Connect with us

Technology

How to outsmart car thieves with these smart AirTag tactics

Published

on

How to outsmart car thieves with these smart AirTag tactics

Creativity around AirTag usage has grown considerably since Apple introduced it in 2021. Along with this growth in creativity comes controversy around how AirTags are being used. It became common knowledge that stalkers place AirTags in their victims’ vehicles without their knowledge or consent and then use their phones to track their victims’ whereabouts.

While Apple has introduced new alert features with its most recent iOS updates to mitigate having an AirTag used against your will or without your consent, what if you could make AirTags work for you as an automotive security measure?  

Interestingly, even Android users can use AirTags for such purposes. Although AirTags are primarily designed for iPhones, Android users can use apps like Tracker Detect to scan for nearby AirTags.

According to the National Highway Traffic Safety Administration (NHTSA), a vehicle was stolen every 32 seconds in the U.S. in 2022 alone. Instead of allowing AirTags to be used against you, perhaps it is time to proactively use them to work for you.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Advertisement

THE BEST BLUETOOTH TRACKERS OF 2024

Reasons why Apple AirTags are the perfect solution for car theft tracking

At the time of publication, Apple AirTags retail at $29.99 for one or 4 for $99.99. Compared to a GPS or other navigation system, which can start at several hundred dollars, Apple AirTags, if used appropriately, can help you recover your vehicle if stolen. Below are the potential benefits and pitfalls of using Apple AirTags to track your car.

car break-in

A thief breaking into a car  (Kurt “CyberGuy” Knutsson)

HOW TO SET UP AND USE APPLE AIRTAGS TO TRACK ITEMS

Advertisement

4 potential benefits of using an AirTag to track your vehicle

1. Size and weight: At .39 ounces and measuring 1.26 inches wide and .31 inches high, these tracking devices are very discreet. A car thief would have a hard time noticing or locating an AirTags visually, which would give you more time to track and locate your vehicle.

2. Battery life: AirTags are battery-operated, which means they do not require charging. According to Apple, an AirTag is supposed to last more than a year on a standard battery. These CR2032 coin-cell batteries are cheap to replace, too. This means you can leave it in your vehicle for long periods of time and don’t have to leave yourself or your car vulnerable by having to charge the AirTag. You’ll get plenty of warnings from your iPhone when it is time to replace the battery, too.

3. Private and secure: No tracking data is stored in your AirTag or by Apple, so your information is kept private. Because the signal and information being sent from your AirTag are anonymous and encrypted, you can rest assured that no unnecessary information regarding your whereabouts is floating around.

4. Wide reach and precision locating: Because your AirTag sends out a Bluetooth signal, it uses nearby devices in the Find My network. With the mass use of Apple devices, you have many devices that can send the location of your AirTag to iCloud so you can track it.

Because of the AirTag’s built-in Ultra Wideband technology, your iPhone can lead you to your AirTag with Precision Finding, which will show you the exact distance and direct you to it. 

Advertisement

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Understanding the limitations and privacy concerns of AirTags

AirTags are designed to leverage the Find My network for location tracking. However, this network’s effectiveness is contingent on the proximity to other Apple devices. In areas with a sparse Apple device population, the range and precision of AirTags can be significantly compromised. Consequently, their utility for tracking items like vehicles may be diminished in such regions.

Moreover, AirTags incorporate a double-edged privacy feature. Should a car thief possess an iPhone, he may receive an alert notifying him of an unrecognized AirTag moving with him. This mechanism, intended to prevent unwanted tracking, could inadvertently assist the thief in locating and removing the AirTag

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

an iphone

Find My Network on iPhone  (Apple)

DID YOU KNOW YOU CAN USE APPLE AIRTAG WITH YOUR ANDROID PHONE?

Advertisement

How to place AirTags for safe vehicle tracking

If you want to track your vehicle if it is stolen or even lost (have you ever forgotten where you parked your car?), it is best to place your AirTag somewhere it is not visible and safe from removal or obstruction. Possible locations include under car floor mats, glove compartment, spare tire well or between seat cushions.

Since car thieves may check for AirTags before taking off with your car, it is best (if possible) to place more than one AirTag in different locations in your vehicle. This way, even if a thief finds and removes one AirTag, the second one can still help you track your vehicle. Thieves often assume there is only one AirTag, so having a second one hidden can be a clever way to outsmart them.

If you discover that your car has been stolen or lost, you can use your iPhone’s Find My app to see it on a map. 

BEST AMAZON PRIME DAY 2024 EARLY DEALS

Kurt’s key takeaways

While there is no replacement for a professional GPS tracking system, Apple AirTags can be a useful device to help you keep track of your vehicle, whether it is lost or stolen. Just like you can lose keys, you could definitely forget where you parked your car. With an AirTag in your car, you can open up your Find My app and just see where you last parked. 

