. The entire operation exists to steal social media credentials, hijack accounts and spread further. It looks polished. It feels personal. That is what makes it effective. The next time someone asks you for a quick vote, pause and inspect the link. That small moment of skepticism can prevent days of damage.

If a message came from someone you trust, would you still stop to inspect the link before clicking? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

YouTube TV billing scam emails are hitting inboxes
Continue Reading

Technology

DJI will pay $30K to the man who accidentally hacked 7,000 Romo robovacs

Published

on

DJI will pay K to the man who accidentally hacked 7,000 Romo robovacs

On Valentine’s Day, I brought you a story that’s since made headlines all around the world: How one man, just trying to steer his DJI robot vacuum with a PlayStation gamepad, discovered an entire network of 7,000 remote-control DJI robots ready to let him peek into other people’s homes.

To be clear, DJI had already begun addressing some of the related vulnerabilities before the man, Sammy Azdoufal, showed The Verge just how much he could access. But it wasn’t clear whether DJI would pay him for his discovery, particularly after how it treated security researcher Kevin Finisterre back in 2017 — or how soon DJI might fully patch the additional vulnerabilities that Azdoufal discovered.

Today, we have some of the answers.

DJI will pay Azdoufal $30,000 for one single discovery, according to an email he shared with The Verge, without specifying which discovery it’s paying him for. Though DJI is not naming Azdoufal, it confirms to The Verge it has “rewarded” an unnamed security researcher for their work.

DJI would also not tell us which discovery it’s paying him for, but says it has already addressed the extra vulnerability Azdoufal found where someone can view a DJI Romo video stream without needing a security pin. “We can confirm that the PIN code security observation was addressed by late February,” reads a statement provided by DJI spokesperson Daisy Kong.

Advertisement

You might be wondering: What about the vulnerability that seemed so bad we refused to describe it in our original story? DJI tells me it’s working on that one too: “We have also started upgrading the entire system. This includes a series of updates, which we anticipate will be fully implemented within one month.”

DJI has also published a public blog post today about strengthening the DJI Romo’s security, one where it continues to claim that it discovered the original issue itself, while also crediting “two independent security researchers” for finding the same problem.

There, DJI seems to be suggesting that everything’s already resolved with the Romo: “Updates have been deployed to fully resolve the issue.” But again, there wasn’t just one vulnerability, and DJI told The Verge that it could take as long as another month.

In the blog post, DJI also says that the Romo already has ETSI, EU, and UL certifications for security — which may raise questions about how useful those certifications really are if one guy with Claude Code could access an entire network full of robovacs! — and that it will continue to test, patch, and submit the Romo and its app to independent third-party security audits.

DJI writes that it is “committed to deepening our engagement with the security research community, and we will soon introduce new ways for researchers to partner and collaborate with us.”

Advertisement
Continue Reading
Advertisement

Trending