Connect with us

Technology

Cybersecurity experts warn of impending attacks – do this now to prepare

Published

on

NEWNow you can hearken to Fox Information articles!

Within the very first days that the Russia Ukraine struggle began, I warned you about 10 Russia-Ukraine cons to count on. We’re already seeing proof of these scams in motion. Make certain you’re maintaining your digital guard up. 

Smishing — the insider time period for rip-off texts — is a well-liked route. Most individuals are much less guarded scanning texts than emails. Search for these indicators a textual content is unhealthy information and find out how to report it

Misinformation and deceptive posts are slamming social media, too. Listed below are my tips to recognizing pretend Russian accounts and posts

Advertisement

As sanctions improve and Russia’s techniques intensify, it’s straightforward to suppose that you’ll not be affected except for excessive fuel costs. This concept is precisely what’s going to get you into bother—time to get up. 

What you should know 

In 2020, Russian hackers invaded a number of federal authorities businesses, together with the nuclear weapons company. That’s small potatoes of what might come. A Russian assault on our fiber optic cables or satellites would take down a ton of vital sectors, like web visitors, banking, GPS, water remedy amenities, energy vegetation, and the facility grid.  

Many cybersecurity consultants predict large-scale Denial of Service assaults. This assault swamps a web site with trillions of pings. The web site is so busy answering every ping that it may possibly’t reply to the rest. If this occurs, authorities and personal business might take days and even months to type out.  

Wait, there’s extra. Russia might launch phishing and different assaults to plant harmful malware and ransomware on enterprise and particular person computer systems and networks. 

Have a plan in case your web goes down 

Our minds soar to the worst-case situation in instances of misery. Say your web goes out. Earlier than blaming a large-scale assault, ensure the issue is not nearer to dwelling. 

Advertisement

Faucet or click on right here for one of the best apps you need to use to troubleshoot your unhealthy Wi-Fi for Android and iPhone. You may as well examine outage monitoring web site Down Detector if solely particular websites aren’t loading.  

In case your web is out and you’ve got cell service, you need to use your telephone as a hotspot. It’s good to set this forward of time, so that you’re snug utilizing it.  

Right here’s find out how to flip your iPhone or Android right into a cell hotspot.  

Have a plan for no cell service, too 

When Michael Jackson died 13 years in the past, so many individuals had been calling each other the nation’s cell phone system grew to become overwhelmed and unusable. Hurricane Sandy flooded decrease New York Metropolis in 2012. Once more, cell phones had been the primary service to go.  

If America is hit with cyberattacks, count on to lose dependable service. Now’s the time to work in your private plan of what you and your loved ones will do with out working smartphones. 

Advertisement

Nominate one particular person in your loved ones (possibly that particular person is you) to examine in often. Perhaps it is as soon as a day; maybe it is as soon as every week.  

If there is no cell connection, however your web is working, use your texting app, Fb Messenger, WhatsApp, or one other messaging choice to keep up a correspondence. Work out with your loved ones and pals on the chosen platform forward of time. The very last thing you wish to uncover is a sequence of panicked WhatsApp messages hours later once you’ve been making an attempt to speak through Fb Messenger. 

Know that texting will typically work even when mobile traces are jammed. 

RELATED: Anybody can intercept your textual content messages – except you’re taking this step

Discover various charging strategies 

Full disclosure: I’ve a backup generator at my dwelling. At first, I assumed it was an entire waste of cash. Now that the generator has robotically kicked in a number of instances when the facility goes out, I’m pleased that I made the funding. Faucet or click on right here for 5 strong choices

Advertisement

Mills aren’t the one technique to go. We not too long ago reviewed a photo voltaic possibility at Komando.com that may energy as much as 85% of home equipment. It’s costly however highly effective for longer-term wants. 

Alternatively, energy banks are an inexpensive technique to recharge your gadgets. Most energy banks will maintain a cost for a number of months. This energy financial institution from Anker has sufficient juice to cost two telephones, and it’s round $20. This selection is beefy sufficient to cost a laptop computer as soon as or an iPhone 11 4 instances. 