Advertisement

In the worst-case scenario, if your car gets stolen, you can track it as long as it is within range of other Apple devices on the Find My network. Its discreet size, weight and wide-reaching Find My network make it a potentially good option for keeping track of your car. Of course, we caution against using it on other people’s cars or belongings without their consent.

Do you have a GPS tracking system installed in your car? Would you use AirTags to keep track of your car? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Advertisement

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Technology

An Android feature now rolling out locks your screen if your phone is swiped

Published

on

An Android feature now rolling out locks your screen if your phone is swiped

Google is rolling out a new set of features aimed at making it less easy for thieves to access your data. That’s according to Mishaal Rahman, who posted on Reddit that the features are showing up in a new update after seeing that his Xiaomi 14T Pro phone now has Theft Detection Lock and Offline Device Lock, two of three features Google announced in May. Others say they only see the third one, called Remote Lock.

The flashiest of the new features is Theft Detection Lock, which uses AI to lock your screen when it detects “common motion associated with theft,” like someone snatching your phone out of your hand. Meanwhile, Offline Device Lock locks a device’s screen when it’s offline for a while, and Remote Lock lets users lock their phone using only their phone number when they can’t log into Find My Device with their password.

So far, I’m not seeing any of the features on my own Pixel 6. You can see screenshots of the new features’ settings in the overnight Threads post from Rahman below.

Theft Detection Lock and Offline Device Lock are supported on any Android device running Android 10 and up, while you’ll need at least Android 5 for Remote Lock. If you don’t have the features yet, you can try updating Google Play Services, though Google tends to roll out new features over time, rather than to everyone at once, so, like me, you may have to wait.

Continue Reading

Technology

How to remotely fix family computer woes

Published

on

How to remotely fix family computer woes

We’ve all been there — whether it’s a grandparent struggling with a new device or a parent confused by software updates. It’s frustrating when you want to help but can’t be there in person. While gathering around a kitchen table to troubleshoot is ideal, distance often gets in the way. 

And let’s face it, trying to explain complex steps over the phone or video chat can be a challenge. So, what’s the solution? Remote assistance might just be the answer you’re looking for. Let’s explore how you can lend a helping hand from afar and get those tech troubles sorted out.

First, a word of caution. Having reported on outside scammers encouraging you to download and connect remotely to them, be very careful to use the following remote connection tips for those you already know and trust.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

It’s possible to remotely access a family member’s computer. (Kurt “CyberGuy” Knutsson)

Advertisement

How to set up remote access on Windows

1. Quick Assist

Quick Assist is a built-in remote access tool available on Windows 10 and 11.

  • To start, search for Quick Assist in the Start menu or find it in the Windows Accessories folder.
  • Open the app and choose “Help someone,” then sign in with your Microsoft account (your friend or family member does not need one).
  • You’ll receive a six-digit code that expires in 10 minutes.
  • Then, share this code with the person you’re helping.
  • They should open Quick Assist and enter the code under the “Get help” section.
  • After they grant permission, you’ll be able to control their computer. You can even use the Remote Reboot option to restart their computer and maintain the connection.

2. Windows Remote Assistance

For users on Windows 7, 8 or 10, you can use the older Remote Assistance tool.

  • Have the person you’re assisting search for “Invite someone to connect to your PC” in Windows, or find it via Control Panel.
  • They need to send you an invitation file via email and share the generated password.
  • Alternatively, they can use Easy Connect if available, which only requires providing a password.

3. Remote Desktop Connection

Remote Desktop Connection allows you to fully control another PC.

  • First, enable the feature on the remote computer by navigating to Settings.
  • Then click System.
  • Next tap Remote Desktop.
  • Open the Remote Desktop Connection tool from the Start menu.
  • Then, enter the remote PC’s name or IP address, and connect using the credentials provided.

BEST ANTIVIRUS FOR PCS — CYBERGUY PICKS 2024

quick assist image

Quick Assist. (Microsoft)

WINDOWS USERS WORLDWIDE FACE BLUE SCREEN OF DEATH DUE TO CROWD STRIKE ISSUE

How to set up remote access on Mac

1. Screen share in messages

Mac users can use the Messages app for remote assistance. Both parties need to be signed in with their Apple ID and be using macOS. 

  • Open Messages.
  • Start or select a conversation.
  • Click the “i” button.
  • Then click Share.
  • You can ask the other person to “Ask to share screen” with you, granting you control to help them with any issues.

2. SharePlay in FaceTime

For macOS Monterey or later, you can use SharePlay in FaceTime to share screens.

  • Ensure SharePlay is enabled in FaceTime’s preferences.
  • Start a FaceTime call.
  • Have the other person click FaceTime in the top menu.
  • Then select Screen Share and choose to share the entire screen.
  • You can view but not control their screen.

