Can’t remember the last time you turned off your phone? Is your Bluetooth always on? Is it connected to the charger you found?
Win $329 Ray-Ban Meta Smart Glasses. Please enter here. No need to purchase.
If you answer yes to any of these questions, the NSA claims you are abusing your privacy. The purpose of the National Security Agency is to intercept and collect communications from satellites, cell phones, and anywhere else.
These mistakes can lower your credit score
Let’s take a closer look at their five smartphone rules that you can follow too.
1. Restart your phone once a week
It’s very simple and definitely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to counter zero-click exploits, where hackers can break in by simply submitting the correct code.
Note: Restarting does not work for other types of malware. If your phone is infected, you will need to perform a complete factory reset.
2. Disable Bluetooth if not needed
Bluetooth works similarly to Wi-Fi and cellular networks, but performs simpler tasks over shorter distances. Bluetooth does not require a cellular signal or network connection and uses no data. Also, like any connection, it is not 100% secure.
The driver was photographed holding an iced coffee and a cell phone inside the vehicle. (St. Petersburg)
To hijack your phone using Bluetooth, a hacker or scammer must be near you. But in public, you’re at arm’s length from strangers.
NSA advice: Turn off Bluetooth when you’re not using it. It also helps with battery life.
On iPhone, go to (Settings) > (Bluetooth) and turn off Bluetooth. You can also swipe down from the top right of the screen to open Control Center and tap the Bluetooth icon. The same steps work for Android smartphones as well. Go to (Settings) > (Connected Devices) > (Connection Settings) > (Bluetooth) and turn it off. (Note: Steps may vary depending on your phone model. If these steps don’t match your phone, look for or search for Bluetooth.)
Airplane mode also disables things like Bluetooth and Wi-Fi, so it works in an emergency, but you won’t be able to receive calls or text messages.
Steps I take to empty my inbox every January
3. Skip public USB ports
In spaces like airports and coffee shops, hackers can use them to install malware or steal data. Actual cases of juice jacking are currently rare in the United States, but they remain a real threat. These are done through a USB connection, so as long as your kiosk has an actual power outlet to charge your phone using its own adapter, you’ll be fine.
Stay away from USB ports of any size, especially when traveling abroad. USB standards are international, and even if you’re not using a kiosk, foreign hackers can target your hotel or rental’s USB ports and steal your data.
More and more public kiosks are equipped with wireless charging pads instead of USB. This method does not exchange data directly with your phone, so it is not infected by viruses by default.
If you really need juice, you can safely use a USB connection with the appropriate cable. Please prepare a dedicated charging cable for your trip. It is cheap and compact, but cannot transfer data.


A businessman is seen working on a laptop. (St. Petersburg)
4. Don’t use public Wi-Fi
It is a playground for voyeurs. Since public Wi-Fi is available to everyone, all devices are affected, including smartphones, laptops, and tablets.
Just because you see a public Wi-Fi network and are asked if you want to join doesn’t mean it’s legal. If you’re at a coffee shop or hotel, ask the employee for the specific name of the Wi-Fi network. Scammers sometimes create networks called “coffee shops” or “hotel guests” to trick you into believing they are connecting to a genuine connection when in fact they are not.
A good rule of thumb is: If a username and password are required to log in, you should only access the site from your own private network. If you need to access sensitive sites or information on a public network, do not do so without enabling a VPN.
AI isn’t going anywhere: A push to make life easier
5. Cover your microphone and camera
The NSA says it’s best to drown out the microphone and use a protective case to cover the camera when not in use.
In a “hot miking” attack, a hacker can activate your microphone and eavesdrop on your conversations without you knowing. This happens if your device is compromised in any way. Usually through malware or apps that abuse the permissions granted. Most people wouldn’t be the target of an attack like this, but I’d rather be safe than sorry.
Start with your app’s permissions and see what access you’ve granted it.
Apple iPhone: Go to Settings > Privacy & Security to see the list of apps and the permissions they have. Google Pixel: Open Settings > Security & Privacy > Privacy > Permission Manager. Samsung Galaxy: Go to (Settings) > (Security & Privacy) > Permission manager.


A woman uses her smartphone while waiting to board a flight at Dallas-Fort Worth International Airport. (Robert Alexander/Getty Images)
Hackers aren’t the only things to worry about. Most things you type, say, search for, and buy are tracked in some way.
The only layer of security that cannot be hacked is physically blocking the audio or camera feed. There are expensive cases on the market that have this feature, but you can also purchase a microphone blocker for about $10.
Slide it into the headphone port to stop recording. If your phone doesn’t have an audio jack, you’ll need an adapter. For a cheaper DIY option, take your oldest corded headphones, cut them up, and connect them to an adapter.
Pro tip: If your phone’s microphone is turned on or has been accessed recently, you’ll see a small orange dot at the top of your screen. A green dot will appear if the camera is in use or has recently recorded.
With this in mind, go one step further. Here’s a quick 5-minute phone cleanup that I do a few times a year.
CLICK HERE TO GET THE FOX NEWS APP
Incorporate technology wisely into your schedule
Award-winning host Kim Commando is your secret weapon for navigating technology.
Copyright 2025, WestStar Multimedia Entertainment. Unauthorized reproduction is prohibited.