Photo voltaic-powered chargers work in a pinch. For about $50, this one from BLAVOR takes round 13 hours to recharge, then can energy up an iPhone as much as 4.5 instances. 

Fill up in your drugs 

A ransomware assault might compromise treatment provides. E-mail your physician and ask for a 90-day prescription to be stuffed. Have them e mail it to you to print it out and take a tough copy to the pharmacy.  

Higher but, create an internet account together with your pharmacy. This manner, you’ll be able to monitor any exercise and make particular requests. Getting 90-day prescriptions won’t solely hold you lined in case of provide points, however you may also have the ability to avoid wasting cash, too. 

Advertisement

Faucet or click on right here for assist organising an account together with your pharmacy

Lockdown your house community 

Adjusting router settings can really feel intimidating in case you’ve by no means finished it earlier than. Begin by logging into your router’s administration console. Each router has a distinct means of doing this; examine your handbook for particular directions.  

Don’t have a handbook? Test the producer’s web site or faucet or click on to go to a web site that compiles 1000’s of consumer manuals

You wish to have a look at the DHCP Consumer Listing or Connected Gadgets part. This exhibits what devices are related to your router, usually listed by IP tackle, MAC tackle and/or identify.  

Determine which of them belong to you. It is best to acknowledge your principal laptop’s identify, and your pill or smartphone ought to have the identify of the producer or mannequin. If you happen to can’t make sense of the checklist or determine sure gadgets, flip off every gadget one after the other. 

Advertisement

Faucet or click on right here for extra in-depth steps and directions for locking your router to outsiders

Allow antivirus in case you’re not utilizing it already 

A lot of in the present day’s malware is sneaky sufficient to cover in your system with out leaving many clues. 

There are indicators of an infection.  

Is your laptop or telephone utilizing extra knowledge than typical? Are your gadgets getting sizzling to the contact for no motive? Perhaps you see emails or texts in your outbox that you simply don’t bear in mind sending. Faucet or click on for extra clues your gadgets have been hacked

A strong antivirus program can spot the indicators that you would be able to’t. I counsel often scanning your system for malware, adware, and different threats. My decide is TotalAV, a sponsor of my nationwide radio present. 

Advertisement
Data Breach Button on Computer Keyboard

Information Breach Button on Pc Keyboard
(iStock)

Swap in your VPN, too 

A digital personal community, or VPN, is a layer of safety between your gadgets and the web. It hides your IP tackle and your location. It additionally encrypts your knowledge after leaving your machine and touring to no matter web site you are visiting. 

You desire a VPN that doesn’t harvest and promote your data and one which works throughout a number of gadgets. Most of all, it should be quick and simple to make use of. I take advantage of ExpressVPN, a sponsor of my nationwide radio present as a result of it’s all of this.  

Further steps for small enterprise homeowners 

Companies are an even bigger goal than people. In any case, that’s the place the cash is. If you happen to run a enterprise, you should get your knowledge so as. Ransomware threats are meaningless when you could have a strong backup of all of your important data. 

Faucet or click on for my professional tricks to keep away from ransomware and what to do if your organization is attacked

It is also a superb time to remind your workers to not open emails from unrecognized senders or obtain attachments they did not request. Phishing scams are too widespread and devastating to disregard. Faucet or click on right here to find out how one phishing assault lets hackers learn and ship emails out of your account

Advertisement

Lastly, take a deep breath. This isn’t a time to panic or overreact, however keep in mind that the possibilities of cyberattacks on America have by no means been greater than proper now.  

Please share this story together with your family and friends to verify they’re ready, too. 

Bonus Tip: An unbelievable story about hackers hitting up a hospital for ransomware 

Ransomware hackers not too long ago hit a hospital, and the whole lot from the cardiac machines to IV pumps stopped working. Medical doctors and nurses had to make use of pen and paper. There have been no digital affected person data. However what occurred when the hackers came upon it was a hospital will undoubtedly shock you. 

