
Apple's and Samsung's Warning: The Truth About Putting Wet Phones in Rice
None of these methods are guaranteed to work, however, and while there's a lot of anecdotal evidence, there are very few scientific studies on the subject. The most recent study we could find was from 2014 by Gazelle, a company that buys and sells used and broken phones. According to that study, the make and model of phone were found to influence whether a phone could return to working order, with Android phones typically faring better than iPhones.
Phone manufacturers agree that removing your phone from water as quickly as possible helps to minimize how much water comes into contact with your device. That means you have a better chance of saving your phone but don't put your phone in rice after removing it from water because that could damage it.
Here's what you should do if you drop your phone in water. If you follow these instructions and your phone won't turn on, or it turns on and has some issues, you should take it to an associated phone shop to see if they can help.
What Apple and Samsung recommend
The two biggest phone manufacturers have some tips in case you drop your phone in water.
Apple says that many iPhones are splash, water and dust resistant when tested in controlled lab environments, but these resistances aren't permanent. If your iPhone gets wet, it might display a warning that there's water in your phone's charging port. If you see this warning, or your iPhone comes into contact with water, lotions, soap or other potentially hazardous material, here's what Apple says to do:
1. After removing your iPhone from the material, turn it off and dry it with a soft, lint-free cloth.
2. Tap your phone gently with the charging port facing down to get excess water out of the port.
3. Place your iPhone in a dry area with good circulation and wait at least five hours. Pointing a fan at your iPhone's charging port might help the process.
After five hours, try turning your iPhone back on and plugging it back in. If you're still having issues, you can try the other methods mentioned in this article, or you can take your phone to an Apple store for further assistance.
Apple also says don't put your iPhone in rice. "Doing so could allow small particles of rice to damage your iPhone," the company writes online.
Drop your smartphone in water? Don't panic.Samsung has similar instructions for drying your phone:
1. Remove your phone from the water, turn it off and dry it off with a dry towel or a clean cloth.
2. Place your phone in a well-ventilated area or in the shade with cool air from a fan. Samsung doesn't specify a length of time to wait, though.
Samsung says even after you've followed these steps that there might still be water inside your phone so you should bring it to a Samsung Electronics Service Center.
Both manufacturers also say if you drop your phone in a liquid other than clean water -- like soda or pool water -- you should quickly rinse your phone using tap water before drying with a towel and then air drying.
Apple and Samsung say to never use a heating source, like a blow dryer or oven, to dry off your phone. The heat could damage it.
Silica gel beads could help
You could also try silica gel. According to Gazelle, silica gel beads are a good option to absorb moisture out of phones. Silica gel beads can be found in those white packs labeled "Do not eat" that many products come packed with. You can save these packs from packages you've received, or buy packs through online stores like Amazon or companies like Dry & Dry.
Once you have your silica, here's what to do after dropping your phone in water:
1. Get your phone out of the water and turn it off.
2. Dry the outside of your phone with a lint-free towel.
3. Place your phone in a large container.
4. Fill the container with your silica gel beads and seal the container.
5. Gazelle recommends waiting 72 hours to let your phone dry.
6. Remove your phone from the container and try turning it back on.
Other household items might help
If you don't have silica gel beads on hand, you could try other household items. Gazelle found couscous and instant rice both work well as drying agents.
Follow the steps in the above section, but replace the silica beads with either of these, wait for the same amount of time and then try restarting your device.
Gazelle also tested conventional cat litter, oats, chia seeds and uncooked white rice but doesn't recommend these products because they leave behind debris that could damage your phone.
