|
Deepfake or synthetic videos are a scary new form of technology that criminals are using to commit blackmail and identity theft cyber scams. Deepfakes have been around for a while with people using them for entertainment purposes and you've probably already seen this type of technology in use such as popular deep fake videos featuring Jim Carrey's face replacing Jack Nicholson's in The Shining or Jerry Seinfield's face replacing the man hiding in the bathroom in Pulp Fiction.
There are tons of examples of deep fakes floating on the web that are entertaining, but now you need to beware because criminals with the help of AI are able to create videos so convincing, they can fool anyone. What is a Deep Fake Video? Deepfake videos use an artificial intelligence (AI) technology called deep learning. Deep learning works by collecting information to 'get smarter' about the task it's set to perform. In the case of deep fake video software programs, it's designed to analyze data when it comes to facial structure and facial movements in the video. When the deep fake software gathers enough information, it can take existing photos and superimpose them over an existing video and match out the face structure and movements generating a realistic video that is fake. What is even more troublesome, with current AI technology you can generate one of these videos in as little as 8 minutes. How Can Criminals Scam You? One of the things that makes deep fakes scary is there are a number of programs that are easily available on the internet, and you don't need a high-end graphics computer or extensive video editing knowledge to create fake videos. Also, in our digital world, criminals or even malicious strangers can easily get video and audio of you from online sources such as social media. Types of Deepfake Scams: Phishing Scams. Phishing is the act of acting as if you're an authority figure or a trusted business. Criminals can create videos that look as if they come from a trusted source to scam you out of money. Blackmail. Criminals can threaten to send suggestive and inappropriate videos that have been altered to have your face to your friends and family unless you pay the demanded ransom. Identity Theft. Criminals can capture images, video and audio of you on social media and then use that information to trick people into giving out your personal information that criminals can use to assume your identity. Workplace Phishing Scams. In this world of virtual working, it's easy for a criminal to get information photos of your workforce, this can then be used to trick you into giving up critical company information. Political Scams: Political deep fake scams involve using deep fake technology to create fake videos or audio clips of political figures. These videos or audio clips are used to spread false information or to change public opinion. How to protect yourself from AI-deep fake scams. This new wave of tech scams goes way beyond avoiding clicking on links and spotting when a phone scam appears on your phone. It's important that you pay double attention when trying to avoid deepfake scams as they appear. The best thing you can do is to trust your instincts. if it doesn't feel right to you, then it probably isn't. Other things to look for are: The lips aren't in sync with the video. You notice that the subject in the video has a jerky movement. Facial skin tone doesn't match up to other body parts. There are noticeable shifts in video lighting from one frame to the next Strange blinking or no blinking at all. Good basic security procedures will always be effective at stopping all cyber threats. Other things you should implement are: Make sure you, your family, and your co-workers know how to spot a deep fake. Learn how to identify reliable news sources and don't rely only on social media for your news. Become a skeptic when it comes to voicemail and videos. Always make sure your files are automatically backed up on all of your devices. This will help you if you or your company falls for a ransomware attack. Stop using passwords and start using passphrases for all of your online accounts. Use different passwords for all of your online accounts to keep them safe from the hands of criminals. If someone gets into one of your online accounts, you don't want them to be able to get into your other accounts. Hopefully, this post has given you the information you need to stay safe from the dangers of Deep Fake AI Scams. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer repair service near you? My company Integral offers the highest quality computer repair service nationwide. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829.
0 Comments
uice Jacking may sound like the latest bullying technique kids are using in the lunchroom to harass and steal juice and other beverages. However, Juice Jacking refers to the latest tactics used by criminals to install viruses and malicious software on mobile devices such as smartphones and tablets.
