|
Winter is nearly here, which means you and your family will probably be spending more time inside huddled around your gaming systems and smart devices. Cyber crooks understand people young and old are playing games on their devices and they are prepared to do whatever it takes to trick you and your family into falling for a variety of scams.
It doesn't matter if you're playing 'Words with Friends, Fortnite, Call of Duty, Wordle or Roblox, you need to follow these best practices to protect your information. Check out my recommendations for keeping sensitive information secure and protecting yourself while playing online games. You probably didn't know this but online gamers are common targets for cybercriminals. You always need to have your guard up, because anyone you or your children encounter in an online video game could be a cyber crook who may try to steal your sensitive information. Here are some of the threats to your data security and safety that you may encounter while playing games online. Stolen accounts. Video game accounts are targets for cybercriminals because they are often linked to credit cards and contain important personal information. They are also valuable for the achievements and rare in-game items you earn while playing. These achievements make your gaming accounts valuable and can be sold to others. Doxxing. This occurs when crooks and other malicious players publish your home or office address publicly and usually with malicious intent. People will then use that to harass and target you, Swatting. Sometimes cybercriminals use your leaked personal information to send the police a false tip about a crime, which prompts them to send emergency services – such as a SWAT team – to your house. Harassment and cyberbullying. You aren't always at risk from cybercriminals. There are malicious people in gaming communities who commit acts of stalking and sustained harassment, which means incidents of harassment that originate from online gaming and can move into real-life environments. How You Can Stay Safe While Online Gaming Luckily, the risks of online gaming can be minimized with simple, but effective tips 1. Is your personal information floating on the dark web? There have been many online gaming sites that have suffered data leaks. In 2022, the companies that make Roblox, Elden Ring, and Dark Souls suffered data breaches. Do a quick check to see if your gaming credentials have been leaked on www.haveibeenpwned.com If your information has been leaked, immediately change the passwords for the gaming accounts that have been leaked as well as ones that were using the same password as those that were leaked. 2. Start using passphrases on your gaming accounts. If you stick to the old practice of using passwords, your accounts will continue to get hacked. A passphrase is a password created with two unrelated words that are combined to create secure protection for your gaming accounts. Using a unique, random passphrase with at least 8 characters for each of your gaming accounts can protect you from many online gaming threats. Need help creating one, visit www.useapassphrase.com 3. Use a Password manager. You might be reluctant to use a password manager for your gaming accounts because of the 2022 LastPass breach. Remembering all of your unique passwords is a nearly impossible challenge, so we recommend using a password manager to remember them for you. Whatever web browser you use, Chrome, Safari, Opera, Brave or Edge is great for saving all of those hard-to-remember passwords. 4. Enable 2 Factor Authentication (2FA) 2FA requires an additional method of authentication – usually a code sent to your email address or smartphone which helps prevent an attacker from getting into your account with just your credentials. Most online gaming platforms offer sophisticated 2FA options, as cyberattacks in online gaming are common. 5. Use a Virtual Private Network (VPN) while playing online games. A VPN is worth it for online gamers because threat actors who encounter you on a live gaming platform may be able to see your IP address, which can give away your location. Because a VPN hides your traffic, it also hides your location. Knowing your location is the first step in attacks like doxing and swatting. 6. Keep your gaming software updated. Don't ignore those updates, they are released because there's a credible vulnerability in the game you're playing. Software updates contain security patches that fix known vulnerabilities. Cybercriminals often target users shortly after the security patch is released in hopes of exploiting a vulnerability before users have a chance to update and fix it. 7. Pick an anonymous username. Never use your real name when playing games online. When you share your personal information like birthdays, names (including middle names), and age, a cyber crook actor can use any tiny piece of information to target you online. 8. Use a credit card to make purchases. Credit cards have more protection against fraudulent charges, so it’s recommended to use them instead of debit cards to make purchases online – including in video game stores like Steam. I hope you can use these tips to keep safe when gaming online. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help. Looking for More Useful Tips Tips? My Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, I LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 1:00 pm CST on Facebook, Instagram, LinkedIn, and Twitter. Technology product reviews are posted every Thursday. You can view previous episodes on my YouTube channel.
0 Comments
With scorching summer temps in the forecast, it’s time to break out the hats and sunscreen to protect ourselves. And make sure you don't forget your favorite tech devices… they need protection from the heat too!
