How to protect your phone from hackers: why you should restart it once a week. Seven tips from the experts

Hackers are always looking for ways to gain access to sensitive information. The US National Security Agency (NSA) has presented seven ways iPhone and Android owners can protect their devices and personal data, reports the Daily Mail.

Criminals are turning to WiFi networks and smartphone apps. Photo: Archive

The agency noted that these criminals are turning to WiFi networks, smartphone apps and other gateways to conduct cyber espionage, steal identities and spread ransomware.

Here are the officials' recommendations:

Updating software and applications

The NSA recommends that users update smartphone software and apps to make the devices more secure.

Hackers find secret ways to break into phones by looking for loopholes in existing software, but with each update, companies patch up any potential bugs they could have used to get into the phone.

By resorting to this measure, you can prevent hackers from accessing your data. However, it's also worth noting that this only works for certain attacks, according to the NSA.

This method will prevent hackers from snooping on your calls, texts, and data, and will block most spear-phishing attacks, which is receiving fraudulent emails to steal sensitive information such as credentials.

Pay attention to installed applications

Smartphone users should be careful when installing apps and ensure that they are only downloaded from official app stores such as Google Play and the App Store.

Examples of unofficial app stores: Aptoide, SlideMe, ACMarket and Amazon Appstore.

Hackers often create a fake version of an official application so that, after downloading, they have full access to the device. They can install malware on your device and share data with third parties.

By double-checking that the app and store are secure, you can prevent spear-phishing and the collection of audio, video, call, text, and data data, but you can prevent the hacker from accessing your device's geolocation service.

Turn off WiFi and Bluetooth

Android and iPhone users should not connect to public WiFi networks. But the NSA cautioned that users connecting to public networks should turn off Bluetooth when not in use.

Hackers are constantly looking for vulnerabilities, and leaving WiFi on makes your device susceptible to “KRACK” attacks.

This is a cyber attack that consists of manipulating protected WiFi access via encryption keys to establish a secure connection that allows them to steal data over the network when they are near their target.

Similarly, leaving Bluetooth on can leave you the victim of a “BlueBorne” attack – when a hacker takes control of the device without any user intervention.

BlueBorne allows hackers to perform cyber espionage, data theft or even a ransomware attack.

Use encrypted apps for voice, text and data

Encrypted voice, text, and data applications can help block hackers from accessing your personal information by turning communication into a code.

WhatsApp is one of the most popular encryption apps, followed by Telegram – a security method that keeps phone calls, messages and other data private from anyone, including the app itself. However, even encrypted apps are not 100% safe from attacks.

Zero-click attacks are among the most dangerous, as the user does not need to click on a malicious link or download a compromised file for their data to be targeted.

Do not click on links or open attached files

The NSA has warned Android and iPhone users not to open unknown attachments and links. Hackers can access personal information in two ways: by keylogging or by using a Trojan.

Keylogging works like a tracker that monitors your every move, allowing it to access real-time information while you're typing or browsing the Internet and other apps—even listening in on phone conversations.

The Trojan is an invisible malware that is used to extract important data, including credit card details.

Restart your device weekly

Phones should be rebooted once a week to prevent zero-click and spear-phishing attacks. If users do not reboot the device, a hacker can manipulate open URLs to run code that installs malware on the device.

Powering down your phone completely resets all open web pages and apps and disconnects banking apps to prevent hackers from accessing sensitive information.

Use a protective microphone case and cover the camera of the device

Using a protective cover to cover the microphone and block background sound could prevent a “hot-micing attack,” the NSA reported.

These cases have a built-in microphone jamming system that prevents unwanted listeners from hearing your conversations through apps or an external cyber attack.

It's also important to cover the rear and front camera on both Android and iPhone, as hackers can turn the camera on and off and save media from the device's gallery if they have access.

How do you know if you've been the victim of a hacker attack?

There are a few possible signs, such as the camera light staying on even after you've closed the app, or it may turn on unexpectedly.

Other signs: The battery drains faster than usual, the phone runs slowly or heats up unexpectedly, apps close suddenly, the phone shuts down and restarts seemingly of its own accord, according to McAfee.