In today’s digital landscape, data privacy and security are top concerns for users, especially those relying on smartphones, as these devices may inadvertently record conversations and transmit data to remote servers.

If you’re worried about potential eavesdropping by your smartphone, security researchers at NordVPN have developed a simple experiment to help determine if your device might be monitoring your conversations.

Here’s how to test it: Choose a topic you’ve never searched for on your mobile phone—something entirely new to your device’s search and browsing history. Discuss this topic with a friend or family member while your phone is nearby, but ensure that you do not use any device to search for information about this topic beforehand.

After a day or two, check whether advertisements related to your conversation topic appear on your browsing apps or social media platforms. For example, if you mentioned something like travel plans to a specific destination, keep an eye out for ads promoting flights, hotels, or travel packages to that location.

If you start seeing ads related to the topic you only mentioned in conversation, it may indicate that your device is “listening” to you.

Now, this raises an important question:

Is it legal for your smartphone to monitor your conversations?

In most cases, this type of surveillance would violate data privacy and security laws in many regions. However, if you use a virtual assistant like Apple’s Siri or Android’s Gemini, you may have unknowingly given consent for certain types of listening activity. Voice-activated assistants rely on continual background listening to provide instant responses to commands. This listening capability means that, even when idle, your smartphone’s virtual assistant may be capturing audio to improve the speed and relevance of its responses.

To protect your privacy, you might consider disabling these virtual assistants. Regularly clearing your voice command history and using a virtual private network (VPN) can also enhance your security, as many VPNs offer browsing tools that minimize tracking. However, it’s essential to remember that we may never fully know the extent to which data centers collect or manage information gathered through these platforms.

The post How to test if your smart phone is spying on you appeared first on Cybersecurity Insiders.

The National Security Agency (NSA) of the United States has recently issued a set of comprehensive guidelines aimed at enhancing the security of Android and Apple iPhone users against various digital threats such as hacks and snooping campaigns. These guidelines are particularly pertinent for users in India and other Asian countries, which have been increasingly targeted by sophisticated cyber-attacks.

Outlined below are the top 11 mobile security tips recommended by the NSA:

Location Services: Users are advised to avoid carrying their devices to sensitive locations and to disable location services when not needed. Furthermore, it’s recommended to restrict access to location tracking features for mobile applications, enabling them only when necessary.

Powering Off the Device: Security agencies are advocating for regular powering off of mobile devices, as this simple action can disrupt potential malware. In-fact in an interview last year, Australian Prime Minister Anthony Albanese urged the same to his country’s populace.

Avoid Sharing Sensitive Information: Users should refrain from sharing sensitive information such as card details, Aadhaar or Green Card details, and banking information on their mobile phones to prevent exploitation by online criminals.

Exercise Caution with Email and SMS Links: Users are urged to exercise caution when clicking on URL links shared via SMS or emails from unknown senders, as they may lead to malicious content or mobile ransomware.

Disable Wi-Fi and Bluetooth: It’s advisable to disable Wi-Fi and Bluetooth when not in use, as leaving them enabled can pose security risks. Additionally, connecting to public Wi-Fi networks can potentially compromise device security.

Keep Software and Apps Updated: Regularly updating the software and apps on mobile devices is crucial, as it helps to patch vulnerabilities and enhance security.

Utilize Biometrics: Using biometric authentication methods such as fingerprint or PIN to secure account access adds an extra layer of security to mobile applications and data.

Screen Lock: Enabling automatic screen lock after a period of inactivity helps to prevent unauthorized access to the device by acquaintances or strangers.

Download Apps from Official Stores: Users are advised to download apps only from official app stores to minimize security risks. Furthermore, it’s recommended to refrain from storing or entering sensitive data into applications.

Microphone and Camera Security: Covering the device’s camera and disabling the microphone when not in use can mitigate the risk of unauthorized surveillance by malicious software.

Password Protection: Users should avoid using easily guessable passwords and opt for strong, alphanumeric passwords with a minimum length of 9 to 12 characters to secure online accounts effectively.

By adhering to these mobile security best practices, users can significantly reduce their vulnerability to various cyber threats and safeguard their personal and sensitive information effectively.

The post NSA suggests these 11 mobile security tips to Android and iPhone users appeared first on Cybersecurity Insiders.

Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities.

Apple Inc. issued a statement yesterday, urging iPhone users to exercise caution, as certain states have been reported to hire hackers to engage in surveillance on prominent political figures and public personalities in over 158 countries globally.

