New Delhi4 minutes ago
- Copy link

In the digital era, smartphone users are in danger of privacy breech and data theft. Many research has revealed that the smartphone- can spy you in different ways like camera, microphone and search history.
Many smartphone users feel that if they talk about a product, then their phone starts showing the ed of the same product.
In such a situation, the question arises that how can you find out whether your smartphone is listening to your words or not? Through which settings of smartphones can spiaing be prevented? In this news, we are telling you about these settings.

Control spiating through these settings
Many applications in the smartphone have access to your camera, microphone and storage. Through this, any app can hear your words. To avoid this, you have to limit your access or to serve the selected permission.
1. Manage app permission
Go to the option of security and privacy in the settings of your phone. Here you will get the option of privacy. Click on it and go to the permission manager. Here all the applications will have an access show of microphone. Manage it according to the need.
2. Keep the software updated
Keep updating the software and apps of the phone. Update the security patch available every month in the phone.
3. Disable Voice Assistant
Disable virtual assistants like Siri, Google Assistant or Alexa in the phone. This can prevent voice licensing in the phone.
4. Avoid the use of Anasikure Public Wi-Fi
Public Wi-Fi networks and hotspots can become a means of hacking. To avoid this, use VPN while using an unseen public Wi-Fi.
5. Monitor Third Party App
Avoid downloading the unknown third party app. Install the apps only from the official app store. After installing, give necessary permission to the apps.
6. Rear the phone
Some malware work in phone memory. To avoid this, reboot the phone. This also stops the background processing of third party apps.
(Tagstotranslate) Security & Privacy Settings (T) Mobile App Security & Privacy Breaches (T) Privacy Breach (T) Cyberattacks
Source link