Crooks can also steal your passwords, credit card information, addresses, names, and other data. Attackers can also install malware to track keystrokes, show ads, or add devices to a botnet. The scary part is these attacks can happen in any public place where portable wall chargers or USB charging stations are available. How can you keep safe? Check out these tips that can help you avoid Juice Jacking attacks. Juice jacking attacks can happen in any public place that offers USB charging stations. These places normally include airports, train stations, coffee shops, hotels, and other places where groups of people would normally gather with their devices. With Juice Jacking, criminals take advantage of one of the popular features of your smartphone and tablets which is to allow you to connect these devices to your desktop or laptop computer to transfer information between the two. When you plug your gadgets into public charging stations, your phone thinks you're connected to your computer and allows the charging station and the criminals to access everything on your device. Once your phone is connected and charging, the attacker can upload malware to your device, initiate data transfers, or monitor your keystrokes. Juice Jacking isn't limited to smartphones, criminals can access anything that needs a USB cable to charge. That means mobile phones and tablets, but also smartwatches, fitness bracelets, and even laptops (if they support USB charging – and many do). There are several things criminals want to achieve with Juice Jacking. There are as follows: The Installation of ransomware. For criminals, installing ransomware is a good way to gain access to your files and data because it's a great way for criminals to scare you into giving up your information. If you were to receive an alert on your device saying that you need to call a number to get access to your files, you're probably going to do whatever it takes to remove the infection, including calling a number that's clearly from a bogus company. Malware attacks. Malware attacks can be as simple as tracking your keyboard movement on your device and as complex as making a clone of all of the information on your device to be transferred to another phone in their possession. Once they have your information, they can commit identity theft. They want to attack many devices. Criminals can install bots on your devices that are designed to get your user data, but these bots lurk on your smartphone until you hook into another charging port. Once you do, they can seek out other devices and install bots on other devices so they can take control of these devices as well. Beware, that other device could be your personal desktop or laptop computer. Criminals can disable your devices. Cyber crooks can be downright malicious and disable your devices in a juice jacking attack the most prominent way to do this is to commit SIM Card fraud where a criminal gets your SIM card information along with other personal details. They can then call up your cellular provider and ask them to transfer your phone information to your phone. Doing so allows criminals to make phishing and other malicious calls from your cell phone to unsuspecting victims. How to avoid Juice Jacking. If you want to avoid a juice jacking attack, the best solution is to avoid public charging stations. While it's convenient when you're running low on battery for your devices, it can become a lot more of a headache if you're unlucky enough to become a victim of this cyber attack. Things that you can do instead of using charging ports is to always carry a wall plug to use when you are traveling. Another good tool to have is a battery charging pack that will allow you to charge your devices when getting low on power. Finally, if you depend on public charging stations, you could purchase a 'USB condom' that will block the USB connections that are used for transferring data, and allow the connections that are used for charging. You can find battery packs and USB condoms on Amazon or any place that sells computer accessories. I hope you can use these tips to prevent your smartphones and other devices from being hacked by cyber crooks. hackers. Juice Jacking isn't a widespread problem yet, but cybercriminals are always looking for ways to get access to your gadgets and information, so beware. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Artificial Intelligence (AI) is a concept has been around since ancient times, but in our digital world, we are beginning to see the concept come to life. Smart devices have invaded our lives in the form of smart home gadgets, as well as software-based tools like Grammarly.