Take a look at my podcast “Kim Komando Explains” on Apple, Google Podcasts, Spotify, or your favourite podcast participant. 

Advertisement

Take heed to the podcast right here or wherever you get your podcasts. Simply seek for my final identify, “Komando.” 

What digital way of life questions do you could have? Name Kim’s nationwide radio present and faucet or click on right here to search out it in your native radio station. You’ll be able to hearken to or watch The Kim Komando Present in your telephone, pill, tv, or laptop. Or faucet or click on right here for Kim’s free podcasts. 

Copyright 2022, WestStar Multimedia Leisure. All rights reserved. By clicking the buying hyperlinks, you’re supporting my analysis. As an Amazon Affiliate, I earn a small fee from qualifying purchases. I solely suggest merchandise I consider in. 

Study all the newest know-how on The Kim Komando Present, the nation’s largest weekend radio speak present. Kim takes calls and dispenses recommendation on in the present day’s digital way of life, from smartphones and tablets to on-line privateness and knowledge hacks. For her day by day ideas, free newsletters, and extra, go to her web site at Komando.com. 

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The Pixel 9’s “Google AI” is like Microsoft Recall but a little less creepy

Published

on

The Pixel 9’s “Google AI” is like Microsoft Recall but a little less creepy

The next generation of Pixel phones could come with new “Google AI” features, including one that sounds a little like Microsoft’s controversial Recall tool. As reported by Android Authority, Google is working on a “Pixel Screenshots” feature that can “save and process helpful details” from your screenshots, allowing you to search through them.

However, unlike Microsoft Recall, which automatically captures what you’re doing on your device, Google’s version would only process the screenshots taken manually — which should immediately make it less creepy-feeling than Recall. Microsoft delayed the rollout of Recall on Windows 11 after security experts raised concerns about the feature. Even though Google AI may only use the screenshots you take, it could raise similar concerns based on how the information is processed and stored.

Images obtained by Android Authority indicate that you can enable or disable AI processing for your screenshots at any time. When toggled on, it looks like you can use the feature to summarize your screenshots or answer questions about the information in them. Google will also save metadata, such as links, app names, and when the screenshot was taken to make it easier to search for specific images, according to Android Authority.

Google is planning to roll out a similar feature in Google Photos that uses AI to help you search through your photos. These aren’t the only AI features Google is working on, either. In addition to Pixel Screenshots, Android Authority reports that a new photo editing feature called “Add Me” will live under the Google AI umbrella. This feature could let you add someone to a group photo, which goes a step further than tweaking everyone’s faces with Best Take. Google will also reportedly add a previously rumored Studio tool that could use AI to generate stickers and other images.

Continue Reading

Technology

Top 7 tips for sending sensitive documents online

Published

on

Top 7 tips for sending sensitive documents online

Gone are the days of mailing physical files or delivering them by hand to ensure the safe and secure delivery of sensitive files. While there is no guarantee or foolproof method of sharing files online, below are some of the best tips for how to share sensitive files as safely as possible.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A man handing a folder to a co-worker (Kurt “CyberGuy” Knutsson)

Top 7 tips for safely sending sensitive files online

1) Restrict access to files

Best tips for sending sensitive documents online

Red skull and bones next to protected file on a computer screen (Kurt “CyberGuy” Knutsson)

When transmitting sensitive files online, think of them as confidential documents that require stringent security protocols. Most file-sharing services offer robust access control settings, which are crucial for protecting your data. By default, shared links may allow anyone to access the file, posing a significant risk if the link is inadvertently shared with unauthorized individuals. To mitigate this, proactively adjust the settings to:

Limit access to specific individuals: Assign access rights exclusively to designated email addresses or registered users on the platform. This ensures that only verified individuals can view, edit or provide feedback on your files.

