Technology
It’s 2022 and the Magic Mouse still charges from the bottom
Apple launched a brand new Magic Mouse at this time, March eighth, 2022. It’s a slick-looking black model. It additionally nonetheless has its charging port on the underside — which means that six and a half years after its introduction, Apple nonetheless appears to suppose that the easiest way to cost the mouse is by flipping it over (rendering it ineffective) and plugging in a Lightning cable.
Right here’s a little bit secret: I copied and pasted most of that final sentence from an article I wrote about this actual concern practically a 12 months in the past, when Apple launched an entire line of colourful Magic Mice and had the chance to vary how they cost, however didn’t. Apple has stored this charge-on-the-bottom design since October 2015.
My former Verge colleague Nick Statt ridiculed the mouse’s design the December after it was launched, stating that Apple asks the mouse customers to “flip the machine on its again like a beetle with its legs within the air and plug within the cable.” I included a part of that quote in my article final 12 months, too, and am mentioning it as soon as once more right here as a result of I nonetheless suppose it’s metaphor for a way foolish all of it appears.
Most rechargeable wi-fi mice allow you to plug them in, so you need to use them whereas charging. However for some purpose, Apple steadfastly refuses to place a charging port anyplace however below the Magic Mouse. The corporate has proven a willingness to repair a lot of its different odd design selections — the newer Apple Pencil doesn’t want to stay out of a Lightning port to cost, for instance, and the brand new Apple TV Siri Distant dumped the outdated touchpad for a scroll wheel and a clickpad.
With the brand new Mac Studio, Apple even put a pair USB-C ports and an SDXC card slot on the entrance as an alternative of shoving all of them within the again, reflecting Apple’s latest willingness to offer folks ports they need in apparent locations (see additionally: the numerous ports on the brand new MacBook Execs). However the underside charging port for the Magic Mouse lives on.
To be truthful, Apple claims on its web site that the Magic Mouse’s battery will “energy your Magic Mouse for a few month or extra between prices,” so that you gained’t must plug the mouse in each week. However in my previous experiences with wi-fi mice, I might use them till their batteries have been utterly drained, after which would scramble to discover a charging cable so I might use them wired for a short time as they charged. With the Magic Mouse, I wouldn’t be capable to do this; I’d must shove it off to the aspect whereas it rested on its again to get some extra juice and hope that I’ve one other mouse or trackpad mendacity round that I might use within the interim.
For those who nonetheless need the black Magic Mouse despite its irritating charging state of affairs, you possibly can order one from Apple’s web site proper now — however it’s best to know that like the brand new black trackpad, it’s $20 costlier than the white one.
Technology
Nvidia to hold CES 2025 keynote as RTX 5090 rumors swirl
Nvidia CEO Jensen Huang will deliver a keynote at CES 2025 in January. The keynote will take place on January 6th at 6:30PM PT / 9:30PM ET, just a day before the Consumer Electronics Show opens its doors in Las Vegas. It comes amid rumors of next-gen Nvidia GPUs appearing early next year.
A source familiar with Nvidia’s plans told The Verge last month that we might hear more about the RTX 50-series at the Consumer Electronics Show in early 2025. Nvidia is an official guest keynote of the Consumer Technology Association (CTA) for this upcoming CES show after the company previously delivered its own “special address” stream at CES 2024 earlier this year.
While Huang will undoubtedly focus on the AI hardware and software that has propelled the company to a $3 trillion valuation, he may well discuss the company’s upcoming desktop GPUs based on the Blackwell architecture.
Specifications for Nvidia’s RTX 5090 allegedly appeared online last month, with rumors that the flagship GPU for the 50-series will include 32GB of VRAM. Rumors suggest Nvidia may announce both the RTX 5090 and RTX 5080 at the same time, with both cards reportedly more power-hungry and built using GDDR7 memory.
Technology
These are the 7 most devastating data breaches. Now what?
In recent months, we’ve witnessed a shocking wave of data breaches that have put the personal information of millions at risk. With our online lives becoming more exposed than ever, it’s essential to grasp the scale of these incidents and what they mean for us. We’ll look at the seven biggest data breaches of 2024, revealing the staggering number of records compromised and the potential dangers for both individuals and businesses.
From AT&T’s concerning double breaches to Ticketmaster’s enormous leak, the fallout from these incidents highlights just how important it is to take cybersecurity seriously. We’ll also discuss some practical steps you can take to protect your information in today’s volatile online environment.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
1) The AT&T double whammy
AT&T’s cybersecurity woes in 2024 have been nothing short of catastrophic. The telecom giant faced not one but two major data breaches, leaving millions of customers vulnerable and exposed. In March 2024, AT&T confirmed a significant data breach affecting approximately 73 million customers. This breach included sensitive information such as Social Security numbers, account numbers, passcodes, full names, email addresses, dates of birth and phone numbers. The compromised data, believed to originate from 2019 or earlier, was discovered on the dark web. This incident followed a previous cyberattack in January 2023 that impacted 9 million users, highlighting a troubling pattern of security vulnerabilities.