In the past few months, AI has become more evolved as ChatGPT was released by Open AI last fall. This tool allows you to ask questions using natural dialogue to which this chatbot gives answers in conversational mode. This chatbot can remember the course of your dialogue, using questions and answers you've already asked to formulate more responses as the conversation goes on. It can also pull answers and information from the wealth of resources on the Internet. Why is ChatGPT taking up the conversation on the Internet? Read on to find out why this system is raising so many eyebrows. What's the big deal with ChatGPT? ChatGPT was released by OpenAI in November 2022 for the propose of showing what a very powerful AI system can do. Unlike many resources on the internet where you have to physically use search engines like Google or Bing, you can go to ChatGPT ask it countless questions which will usually deliver useful information. For example, you can ask it questions that you would look up on Google or on an old school encyclopedia. You can ask questions like "Why is the sky blue during the day", or something more complex like "Explain Einstein's formula E=MC2". You can ask it to "write me a poem" or "create a haiku". You can even ask it to write a computer program. The list is almost endless in the questions you can ask. The interesting thing about ChatGPT is that it doesn't really know anything, so it isn't intelligent. It simply knows how to find the information you're looking for by searching the large amount of data that's on the internet and is able to deliver it in a way that is easy for you to understand. Since ChatGPT isn't fully 'aware' and is just gathering data, sometimes the information you get from your request may be wrong. Chatbots like open AI have been around for years. One of the things AI researchers are trying to solve is the Turing Test which was created by Alan Turing. The Imitation Game that Turing created was designed to test intelligence with the question of "Can a human conversing with a human and with a computer tell which is which?" For years, companies and hackers have tried to use AI. With companies, the use of AI is to help reduce the workload of humans by having AI handle mundane customer service requests. Criminals create chatbots as a means to phish information from unsuspecting users on social media and other online mediums. What are the Pros and Cons of ChatGPT It's Free. At the time of this writing, ChatGPT can be downloaded and used on any device out there. Start at https://chat.openai.com/chat to start playing around with this AI and see what it can do for you. It Remembers. Unlike most other chatbots, ChatGPT remembers previous questions and answers in the same conversation. AI can be helpful as it begins to understand what your thinking process is and help you find solutions to the questions you ask. Bilateral interactions. As you discuss various subjects, you can provide follow-up corrections so that ChatGPT adapts its responses to better focus on what matters most to you. You can also ask it for clarity on the responses you get back. It pays close attention to your Terms. ChatGPT pays attention to every word in your sentences or questions to provide as complex and detailed answers as you want. For example, the questions "explain how black holes work in simple terms" and "explain how black holes work in advanced terms" will result in two different answers. It is an Ethical AI. Queries are filtered to prevent ChatGPT from producing potentially racist, sexist, violent, or non-ethical outputs. It ain't perfect. ChatGPT is impressive, but it is absolutely not a perfect solution to every problem. It still has limitations, and the developers know it, as it may occasionally generate incorrect information, harmful instructions, or biased content, and has limited knowledge of the world and events after 2021. Also, it cannot browse the internet or provide information on websites. As with Google itself and other sources of information like Wikipedia, it's best practice to verify information from original sources before relying on it. Hopefully, this has given you an explanation of ChatGPT and how it impacts you. This AI is bringing us closer to a world of full artificial intelligence, but we have a ways to go. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! If you received smart home items, computers, phones, or tablets for holiday gifts, you need to remember to set up those tech items in a way where they aren't going to be compromised by hackers. Cyber-criminals are always on the prowl for your personal information so it's in your best interest to make sure those new tech toys are going to be safe and secure in the coming year. Not sure where to start? These tips should help you get started in the right direction.
1. Create strong security for your online accounts. Usually, the difference between you getting hacked and not getting hacked is the strength of your passwords. In our digital society, most of our online accounts are web-accessible. This makes it convenient for you to get access to your stuff, but that means criminals can get access to it too. Using secure passwords means you minimize the risk that your devices will be hacked. Make sure all of your devices and online accounts have 2 Factor Authentication enabled. Also, you will want to make sure you're not using the same password for your devices and online accounts so you don't fall victim to 'credential stuffing' or hackers using your breached information hiding on the dark web to access your stuff. Also, keep tabs on data breaches by visiting www.haveibeenpwned.com 2. Stop Your Devices From Spying on You. Smart devices are great because of all of the information that they allow us to access. The downside, these devices are keeping track of what you view and what you read. Many Smart TVs use a feature called ACR, or “Automatic Content Recognition.” This feature scans what you watch and sends the data to marketing firms to they can send targeted ads to you. Google and Amazon are guilty of using your recordings to develop their software. Ring users can potentially have their home and office locations made public because of their neighbors' software features. Fortunately, each of these devices allows you to enable privacy settings and remove your user information. 