For more tips, check out how low-frequency sounds can get rid of water from your phone's speakers, how to get two days out of a single iPhone charge and how to easily manage your Android permissions.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
19 minutes ago
- Yahoo
Technical Program Manager Interview Prep Course Launch - Interview Kickstart's FAANG TPM Experts Share Interview Preparation Secrets
Santa Clara, Aug. 06, 2025 (GLOBE NEWSWIRE) -- As the world moves deeper into 2025, the role of Technical Program Managers has evolved from simple project coordinators to strategic leaders who drive innovation and ensure the successful delivery of complex technical initiatives. In today's rapidly changing tech landscape, companies are dealing with increasingly sophisticated projects that involve multiple teams, cutting-edge technologies, and tight deadlines. This complexity has made Technical Program Managers more valuable than ever before, as they serve as the crucial bridge between technical teams and business objectives. Recognizing this growing demand and the specialized skills required, Interview Kickstart has developed a comprehensive Technical Program Manager Course that prepares professionals for these strategic leadership roles at top technology companies. To learn more about the course, visit: The modern Technical Program Manager needs to understand not just project management principles, but also the technical details of the systems they're managing. They work closely with engineering teams to design scalable architectures, coordinate releases across multiple products, and ensure that technical decisions align with business goals. This dual expertise in both technical and management domains makes them essential for companies trying to move fast while maintaining quality and reliability. In 2025, Technical Program Managers are expected to have a deep understanding of system design principles, especially when it comes to building scalable solutions. They need to know how different components of a system work together, understand the trade-offs between different architectural choices, and be able to communicate these concepts clearly to both technical and non-technical stakeholders. This technical depth allows them to make informed decisions about project priorities, resource allocation, and timeline planning. Given these evolving requirements, traditional project management training is no longer sufficient for aspiring Technical Program Managers. They need comprehensive preparation that combines technical knowledge with program management skills, which is exactly what Interview Kickstart's Technical Program Manager Course provides. The course is specifically designed to prepare professionals for the demands of modern TPM roles at top technology companies. The course spans 15 to 17 weeks and provides a thorough foundation in both technical concepts and program management principles. Students dive deep into data structures and algorithms, which helps them understand the technical challenges their engineering teams face. This knowledge is crucial when making decisions about project scope, timeline estimation, and resource planning. The scalable system design modules teach students how to think about building systems that can handle growth, which is essential knowledge for any TPM working on products that need to scale. What makes this course particularly valuable is its industry-relevant curriculum that includes 4 to 6 weeks of training on specific technical domains. Students can choose to focus on areas like data engineering, machine learning, data science, frontend development, backend systems, site reliability engineering, test engineering, Android development, iOS development, and more. This specialization allows future TPMs to develop deeper expertise in the areas most relevant to their career goals, making them more effective in their roles. The course requires a significant commitment of 10 to 12 hours per week, which includes live sessions where students interact with instructors and peers, practice solving coding problems, and participate in live doubt-solving sessions. This hands-on approach ensures that students don't just learn theory but also develop practical skills they can apply immediately in their work. The 1:1 personalized coaching from FAANG professionals provides invaluable guidance from people who have successfully navigated TPM roles at the world's most demanding tech companies. One of the most valuable aspects of the program is the 15 mock interviews with FAANG+ interviewers. These practice sessions simulate real interview conditions and help students understand what top companies are looking for in Technical Program Manager candidates. The feedback from these sessions is incredibly detailed and helps students identify areas for improvement before they face actual interviews. In a job market where Technical Program Managers are in high demand but companies have very specific requirements, having comprehensive preparation makes all the difference between