NSA Warns iPhone And Android Users To Turn It Off And On Again (2024)

Updated Saturday, June 1: This article has been updated to include clarifcation around the safety of using public Wi-Fi networks and additional advice from the NCSC and FCC.

Although some people might worry about the National Security Agency itself spying on their phones, the NSA has some sage advice for iPhone and android users concerned about zero-click exploits and the like: turn it off and on again once per week.

How often do you turn off your iPhone or android device? Completely turn it off and then reboot it, rather than just going into standby mode, that is. I suspect that the answer for many people is only when a security or operating system update requires it. That, according to the NSA, could be a big mistake.

ForbesFBI Issues Advisory As Hackers Strike: Email Admins Do This 1 Thing NowBy Davey Winder

NSA iPhone And Android Device Security And Privacy Best Practice Advice

In a document detailing several mobile device best practices, the NSA recommends users turn their devices off and then back on once every week to protect against zero-click exploits, which attackers often use to eavesdrop on and collect data from phones.

Users can mitigate the threat of spear-phishing, which can lead to the installation of yet more malware and spyware, by the same simple action. However, the NSA document does warn that the turn it off and on again advice will only sometimes prevent these attacks from being successful.

MORE FROMFORBES ADVISOR

Best High-Yield Savings Accounts Of 2024ByKevin PayneContributor
Best 5% Interest Savings Accounts of 2024ByCassidy HortonContributor

“Threats to mobile devices are more prevalent and increasing in scope and complexity,” the NSA said while warning that some smartphone features “provide convenience and capability but sacrifice security.” As such, doing something is always better than doing nothing when it comes to being proactive about your device and data security.

The advice given is not some silver bullet that will solve all your security ills, it must be noted. Indeed, the NSA document includes a chart that shows how effective each tactic is against different threats. While good general advice, turning it off and on again will not help you against many of the more advanced malware and spyware threats that are programmed to reload on reboot.

Balancing Smartphone Convenience And Security

The NSA also advises Phone users to disable Bluetooth when not using it, update the device as soon as possible when operating system and application updates become available and disable location services when not needed. The small matter of security over convenience comes into play for much of the advice given, as you can tell already. Throw in not using public Wi-Fi networks and not using public charging stations, despite plenty of security experts considering the risk to be low in most real-world use cases, and many smartphone users are likely to roll the dice.

When it comes to public Wi-Fi there’s a difference between the risks that can be present and an individual actually being at risk. While it is possible for a determined criminal to use unsecured networks for nefarious purposes, this usually involves tricking an unsuspecting user into connecting to their Wi-Fi hotspot rather than one being provided by the railway company, airport, or coffee shop. A recently disclosed vulnerability that can lead to something called an SSID Confusion Attack is a good example of how this can work. Without going into the technical details, read the article for that; it can disable your VPN in certain circ*mstances and make it appear that you have connected to a secure network when you haven’t. But, again, most unsecured public WiFi networks are safe to use for general activity. The U.K. National Cyber Security Centre suggests that users instead connect by way of their mobile 4G or 5G network as these “will have built-in security and you can also use the tethering feature of most such devices to connect your laptop to your smartphone’s network. This makes sense when performing sensitive activities such as online banking, for example. There’s an excellent thread on Reddit that delves into the facts for further information.

All that said, I heartily agree with the on and off again advice as this only takes a minute or two of your week and is a good habit to get into. In fact, I’d say get into the habit of doing so every day, maybe as part of your bedtime routine.

ForbesSecurity Experts Issue Jenny Green Email Warning For MillionsBy Davey Winder

The NSA also says that ‘strong’ lock-screen PINs and passwords should be used, advising a minimum of a six-digit PIN as long as your smartphone is set up to wipe itself after 10 incorrect attempts and to lock automatically after 5 minutes of no input. More broadly, Oliver Page, the CEO of cybersecurity company Cybernut, says that users should “generate strong, unique passwords for each account using a password manager” and avoid using common phrases, dictionary words and password reuse across multiple accounts.

The NSA further warns that opening email attachments and links is a no-no, even when the sender appears legitimate, as they can easily pass on malicious content without realizing it or because their accounts are compromised. “Learn to recognize phishing attempts by checking email sender addresses, verifying website URLs, and scrutinizing email content for signs of manipulation,” Page says.