3. Setup Your Devices to Perform Automatic Backups. If you got new tech devices as gifts that store data, make sure you have set up automatic backups for them. You never know when your devices will get hit with a virus, ransomware or just fail. You have many options to choose from such as Carbonite (www.carbonite.com) Google Backup and Sync (www.google.com) and iCloud Backup (www.apple.com). 4. Don't Let Your Neighbors Know What Gifts You Purchased. It's tempting after the gift exchange is done to set those old boxes on the curb. Yes, those boxes are out of the house, but you're also advertising your new tech to thieves who are looking to get some holiday tech gifts of their own. Break those boxes down and hide them in closed-lid recycling containers to keep them out of prying eyes. If you have space, you might want to keep those boxes. Most tech gear is under warranty for at least a year. If you keep your boxes, it's easy for you to ship your items back if you need warranty repair. If you like selling your old tech items, they have more appeal if you resell them in their original boxes. 5. Update Your Devices On a Regular Basis. Hackers are always looking for new ways to get into your devices and the companies that make your hardware devices are aware of this. When a bug or security flaw is discovered, hackers will take advantage of this. That's why hardware and software companies work hard to patch your gadgets to keep you safe. It's always important to make sure you update your software and hardware devices. 6. Register your devices. I never used to register my devices, but I do now. So many changes with tech devices such as product recalls, updates, and security vulnerabilities. When you register your tech gear, you will always know what your warranty is, if there are any product updates, and get faster access to tech support if you have problems with your devices. In some cases, registering your device can help you recover your devices if they are stolen. 7. Enable Device Tracking for Mobile Items. All smart gadgets are sought after by thieves which is why it's a good idea to enable the tracking features of your devices. The GPS feature built into your devices will help you recover your device if it's lost or stolen. If you have Apple products, you can enable the 'Find My' feature for your iPhone, MacBook Pro or iPad. If you have Windows 10 device, you can enable Windows tracking, and Android computers, phones, and tablets have the "Find My Device' feature. 8. Stop giving out your email and mobile number. Email addresses that are out in the public domain allow criminals to log into your online accounts and put you at risk of spam messages in your inbox. Create an email with a free email provider that you share with the public and keep one for your personal use. Same thing with your mobile number. If a criminal get ahold of your smartphone number, they can resort to SIM card fraud which puts your smartphone account at risk of being lost forever. Hopefully, this guide has given you some clarity on what to do to protect your tech items. Tech gifts sometimes make the best gifts to receive during the holiday season. In our digital age, you need to take extra steps to make sure your devices are protected from cybercriminals and thieves to ensure that you're able to enjoy your gadgets safely and securely for a long time. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. If you prefer to connect with me on social media, you can find me on Facebook, Instagram, LinkedIn, and Twitter, and watch great tech tip videos on my YouTube channel. I love technology. I've read all of the manuals and I want to make technology fun and exciting for you. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. My team of friendly tech experts are always standing by to answer your questions and help make your technology useful and fun. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. The week of October 3rd, Grain Valley Schools experienced a cyber-attack, resulting in a disruption to certain district computer systems. In a brief statement, the district stated the investigation into the cause and impact continues.
"Grain Valley School District (GVSD) recently began experiencing technical difficulties, resulting in a disruption to certain computer systems. We are working diligently with third-party IT specialists to investigate the source of this disruption, confirm its impact on our systems, and restore full functionality to our systems as soon as possible. We appreciate your patience and understanding and apologize for any inconvenience." The district had been in the process of migrating to a new phone system when the cyberattack occurred. According to Dr. Amanda Allen, Assistant Superintendent, Student and Community Services, "until the investigation is complete, the migration is postponed. It will resume as soon as the cyber-attack is resolved." Burton Kelso, Chief Technology Expert with Integral, explains the majority of cyber-crime requires user interaction, which means if you take the time to educate yourself about the different cyber threats on the Internet, you can keep yourself and your business safe. Kelso outlines the threats individuals and business owners may encounter and how to protect yourself