The only thing you need to do on your phone once a week, leaders warn

Protecting your sensitive information can be as simple as this simple step.


The smartphone of your pocket allows you to shop for home supplies to manage your bank account and your finances. Unfortunately, the convenience of doing so many tasks with a single device can sometimes come to the cost of your stolen personal information. A total corporate industry and cyber-protection has since increased to help people protect their data. But according to some officials, there is a very simple thing that you can do on your phone every week that can be incredibly effective in preventing a major offense. Read it to see what you should do with your device.

RELATED:If you see that on your iPhone, do not click, experts warn.

Disable your phone and phone each week can help protect against pirates.

woman turning off iphone
Refuge

According to a "best practices" guide published by the National Security Agency (NSA),Turn off your phone And back once each week can be an easy way to prevent hackers from accessing your sensitive information. Simple tactics - a common solution as common for most gadgets and technology that it has become a cliché-can work as a major roadblock so that anyone seeking to exploit security vulnerabilities in your device, reports of associated press.

According toNeal Zire, Technical Director of the Cybersecurity Directorate of the NSA, the simple fact of restarting will not be enough to prevent all data violations and theft of data, but it complicates the jobs of long-term computer hackers by making it more difficult Access to your phone. "That's all about the imposition of costs on these malicious actors," he told AP.

Restarting your phone makes it more difficult computer hackers maintain access to your personal data.

a hacker doxing someone online
Refuge

Experts explain that a change in how computer hackers gain access to devices have evolved in recent years. While accidentally downloading a bad program can always lead to a violation, many attacks on phones and tablets now use what is called a "zero click" feat that can settle without warning. "There was this evolution far from having a target click on a Dodgy link"Bill Marczak, a principal investigator of Citizen Lab, a Watchdog on the Internet rights of the Internet at the University of Toronto, told AP.

However, access to a device does not guarantee that a computer hacker will have permanent access to it. Strong security systems integrated with devices and constantly updated can make it almost impossible for digital thieves to permanently sink into the system of a computer. This requires them to use programs called "useful load" more difficult to detect but can not generally survive a system reboot, according toPatrick Wardle, a security expert and a former researcher of the NSA.

RELATED:If you see this message on your Roku, report it immediately, experts say.

A recent report revealed that up-to-date iPhones could be hacked without even clicking on a link.

Cropped shot of an unrecognizable man using a smartphone while sitting indoors
exit

Unfortunately, the task of maintaining digital security becomes a more difficult perspective because technology takes an increased role in our lives. A report by Amnesty International published on July 18 found thatApple iPhones could be hacked Without users even need to click on a link, giving the attacking access to all emails and text messages to the camera and telephone microphone.

The report indicates that "zero-click" infiltration developed by the Israeli group Cyber ​​espionage the NSO group has been used to infect the iPhones belonging to human rights defenders and journalists, even if the devices wereExecution of up-to-date software at the time. This highlights the vulnerability of "0day" exploits, a term used for security vulnerabilities that technology companies are not yet conscious.

"Attacks like those described are very sophisticated, cost millions of dollars to develop, often have a short life and are used to target specific individuals", "Ivan kristicHead of security engineering and architecture for Apple, said in a statement. "Although it means that they do not constitute a threat for the vast majority of our users, we continue to work tirelessly to defend all our customers and we are constantly adding new protections for their devices and data."

You can take other simple security measures to protect your attack phone.

BUENOS AIRES, ARGENTINA - DECEMBER 26, 2019: iPhone's settings icon displays bluetooth and wifi options to access easily
Refuge

While pirates are still trying to stay ahead of safety efforts, the list of "best practices" of the NSA highlights some other simple tips forKeep your phone better protected. They suggest deactivating Bluetooth whenever it is not used, which does not connect to any public Wi-Fi networks, no jailbreaker your phone and use only confidence accessories with your device.

The agency also says careful with the applications you download, where you get them and close them when you do not use them. And of course, you should keep your Updated phone operating system with the last software.

RELATED: If you receive this Amazon message, do not open it, the experts warn .


Why you should not worry about the reinfection of Covid, says Harvard Doctor
Why you should not worry about the reinfection of Covid, says Harvard Doctor
Ginger room recalled due to a dangerous labeling mixture, the FDA says
Ginger room recalled due to a dangerous labeling mixture, the FDA says
How to entertain a child in summer
How to entertain a child in summer