When it comes to sensitive conversations or messaging, the NSA warns against these on personal devices, even if you think the content is generic. This is a little restrictive, to say the least, given that many of us use our smartphones for that. However, falling for social engineering tactics such as responding to unsolicited emails or messages is a completely different kettle of phish. “Falling for social engineering tactics, like responding to unsolicited emails requesting sensitive information, can result in account compromise and identity theft. These phishing attempts often mimic legitimate entities, deceiving individuals into divulging confidential details,” Page says, adding, “Trusting phone calls or messages without verification can lead to serious consequences, as scammers manipulate victims into disclosing sensitive information or taking actions that compromise their security.”

Federal Communications Commission Offers Sage Smartphone Security Advice

The Federal Communications Commission, an independent agency of the U.S. government, also offers some pertinent security advice for smartphone users. There is a lot of overlap in the advice offered by differing government and law enforcement agencies, some of the FCC advice is worth mentioning here. Not modifying the security settings of your smartphone, for example. “Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone,” the FCC advises, “while making it more susceptible to an attack.” The mantra of not disabling security settings for the sake of convenience is one I agree with, but I acknowledge this is likely to go ignored by the general user, for whom convenience is everything until a security incident impacts them personally.

The FCC also warns that understanding app permissions is important as these can be used to bypass certain security functionality by a malicious app developer. Luckily, modern mobile operating systems have made such permission granting more transparent than ever, but it still pays to be alert to the danger. “You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone,” the FCC said.

Another option that has become even easier with the evolution of these operating systems is the ability to remotely erase data from a stolen or lost smartphone. Just ensure you get this set up so it can work to your advantage if the worst happens. “In the case that you misplace your phone,” the FCC guidance says, “some applications can activate a loud alarm, even if your phone is on silent. These apps can also help you locate and recover your phone when lost.”

And finally, always wipe data from your device and reset it to factory settings before selling or otherwise disposing of your phone.

NSA Warns iPhone And Android Users To Turn It Off And On Again (2024)
Top Articles
Top 15 Small Investment Ideas in Pakistan 2024 | S2S Blog
How to Tell If Someone Is Spying on Your iPhone
Kansas City Kansas Public Schools Educational Audiology Externship in Kansas City, KS for KCK public Schools
Ofw Pinoy Channel Su
Soap2Day Autoplay
Wild Smile Stapleton
Unlocking the Enigmatic Tonicamille: A Journey from Small Town to Social Media Stardom
Cinepacks.store
William Spencer Funeral Home Portland Indiana
Nichole Monskey
Ukraine-Russia war: Latest updates
Ladyva Is She Married
How to watch free movies online
Slushy Beer Strain
The fabulous trio of the Miller sisters
Finger Lakes Ny Craigslist
Rachel Griffin Bikini
Inside the life of 17-year-old Charli D'Amelio, the most popular TikTok star in the world who now has her own TV show and clothing line
Red Devil 9664D Snowblower Manual
Craigslist Missoula Atv
Kamzz Llc
BMW K1600GT (2017-on) Review | Speed, Specs & Prices
Team C Lakewood
Cincinnati Adult Search
Babbychula
Aol News Weather Entertainment Local Lifestyle
Idle Skilling Ascension
Dtm Urban Dictionary
27 Fantastic Things to do in Lynchburg, Virginia - Happy To Be Virginia
Log in or sign up to view
The Mad Merchant Wow
Metro By T Mobile Sign In
Montrose Colorado Sheriff's Department
School Tool / School Tool Parent Portal
Midsouthshooters Supply
Crazy Balls 3D Racing . Online Games . BrightestGames.com
Has any non-Muslim here who read the Quran and unironically ENJOYED it?
Jason Brewer Leaving Fox 25
Trap Candy Strain Leafly
Let's co-sleep on it: How I became the mom I swore I'd never be
Lake Kingdom Moon 31
Mcalister's Deli Warrington Reviews
Pain Out Maxx Kratom
Leland Nc Craigslist
Flappy Bird Cool Math Games
Cch Staffnet
Phone Store On 91St Brown Deer
Server Jobs Near
The top 10 takeaways from the Harris-Trump presidential debate
Cvs Minute Clinic Women's Services
Where To Find Mega Ring In Pokemon Radical Red
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 6527

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.