The summer heat can cause damage to your mobile devices when left out in the sun, but don't worry! Your favorite tech expert is here to drop some knowledge and help you prevent your smart devices from melting down. Check out these quick and easy tips to help keep your devices cooler in the summer heat. 1. Know the "safe range" for temperatures. Most tech devices are good to go in temperatures of 50° to 90° Anything warmer than this is asking for trouble. Laptop, smartphone, and tablet batteries are notoriously not heat-friendly and the components of your delicate hard drive or internal storage might expand—sometimes causing permanent damage which puts you at risk of losing documents, photos, and music stored on your devices. 2. NEVER leave your tech devices in a hot car. Treat your tech like a baby and don't ever leave it in a warm car—not even in the trunk. The temperatures in your car on a warm day are almost always going to reach outside the safe range of your device. If you must leave your tech in a car, make sure it's been turned off completely. 3. Avoid high humidity. Many laptops, tablets, and smartphones can experience electrical problems when the humidity is very high. Don't work outside with your device on days like this or you could fry your device. 4. Stay out of direct sun, if you can. Yes, heat usually comes with lots of direct sunlight. We've heard all the urban legends about your device's screen becoming damaged from sun exposure, but we can't find anything to support it. Either way, it's better to be safe than sorry. 5. Don't put your devices on ice if they start to overheat. If your smartphone, tablet, or laptop starts to show signs of overheating, place it under the shade to gradually cool off. Remember, do not put your device in the refrigerator or freezer; the rapid temperature change can cause condensation buildup that could damage the circuit. I hope you can use these tips to help you stay safe when you're using your devices this summer. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. We're well into summer which means many of you are involved with vacation trips, camp, and leisure days. Unfortunately, extreme weather is probably part of your summer plans which means you need to have a plan in place to stay safe from excessive heat, violent storms, and hazardous smoke from forest fires.
Even when your power and cell service are uncertain, your smartphone and other tech devices can help you avoid those uncertain times. Check out some tips to help you use your tech through major meteorological moments. Here's what you need to know: 1. Get a Digital Antenna. Digital Antennas equal free TV. Your local channels such as PBS, ABC, CBS, NBC, and Fox were meant to be free. Think about it. How many times has a storm knocked out your cable or satellite service? With an antenna, you can keep safe if your internet service goes out. Your local channels will still be able to get you the information you need to keep your home and family safe in the event of an emergency. When you get a digital antenna, make sure you re-scan for channels occasionally which will help you stay on top of emergency updates. 2. Download a weather app on your smart devices. It's rare that your cellular service will go out in extreme weather which is why it's a good idea to download and set up alerts on Apple’s Weather app, the Google app or a specialized weather app to keep you notified. Bookmarking web pages in your browser — like those for the National Oceanic and Atmospheric Administration, the National Hurricane Center, or the U.S. Air Quality Index — is good for manual checks of current conditions. Also, your smartphone can also receive wireless emergency alerts from authorized federal, state, local, and tribal, authorities. Make sure these settings are enabled on your smartphone or tablet. 3. Get an Amazon Echo Show or a Google Home Hub. If you currently have an Echo or Google Home and you've cut the cord, it's time to upgrade. If you aren't familiar, the Echo Show and the Google Home Hub both have screens that are constantly showing news and other alerts. When there is severe weather in your area, these smart-home devices will show you what's going on. You can even take it a step further by programming the function into these devices to give you verbal alerts in the case of extreme weather. 4. Save Important items to Your Digital Wallet. Keeping track of all of your important documents is the last thing you want to do in extreme weather. If you can, upload your credit and debit cards to your digital wallet app on your phone. Also, make sure you have photos or pdfs of your health care cards and drivers license. Just about every major insurance company has its own mobile app that you can use for filing a claim, getting roadside assistance, and checking documents that are part of your policy. If you have not installed your provider’s app and set up your account on your phone, do it before you need to use it. 5. Stock Up on Power Sources. If the power goes out, you will need alternative ways to charge your phone. Technology like solar panel battery packs, a power cable for your car’s 12-volt dashboard outlet, or hand-cranked chargers. These tech items can keep your tech devices charged and ready to help you out. 6. Check out Gas Buddy and Google Maps. Extreme weather can often disrupt gasoline delivery and other items on the supply chain. Gas Buddy will not only help you find the cheapest gas prices, it also has an outage tracker feature, that can help you find working gas stations. Google Maps also you to keep track of Air quality as well as wildfires. It will also help you navigate the roads and alert you of closures if you have to evacuate during extreme weather. 7. Get a Weather Radio. In times of extreme weather, you can never predict what services you will lose. TV, Internet, and cellular signals can all fall victim to storms in your area. To keep everyone safe in extreme weather, the National Weather Service has a dedicated radio station that transmits around the country. A weather radio can help you get this important information. Also, most weather radios do not require charging and will work in all weather conditions. Hopefully, this post has given you the information you need to keep yourself safe from extreme summer weather. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer repair service near you? My company Integral offers the highest quality computer repair service nationwide. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. The summer months can be dangerous time for teens, as extra free time can lead them to do careless things like talking to strangers on online forums. If you're a parent of a tween or teen, you need to make sure you're speaking to your teens about the dangers of sharing sexual material online, especially because of the rise of sextortion scams targeting them.