from them. 1. Accidental Sharing. This occurs when you or a friend accidentally shares sensitive information such as hitting 'reply all' to an email or when you use Carbon Copy (CC) to send out an email to a lot of connections rather than clicking on Blind Carbon Copy (BCC). How to Stay Safe: Don't be in such a rush when sending out emails and other information. When you fail to take the time to watch what information you're sharing, you're risking exposing sensitive information such as passwords to home and work accounts, company sensitive emails, and more. 2. PDF Scams. If you aren't familiar with what a PDF is, it stands for "Portable Document Format" and was developed by Adobe. These scams are on the rise because even though you will probably avoid clicking on a link on an email or downloading most attachments, you probably will attempt to open up a PDF file. Why? Well, if you see a PDF file as a file attachment, you will assume it's an important document and open it up. How to Stay Safe: Beware of generic emails that show up in your inbox that come from unknown sources and have generic greetings. Also, if you get a PDF file unexpectantly, if possible, call the sender of the email to verify they were the ones who sent it. 3. Credential Stuffing. The act of credential stuffing means using the same username and password information to log into online accounts. This form of cyber-crime relies on people not changing their login credentials on a regular basis. Cybercriminals get on the dark web to look for username and password data dumps. Once they get this information, they use bots to automatically your information to attempt to log into common social media and email sites to get the personal data stored in these accounts. Once they get more information about you and where you visit on the internet, they will use this information to log into your financial accounts and even work accounts. How to Stay Safe: It's important that you keep an eye on large-scale data breaches to verify your information hasn't been leaked as well as making sure you don't use the same usernames and passwords for your online accounts. Check to see if your information has been leaked at www.fightingidentitycrimes.com and at www.haveibeenpwned.com. Keep track of all of your pesky passwords by storing them in your favorite web browser or use a password management software program like LastPass (www.lastpass.com) 4. Vishing and SMShing. Vishing or voice call phishing has been around for a while (think tech support scam phone calls), but SMShing or SMS Text phishing has risen during the pandemic because people respond to text messages easier making it more likely that you'll fall for a scam. Both use a technique called "social engineering' which is designed to get you to react to a phone call or email rather than taking the time to think if it's a legit call or not. Samples of these types of attacks usually involve there is a problem with a personal or work account, problems with your computers and technology, or a subtle sales pitch to get you to purchase something you don't need. How to Stay Safe: The best defense against voice phishing and SMS phishing is to ignore the message if you don't recognize who's calling or leaving a message. If you're a small business or home user, limit who you share your home or mobile phone number with. If you have to share a number with the public, create a 'free' phone number with Whatsapp (www.whatsapp.com) or Google Voice (www.google.com). If you have a lot of incoming spam calls coming in, sign up for the Do Not Call Registry at www.donotcall.gov. Check to see if your mobile carrier offers spam call and text protection. You should also consider download and using the RoboKiller app (www.robokiller.com). 5.Ransomware. Ransomware is probably one of the most devastating cyber threats on the web today. If your home or office computer is infected with ransomware, it could mean the files on your devices are lost forever. Ransomware encrypts or locks up the pictures and documents on your devices. Ransomware is so lethal, it will infect multiple devices that are connected together on your home or office network, including cloud storage services and external hard drives used for backup. You are only able to gain access to them if you pay the ransom criminals will put up. How To Stay Safe: Ransomware normally shows up in the form of a phishing email, so think before you click on any link or attachment that shows up in your inbox. Set up an automatic backup system for all of your home and office devices. Services like Carbonite (www.carbonite.com) can keep your Windows and Macintosh safe in the cloud with automatic backup. For your smartphones and tablets, it's worth it to pay Apple and Google the extra money for storage to allow you to backup your information to their cloud services. In a world where the internet connects all your devices and allows you to work from home and communicate with your loved ones, staying on top of cyber threats has never been more important. Imagine this scenario. You're shopping at a store. You go to the checkout to make your purchase. All of a sudden you get an email receipt. How did they get your name, your email, and your credit card information? Criminals don't have to get access to your computer and devices to get your personal information. There are many ways your information falls into the hands of cyber crooks.
