Cleaning out regularly calms your nerves and helps you keep track of things. Just as we critically examine household goods, documents and acquaintances, we should also detox our smartphones.
Australian Prime Minister Anthony Albanese recently advised his compatriots to turn off their cell phones for five minutes every night for cybersecurity. The British newspaper The Guardian , which published the quote, speculates that this information is intended to "stop any spyware that may already be running in the background on the device."
“There is something to it,” says Paul Ducklin of Sophos. “Infections with malware can generally be divided into two categories: 'constant threats' and the 'rest'. Constant refers to criminal software that outlives the application that launched it. It also survives current login sessions (if you're on a laptop) and even a complete shutdown and restart process. Non-persistent threats do not survive app restarts or system reboots. And shutting down the smartphone generally closes all applications and terminates the operational system. It stops any malware or spyware that was active in the background. In this regard, a regular restart of the cell phone makes sense and does not cause any damage to the device.”
Reboot protects against malware – sometimes
The problem is that most malware, especially sophisticated, hidden and mobile spyware, now falls into the persistent threat category. For example, Apple's latest security update to eliminate spyware for iPhones, iPads and Macs included patches for two zero-day code execution vulnerabilities: one in WebKit (Apple's deep-rooted browser software) and one in the operating system kernel.
Type 1: Malware via browser
If attackers can only execute unauthorized code in the victim's browser, then it is very likely
a) the malware cannot detach itself from the browser process and
b) is therefore also unable to access or manipulate any other parts of the device.
The malware is limited to the current browser session. Restarting the smartphone would conveniently disinfect the device.
Type 2: Malware via system vulnerability
“But if the unauthorized code that the attackers launch within the browser via the zero-day Webkit bug then triggers the other zero-day bug in the kernel, then the smartphone user has a problem,” says Ducklin. “Cybercriminals can use the non-permanent malware in the browser to compromise the kernel itself, thereby gaining control of the entire device. This allows them to use the unauthorized code in the kernel to implant a permanent malware infection that launches automatically even when the phone is turned off. That is exactly the reason why attackers have chosen this route, because diligently restarting the cell phone every day lulls the victim into a false sense of security.”
More tips for smartphone detox:
Unfortunately, the following safety tips are not quite as simple as the “off and on again” described above, but they still deserve a chance:
- Get rid of apps that are no longer needed. Completely uninstall unnecessary applications on your smartphone and delete all data associated with them. If you miss the app, you can reinstall it. Unfortunately, many mobile devices come with pre-installed software that cannot be removed, known as bloatware. However, some things can at least be turned off so that the user prevents them from running automatically in the background.
- Explicitly log out of applications when they are no longer in use. It's unpopular advice because it means you can't simply reopen an app, such as Zoom or Outlook, and switch back to the meeting or discussion group. And: logging in with a password and 2FA using the fiddly smartphone keyboard can be annoying. But the best way to avoid accidentally revealing your data is through your own authorization.
By the way, restarting the smartphone does not mean restarting the login status of apps. The phone normally starts up with the usual applications, which automatically log in to their respective online accounts, unless you have previously intentionally logged out. Unfortunately, different apps (and different operating system options) implement their logout processes in different ways, so you may have to experiment to figure out how to log out and where.
- Address privacy settings for all your applications and services. Some functions can be set directly via the mobile phone's operating system, others in the apps themselves and others only via an online portal. A little tedious, but worth it.
- Learn how to clear browser history and practice this process regularly. When you restart the device, this data is not automatically deleted.
- Turn off as many features as possible on the smartphone's locked screen. It's best to just read emergency call and unlock. Because every application that appears on the locked screen weakens your own cybersecurity - after all, anyone can read it.
- Set the longest lock code and shortest lock time you can tolerate. Or use identification methods such as facial recognition. And: get into the habit of locking your cell phone as soon as you put it down.
- “Be aware of what you share” – Be careful about what you share. The current location is not important for navigation? Then please turn it off. Surfing is unnecessary right now, for example in the cinema? Then turn off Wi-Fi. The same is true with Bluetooth.
- Set a PIN code on your SIM card. A physical SIM card is the encryption key for calls, text messages, and perhaps some 2FA security codes or account resets. If the device is stolen, you don't have to hand your data to the criminal on a silver platter.
And what about the laptop?
There is no reason why only the smartphone should get a refresh. Laptops also benefit from regular restarts. The sleep mode on modern devices is quite practical, but given how quickly current models boot up, it's better to turn it off and on again. Here too, please clean the browser history including cookies etc. from time to time.
Also read: The pitfalls of AI: understandable tweets and convincing fake news
Source:
Sophos
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