Just as the dust was settling from the March breach, AT&T was hit with another devastating blow in July. This time, cybercriminals managed to steal call and text records of “nearly all” AT&T customers, an estimated 110 million individuals. The breach extended over a six-month period in 2022, with some cases stretching even longer. The data wasn’t stolen directly from AT&T’s systems but from an account it had with data giant Snowflake. While the stolen data didn’t include call or text content, it revealed metadata such as who called whom and when. The breach also affected noncustomers whose numbers were called by AT&T customers during the affected period.
DATA BREACH VICTIMS SKYROCKETS OVER 1,100%: HOW TO PROTECT YOURSELF
2) Ticketmaster’s ticketing tragedy
In May 2024, Ticketmaster Entertainment faced a staggering breach that dwarfed even AT&T’s woes. The hack resulted in the compromise of over 560 million customer records. This massive breach included order history, payment information, names, addresses and email data. The severity of this breach cannot be overstated. With over half a billion records exposed, it represents one of the largest data breaches in history. Ticketmaster responded by sending emails to affected customers, advising them to monitor their accounts and credit statements closely.
MASSIVE FREE VPN DATA BREACH EXPOSES 360 MILLION RECORDS
3) The MoveIt mayhem
While not as widely publicized, the MoveIt breach was a silent killer. It impacted 77 million individuals across 2,600 companies globally. The Clop malware gang exploited a security flaw, causing an estimated $12 billion in damage worldwide. This breach shows how a single vulnerability can have far-reaching consequences across industries.
WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM
4) Dell’s digital disaster
Dell, a titan in the tech industry, wasn’t spared from 2024’s cybersecurity onslaught. In May, the company faced a major cyberattack that potentially affected 49 million customers. The breach was particularly sophisticated. Hackers created authorized partner accounts to infiltrate Dell’s systems. They launched a brute-force attack, sending over 5,000 requests per minute for nearly three weeks without detection. Sensitive customer data, including home addresses and order details, may have been compromised. While financial details were reportedly not breached, the stolen data is now being sold on hacker forums.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
5) The National Public Data disaster
The crown jewel of 2024’s data breaches came from National Public Data. An eye-watering 2.7 billion records were leaked, including sensitive personal information like Social Security numbers, physical addresses and possible aliases. This breach underscores the massive scale at which our data is collected and the catastrophic consequences when it’s not properly protected.
6) CMS alerts nearly 1 million Medicare beneficiaries to data breach
The Centers for Medicare & Medicaid Services (CMS) notified 946,801 Medicare beneficiaries that their personal information may have been compromised in a data breach last year. The incident involved a security vulnerability in the MOVEit file transfer software used by Wisconsin Physicians Service Insurance Corp., a CMS contractor. Exposed data potentially included names, addresses, Social Security numbers and Medicare Beneficiary Identifiers. This breach follows a similar incident reported in July 2023, affecting approximately 612,000 Medicare beneficiaries. These events underscore the ongoing challenges in protecting sensitive health care data and the importance of remaining vigilant about personal information security.
7) MC2 Data’s major breach puts millions at risk
On Aug. 7, 2024, Cybernews researchers discovered that MC2 Data, a background check firm, had left an unprotected database containing 2.2TB of personal data accessible online without password protection. The exposed database contained 106,316,633 records with private information about U.S. citizens, affecting an estimated 100 million individuals. The leaked data included names, emails, IP addresses, encrypted passwords, partial payment information, home addresses, dates of birth, phone numbers, property records, legal records, family information and employment history. Additionally, the data of 2,319,873 MC2 Data subscribers, including individuals and organizations requiring background checks, was also exposed.
This massive data leak raises serious concerns about the security practices of background check companies and the potential misuse of sensitive personal information. The exposed data could be exploited by cybercriminals for various malicious purposes, including identity theft, targeted phishing attacks and fraud. The incident highlights the need for stricter data protection measures and regulatory oversight in the background check industry to safeguard individuals’ privacy and prevent such large-scale data exposures in the future.
The ripple effect
The impact of these breaches extends far beyond the immediate theft of data. Financial losses are a significant concern, as individuals face the risk of identity theft and fraud, while companies may incur significant fines, legal costs and lost revenue.
Reputational damage is another major consequence, as trust is the currency of the digital age, and these breaches severely erode customer confidence, potentially leading to reduced sales and business opportunities.
Legal ramifications are also a concern, with companies like AT&T now facing class-action lawsuits, adding to the financial and reputational toll. Operational disruption is common, as affected businesses often experience downtime and increased costs as they work to restore systems and implement new security measures. Privacy violations are a long-term risk for individuals, including potential blackmail, stalking or other forms of exploitation.
