253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

If you’re a Samsung smartphone user, have you ever seen a little eyeball symbol appear at the top of the screen? You might notice that it will show up for a minute, and then disappear again. Since this kind of activity usually makes users question what’s going on with their device, let’s get down to the bottom of this weird occurrence.

To assuage your fears that you’re being watched by some sort of malware or spyware, know that this eyeball icon doesn’t mean you’ve been hacked. Instead, it’s a feature called Smart Stay created by Samsung. When the eye appears, the feature is activated.

What is Smart Stay?
Smart Stay uses your front facing camera to tell whether or not you’re looking at the device. While this sounds a bit creepy, the camera can use your face to keep the screen from turning off while you’re looking at it--like, say, when you’re reading an article on the Internet that’s particularly long. This actually overrides any screen timeout settings, so it’s a great way to finish off whatever you are reading without having to press a button every now and again to keep it lit up.

To change the settings of Smart Stay, you just go through to Menu > Settings > My Device > Smart screen. All you have to do is uncheck the Smart Stay box to turn it off. Depending on how helpful you find this feature, you might actually prefer to keep it on.

How You Know You Have Something to Worry About
While Samsung’s Smart Stay isn’t something to worry about, there are other symptoms of hacking attacks on your mobile device that you want to keep in mind should the need arise. Depending on the type of problem, the symptoms will vary, but keep the following in mind if you suspect something out of the ordinary.

    n
  1. Unfamiliar charges on your carrier’s statement.
  2. Data access patterns that you don’t recognize.
  3. Your battery drains quicker than normal.
  4. You find apps that are downloaded from a third-party app store.
  5. Strange notifications start appearing, especially related to finding and downloading new apps and games.
  6. Your device has been rooted (aka jailbroken).
  7. Your antivirus has been disabled.
  8. You actually see the hacker’s remote actions of opening apps and navigating your phone.

If you ever have reason to suspect that your phone has been hijacked, make sure that the first thing you do is turn off the device’s Internet connection and power it down as soon as possible. Once you’ve done this, consult your trusted IT professionals at Graemouse Technologies. We can remove the threat before it causes any more damage to your device.

A little healthy skepticism never hurt anyone, so be sure to approach issues with your device with a grain of salt. To learn more about how your business can identify troubles with technology, reach out to us at 253.777.0763.

What’s Behind so Many Businesses Switching Their P...
Tip of the Week: Resolve a Poor Internet Connectio...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

BYOD Internet exploMicrosoft Windows 10s Alert IT Plan Apps Botnet Budget Knowledge Google Millennials The Internet of Things Marketing Telephone Systems Browser Facebook Save Money Microsoft Travel Data Storage Productivity Netflix Windows 10 Physical Security Communication Specifications Bandwidth App User Error Saving Money Artificial Intelligence FENG Networking Upgrade Best Practices Hiring/Firing Social Media Data Hosted Solutions Computers Automation Windows Privacy How To Fun Small Business Business BDR Frequently Asked Questions Word Operating System Efficiency Miscellaneous Screen Mirroring Private Cloud Leadership Windows 7 Recovery Unsupported Software Software Managed IT Services Spam Employer-Employee Relationship Remote Monitoring Data Breach Money Government Phishing Business Computing Cloud Computing Server Big Data IT Services Public Cloud History Solid State Drive Emails Avoiding Downtime Gadgets Mobile Device Management Outsourced IT Security Two-factor Authentication Net Neutrality Network webinar Google Drive Collaboration Network Security Root Cause Analysis Business Continuity Wi-Fi End of Support Office 365 Start Menu Managed IT Services Advertising Samsung Office Redundancy Business Management Relocation Tip of the week Google Docs Patch Management Virtualization Online Quick Tips Files iPhone Disaster Recovery Title II Data loss Social Engineering Router Tools Hackers Safety FCC IT Management Internet Exlporer Voice over Internet Protocol Value OneNote Settings Update Vulnerability Hardware Audit Software Tips Excel Comparison Trending IT Consultant Flash Downtime Outlook Windows 10 Managed Service Provider Computer Innovation Flexibility Workforce Multi-Factor Security Cybersecurity Emergency IBM Malware Scam Internet Meetings Skype Scalability Spam Blocking Communications Bring Your Own Device HBO Data Backup HaaS Competition Data Security Computer Care Work/Life Balance Sync Humor Microsoft Office Tip of the Week Ransomware VoIP Android Data Recovery Holiday Conferencing Smartphone Backup Cloud Smartphones Supercomputer Apple User Tips Law Enforcement Email Hybrid Cloud Telephony Cast Productivity Windows Server 2008 Business Intelligence Current Events IT Support Managed IT Passwords Computer Fan Chrome Technology Mobile Devices Health Website Network Congestion Cybercrime

Newsletter Sign Up