(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

If you’re a Samsung smartphone user, have you ever seen a little eyeball symbol appear at the top of the screen? You might notice that it will show up for a minute, and then disappear again. Since this kind of activity usually makes users question what’s going on with their device, let’s get down to the bottom of this weird occurrence.

To assuage your fears that you’re being watched by some sort of malware or spyware, know that this eyeball icon doesn’t mean you’ve been hacked. Instead, it’s a feature called Smart Stay created by Samsung. When the eye appears, the feature is activated.

What is Smart Stay?
Smart Stay uses your front facing camera to tell whether or not you’re looking at the device. While this sounds a bit creepy, the camera can use your face to keep the screen from turning off while you’re looking at it--like, say, when you’re reading an article on the Internet that’s particularly long. This actually overrides any screen timeout settings, so it’s a great way to finish off whatever you are reading without having to press a button every now and again to keep it lit up.

To change the settings of Smart Stay, you just go through to Menu > Settings > My Device > Smart screen. All you have to do is uncheck the Smart Stay box to turn it off. Depending on how helpful you find this feature, you might actually prefer to keep it on.

How You Know You Have Something to Worry About
While Samsung’s Smart Stay isn’t something to worry about, there are other symptoms of hacking attacks on your mobile device that you want to keep in mind should the need arise. Depending on the type of problem, the symptoms will vary, but keep the following in mind if you suspect something out of the ordinary.

  1. Unfamiliar charges on your carrier’s statement.
  2. Data access patterns that you don’t recognize.
  3. Your battery drains quicker than normal.
  4. You find apps that are downloaded from a third-party app store.
  5. Strange notifications start appearing, especially related to finding and downloading new apps and games.
  6. Your device has been rooted (aka jailbroken).
  7. Your antivirus has been disabled.
  8. You actually see the hacker’s remote actions of opening apps and navigating your phone.

If you ever have reason to suspect that your phone has been hijacked, make sure that the first thing you do is turn off the device’s Internet connection and power it down as soon as possible. Once you’ve done this, consult your trusted IT professionals at TaylorWorks. We can remove the threat before it causes any more damage to your device.

A little healthy skepticism never hurt anyone, so be sure to approach issues with your device with a grain of salt. To learn more about how your business can identify troubles with technology, reach out to us at 407-478-6600.

What’s Behind so Many Businesses Switching Their P...
How to Protect Your Data From These 3 Common Disas...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Best Practices Privacy Business Computing Network Security Hackers Technology Email Outsourced IT VoIP Microsoft Backup Malware Business Continuity Software Data Backup Mobile Devices IT Support Google Saving Money Hosted Solutions Small Business Disaster Recovery Android Hardware Data Efficiency Business How To Cybersecurity Data Recovery Smartphones Cloud Computing Two-factor Authentication Managed IT User Tips Chrome Communication Law Enforcement Managed IT Services Communications Ransomware Avoiding Downtime Spam Mobile Device Management BDR Collaboration Alert Proactive IT Telephone Systems BYOD Gadgets Social Engineering Innovation Windows 10 Computers Phishing Internet Mobility Windows Cybercrime Router IT Services Compliance App Firewall Data Storage Solid State Drive Business Owner Holiday Business Intelligence Productivity Money Apps Bring Your Own Device Budget IT Management Browser Artificial Intelligence Business Management Save Money Internet of Things Employer-Employee Relationship OneNote Social Media Virtualization Unsupported Software Identity Theft Flexibility Information Technology Data Breach Word Server Wi-Fi Smartphone Credit Cards Computer Spam Blocking Network Passwords Operating System Value Work/Life Balance Bandwidth Data Security Redundancy Office 365 Workers Vulnerability Remote Monitoring Audit Online Shopping Telephony Hard Drives Knowledge Government Specifications Frequently Asked Questions Emails Private Cloud Evernote Skype Content Filtering Recovery Network Congestion Update Millennials Charger Excel Document Management Public Cloud Computer Fan Wireless Charging Start Menu Mobile Device Data Warehousing IT Consultant Workforce Tip of the week Save Time Productivity The Internet of Things FENG Fiber-Optic Mobile Risk Management Leadership Google Docs Telecommuting Unified Threat Management Windows Server 2008 Keyboard Netflix Users Cables Professional Services IT Plan Black Market Voice over Internet Protocol Remote Work Windows 7 Hacking HaaS Upgrade Settings Google Drive Unified Communications Tools Patch Management Battery Wireless Facebook webinar Multi-Factor Security Computer Care Regulations Windows 10 Theft Scam Remote Computing Software Tips Education Conferencing Trending Samsung Servers Computing Infrastructure Downtime Google Apps Botnet Cortana Physical Security Applications Wireless Technology IT Support Lifestyle Fraud Flash Hacker Root Cause Analysis Marketing Infrastructure Travel Data loss Mobile Computing Microsoft Office End of Support Windows 10s Amazon Screen Mirroring Meetings Networking Technology Tips Data Protection HBO Virtual Reality Office Tips Website Health Amazon Web Services SaaS Sync Cast Current Events Software as a Service Comparison Outlook Worker Commute Advertising Entertainment Legal How to Two Factor Authentication Relocation Vendor Management Password Public Speaking History Assessment Best Practice Lithium-ion battery Humor Augmented Reality Techology Webinar Television Books Tech Support Shadow IT Safety WiFi Electronic Medical Records User Error IT solutions Hybrid Cloud Public Computer Hiring/Firing Competition Fun Big Data PDF Emergency Politics Miscellaneous Quick Tips Employer Employee Relationship Cleaning Experience HIPAA Video Games Computer Accessories Music Automobile Search Colocation CrashOverride Presentation Bluetooth Wearable Technology Data Management Scalability Automation Transportation 5G Internet Exlporer USB Managed Service Provider IBM Benefits Worker Loyalty Troubleshooting Content Customer Relationship Management Workplace Tips IP Address Password Manager Smart Technology Rootkit Internet exploMicrosoft Hosted Solution Audiobook Customer Service Instant Messaging Mobile Office Office Training Domains Files

      Mobile? Grab this Article!

      QR-Code dieser Seite