Updated October 23, 2024: This article was originally published on October 22 and includes details on new security recommendations applicable to iPhone and Android users issued by the U.S. Cybersecurity and Infrastructure Security Agency. I am.
If you’re a fan of comedy, you may well remember the line from the British sitcom, “Have you tried turning it off and turning it on again?” IT cloud. But what if the National Security Agency told all smartphone users to do so? And more importantly, if you follow that advice, will you be safe from malware and spyware in 2024 and beyond?
NSA advises iPhone and Android users
The NSA’s first warning was published in the Mobile Device Best Practices Guide in 2020. If you have trouble opening a PDF document from the previous link, there is another route to the same document that requires a few more clicks. NSA press room. As smartphones, running on all operating system platforms, become increasingly common targets for threat actors of all kinds, the NSA says, “Many of the features offer convenience and functionality, but do not come at the expense of security. ” and attempted to identify simple, if not the safest, procedures. Technology users can better protect their devices and the data stored on them. Earlier this year, I reported on the NSA’s recommendations, and that article continues to generate countless responses to this day. Security experts and smartphone users have thanked us for drawing attention to this warning, but for not detailing what a reboot won’t protect people from. Some people scold me. Of course, all these opinions are valid, and this article is written in the hope of providing a clearer explanation.
First of all, I have nothing but praise for the documents released by the NSA. The advice is not only sensible, but presented in a way that is clear for all audiences. The NSA takes a pictorial approach and uses an icon-based warning system to tell readers what to avoid, what to disable, what to do, and what not to do. I have notified you. The to-do list includes the use of strong PINs and passwords, biometric locks, and regular software updates. Advice on what not to do includes rooting or jailbreaking your phone, clicking on unknown links or opening unknown attachments. But what intrigued me the most was the disable icon, especially when you disable the power by turning the device off and on again every week.
The second page of the infographic-heavy advice document took a more tabular approach to alerting smartphone users of what they should do when it comes to threat mitigation. This time, the iconography was divided between sometimes obstructed and almost always obstructed. If you regularly restart your phone, we recommend doing so as it may prevent spear phishing (installing malware) and zero-click exploits. So this was never a silver bullet solution or a one-size-fits-all security panacea.
do iPhone and Android Will users need to restart their smartphones regularly in 2024?
The short answer to whether you’ll need to restart your smartphone every week in 2024 is no. But need does a lot of the heavy lifting on this issue. From a security perspective, a reboot eliminates the threat of non-persistent malware. That is, it is a threat that cannot survive a reboot. I know it’s obvious, but I’ll say it. There are many types of malware that fall into this category, and not all of them come from the least advanced or sophisticated attackers.
At a time when spyware was making headlines for good reason, with nations using sophisticated software such as Pegasus to infect both Android and iPhone devices, the report notes that spyware’s persistence makes it difficult to reinfect it again. It was suggested that it now relies on a binary payload that can be exploited again after launch. Relying on malware in memory rather than being written to permanent storage is another way to avoid leaving behind evidence of surveillance during such advanced attacks.
“As long as people regularly update their devices when new versions of operating systems are released, their devices will stay healthy and protected,” said Jake Moore, Global Cybersecurity Evangelist at ESET. However, we recommend restarting your phone periodically for battery reasons rather than security.
Moore is right: A quick restart can often resolve performance or connectivity issues. However, the security reasons for rebooting are not completely ignored. “Zero-click malware is a recurring problem on both Apple and Android operating systems, but it is typically quickly identified and addressed. Once detected, zero-click malware is a recurring problem in both Apple and Android operating systems,” Moore said. Patches will be developed and new updates will be released.
There is no definitive answer regarding the greed of NSA warnings and reboot advisories, but in my humble opinion, erring on the side of caution should never be underestimated. There’s an interesting discussion on Stack Exchange that sums things up pretty well. The long answer is that it depends on what your handheld has done since the last reboot, but the short answer is that, on average, reboots reduce vulnerabilities. There are few, if any, downsides to rebooting, so why not reboot regularly? I’m on the side of the NSA on this one.
U.S. Cybersecurity and Infrastructure Security Agency proposes new security requirements – iPhone and Android users should pay attention
As reported by Bleeping Computer, the U.S. Cybersecurity and Infrastructure Security Agency has announced a series of new security proposals aimed at protecting personal data and government information from adversaries. The list of proposed security requirements is directly targeted at government agencies that move large amounts of sensitive data, particularly those where the information may be disclosed to persons or countries of concern. This most often means someone who engages in cyber espionage against the United States or has a history of state sponsorship of advanced persistent threat actors. CISA recommends that organizations have “the technical capacity and sufficient governance structures to ensure that targeted data-level security requirements are appropriately selected, appropriately implemented, and continue to be enforced in a manner that addresses identified risks.” He said he is evaluating implementation of the requirements as necessary to verify that they are in place. Regulated by the Department of Justice for restricted transactions. ” At the same time, note that specific requirements may vary depending on the type of transaction.
Things like maintaining an up-to-date asset inventory of hardware and accurate network topology are beyond the purview of most individuals, no matter how sensible they may be. But it would be foolish to focus only on the benefits that you will not get from a very sound list of recommendations.
The complete list of security requirements proposed by CISA is available as a PDF document and is highly recommended as a must-read for organizations looking to strengthen their security posture.
Although this proposal is aimed first and foremost at federal agencies, that doesn’t mean the proposed advice has no impact on the rest of us. In fact, some of the suggested steps should be etched on the smartphone screen of every iPhone and Android user. Update your devices to fix known vulnerabilities as soon as possible, use two-factor authentication on all available accounts, and make sure your passwords are at least 16 characters long, for example.