Connect with us

Technology

Cheap Black Friday deals cost to your privacy

Published

on

Cheap Black Friday deals cost to your privacy

It’s the perfect time to pick up holiday gifts for your family and treat yourself to that pricey watch you wouldn’t splurge on otherwise.

Black Friday is a worldwide cultural and economic phenomenon today. It comes with much anticipation, great discounts and a shopping frenzy. Its success is such that it now lasts the whole month. But don’t let the excitement cloud your judgment. 

The deals are enticing, but there are dangers lurking beneath the surface.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

A woman shopping online on her laptop. (Kurt “CyberGuy” Knutsson)

Advertisement

The devil’s in the privacy policy

Particularly when it comes to online shopping, we give up personal data with every purchase. Information such as your email address, name and address is necessary to create an account or receive a delivery. And that’s fine as long as it’s used for these purposes only.

However, the fine print linked under “Privacy Policy” that you agree to at checkout often comes with a long list or, worse still, an unspecified number of third parties with which your data will be shared. Retailers often sell personal information and purchase histories to third parties, such as marketing companies and data brokers, who use it to build detailed consumer profiles. Once it’s out there, it’s very hard to remove your information from these third-party databases.

Arguably, this happens all the time, Black Friday or not. But with all the marketing strategies pushing us to buy quickly and buy more, we’re just less likely to pay attention.

shopping online

A woman shopping online on her laptop. (Kurt “CyberGuy” Knutsson)

BEST WAY TO CONNECT YOUR NEW LAPTOP TO EXTERNAL DEVICES

The spam and scam aftershock, a post-Black Friday hiccup

The term “Black Friday” was originally coined in the 1950s by Philadelphia police officers to describe the chaos that ensued the day after Thanksgiving, when hordes of shoppers and tourists flooded the city.

Advertisement

After the shopping extravaganza of Black Friday, your inbox and phone may experience their own dark moments. A surge in spam is widely reported during the month of November. This unwanted communication can come from several sources.

First, from the online shops where you’ve left your email and phone number. Second, from all the companies that received your consumer profile, the ones listed (or not) in the fine print of the privacy policy. Third, from all the retailers you bought from in the past, including that one-time purchase of a kettlebell set three years ago (that you’d rather forget).

But that’s not all; Black Friday is a fiesta for hackers, too, and the perfect time for social engineering attacks! The urgency and excitement of Black Friday deals encourage you to let your guard down. You’re likelier to click on links or open attachments without checking the source. And less likely to notice that a phishing email pretending to be sent by a big retailer has sneaked into your inbox. Your data is being collected, shared and sold as you read this article.

keyboard

A woman shopping online on her laptop. (Kurt “CyberGuy” Knutsson)

THE DANGEROUS INTERSECTION OF PEOPLE SEARCH SITES AND SCAMS 

How to buy without being sold at the same time

Reading privacy policies every time you buy something isn’t realistic. If you’re ambitious, use the search function (Ctrl+F or Command+F) to find terms like “opt out,” “unsubscribe” or “do not sell” to quickly locate sections where you can limit data sharing. Depending on where you live, these options may simply not be available to you.

Advertisement

An easier solution is to use a disposable email address whenever you open an account for the sole purpose of making a purchase. Once you receive your order confirmation, you can disable it so that no further communication is sent your way. You can also use privacy-focused tools or browsers that block tracking cookies and prevent companies from collecting your data.

laptop shopping

A woman shopping online on her laptop. (Kurt “CyberGuy” Knutsson)

5 SECRETS TO SHOPPING SMARTER ON AMAZON

8 tips to safeguard your email after Black Friday

As the dust settles from the shopping rush, it’s crucial to be proactive; here are eight essential tips to help you protect your email and personal information from the surge of spam and scams that often follow.

1. Create alias email addresses. An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address. An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of best secure and private email services here. 

2. Use a password manager to consistently use complex passwords that you can change frequently.

Advertisement

3. Avoid opening attachments or clicking on links from emails unless you are sure they are from a trusted source. Scammers or hackers can easily change the name of the sender to make it look like it came from a legitimate organization such as Amazon or an individual.  But if you click the email header, you will see the sender’s actual email address. By pretending to be a reputable organization, the crooks send urgent messages to make you click on links, reply or provide personal information in an attempt to fix a problem or claim a reward. If you click on a malicious link, then a scammer may be able to access your email and other personal data.