Advertisement

Use advanced permissions: Customize user permissions with granular control, determining who can download, edit or merely view the files. This prevents unauthorized alterations and distribution.

Enable link expiration: Set shared links to expire after a certain period or after the intended use, reducing the window of opportunity for unauthorized access.

Track file activity: Use the platform’s tracking features to monitor who accesses the files and when, providing an audit trail for security purposes.

By implementing these measures, you create a digital equivalent of a secure, locked filing cabinet, ensuring that your sensitive files remain confidential and only in the hands of those who are meant to see them.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Advertisement

2) Regularly update your software

If your system isn’t safe and protected, your files cannot stay safe and protected. By regularly updating your operating system’s software and the applications you use, you are less likely to be exposed to certain vulnerabilities. This practice is not just a recommendation; it’s a critical component of a robust cybersecurity strategy.

Software updates do more than introduce new features; they are often released to patch security holes and fix vulnerabilities that have been discovered since the last version. Cybercriminals constantly scan for systems with outdated software to exploit these weaknesses. By staying current with updates, you close these openings and make it significantly harder for attackers to gain unauthorized access to your system. Running outdated software is akin to leaving the door to your digital house unlocked. It invites a host of potential risks, including:

Malware infections: Outdated applications can become the perfect hosts for malicious software, which can spread across your network, corrupting files and stealing sensitive information.

Data breaches: Unpatched vulnerabilities can serve as entry points for data breaches, leading to the exposure of confidential data such as personal details, financial information and intellectual property.

3) Password-protect files

Best tips for sending sensitive documents online

Username and password screen (Kurt “CyberGuy” Knutsson)

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement

When you can, password-protect any of the files you share online. It is an extra layer of protection that must be bypassed to access your file. Password protection requires anyone who has access to the recipient’s device to know the password to access your file, too. Consider using a password manager to generate and store complex passwords.

HOW YOUR PASSWORDS CAN BE STOLEN BY AI LISTENING TO YOUR KEYSTROKES

4) Opt for trusted file-sharing services

When it comes to transmitting sensitive data online, the integrity of your file-sharing service is paramount. Opting for established and trustworthy platforms can significantly mitigate the risk of unauthorized access or data breaches. Here are some of the most renowned and secure file-sharing services that have earned their reputation for reliability:

Microsoft OneDrive: Integrated seamlessly with Windows and Office 365, OneDrive provides a secure and efficient way to store and share files, with advanced features like Personal Vault for an extra layer of protection.

Dropbox: A pioneer in cloud storage, Dropbox has evolved to offer high-level security features, including two-factor authentication and file encryption, making it a solid choice for sensitive information.

Advertisement

Amazon Cloud Drive: With the backing of a tech giant, Amazon Cloud Drive delivers a secure and reliable platform for file storage and sharing, complete with comprehensive controls to manage access and permissions.

Google Drive: Renowned for its user-friendly interface, Google Drive offers robust sharing options and powerful collaboration tools, all while ensuring your data is protected with industry-leading security measures.

Each of these platforms offers unique features and security protocols. It’s essential to evaluate their offerings in relation to your specific needs. For instance, if collaboration is a key aspect of your workflow, Google Drive or Microsoft OneDrive might be more suitable due to their integration with productivity suites. On the other hand, if you’re looking for straightforward file storage with easy retrieval, Dropbox and Amazon Cloud Drive are excellent choices.

For a deeper dive into the capabilities and security features of these platforms, consider checking out “Best ways to save and restore documents,” which provides valuable insights into optimizing your file management practices while maintaining the highest security standards.