Sextortion involves criminals reaching out and forming relationships with teens on social media platforms like Snapchat, BeReal, Discord, as well as online gaming platforms. With the help of AI, criminals are able to disguise themselves as teens to friend them and trick them into sending nude photos. Here's what you need to know: How does it work? Cyber crooks setup online profiles or steal social media accounts that appear to be around the same age as the victim. They then begin reaching out with friend requests on various online chat platforms, and then move the conversation to a platform such as Instagram where they can view the victim’s personal information and contacts. They then send the victim an intimate image and encourage them to take part in video chats or sharing their own intimate pictures. Screenshots are taken of intimate images and videos are recorded. As soon as an intimate image or video has been shared, the victim is told they have been recorded and that the recording or pictures will be shared online or with their friends and family unless a ransom is paid immediately. The scammers apply pressure to the victim and tell them the image will be deleted as soon as they pay. Some cases have incurred losses in the thousands of dollars, and these are just the cases that are reported. What's worse with sextortion, there have been instances of teens who feel they are put into a no-win situation with this scam and they take their lives when faced with public humiliation from having the photos and videos released to family and friends. What are some of the signs of a sextortion scam? Some tell-tale signs of a sextortion scam include but are not restricted to:
What to do if your teen has fallen victim to sextortion? If your children have fallen victim to a sextortion scam, then immediately support, without questions of why they did what they did, to ensure that they do not pay, and that they and you are prepared for how people may react if the images or video is released.
Hopefully, this post has given you the information you need to keep your teens safe from the dangers of sextortion scams. If you think you're being targeted, don't hesitate to reach out. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer repair service near you? My company Integral offers the highest quality computer repair service nationwide. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. Threads is a new app from Meta, which is touted as the 'Twitter Killer'. The app looks a lot like Twitter, with a feed of largely text-based posts, but like Twitter, you can also post photos and videos as long as five minutes. Content posted to Threads has a 500-character limit and like Twitter, users can reply to, repost, and quote others’ Threads posts. Also, the app offers the ability to share posts from Threads directly to Instagram Stories. Here's what you need to know:
What's the difference between Twitter and Threads? There are many differences between Twitter and Threads even though the interface looks the same. With Twitter, you're expected to share your thoughts and feelings as well as keep up with current events. Threads is more geared for social networking. On both platforms, you can share pictures, videos, and website links. You're limited to 280 characters on Twitter while Threads allows you to post 500 characters per post. There is direct messaging on Twitter, but none on Threads. Twitter has a strong hashtag presence but there isn't one on Threads. Also, Twitter is an independent app whereas Threads is tightly integrated into Instagram. Finally, you can use Twitter from a desktop computer and app while Threads is only available via an app. How to get started with Threads. You're probably thinking "Oh no, not another social media app" but if you're a solo, small, or even large business, you might want to reconsider and embrace this new social media app. It's estimated that the Threads user count cruised past 30 million in under 24 hours. To get the app, just visit the Apple App Store or the Google Play Store and download it to your device. Once you've downloaded the app, you be asked to set up an account. The great thing about Threads is you can import your account information from Instagram and even follow the same people you follow on Instagram. Posting content is simple as Threads layout is pretty similar to an Instagram Feed and you can share pretty much the same content to Threads as you would to Instagram. Why do you want to jump on another social media platform? As of this writing, the Threads algorithm hasn't quite kicked in so you will see more content and fewer ads at this stage of the game. Also, if your company uses digital marketing, you should always have several social media accounts you post content to in the event that something happens to one or more of your accounts. With criminals targeting social media accounts, it's likely one of your accounts can fall into the hands of cybercriminals. Also, current algorithms can mistake innocent content you post as something malicious or offensive and you can wind up in social media jail or suffer a lifetime ban. What about fake accounts? Do I need to worry about those? As with any social media account, you're bound to get criminals who set up shop at some point, but as of this writing, there aren't any fake accounts on the platform. If a criminal had an Instgram account they stole, it's possible they could transfer that account to Threads, so beware. Is it safe? Is Threads looking at my data? Don't be fooled into thinking this is a freebie from Meta as there are still privacy issues with Meta. The goal with Threads is to compete with Twitter, but the ultimate goal is for the tech giant Meta to pull even more users into its universe and to lure many who left Facebook back. Just like most social media apps, Threads is able to collect a wide range of personal information, including health, financial, contacts, browsing and search history, location data, purchases, and “sensitive info”. Just check out those terms of service. As with any social media account. Use strong passwords or passphrases to keep those accounts secure. If you have a little free time this week, why not add another app to your smartphone or tablet? For the time being, you can experience an add free fun social media platform and perhaps connect with some friends you haven't seen in a while. Let me know your thoughts about Threads. Hopefully, this post has given you the information you need to know about Meta's new app Threads. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. by Burton Kelso, The Technology Expert