BEST ANTIVIRUS SOFTWARE FOR YOUR MAC

sharing a screen

NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

Advertisement

How to use FaceTime’s SharePlay in iOS 18 on iPhone or Mac

With iOS 18, Apple has enhanced FaceTime’s SharePlay feature, making it easier than ever to help family members with their computer issues remotely. Here’s how you can use SharePlay to guide them through troubleshooting steps:

  • Start a FaceTime call: Begin by initiating a FaceTime call with the family member who needs assistance.
  • Activate SharePlay: Once the call is connected, tap the SharePlay button. This will give you several options, including sharing your screen or requesting access to the other person’s screen.
  • Share your screen: If you need to show them how to perform a task, select “Share My Screen.” This will broadcast your screen to the other person, allowing them to follow along with your instructions.
  • Request screen access: If you need to see their screen to diagnose an issue, select “Ask to Share.” The other person will need to approve this request. Once approved, their screen will appear on your device.
  • Interactive tools: While viewing their screen, you can use the new drawing tools to highlight areas or draw instructions directly on their screen. This can be incredibly helpful for pointing out specific buttons or menu options.
  • Control playback: If you’re watching a tutorial video together, you can control the playback, and it will sync across both devices. This ensures you’re both on the same page.
  • End SharePlay: When you’re done, simply tap the SharePlay button again and choose to end the session.

Using these steps, you can effectively assist your family members with their computer issues, no matter where you are.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS — CYBERGUY PICKS

How to use Google Meet for remote assistance on Android

 Settings may vary depending on your Android phone’s manufacturer 

  • Open the Google Meet app on your Android device.
  • Click Create a new meeting. 
  • Tap Share
  • Then share the meeting link with the family member who needs assistance via a text or email. 
  • Both you and your family member should join the call using the provided link.
  • Tap the three-dot menu in the bottom right corner and select “Share screen.” Choose the screen or app you want to share. This allows the other person to see your screen and follow along with your instructions.
  • If you need to see their screen to diagnose an issue, ask them to share their screen using the same steps. They will need to approve this request.
  • While viewing their screen, you can guide them verbally or use the chat feature to send instructions. Although Google Meet doesn’t have built-in drawing tools, you can use third-party apps like Google Keep for annotations.
  • If you’re watching a tutorial video together, you can control the playback on your device, and they can follow along on their screen.
  • When you’re done, simply tap the “Stop sharing” button and end the call.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

How to set up remote access for Chrome and other platforms

Advertisement

1. Chrome Remote Desktop

Chrome Remote Desktop is a versatile tool for cross-platform remote access. Both parties need to use Google Chrome and visit the Chrome Remote Desktop site.

  • The person needing help should click “Share My Screen.” 
  • Download the necessary app. 
  • After installation, they generate a 12-digit code, which you enter on your computer to gain control.
  • This setup makes future sessions easier to initiate.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

remote access

Chrome Remote Access. (Google)

BEWARE OF THIS MCAFEE GOOGLE CHROME AD SCAM

2. Remote access via video conferencing software

Many video conferencing apps, like Zoom and Microsoft Teams, offer screen sharing and remote control features.

  • In Zoom, request control by selecting “Request Remote Control” from the View Options menu during a call.
  • The meeting host can then grant you control.
  • In Teams, click “Request control” during screen sharing, or give control by selecting “Give control” from the sharing toolbar.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION 

Kurt’s key takeaways

We all run into computer trouble every so often, or we know someone who does. Instead of waiting until you’re together in the same room — which may be a long time for some loved ones — utilize remote access capabilities to troubleshoot the problem from far away, no matter what device you have.

What challenges have you faced while helping someone with tech issues from a distance, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Intel says its Raptor Lake crashing chip nightmare is over

Published

on

Intel says its Raptor Lake crashing chip nightmare is over

Vmin Shift Instability Root Cause 

Intel® has localized the Vmin Shift Instability issue to a clock tree circuit within the IA core which is particularly vulnerable to reliability aging under elevated voltage and temperature. Intel has observed these conditions can lead to a duty cycle shift of the clocks and observed system instability.  

Intel® has identified four (4) operating scenarios that can lead to Vmin shift in affected processors: 

1) Motherboard power delivery settings exceeding Intel power guidance. 

a. Mitigation: Intel® Default Settings recommendations for Intel® Core™ 13th and 14th Gen desktop processors.  

Advertisement

2) eTVB Microcode algorithm which was allowing Intel® Core™ 13th and 14th Gen i9 desktop processors to operate at higher performance states even at high temperatures. 

a. Mitigation: microcode 0x125 (June 2024) addresses eTVB algorithm issue.  

3) Microcode SVID algorithm requesting high voltages at a frequency and duration which can cause Vmin shift. 

a. Mitigation: microcode 0x129 (August 2024) addresses high voltages requested by the processor.  

4) Microcode and BIOS code requesting elevated core voltages which can cause Vmin shift especially during periods of idle and/or light activity. 

Advertisement

a. Mitigation: Intel® is releasing microcode 0x12B, which encompasses 0x125 and 0x129 microcode updates, and addresses elevated voltage requests by the processor during idle and/or light activity periods.  

Continue Reading
Advertisement

Trending