Most businesses have access to your personal information and many of the point-of-sale services used such as Square and Clover share this information across their network. In this digital age, you should be aware your information is everywhere, and now more than ever you need to make sure that you know where it is and make sure it doesn't fall into the wrong hands. How do criminals get access to this information that is supposed to be safe and secure? Check out these tips to keep your data safe. When you deal with any business, their main priority is to keep your information safe and secure. As I stated before, many shops collected your data in a variety of ways such as registering as a "preferred customer" or joining a mailing list for coupons, newsletters, and a variety of other perks. Most do a good job at keeping your data private, but sometimes your information can get out of their hands and into the hands of crooks who are always looking to get access to your data. Here are some of the ways they do it: Data breaches. One of the most common ways criminals get access to your data is through data breaches. These occur when crooks gain access to a business computer and steal information. Sometimes they release your information on the dark web or they sell your secrets to interested parties who want to steal your identity. In the instance I shared above with POS or point of sale services, like most financial institutions, they do an excellent job keeping your information safe and secure. One of the best ways to see if you're a victim of a data breach is to check out www.haveibeenpwned.com. This site will let you know if your information is floating around on the dark web. If you discover that you have been a victim of a data breach, change the passwords to your accounts immediately. Phishing Emails, Text Messages, and Phone Calls. The places you share your personal information with aren't the only ones guilty of sharing your information with criminals. Phishing schemes are designed to trick you into sharing your info with crooks. Phishing works when you get an Email, text, or phone call from someone pretending to be a representative from a trusted company you've worked with. Using social engineering tactics, they scare you into giving up information like your full name, address, credit card numbers, and more. An example of phishing is if you got a phone call from your cell provider, IRS, or a retailer saying there was a problem with your account, and they needed a payment to fix the issue. Your first instinct is to fix the issue by providing whatever information is being asked. Once thieves have your info, they can use it to access your account – and run up your credit cards or make purchases. They can even steal all of your private information. Name Scraping. Another way cybercrooks thieves attempt to steal your info is through name or data scraping. This is where they use 'bots' to pull off a variety of information about you from social media and other websites. Once your information is collected, criminals use this information for spam campaigns or phishing information. Be careful not to share too much information on your social media sites and beware when using web forms on websites. If the website isn't secure, criminals can easily gather your information. Spoofed Websites. Criminals create spoofed websites that look just like legitimate website to collect your information. Sometimes you will get these websites in the form of a phishing email or text. In other instances, you may see them in a popup that appears in the form of an ad or popup on a legitimate website. When visiting websites, never do it from a link or a popup. Open a browser and type in the website address to access the information you need to access. Ransomware. In standard Ransomware attacks, criminals will block access by the means of data encryption to your files in exchange for money. More recently, criminals will also steal your files and gather information from them. If you become a victim of ransomware, make sure you change all of your personal information to mitigate the risk of having your personal information used against you. I hope you can use these tips to understand how criminals can get access to your information. 99% of cybercrime requires user interaction in the way of clicking on links of falling for the variety of schemes out there. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Since the beginning of the pandemic, cybercrime has become more rampant among individuals and businesses. Most of you are familiar with common cyber-attacks such as phishing, smishing, vishing, credential stuffing, and ransomware attacks. However, an old tactic called scareware is starting to increase.
Scareware works with criminals using web browser popups to trick you into thinking your computer or smart device is infected with a virus or has been hacked. What can you do about this latest threat? Check out these quick and easy tips to make sure you don't fall for this latest trap from crooks trying to steal your data. 99% of all cyberattacks require user interaction. This means, you have to click on a link or pop up before your device is infected. Scareware attacks work so well against you because they use social engineering tactics which create a sense of urgency and fear. This makes you want to take action right away rather than to stop and think if the threat is real. If you get a message on your computer or device that pops up saying there is a virus or other problem, you will want to take care of it immediately rather than having your device ruined. There are several ways hackers will use to launch a scareware attack on your devices: Malvertising. Malvertising is known as malicious advertising. Criminals