5) Install and use strong antivirus software

Before uploading or downloading any files you are sending or receiving, use your antivirus program to scan them for malware. There’s no point in securely sending or receiving corrupt files. If you don’t have one, you should, as it is also the best way to protect yourself from clicking malicious links that install malware that may access your private information. We recommend having strong antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

6) Encrypt your files

Best tips for sending sensitive documents online

A person typing on a laptop with the words “Your personal files are encrypted” (Kurt “CyberGuy” Knutsson)

Even though emails seem almost instantaneous, the files you email can still be intercepted while traveling between you and your intended recipients. If cybercriminals intercept a file, but it is encrypted, then regardless of that breach, the file will be unreadable and useless to them. By encrypting your files, you create a formidable barrier that preserves the confidentiality and integrity of your data, ensuring that only the intended eyes can decipher the message within.

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

7) Enable 2-factor authentication

In today’s digital world, protecting sensitive files during online transmission is crucial, and one of the most effective security measures available is two-factor authentication (2FA). This advanced security protocol requires two proofs of identity, significantly enhancing the protection of your digital assets. When you enable 2FA, you’ll first enter your username and password followed by a second form of identification, such as a code sent to your mobile device, a fingerprint or facial recognition.

The importance of 2FA cannot be overstated; it not only reduces the risk of password theft but also offers a variety of verification methods to suit your preferences, along with immediate security alerts for any unauthorized access attempts. To implement 2FA, always check the security settings of your platforms and enable it wherever possible.

For a more secure experience, consider using authenticator apps, which generate time-sensitive codes. It’s also wise to have backup codes or a secondary authentication device in case your primary 2FA method is unavailable. Incorporating 2FA into your security routine ensures that your sensitive files remain confidential and well-protected during online transactions. 

Advertisement

Kurt’s key takeaways

While cloud and file-sharing services can make life a lot easier, it is important to protect what you are sharing, especially sensitive files. Because not all files can be password protected on every file-sharing platform or safe during online transit, the seven steps outlined above can keep your sensitive files safer when being shared online.

What additional measures do you think could enhance the security of file-sharing platforms currently available? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Samsung SmartThings takes a step toward a smarter grid

Published

on

Samsung SmartThings takes a step toward a smarter grid

Samsung has launched a new demand response program for its SmartThings smart home platform. Flex Connect allows your SmartThings connected appliances to communicate with the grid and automatically reduce energy use when there’s a spike in demand, which could help avoid blackouts. While demand response programs have made for some scary headlines, many experts believe connecting our smart homes to the grid is critical for managing the strain on our energy network.

Flex Connect is available in New York and California and works with SmartThings Energy — an energy management solution. It taps into SmartThings’ AI Energy Mode to automate how smart appliances and connected devices like lights and thermostats respond to demand response events.

AI Energy Mode, which Samsung says can save up to 70 percent of energy consumption when using Samsung products, is a smart program that learns your household’s routines and automatically adjusts appliances and devices’ energy use to save energy based on targets you set in the app.

Alongside appliances, SmartThings Energy can automate devices connected to smart plugs, such as this Eve Energy plug.
Photo by Amelia Holowaty Krales / The Verge

According to Samsung, when a demand response signal is received from your utility company, Flex Connect can automatically turn on the AI Energy Mode to save extra energy use in supported appliances, automatically power off devices — including third-party lights and plugs — and automatically adjust supported thermostats to lower their energy use.

Advertisement

If you don’t have any supported appliances, you can still use the SmartThings Energy feature to receive alerts when an event is triggered. This way, you can know to adjust your thermostat or not run your dryer.

The Flex Connect program is optional, and you can choose which devices you want to enroll, as well as change them at any time. Any appliance or device that works with SmartThings Energy can be connected to Flex Connect. While the compatible devices list is dominated by Samsung appliances, several third-party plugs, lights, and thermostats are supported. Some notable brands include Wemo, TP-Link, Aeotec, Ecobee, Sengled, and Resideo (Honeywell Home). There’s also support for Tesla products, including the Powerwall and Loop EV chargers.

Samsung hasn’t provided specific details on how utilities will work with the program, if there are plans to expand to more states, or when Flex Connect will go live. We’ll update this post with more information when we receive it.

Continue Reading

Trending