Setting aside the potential targets of these hackers, it’s essential to understand how to detect signs of a compromised smartphone:

Rapid Battery Drainage: While 5G networks can deplete a phone’s battery faster than 4G networks, malevolent apps operating in the background can also significantly impact battery life. By monitoring battery usage, users can identify apps responsible for the drain and either uninstall or disable them to prevent damage.

Overheating: Modern phones are equipped with cooling mechanisms to regulate temperature, and regular activities should not cause the device to overheat. If your phone consistently heats up, it may be due to a malicious background process.

Social Media Anomalies: If you notice posts on your social media accounts that you don’t remember sharing, change your password and report the breach to the respective social networking site.

Sluggish Performance: Slower response times when opening apps may indicate the presence of malware operating discreetly in the background.

Application Failures: If apps, especially payment wallets, fail to load or if your phone freezes when launching an app, consider installing available software updates or occasionally rebooting your phone to reduce the influence of malicious background apps.

Pop-up Notifications: Users with Android versions beyond 8-9 have automatic pop-up detection and neutralization, but those on Android versions 7 and 8 might encounter adware issues.

Unwanted App Installations: The appearance of new apps in your phone’s menu, which you didn’t download, may signal the presence of spyware. Stick to official app stores and rely on reviews to assess an app’s legitimacy before downloading.

Abnormal Data Usage: Unusually high data consumption could signify the presence of malware, including data-mining software, which can lead to unexpected, costly bills.

 Gallery Monitoring: In countries like Spain, Britain, and South Africa, cybercriminals are known to infiltrate phones via public Wi-Fi and take control of the camera, capturing images without the user’s knowledge. If your phone’s flashlight activates without any user input, it may indicate a potential device takeover.

Calls and Messages: Keep a vigilant eye on your call and message logs, as certain rogue applications can access premium online services, resulting in unexpected costs.

The post 10 ways to know your smart phone has spying malware appeared first on Cybersecurity Insiders.

It’s strange! But its true that Australian Prime Minister Anthony Albanese has asked his citizens to turn off their mobile phones daily for 5-10 minutes to combat cyber threats and risks associated to attacks. The suggestion was made after the Nation’s leader was provided a briefing on how to a 5-minute turn-off a smart phone for every 24 hours can help them minimize risk of the device being hacked.

“You can do it while brushing your teeth or while bathing or at least during or after your bed time. But it works and was proven in practical by the National Security Agency (NSA)”, said Mr. Albanese.

Security experts suggest that phony apps often run in the background and collect data and transit to remote servers. If the infected device is switched off for a certain period, the operations of such apps will be forcibly shut down and will take time to persist, at times taking hours or days for the mechanism to restart its activity as it makes the hacker work harder with their notorious activities.
Earlier, security professionals urged their customers to restart their phones once or twice a day. But now they are asking them to switch off their device for at least 5-10 minutes as it helps in blocking the apps that transmit info to adversaries.

How to know the phone is infected?

Whether it’s an Android or iPhone, there is not such device in the world that cannot be hacked. Although, both the manufactures are working hard to deliver security from the operating core, its never a foolproof try!

Unusual data consumption, excess battery drain, poor performance of the device, apps taking a lot of time to start, restarts happening 2-3 times a day, ad pop-ups, money drain from wallets and outgoing calls and messages that you aren’t aware and mysterious search history on the mobile search engine always indicate that the device has been infected.

So, how to block such activities?

1.    Keep your phone connected to 4G or 5G network instead of a Public Wi-Fi while roaming.
2.    Never download apps from online resources, except the app store
3.    Keep it protected with an anti-malware solution
4.    Never browse a-rated sites or games
5.    Switch off your phone for 10 minutes on a daily note.
6.    Never charge the device from public charging posts such as transit stations
7.    Keep your in-car entertainment system free from malware
8.    Never click on email or message links sent by unknown callers or senders
9.    Last, keep your phone updated with the latest software and relative updates

The post Australian Prime Minister urges citizens to turn off their mobile phones to fend cyber attacks appeared first on Cybersecurity Insiders.

In today’s world, almost everyone owns a smartphone. In fact, it has become a necessity rather than a materialistic want. To secure the device from fraudulent access, mobile operating system manufacturers are coming up with various security features, among which phone PIN is the most commonly used option.