landing the target role and continuing to search. For more information, visit: About Interview Kickstart Interview Kickstart, founded in 2014, is a trusted upskilling platform designed to help tech professionals secure roles at FAANG and other leading tech companies. With over 20,000 success stories, it has become a go-to resource for career advancement in the tech industry. The platform offers a flexible learning experience with live classes and over 100,000 hours of on-demand video lessons. This ensures learners have the tools they need to dive deep into technical concepts and refine their skills on their own schedule. Additionally, 1:1 coaching sessions provide personalized support in areas like resume building and LinkedIn optimization, enhancing each learner's professional profile. ### For more information about Interview Kickstart, contact the company here:Interview KickstartBurhanuddin Pithawala+1 (209) 899-1463aiml@ Patrick Henry Dr Bldg 25, Santa Clara, CA 95054, United States CONTACT: Burhanuddin Pithawala
Yahoo
19 minutes ago
- Yahoo
Former Leader of Ohio Bureau of Motor Vehicles Joins FaceTec
Mike Rankin named Strategic Adviser SUMMERLIN, Nev., Aug. 6, 2025 /PRNewswire/ -- FaceTec announced that Mike Rankin will join its executive team as a strategic adviser, further expanding the company's industry-leading position in global 3D Face Verification and digital ID markets. Mike brings four decades of public and private sector experience, driving innovative problem-solving and improving customer service in complex organizations. He recently introduced inventive crime-fighting processes as First Assistant Prosecutor for Special Services at the Franklin County, Ohio Prosecutor's Office. His prior roles include Director/Registrar of the Ohio Bureau of Motor Vehicles, number-two lead in the Ohio Secretary of State's office, General Counsel for commercial real estate development, and Chair of the Mid-Ohio Regional Planning Commission ( "Mike's vast experience will help FaceTec provide valuable guidance and education about the broad applications and benefits of our world-leading digital identity verification technology, including FaceTec's 3D Liveness and 3D Face matching software, and our groundbreaking UR® Codes," said Kevin Alan Tussy, FaceTec CEO. As a strategic adviser for FaceTec, Mike will promote the company's solutions to major public sector identity-issuing authorities and law enforcement, domestically and internationally. "I am honored to have the opportunity to serve and connect with public safety leaders along with FaceTec's expert team and world-class technologies. I'm excited to become a part of this amazing, dedicated group of highly-regarded professionals at FaceTec, and to contribute to their important, meaningful work in identity verification," said Mike. "FaceTec's demonstrated expertise with Liveness-proven biometrics and binding a legal identity to a legitimate account holder is exceptionally effective, preventing fraud and identity theft in countless industries around the world. FaceTec software provides users easy-to-use, privacy-preserving and secure methods to prove their identity. I look forward to helping solve increasingly important identity-related challenges." About FaceTec Founded in 2013 and headquartered in the US with additional staff in the UK, Brazil, Portugal, Mexico, Canada, and India, FaceTec is the world's leading provider of 3D face biometric Liveness and matching software, processing 3.5 billion-plus 3D Liveness Checks annualized, protecting sensitive information in high-risk, high-value environments, including banking and finance, government, major e-commerce, global social networks, digital national IDs, mobile driver licenses, and many more. FaceTec's AI-driven technology employs advanced algorithms and deep learning models to accurately and securely verify, authenticate, and bind individuals to their accounts based on their unique face biometrics. FaceTec's patented, industry-leading Certified 3D Liveness Detection and face matching UR® Codes, optical character recognition, know-your-customer, and age estimation technology anchor a secure chain of trust in the IDV process for reliable, trusted access to mobile and web applications. FaceTec technology has been exhaustively tested against tens-of-millions of digital and physical spoof artifacts--including hi-res photos and videos, life-like masks, and mannequin heads--but also against much more sophisticated injection and bypass-type attacks, all now easily blocked. With ongoing, advanced AI development and the world's only spoof bounty program, FaceTec continues to stay ahead of ever-changing attack methods. For more information and business inquiries, please visit For media inquiries, please contact John Wojewidka at JohnW@ About FaceTec 3D Face Verification FaceTec's pioneering, patented 3D Face Biometrics are fast becoming the global standard in secure onboarding, KYC, and reverification, stopping ID fraud and unauthorized access for millions of users on six 3D Face Verification