4. Have strong antivirus software on all your devices: The best way to protect yourself from having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Malicious links are often disguised as legitimate ones, but they can download malware onto your device without your knowledge. Malware is a type of software that can damage your device, steal your personal information, or give hackers access to your data. Hackers can then use your data for various purposes, such as identity theft, fraud or blackmail. This is why it is important to have antivirus software that can detect and remove malware before it causes any harm. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Go directly to the official site where you have any accounts, such as your financial institution, to check if any changes or charges were made instead of clicking links in the email you received or responding to the email. This way, you can avoid falling for phishing scams and keep your account secure.

Advertisement

6. Limit the number of accounts or profiles you create with your personal email account.

7. Regularly scrub your personal information on the internet. You don’t want spammers to take your email and add it to their lists, do you? That would result in annoying and potentially dangerous messages flooding your inbox. To prevent that, you need to make sure your personal information is not exposed on the internet. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

8. Using a VPN (Virtual Private Network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

I’ve been scammed! What to do next?

If a scammer gets hold of your email address, they can use it to access your other accounts, send phishing emails to trick you into revealing your passwords or personal details, or even impersonate you to commit fraud or other crimes. This is why it is important to protect your email address from falling into the wrong hands and to act quickly if you suspect that it has been compromised. Below are some next steps if you find you or your loved one is a victim of identity theft.

1. If you can regain control of your accountschange your passwords and inform the account provider.

Advertisement

2. Look through bank statements and checking account transactions to see where outlier activity started.

3. Use identity theft protection services to manage your personal information on and offline. Identity Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number, and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using identity theft protections services is that it can include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

4. Report any breaches to official government agencies like the Federal Communications Commission.

Advertisement

5. You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft, and if being a victim of criminal identity theft leaves you unable to secure employment or housing.

6. Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7. Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.

If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

Kurt’s key takeaways

Navigating the world of online shopping during Black Friday can be a thrilling yet daunting experience. While the discounts are enticing, they often come with hidden costs — namely, your personal data. As you prepare your shopping list, consider utilizing tools to safeguard your information. These resources can help you maintain your privacy while enjoying the benefits of online shopping. Also, remember that post-Black Friday, you may find yourself inundated with spam and unwanted communications from retailers and third parties. Taking proactive steps now can save you from future headaches.

Advertisement

Have you ever experienced a data breach or privacy issue while shopping online? How did you handle it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

A fully electric Chrysler Pacifica is in the works

Published

on

A fully electric Chrysler Pacifica is in the works

Chrysler is working on a fully electric version of the Chrysler Pacifica minivan, according to Green Car Reports. The EV version reportedly would “likely” come a year after the company debuts a Pacifica design refresh that features elements of the Halcyon concept that Stellantis showed off earlier this year.

At the moment, the Pacifica lineup includes a standard gas-powered minivan and a plug-in hybrid with an estimated 32-mile electric-only driving range before it switches over to gas. Chrysler CEO Christine Feuell, who confirmed the plans to Green Car Reports during the LA Auto Show on Thursday, wouldn’t say whether the company will keep the plug-in hybrid alongside the all-electric model.

Chrysler will reportedly need to rejigger the Pacifica’s “Stow ‘N Go” seating system, which lets owners fold seats down to make a flat loading floor, to accommodate Stellantis’ BEV powertrain. Feuell told the outlet that one solution it’s considering would involve storing the second-row seats underneath the front seats. Another idea reportedly involves putting second-row outboard seats on rails that let them slide sideways.

Continue Reading

Technology

The Supreme Court will decide the fate of America’s low-income broadband fund

Published

on

The Supreme Court will decide the fate of America’s low-income broadband fund

The Supreme Court agreed to hear arguments on a case involving funding for a major broadband subsidy program, the Universal Service Fund (USF).

SCOTUS granted cert in a pair of cases called Federal Communications Commission v. Consumers’ Research, and Schools, Health & Libraries Broadband Coalition v. Consumers’ Research, which were consolidated for oral arguments. They center around whether Congress inappropriately delegated lawmaking function to the FCC by letting it set contribution rates for telecommunications companies to pay into the nonprofit Universal Service Administration Company, which manages the USF. It also asks whether the FCC delegated too much authority to a private entity by letting USAC manage the subsidy program.

The case could deal another blow to the regulator’s authority, after SCOTUS dismantled the Chevron doctrine earlier this year, which diminishes courts’ reliance on agency expertise. It could also jeopardize the USF, which helps provide funding for people who are low-income or in rural areas access telecommunications and broadband services, and also helps school get internet access and equipment.