Thank goodness for Bluetooth and Bluetooth-connected devices. This technology allows you to share data between your devices including your smart home gadgets, your headphones, and your smartphone. The best part is you can eliminate some of those wires you use to connect your devices. Many of you connect to your devices with Bluetooth, but you need to understand there are some risks involved. With anything involving technology, cybercrooks will find a way to take advantage. With anything wireless, criminals can find ways to intercept the signal between your devices. Here's what you need to know: Bluetooth works great when it comes to connecting your electronics through the Internet of Things (IoT). As beneficial as Bluetooth is, you need to understand it can potentially cause major security risks. All wireless technology is at risk of being hijacked, but one of the benefits of Bluetooth is that it only has a range of about 500 feet, which means if a criminal is going to attack your devices, they would have to be within range of your Bluetooth signal. Here are some of the methods crooks are using to get access to your personal information: Car whispering. This is a Bluetooth security threat where criminals target your car radio and entertainment systems that have Bluetooth capabilities. Once they are logged into your system, crooks will listen in on phone calls and conversations. and phone calls that take place inside the car. Bluebugging. This cyber threat allows cybercriminals to get access to your Bluetooth connections via backdoor access. Once in, crooks can peep in on you and access your private information for the purpose of impersonating you and stealing your identity. Bluesmacking. When criminals attack your devices with bluesmacking, they send messages and information to your devices until your devices shut down making them unusable to you. Bluejacking. Did you know your Bluetooth signal can be hijacked to be used to send out phishing and spam messages? Criminals can gain access to your Bluetooth to send out spam and phishing messages. Usually, when these attacks occur, criminals will send out messages that contain dangerous links that could direct you to websites will malware. Bluesnarfing. When a Bluesnarfing attack occurs, crooks log into your devices via Bluetooth with the goal to steal information from your devices such as text messages, emails, photos, and more. Can I Tell If My Bluetooth is hacked? Bluetooth attacks are designed to be discrete, so they are very difficult to identify. Here are some warning signs you can look for:
How to stay safe using Bluetooth. Bluetooth offers many benefits that make using your devices fun and connecting your Bluetooth-enabled devices is a simple process. However, you need to be aware of security risks involving Bluetooth and how to stay safe. Here's what you need to know. Make sure your device can't be found using Bluetooth. One of the easiest ways to keep your devices safe is to turn off Bluetooth when you're not using it on your devices. Each of your devices has different instructions on how to turn it off, so here are some steps for every device: Apple devices:
Don't share your sensitive information over Bluetooth. Avoid sharing your personal information over Bluetooth. If you happen to be in an area with a Bluetooth hacker, your chances of them intercepting your private information are lessened. Don’t pair new devices in public. If you’re pairing devices for the first time, be sure to do so from a secure location. When you pair devices in public, it can allow hackers to hijack the process and connect to your device. Hopefully, this post has given you the information you need to stay safe when using Bluetooth technology. Following these security tips, you can use your Bluetooth devices without worrying about mobile threats. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer repair service near you? My company Integral offers the highest quality computer repair service nationwide. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. Summer vacation trip season has officially started and many of us will travel during the summer months for family vacations, college visits, weddings, reunions, or a romantic getaway. Vacations can be fun, but traveling can put you and your family at risk for identity theft and credit card scams. Fortunately, in our digital age, your smartphone can play a big role in helping protect you from the dangers of cybercrime when you travel. Want to keep you and your family safe? Check out these quick and easy tips to keep you out of the crosshairs of criminals. Use the hotel app to unlock your room. If you're staying at a major hotel chain this summer, download their app and enable the feature that will let you store your room key on your phone. Room keys are easy to lose and steal. If a criminal steals your card and knows your room number, you are in trouble. Room keys stored on your phone are safer and give you one less thing to worry