use third-party software to show bogus ads that will take you to infected websites. This allows cybercriminals to spread malware, posing as legitimate ads on popular websites. When looking at ads on a website, make sure it's for legitimate products or services. Pop-up Alerts: Web Browser popups are one of the most common scareware attack techniques used by hackers. This method is considered 'drive-by hacking' as it relies on you visiting websites that are designed to infect your devices. Hackers do this by purchasing domain names of the misspellings of popular websites. Once you visit the website, a file or plugin when downloaded to your device and create a popup message. Sometimes the popup alert is small allowing you to close the pop-up. Sometimes the pop-up takes up the full screen of your devices making it impossible to get rid of it. In most cases, these pop-ups are stubborn and difficult to shut down. If you experience such an issue, press Ctrl + Alt + Delete to restart your system if you're using Windows. Apple devices you can hit Option, Command, and Esc (Escape) to close the Window. iOS and Android devices, you will have to power the device down completely and restart it. Phishing. Phishing comes in many forms, voice, text, and email, and is used by criminals to get you to visit bogus websites. Pretending to be a legitimate company, scareware phishing attempts ask you to click on a link to do a number of things such as downloading software, to help remove a threat, or to fill out a form with your personal information. File Downloads/Web Browser Plugins. Sometimes hackers will offer you free software, books, songs, or web browser plugins. Beware, as sometimes criminals will hide malware inside these offers. Tips to Avoid Scareware. It doesn't matter your level of tech intelligence; anyone can become a victim of scareware. Always watch where you surf on the web and what you click on. Most people think criminals break into their computers and devices. In most instances, you're the one who is giving access to crooks. Here are some tips to keep you safe. Don’t React Immediately. Scareware is fear-based. Sometimes when you download it on your computer, you might hear a warning message, sirens, and other things to make you take action. When you get one of these pop-ups on your device, slow down and take your time. In most instances, you can simply close down the pop-up. Identify the Sender with incoming emails. If you get a strange email, you can read it, but never click on links to download files or visit a website without identifying the sender. Don't click on unknown links in emails or text messages. If you’re not familiar with a domain address or you can't tell what website the link will have you visit, don't click on it! I hope you can use these tips to help identify scareware in any form that it can show up on your devices or computers. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Looking for More Useful Tech Tips? Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 1:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. You can view previous episodes on our YouTube channel. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. With summer in full swing, it’s time to break out the hats and sunscreen to prepare ourselves for scorching temperatures. And make sure you don't forget your favorite tech devices… they need protection from the heat too!
The summer heat can cause damage to your mobile devices when left out in the sun. Don't worry! Your favorite tech expert is here to drop some knowledge and help you prevent your smart devices from melting down. Check out these quick and easy tips to help keep your devices cooler in the summer heat. 1. Know the "safe range" for temperatures. Most tech devices are good to go in temperatures of 50° to 90°. Anything warmer than this is asking for trouble. Laptop, smartphone, and tablet batteries are notoriously not heat-friendly and the components of your delicate hard drive or internal storage might expand—sometimes causing permanent damage which puts you at risk of losing documents, photos, and music stored on your devices. 2. NEVER leave your tech devices in a hot car. Treat your tech like a baby and don't ever leave it in a warm car—not even in the trunk. The temperatures in your car on a warm day are almost always going to reach outside the safe range of your device. If you must leave your tech in a car, make sure it's been turned off completely. 3. Avoid high humidity. Many laptops, tablets, and smartphones can experience electrical problems when the humidity is very high. Don't work outside with your device on days like this, or you could fry it. 4. Stay out of direct sun, if you can. Yes, heat usually comes with lots of direct sunlight. We've heard all the urban legends about your device's screen becoming damaged from sun exposure, but we can't find anything to support it. Either way, it's better to be safe than sorry. 5. Don't put your devices on ice if they start to overheat. If your smartphone, tablet, or laptop starts to show signs of overheating, place it under the shade to gradually cool off. Remember, do not put your device in the refrigerator or freezer; the rapid temperature change can cause condensation buildup that could damage the circuit. I hope you can use these tips to help you stay safe when you're using your devices this summer. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. Summer road trip season officially started on Memorial Day weekend, but you are bound to take a trip throughout the summer months for family vacations, college visits, weddings, and romantic getaways. Vacations can be fun but traveling can put you and your family at risk for identity theft and credit card scams.