The case reaches the Supreme Court after the Fifth Circuit Court of Appeals ruled that the funding arrangement around the USF violates the Constitution. The Supreme Court asked the parties to also file briefs about whether the case is moot since the challengers didn’t seek preliminary relief before the appeals court.

Three industry groups — NTCA, Competitive Carriers Association, and USTelecom —applauded the court’s decision to hear the case, and said the Fifth Circuit’s ruling in the case defies Supreme Court precedent and other circuit court decisions. The Fifth Circuit decision “threatens to undermine universal service programs that, for many decades, have served to promote the availability and affordability of critical communications services for millions of rural and low-income consumers, rural health care facilities, and schools and libraries across the nation,” they said in a joint statement.

Advertisement
Continue Reading

Technology

How to easily record phone calls on your Android

Published

on

How to easily record phone calls on your Android

Have you ever wished you could save that important conversation or hilarious chat with your bestie? 

Well, you’re in luck. Here’s a nifty trick to record phone calls right on your Android device. If you have an iPhone, you can learn how to record calls using these steps

Let’s dive in.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

A person recording a call on Android. (Kurt “CyberGuy” Knutsson)

Advertisement

The setup: enabling call notes 

First things first, let’s get your phone prepped for recording:

 Settings may vary depending on your Android phone’s manufacturer.

  • Open up your Phone app.
  • Tap those three little dots in the top right corner.
  • Click Settings.
  • Tap Call Notes.
  • Now, just toggle that switch to enable Call Notes.
recording an android call 2

Steps to enable Cal Notes. (Kurt “CyberGuy” Knutsson)

BEST ACCESSORIES FOR YOUR ANDROID

Recording your call

Now that you’re all set up, here’s how to actually record a call:

 Settings may vary depending on your Android phone’s manufacturer.

Advertisement
  • Start a call like you normally would.
  • Look for the “More” button and tap it to expand your options.
  • See that “Call Notes” option? Tap it to start recording.
  • Both you and the person you’re talking to will hear a notification that says, Google Notes is on the call is being recorded.”
recording an android call 3

Steps to record a call. (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY PICKS 2024

Ending the call recording

When you’re done chatting:

 Settings may vary depending on your Android phone’s manufacturer.

  • Just hit that “End Call” button like usual.
  • Your recording will stop automatically.
  • You’ll get a notification confirming that your call has been saved.
recording an android call 4

Steps to end the call recording. (Kurt “CyberGuy” Knutsson)

HOW TO HIDE PHOTOS ON ANDROID FROM SNOOPS

Finding your recorded calls

So, where did that recording go? Don’t worry, it’s easy to find:

Advertisement

 Settings may vary depending on your Android phone’s manufacturer.

  • Open up your Phone app again.
  • Tap on the “Recents” tab.
  • Find the call you just recorded and give it a tap.
  • Look for the “Call Notes” section — you’ll see a summary and a link to your recording.
  • Tap that link to play or send your newly recorded call by tapping the share icon.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

recording an android call 5

Steps to find the recorded call. (Kurt “CyberGuy” Knutsson)

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICE

The legal lowdown: Know before you record

Alright, before you get all excited and start recording every call like you’re a secret agent, let’s have a quick chat about the legal stuff. You see, recording calls isn’t as straightforward as picking up your phone and hitting ‘record.’ Different places have different rules. In the good ol’ US of A, it gets even trickier. Some states are like, “Hey, as long as one person knows about the recording, we’re cool.” But others? They’re more like, “Nuh-uh, everyone on that call better know they’re being recorded, or you’re in trouble, mister!”

So, what are you to do? Well, my friend, it’s time to put on your detective hat and do a little digging into your local laws. Trust me, it’s way better to spend a few minutes Googling now than dealing with legal headaches later. Remember, when in doubt, just ask. Most people won’t mind if you record the call, especially if you have a good reason.

Advertisement
recording an android call 6

A man recording a phone call on Android. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

There you have it — recording calls on your Android is a breeze. But remember, with great power comes great responsibility. Always consider the legal and ethical implications before hitting that record button. When used responsibly, call recording can be a fantastic tool for preserving important information or simply capturing those priceless moments with loved ones.

What are your thoughts on recording phone calls? Do you find them useful, or do you have any concerns about privacy and legality? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

KURT’S HOLIDAY GIFT GUIDES 

Best gifts for MenWomenKidsTeensPet lovers 

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Trending