about. Pay for everything with your smartphone. Apple Pay and Samsung Pay are two of the most secure ways to make payments. For the gas pump, you can avoid credit card skimmers designed to steal your credit card information. For shopping, your information is encrypted, meaning criminals won't be able to wirelessly steal your card information. If you don't have Apple Pay or Samsung Pay, your debit/credit card should allow you to tap to pay at most major retailers. Use it and stay safe. Emergency apps and Road Assistance apps are a must. Emergency apps keep you alerted to the weather in your area, and road assistance apps can help you quickly identify a service provider in the area. Mishaps occur on the road, so you need to be able to contact someone if you're stranded. Use AirTags and SmartTags to track family members. Yes, there has been a lot of negative press about AirTags and SmartTags being used to track victims by their abusers, but you can actually use this technology to track family members. Obviously keeping your eyes on family members is the best option, but if an emergency happens, a tag can help you find your loved ones quickly. Use AirTags and SmartTags To Track Your Luggage. Lost luggage is always a risk when you're on the road, which is why you need to place an Apple AirTag or a Samsung SmartTag in your luggage. You can't control if your luggage will make it to your destination, but at least you will know where in the world it is at all times. Turn on Find My Device to Keep Track of Your Devices. Find my device is available for every device out there which helps to keep your devices out of the hands of criminals. GPS technology means that you can find your device within 5 feet of the location of the device or the person who has stolen your device. I hope you can use these tips to help you stay safe when you're traveling. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Deepfake or synthetic videos are a scary new form of technology that criminals are using to commit blackmail and identity theft cyber scams. Deepfakes have been around for a while with people using them for entertainment purposes and you've probably already seen this type of technology in use such as popular deep fake videos featuring Jim Carrey's face replacing Jack Nicholson's in The Shining or Jerry Seinfield's face replacing the man hiding in the bathroom in Pulp Fiction.
There are tons of examples of deep fakes floating on the web that are entertaining, but now you need to beware because criminals with the help of AI are able to create videos so convincing, they can fool anyone. What is a Deep Fake Video? Deepfake videos use an artificial intelligence (AI) technology called deep learning. Deep learning works by collecting information to 'get smarter' about the task it's set to perform. In the case of deep fake video software programs, it's designed to analyze data when it comes to facial structure and facial movements in the video. When the deep fake software gathers enough information, it can take existing photos and superimpose them over an existing video and match out the face structure and movements generating a realistic video that is fake. What is even more troublesome, with current AI technology you can generate one of these videos in as little as 8 minutes. How Can Criminals Scam You? One of the things that makes deep fakes scary is there are a number of programs that are easily available on the internet, and you don't need a high-end graphics computer or extensive video editing knowledge to create fake videos. Also, in our digital world, criminals or even malicious strangers can easily get video and audio of you from online sources such as social media. Types of Deepfake Scams: Phishing Scams. Phishing is the act of acting as if you're an authority figure or a trusted business. Criminals can create videos that look as if they come from a trusted source to scam you out of money. Blackmail. Criminals can threaten to send suggestive and inappropriate videos that have been altered to have your face to your friends and family unless you pay the demanded ransom. Identity Theft. Criminals can capture images, video and audio of you on social media and then use that information to trick people into giving out your personal information that criminals can use to assume your identity. Workplace Phishing Scams. In this world of virtual working, it's easy for a criminal to get information photos of your workforce, this can then be used to trick you into giving up critical company information. Political Scams: Political deep fake scams involve using deep fake technology to create fake videos or audio clips of political figures. These videos or audio clips are used to spread false information or to change public opinion. How to protect yourself from AI-deep fake scams. This new wave of tech scams goes way beyond avoiding clicking on links and spotting when a phone scam appears on your phone. It's important that you pay double attention when trying to avoid deepfake scams as they appear. The best thing you can do is to trust your instincts. if it doesn't feel right to you, then it probably isn't. Other things to look for are: The lips aren't in sync with the video. You notice that the subject in the video has a jerky movement. Facial skin tone doesn't match up to other body parts. There are noticeable shifts in video lighting from one frame to the next Strange blinking or no blinking at all. Good basic security procedures will always be effective at stopping all cyber threats. Other things you should implement are: Make sure you, your family, and your co-workers know how to spot a deep fake. Learn how to identify reliable news sources and don't rely only on social media for your news. Become a skeptic when it comes to voicemail and videos. Always make sure your files are automatically backed up on all of your devices. This will help you if you or your company falls for a ransomware attack. Stop using passwords and start using passphrases for all of your online accounts. Use different passwords for all of your online accounts to keep them safe from the hands of criminals. If someone gets into one of your online accounts, you don't want them to be able to get into your other accounts. Hopefully, this post has given you the information you need to stay safe from the dangers of Deep Fake AI Scams. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@burtonkelso.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer repair service near you? My company Integral offers the highest quality computer repair service nationwide. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. uice Jacking may sound like the latest bullying technique kids are using in the lunchroom to harass and steal juice and other beverages. However, Juice Jacking refers to the latest tactics used by criminals to install viruses and malicious software on mobile devices such as smartphones and tablets.
Crooks can also steal your passwords, credit card information, addresses, names, and other data. Attackers can also install malware to track keystrokes, show ads, or add devices to a botnet. The scary part is these attacks can happen in any public place where portable wall chargers or USB charging stations are available. How can you keep safe? Check out these tips that can help you avoid Juice Jacking attacks. Juice jacking attacks can happen in any public place that offers USB charging stations. These places normally include airports, train stations, coffee shops, hotels, and other places where groups of people would normally gather with their devices. With Juice Jacking, criminals take advantage of one of the popular features of your smartphone and tablets which is to allow you to connect these devices to your desktop or laptop computer to transfer information between the two. When you plug your gadgets into public charging stations, your phone thinks you're connected to your computer and allows the charging station and the criminals to access everything on your device. Once your phone is connected and charging, the attacker can upload malware to your device, initiate data transfers, or monitor your keystrokes. Juice Jacking isn't limited to smartphones, criminals can access anything that needs a USB cable to charge. That means mobile phones and tablets, but also smartwatches, fitness bracelets, and even laptops (if they support USB charging – and many do). There are several things criminals want to achieve with Juice Jacking. There are as follows: The Installation of ransomware. For criminals, installing ransomware is a good way to gain access to your files and data because it's a great way for criminals to scare you into giving up your information. If you were to receive an alert on your device saying that you need to call a number to get access to your files, you're probably going to do whatever it takes to remove the infection, including calling a number that's clearly from a bogus company. Malware attacks. Malware attacks can be as simple as tracking your keyboard movement on your device and as complex as making a clone of all of the information on your device to be transferred to another phone in their possession. Once they have your information, they can commit identity theft. They want to attack many devices. Criminals can install bots on your devices that are designed to get your user data, but these bots lurk on your smartphone until you hook into another charging port. Once you do, they can seek out other devices and install bots on other devices so they can take control of these devices as well. Beware, that other device could be your personal desktop or laptop computer. Criminals can disable your devices. Cyber crooks can be downright malicious and disable your devices in a juice jacking attack the most prominent way to do this is to commit SIM Card fraud where a criminal gets your SIM card information along with other personal details. They can then call up your cellular provider and ask them to transfer your phone information to your phone. Doing so allows criminals to make phishing and other malicious calls from your cell phone to unsuspecting victims. How to avoid Juice Jacking. If you want to avoid a juice jacking attack, the best solution is to avoid public charging stations. While it's convenient when you're running low on battery for your devices, it can become a lot more of a headache if you're unlucky enough to become a victim of this cyber attack. Things that you can do instead of using charging ports is to always carry a wall plug to use when you are traveling. Another good tool to have is a battery charging pack that will allow you to charge your devices when getting low on power. Finally, if you depend on public charging stations, you could purchase a 'USB condom' that will block the USB connections that are used for transferring data, and allow the connections that are used for charging. You can find battery packs and USB condoms on Amazon or any place that sells computer accessories. I hope you can use these tips to prevent your smartphones and other devices from being hacked by cyber crooks. hackers. Juice Jacking isn't a widespread problem yet, but cybercriminals are always looking for ways to get access to your gadgets and information, so beware. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Artificial Intelligence (AI) is a concept has been around since ancient times, but in our digital world, we are beginning to see the concept come to life. Smart devices have invaded our lives in the form of smart home gadgets, as well as software-based tools like Grammarly.