Fortunately, in our digital age, your smartphone can play a big role in helping protect you from the dangers of cybercrime when you travel. Want to keep you and your family safe? Check out these quick and easy tips to keep you out of the crosshairs of criminals 1. Pay for everything with your smartphone. Apple Pay and Samsung Pay are two of the most secure ways to make payments. For the gas pump, you can avoid credit card skimmers designed to steal your credit card information. For shopping, your information is encrypted meaning criminals won't be able to wirelessly steal your card information. If you don't have Apple Pay or Samsung Pay, your debit/credit card should allow you to tap to pay at most major retailers. Use it and stay safe. 2. Use the hotel app to unlock your room. If you're staying at a major hotel this summer, download their app and enable the feature that will let you store your room key on your phone. Room keys are easy to lose and steal. If a criminal steals your card and knows your room number, you are in trouble. Room keys stored on your phone are safer. One less thing to worry about. 3. Use a Wi-Fi hot spot rather than that free wireless network. Not all free wireless networks are bad, but when traveling you never want to take a chance that that free Wi-Fi is actually a criminal's computer collecting your data. If at all possible, use a Wi-Fi hotspot for the Internet when traveling as it allows a secure connection that criminals won't be able to spy on. 4. If you HAVE to use free Wi-Fi, download a VPN. Your cellular signal won't be available everywhere you travel and sometimes getting Internet is a must. A VPN or virtual private network creates a secure tunnel for your data when you're on public wireless networks which means the bad guys can't see what you're doing. 5. No public computers. Public computers pose no threat, but what if you forget to log out of your secure accounts. It means the next person who uses it has access to your sensitive data. 6. Emergency apps and Road Assistance apps are a must. Emergency apps keep you alerted to the weather in your area. Mishaps occur on the road, so you need to be able to contact someone if you're stranded. I hope you can use these tips to help you stay safe when you're traveling. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Limiting screen time is always a battle, especially in summer. Your kids may have gotten used to increased screen time during the pandemic and will probably push back against you. The battle over smart devices like phones, tablets, gaming systems, and laptops can sometimes feel like too much.
As a parent with two teenage sons, I know the stress of trying to wrangle kids off their devices to have them do chores or even settle down for bedtime. The struggle is real! If left unchecked, too much screen time can lead to sleeplessness, irritability, and depression. No matter what devices your children play on, if you're wanting an easy way to help reduce stress in your life when it comes to allowing reasonable screen time this summer, follow these tips: 1. Make sure you set clear rules and consequences. You probably relaxed on those screen time rules during the pandemic and now that things are almost back to normal, you're having a heck of a time trying to reinstate them. Whenever you introduce your kids to technology, you need to set rules so there is no misunderstanding of how technology is supposed to be used. If you want your kids to do homework or chores before technology use, make sure they understand that upfront. If they are only supposed to play on their devices as opposed to your company laptop, you need to tell them. Sometimes you will sound like a broken record, but you need to keep reminding them what the rules are. Also, don't forget to stand firm with consequences if they don't follow your rules. Don't be afraid to take devices so they understand you mean business. 2. Set a good example as a parent when it comes to your devices. You are probably using your devices for work, but you also have to set a good example when it comes to your technology usage. If your kids see you constantly on your devices, then it sends a signal to them that they should be on them too. Set limits for yourself when using technology around your children. 3. Parents, everyone has to be on board with limiting screen time. Traditional home life, blended home life, or divorced home life, it doesn't matter. Everyone has to be on the same page when it comes to technology usage during the school year and during the summer months. If one parent is using technology as a babysitter and another parent has consistent rules when it comes to device limits, it's just going to cause confusion and frustration with your kids. Please, please, please ... I'm begging like James Brown, everyone get on board so you can have less stress. 4. Take devices away at night. There is no good reason children should have tech devices at night. This means you've enabled parental controls to shut those devices down after a certain time. It means you're not allowing your children to take devices to bed with them. If you don't, you will wake up to a sleep-deprived child who decided they needed to have an all-night marathon playing their favorite game with strangers, some of whom could be attempting to groom your child for a face-to-face meeting. 5. Make sure you set up other outdoor 'distractions' that will take them away from their devices. Things have opened back up again. Take your kids out of the house and leave those devices behind. Day trips, picnics, the list is endless of things you and your kids can do 6. Setup a 'No Tech' Zone for your kids. My wife always shares a story of an event that took place years ago when I made kids visiting stack their phones on the dining room table as we ate. You should do the same when it comes to areas of your home. Your child doesn't need a device in every room. They get too distracted. Areas you could make no tech zones include bedrooms, dining rooms, and even outdoors and road trips. This helps your children realize they don't need to have a device with them for every step they take in life. I hope you can use these tips to help you limit screen time for those kids in your life. Technology devices are designed to keep you and your children plugged in 24/7. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. |
Categories
All
Archives
June 2023
|
Grain Valley NewsGrain Valley News is a free community news source published weekly online. |
Contact Us |