How to protect yourself from data breaches?
These breaches highlight a critical need for both companies and individuals to step up their cybersecurity game. Here are some key takeaways to protect yourself:
1) Change your passwords
If a data breach has leaked your passwords, change them immediately. Hackers could use your password to access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc.
You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely. Changing passwords should be a part of your general cybersecurity hygiene, even if you’re not affected by a data breach.
2) Enable two-factor authentication
Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.
3) Monitor your accounts and transactions
If you have been affected by a data breach, check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.
4) Contact your bank and credit card companies
If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.
5) Use personal data removal services
Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. Hackers are also stealing your IDs to validate the data. These IDs can be misused in more ways than you can imagine, including impersonation. Check out my top picks for data removal services here.
6) Sign up for identity theft protection
If you’re certain that your personal information has been leaked in a data breach, sign up for an identity theft protection service. It can monitor personal information like your home title, Social Security number, phone number and email address and alert you if it is being used to open an account. These services can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
7) Alert your contacts
If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
8) Have strong antivirus software
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
9) Keep your software and systems updated
Regularly updating your software and operating systems is crucial for maintaining strong cybersecurity. When software companies release updates, they often include security patches that address newly discovered vulnerabilities. By installing these updates promptly, you close potential entry points for hackers.
To make this process easier, consider enabling automatic updates on most devices and software, ensuring that you are always running the latest, most secure versions. It is also important to remember to update all your devices, including smartphones, tablets, smart home devices and any other internet-connected gadgets, as they all require regular updates.
In addition to software updates, check for firmware updates on devices like routers, which may require manual intervention. Visit the manufacturer’s website periodically to ensure you have the latest firmware installed.
Be cautious with software that has reached its end-of-life status, as it will no longer receive important security updates. If you find yourself using unsupported software, consider replacing it with a supported alternative.
Restarting your devices regularly can also be beneficial, as some updates require a system reboot to take effect fully. Therefore, reboot your devices periodically to ensure all updates are properly installed. Lastly, don’t neglect your mobile apps; regularly updating the apps on your smartphone and tablet is essential for maintaining security.
By keeping all your software and systems up to date, you significantly reduce the risk of falling victim to known vulnerabilities that hackers might exploit in outdated versions.
Kurt’s key takeaways
As we sail through the turbulent cybersecurity waters of 2024, it’s clear that no organization is immune to data breaches. The incidents at AT&T, Ticketmaster, MoveIT, National Public Data, CMS, Dell and MC2 Data are stark reminders of the ever-present threats in our digital world. For you, as an individual, staying vigilant is key. Regularly monitoring your accounts, using strong and unique passwords and enabling two-factor authentication can go a long way in mitigating risks. As we move forward, it’s crucial for both businesses and consumers like you to stay informed, adapt to evolving threats and prioritize data security. Remember, a proactive approach to cybersecurity helps protect not just your data but your peace of mind as well.
What steps do you think companies should take to be more accountable for protecting our personal information and how can we, as consumers, encourage them to prioritize cybersecurity? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover. Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Shrunken Mac Minis and a new iPad Mini might come in November
Apple is planning to announce in late October that new Macs, including a rumored Mac Mini that’s about the size of an Apple TV, will be available to buy starting on November 1st. That’s according to Bloomberg’s Mark Gurman, who also writes in his Power On newsletter today that the iPad Mini is getting an overdue refresh — its first since 2021.
The Mac Mini may be the most exciting of the updates, given the rumored significant physical revamp coming along with a new M4 chip. Despite its shrunken size, the M4 Pro version might have a healthy connectivity spread (albeit without any USB-A ports).
Looking beyond that, Apple will roll out M4-equipped MacBook Airs, a redesigned iPhone SE, refreshed iPad Airs (and Magic Keyboards to go with them), and a new AirTag in the first half of 2025, according to Gurman. Apple could also release updated versions of the Mac Studio and Mac Pro — which haven’t shown up in the M3 upgrade cycle — in middle and second half of next year, respectively.
-
Technology5 days ago
Charter will offer Peacock for free with some cable subscriptions next year
-
World4 days ago
Ukrainian stronghold Vuhledar falls to Russian offensive after two years of bombardment
-
World4 days ago
WikiLeaks’ Julian Assange says he pleaded ‘guilty to journalism’ in order to be freed
-
Technology4 days ago
Beware of fraudsters posing as government officials trying to steal your cash
-
Health2 days ago
Health, happiness and helping others are vital parts of free and responsible society, Founding Fathers taught
-
Virginia6 days ago
Status for Daniels and Green still uncertain for this week against Virginia Tech; Reuben done for season
-
Sports3 days ago
Freddie Freeman says his ankle sprain is worst injury he's ever tried to play through
-
News2 days ago
Lebanon says 50 medics killed in past three days as Israel extends its bombardment