Texas

Hackers, scammers and advertisers are chasing you: 5 smartphone security steps to do now

Go anywhere online and you’ll feel like someone is watching. Well, that’s why.

Did you know that there is a secret advertiser ID that hides your smartphone? It can be easily traced directly to you and reveals things like your physical address or IP address. Tap or click for instructions to shut down this annoying tracking.

This is just one of many trackers, identities, maps, and settings that collect information. In most cases, all this data will be packaged and sold to the winning bidder. (Sorry, you can’t get the cut.) Tap or click to see the eight maps and trackers you need to know.

If you want to take security seriously, you need to go beyond the normal steps.

1. Turn on USB restricted mode

Have you ever charged your iPhone or iPad in a public place, on an airplane, or at work? USB restricted mode must be turned on. Why is this important? This helps prevent what is called “juice jacking” where malware can be installed on your device or information can be stolen through a USB charging port.

To turn on USB restricted mode Setting >> >> Face ID and passcode > Enter your passcode. Scroll down to the “Allow access on lock” section and make sure the option “USB accessories” is toggled off..

Public charging stations such as airports and coffee shops are convenient, but data is compromised. If you’re charging on the go and don’t want to disable the USB settings, tap or click to see the solution.

Help high school students build wheelchair strollers to help fathers walk newborn babies

2. Automatic data erasure

You also need to enable data erasure. When this option is turned on, the iPhone wipes all data after 10 failed passcode attempts. This makes it less likely that someone will force you into your phone.

select Setting >> >> Face ID and passcode > Enter your passcode. “Clear Data” is displayed at the bottom of the menu. To enable this setting, toggle the button to the right.

WARNING: If you have children, it is important to back them up regularly. Otherwise, if a little person gets your phone and tries to unlock it more than 10 times, you can lose everything.

To make sure iCloud backup is turned on Setting >> >> [your name] >> >> iCloud >> >> iCloud backup..order on iCloud backup.Tap to perform a manual backup Backup now..

3. Stop snooping

A passcode or password to protect your phone is essential, but did you know that individual apps can do the same? It’s clear on Android and a bit more complicated if you have an iPhone.

For Android, third-party apps such as Smart AppLock allow you to use your fingerprint or select a pattern lock or PIN to restrict access. Smart AppLock also sends an intrusion alert when someone tries to open the app with invalid code. handy! For direct download links and other options, tap or click here.

If you have an iPhone, the best bet is a lesser-known feature called Guided Access. It takes a few steps to get it up and running. When you do this, you will be taken to the Guided Access Start screen, where you can disable or lock a specific part of the screen or the entire screen. Locking the entire screen is the easiest way to lock your app.

Tap or click to see the complete steps and other tricks to limit access to the app and screen time limits.

Istanbul, Turkey-February 2, 2019: A woman using a smartphone on a wooden desk. The smartphone is iPhone 8. iPhone is Apple Inc. It is a touch screen smartphone developed by.

Teen siblings launch free online tutoring service for children suffering from distance learning

4. Clean up your favorite apps

These days, almost every app keeps track of at least a few things about you. The best thing you can do to keep your data private is to avoid sharing it. Yes, the app collects information directly from the device, but you can create a dent by leaving as many fields in the profile blank or by including disinformation.

Perform a privacy check on your smartphone to make sure the app isn’t collecting unnecessary data.

For iPhone:

  • Open Setting, Then scroll down, privacy icon.
  • Select permissions for calendar, location services, camera, and more.
  • Select an app that can access that permission and remove the permission for the app you don’t want to access.

For Android phones:

  • Open Setting, Then tap Apps and notifications, followed by Advanced app permissions..
  • Select a permission and then select an app that can access that permission. Remove permissions for apps that you don’t want to keep tabs on.

As you know: 10 apps you need to remove from your phone right now

Can Mobile Phones Cause Cancer?5 steps to minimize risk

5. Password security

We know that strong passwords are required, but the appeal of passwords that are easy to remember and used many times is powerful. You don’t just expect the best. Find the bad password and ban it forever.

Keychain Password Reuse Audit (for iOS)

Safari stores your password in your keychain. You can access your keychain from your Apple device or iCloud. The password is matched against the list of compromised passwords. This feature is turned on by default in iOS 14.

Move to Safari >> >> Environmental setting >> >> password Look under “Security Recommendations” to see if your password has been compromised. In that case, you will be prompted to update your password to a stronger one.

Google password check for Android

Chrome’s password check feature is built into Password Manager. Here you can see if your password has been compromised and which password is vulnerable and needs to be changed. Go to passwords.google.com and Password check >> >> Confirm password..

Every year, a list of the most commonly used fraudulent passwords is published and shakes every year. Tap or click to see if you’re in the top 20. If you are in the top 20, please change it.

Bonus Tip: Does your boss see all your moves?

Check out my podcast “Kim Komando Explains” on Apple, Google Podcasts, or your favorite podcast player.

Invasive software allows businesses to track all clicks, keystrokes, and movements, even during non-working hours. In this episode, security researcher Cooper Quintin sees how so-called bossware works, what to track, and how much things happen when an organization sees everything you’re doing with it. Find out if it can get worse.

Click here to get the Fox News app

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to and watch Kim Command Show on your mobile phone, tablet, TV, or computer. Alternatively, tap Kim’s free podcast or click here.

Copyright 2021, WestStar Multimedia Entertainment. all rights reserved. You support my research by clicking on the shopping link. As an Amazon Associate, I earn a small commission from eligible purchases. I recommend only the products I believe in.

Learn about all the latest technologies at Kim Commando Show, the nation’s largest weekend radio talk show. From smartphones and tablets to online privacy and data hacking, Kim answers the phone and gives advice on today’s digital lifestyle. Visit her website at Komando.com for her daily tips, free newsletters and more.

Hackers, scammers and advertisers are chasing you: 5 smartphone security steps to do now

Source link Hackers, scammers and advertisers are chasing you: 5 smartphone security steps to do now

Back to top button