Platform features: 100% data-sovereign, customer-run software: no user data is sent to FaceTec World-leading 3D Face Matching rate at 1-in-125 million FAR at less-than-1% FRR Patented UI generates data-rich 3D FaceMaps® from standard 2D cameras World's-first UR® Codes enable secure, low-cost two-party identity verification $600,000 Spoof Bounty Program and Level 1&2 Certified 3D Liveness Detection Unphishable 3D FaceMaps ensure trust without creating honeypots Support for all modern smartphones, tablets, and PCs with webcams KYC/IDV Dashboard with integrated 1-to-N de-duplication to catch fraudsters World-leading 1-in-2 million FAR 3D FaceMap-to-2D-photo-ID matching Anonymous, better-than-human 3D age estimation and 3D age checks Fast, intuitive interface with 98-99% first-time-user success rates Easy to integrate, customize, deploy, and manage Developers can download FaceTec's demo apps directly from for iOS, Android, and any modern browser, and the developer SDKs are available free at About UR® Codes FaceTec's UR® Codes enable codeholders to prove with high confidence their legal identity, age, and the right to access their accounts or privileges, in-person and remotely. UR Codes have embedded, digitally-bound biometric and legal identity information that ensures privacy-preserving, decentralized identity verification. Safely storing unique, signed face data, personal info, and legal identity data, UR Codes provide secure, low-cost, two-party identity verification at unlimited scale in any identity-related scenario from any issuing authority, such as a DMV, passport issuer, school, or employer. For more information visit the following resources: An introduction to UR Codes The UR Encoder Demo Learn more at About is an educational resource for biometrics users, vendors, analysts, media, and regulators, providing a comprehensive history of Level 1-5 Presentation Attack Detection, Template Tampering, and Camera Bypasses, as well as explanations of methods and means for evaluation, certification testing, and bounty programs. View original content to download multimedia: SOURCE FaceTec, Inc.
Yahoo
19 minutes ago
- Yahoo
Ex-SEC staff warns of another Lehman Brothers collapse
Ex-SEC staff warns of another Lehman Brothers collapse originally appeared on TheStreet. Amanda Fischer, the former Chief of Staff at the Securities and Exchange Commission (SEC), has issued a blunt warning following the regulatory agency's Division of Corporation Finance revealing its latest stance on liquid staking activities. On Aug. 5, the Division released a statement as per which certain liquid staking activities associated with protocol staking don't constitute the sale of securities, and therefore, parties associated with these activities need not register with the SEC under the securities laws. Let's first break down the concept of liquid staking. Crypto staking refers to the process of staking or locking up your digital assets like Ethereum to help secure a proof-of-stake (PoS) blockchain and earn rewards in staking goes one step further and lets you not only stake your crypto assets in exchange for rewards but also doesn't lock up those assets and instead makes them liquid so that they can continue to be traded. This is how the process takes place. When you stake your crypto assets, you receive a tokenized version of these assets, such as sETH, which can be traded in the market. While the SEC Chairman Paul Atkins hailed the statement for offering clear guidance on crypto, Fischer slammed it as giving validation to "rehypothecation" that led to the collapse of the Lehman Brothers. Rehypothecation is the practice of a lender using collateral received from a borrower for their own benefit, often to secure their own loans or participate in other transactions. Note that the practise played a crucial role in the Lehman Brothers collapse and subsequent 2008 financial crisis. Since the new guideline allows rehypothecation in crypto without the SEC or Fed's oversight, it's worse, Fischer crypto assets and receiving duplicate tokens for trading is no different from Lehman Brothers borrowing customers' assets and using them as collateral to make other bets in the market, she warned. Akin to 30x bets on subprime mortgage If these "synthetic" tokens fail or get hacked, it can exacerbate losses, she cautioned. "Assets can also be restaked and restaked and restaked - generating synethic token upon synthetic token. It begins to look a lot like the leverage on derivatives tied to mortgages. A subprime mortgage is a risk to one bank - but when there are 30x bets on that mortgage? Woof" Fischer also underlined how long the wait times are for unstaking crypto assets. While such an activity in traditional securities markets is heavily regulated, the SEC is letting the crypto industry get away with it, she added. Ex-SEC staff warns of another Lehman Brothers collapse first appeared on TheStreet on Aug 6, 2025 This story was originally reported by TheStreet on Aug 6, 2025, where it first appeared. Sign in to access your portfolio