In the past few months, AI has become more evolved as ChatGPT was released by Open AI last fall. This tool allows you to ask questions using natural dialogue to which this chatbot gives answers in conversational mode. This chatbot can remember the course of your dialogue, using questions and answers you've already asked to formulate more responses as the conversation goes on. It can also pull answers and information from the wealth of resources on the Internet. Why is ChatGPT taking up the conversation on the Internet? Read on to find out why this system is raising so many eyebrows. What's the big deal with ChatGPT? ChatGPT was released by OpenAI in November 2022 for the propose of showing what a very powerful AI system can do. Unlike many resources on the internet where you have to physically use search engines like Google or Bing, you can go to ChatGPT ask it countless questions which will usually deliver useful information. For example, you can ask it questions that you would look up on Google or on an old school encyclopedia. You can ask questions like "Why is the sky blue during the day", or something more complex like "Explain Einstein's formula E=MC2". You can ask it to "write me a poem" or "create a haiku". You can even ask it to write a computer program. The list is almost endless in the questions you can ask. The interesting thing about ChatGPT is that it doesn't really know anything, so it isn't intelligent. It simply knows how to find the information you're looking for by searching the large amount of data that's on the internet and is able to deliver it in a way that is easy for you to understand. Since ChatGPT isn't fully 'aware' and is just gathering data, sometimes the information you get from your request may be wrong. Chatbots like open AI have been around for years. One of the things AI researchers are trying to solve is the Turing Test which was created by Alan Turing. The Imitation Game that Turing created was designed to test intelligence with the question of "Can a human conversing with a human and with a computer tell which is which?" For years, companies and hackers have tried to use AI. With companies, the use of AI is to help reduce the workload of humans by having AI handle mundane customer service requests. Criminals create chatbots as a means to phish information from unsuspecting users on social media and other online mediums. What are the Pros and Cons of ChatGPT It's Free. At the time of this writing, ChatGPT can be downloaded and used on any device out there. Start at https://chat.openai.com/chat to start playing around with this AI and see what it can do for you. It Remembers. Unlike most other chatbots, ChatGPT remembers previous questions and answers in the same conversation. AI can be helpful as it begins to understand what your thinking process is and help you find solutions to the questions you ask. Bilateral interactions. As you discuss various subjects, you can provide follow-up corrections so that ChatGPT adapts its responses to better focus on what matters most to you. You can also ask it for clarity on the responses you get back. It pays close attention to your Terms. ChatGPT pays attention to every word in your sentences or questions to provide as complex and detailed answers as you want. For example, the questions "explain how black holes work in simple terms" and "explain how black holes work in advanced terms" will result in two different answers. It is an Ethical AI. Queries are filtered to prevent ChatGPT from producing potentially racist, sexist, violent, or non-ethical outputs. It ain't perfect. ChatGPT is impressive, but it is absolutely not a perfect solution to every problem. It still has limitations, and the developers know it, as it may occasionally generate incorrect information, harmful instructions, or biased content, and has limited knowledge of the world and events after 2021. Also, it cannot browse the internet or provide information on websites. As with Google itself and other sources of information like Wikipedia, it's best practice to verify information from original sources before relying on it. Hopefully, this has given you an explanation of ChatGPT and how it impacts you. This AI is bringing us closer to a world of full artificial intelligence, but we have a ways to go. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! |
Categories
All
Archives
November 2023
|
Grain Valley NewsGrain Valley News is a free community news source published weekly online. |
Contact Us |