However, according to a research study carried out by the SANS Institute, the most commonly used PIN on mobile phones is 1234. The other 19 most commonly used phone PINs that put their owners at cyber risks are as follows:

1111
0000
9999
1212
7777
1004
2000
4444
2222
6969
3333
5555
6666
1122
1313
8888
4321
2001
1010

Moreover, mobile phones operating on iOS 14 and Android 11 are enabled with a security feature to set a 6-digit pin, and among them, the commonly used digits are:

123456
654321
111111
000000
123123
666666
121212
112233
789456
159753

Therefore, for those using any of the above-mentioned PINs to secure their devices, it is high time to change their passcodes to something more secure, easy to remember but hard to guess for hackers.

Now, the big question is, why are smartphones vulnerable to hackers when these PINs are used?

Well, according to the SANS Institute, 26% of devices using the above-mentioned passcodes were easily hacked by cybercriminals in the past three years. This means that hackers can use software to easily guess the passcode and enter the device to steal information.

Researchers at ESET recommend mobile phone users to use an alpha-numeric passcode if possible and even set up biometric authentication to access their phone data.

The post Most commonly used PINs putting smart phones to cyber risks appeared first on Cybersecurity Insiders.

Smart Phones have become a need for us these days as they assist us in commuting, help in entertaining us if/when bored, help communicate with near & dear, read news and do more such stuff. But as these gadgets have turned crucial in our lives, many hackers are also interested in infiltrating them, to get our glimpse of our lives or where we are heading.

 

Therefore, it becomes imperative to protect these devices from cyber-attacks and that can be achieved by following these simple tricks-

  • Always ensure that you are logged out of the website you are visiting while shopping or while connecting with the world, like Facebook. And if it is an app, please ensure that the account is enabled with a 2-Factor authentication.
  • While connecting to public charging ports, please be aware that such charging points can act as access points to cyber crooks who are into “Juice Jacking” where a fake charging station accesses all private data or install a malware.
  • It is recommended to do an audit of the apps installed on the smart phone once in a month. And check whether they are using data and the internet more than intended.
  • Keep the remote phone wiping option active as it helps to clean the information stored on the phone, if it gets stolen or misplaced. This helps in keeping data secure from prying eyes.
  • Always keep your apps, security software and operating system up to date from time to time.
  • Keep the Bluetooth and Wi-Fi ON only when required
  • Avoid using easy guessing passwords and use only those that are of minimum 15 characters and are made of a mix of alphanumeric characters topped by 1-2 special characters.

 

The post Follow these simple tricks to keep your smart phone secure in 2023 appeared first on Cybersecurity Insiders.

Are you having a doubt that your smartphone has been hacked or is being used by remote hackers for malevolent scams?

If so, then watch out for these abnormal behavioral signs to know whether the device has been hacked.

  • When apps are taking longer time to open than usual, it can be a sign that the device has been hacked. However, if the phone is crashing randomly, it can also mean that the device is lacking security updates.

  • Excessive battery drain can also be a sign of a device hack. As usual, malware working in the background can trigger such a situation. Thus, better you keep a watch on the battery consumption.

  • Increasing data mobile consumption needs your immediate attention, as malware and malicious infections can lead to excessive data consumption

  • Malware infections can lead to increased data usage and subscription to premium services without the user’s consent

  • Annoying pop-ups can also mean that the device has been infected with malicious apps. Better to open all the apps and delete those that aren’t needed anymore.

  • Smartphone overheating can also be a sign of a device hack

If anyone is experiencing the above-said signs, then better follow the below steps to stay out of trouble-

1.) Use a reliable anti-virus and scan the phone for infections. It will help in not only detecting the virus, but will also help remove it on a permanent note.

Avast, AVG, BitDefender, and McAfee are a few of the reliable and free anti-malware solutions

2.) In an Android device, always clear the phone’s storage and cache; and the browsing history and website data in an iOS device

3.) Restart your phone in safe mode and opt for a factory reset. This will not only help bring back the phone to fresh when assembled in the factory, but will also delete any malicious apps or malware downloaded onto the phone. However, the only negative point in this step is that you will lose all your data, including messages, contacts, images, videos, and documents.

Stay out of trouble proactively

a.) To defend a smartphone against future viruses and other security risks, avoid clicking on unknown website links and pop-ups.

b.) Avoid clicking on links sent in text messages from unknown senders, emails, and social media posts.

c.) Always install applications from authorized app stores such as Google Play and Apple App Store.

d.) Never go for a phone jailbreak.

e.) Check what permissions are being granted to apps and are trustworthy enough. It can be found by going through their reviews.

f.) Back up data on a regular note.

g.) Always keep the device OS updated with security updates from time to time.

h.) Monitor the financial transactions that are taking place via phone.

 

The post Watch out for these signs to know whether your phone is hacked appeared first on Cybersecurity Insiders.