Home / Tech / Cybersecurity experts recommend turning off your iPhone every night for five minutes

Cybersecurity experts recommend turning off your iPhone every night for five minutes

iPhone cybersecurity
Share this:

In a recent announcement, cybersecurity experts across the globe have recommended that users turn off their iPhones for five minutes each night. This advice, though seeming quite simple, is a suggested measure to increase the privacy and security of your smartphone.

This tactic is aimed at putting a halt to any possible spyware that might be operating in the background of your device.

The frequent myth among non-tech users has been to periodically force-quit apps to improve their iPhone’s performance. However, rebooting your phone is an entirely different operation. By terminating all background processes, it could provide a modicum of privacy protection against spyware.

This recommendation came to light during a recent announcement concerning a new security appointment. Emphasizing the need for the public to be proactive in countering cyber risks, it was suggested that everyone should adopt the habit of turning their smartphones off and on again once a day.

Also ReadSoon you won’t need mobile phones for UPI payments: Introducing the Smart Ring in India

The reason behind this advice is that, while it might not significantly impede sophisticated spyware like NSO’s Pegasus, security experts believe that it adds an extra layer of complexity for potential attackers.

Despite the meticulous efforts by malicious elements to exploit vulnerabilities that allow malware to relaunch after reboots, placing this additional hurdle can still be worthwhile. New South Wales cybersecurity lecturer Dr. Arash Shaghaghi concurs with this sentiment, stating it provides an added challenge to those with ill intentions.

Just last month, in the first known instance of spyware being used during a military conflict, Apple notified victims of the Pegasus spyware. This current advice, therefore, serves as a timely reminder for users to be vigilant and proactive in their approach to cybersecurity.


Sponsored