Connect with us

Technology

Tech how-to: How to automatically alert loved ones in an emergency

Published

on

Tech how-to: How to automatically alert loved ones in an emergency

NEWNow you can take heed to Fox Information articles!

Unsure occasions remind us that we’re not all the time ready as we have to be. 

Within the digital world, nobody is ever really prepared for the truth of getting hacked. Faucet or click on to see if somebody is absolutely watching what you do or in the event you’re being paranoid

Within the bodily world, our tech could make a world of distinction. Take the Apple Watch, which has been credited with saving lives. Faucet or click on for the emergency and well being options you must arrange now earlier than you want them

Advertisement

Don’t neglect about your cellphone. Right here’s find out how to arrange emergency options that may alert your family members if one thing occurs to you. 

You probably have an iPhone 

Once you make a name with Apple’s Emergency SOS characteristic, your iPhone does a couple of issues. It’s going to name the native emergency quantity and alert your emergency contacts by way of textual content message. 

Your cellphone will even ship your present location to your emergency contacts, together with modifications to your location. Which means they’ll comply with alongside in the event you’re shifting from place to put. 

Right here’s find out how to make an SOS name on an iPhone 8 or later: 

Press and maintain the facet button and one of many quantity buttons. The Emergency SOS slider will seem.  

Advertisement

Drag the slider to name emergency providers. You can too proceed to carry the facet button and a quantity button. As soon as the countdown ends, your cellphone will name emergency providers. 

Word: On an iPhone 7 or earlier, rapidly press the facet or high button 5 occasions to allow the emergency slider. 

Now that you understand how to make use of this characteristic let’s run by means of find out how to add emergency contacts.  

File photo of an iPhone.

File photograph of an iPhone.
(AP)

Keep in mind, in the event you use the Emergency SOS characteristic, these contacts will obtain a message indicating you’re having an emergency. 

  • Open the Well being app and faucet your profile image > Medical ID.
  • Choose Edit, then scroll to Emergency Contacts.
  • Faucet the Add button, then faucet a contact. Add their relationship.
  • Hit Completed to substantiate your modifications.

 RELATED: Have children within the household? This app from the FBI might assist in an emergency 

You probably have an Android 

Android’s model of Emergency SOS works equally, although you must set it up forward of time. 

Advertisement
  • Open the Settings app in your cellphone.
  • Faucet Security & emergency > Emergency SOS.

From right here, you may customise what occurs if you use Emergency SOS. You’ve the choice to sound an alarm or keep silent, name an emergency variety of your selecting, share updates and site data along with your emergency contacts, and report a video. 

To entry Emergency SOS on an Android cellphone, rapidly press the ability button 5 occasions. 

On a Samsung cellphone, steps could fluctuate barely. If the tactic above doesn’t work, open Settings, search for Superior options, then faucet Ship SOS messages. From right here, you may select your emergency contacts. 

In this photo illustration an Android logo seen displayed on a smartphone.

On this photograph illustration an Android brand seen displayed on a smartphone.
(Photograph Illustration by Rafael Henrique/SOPA Pictures/LightRocket by way of Getty Pictures)

On a Google Pixel and different variations of Android, here is find out how to add emergency contacts: 

  • Open the Security app and register along with your Google account.
  • You’ll be prompted so as to add emergency contacts. Scroll by means of or seek for a contact and faucet the identify to proceed.
  • Subsequent, you may add medical info when you have not accomplished so.
  • Faucet Completed to substantiate

Bonus Tip: How you can increase your tax refund this yr 

The IRS has new modifications together with the $600 rule, WFH deductions, little one tax credit and extra. On this episode, tax accountant Rachel Cheek and I dive into the numerous methods deductions, types, social media, and guidelines will impression your 2021 tax return. 

Try my podcast “Kim Komando Explains” on Apple, Google Podcasts, Spotify, or your favourite podcast participant. 

Advertisement

Hearken to the podcast right here or wherever you get your podcasts. Simply seek for my final identify, “Komando.” 

What digital way of life questions do you will have? Name Kim’s nationwide radio present and faucet or click on right here to seek out it in your native radio station. You’ll be able to take heed to or watch The Kim Komando Present in your cellphone, pill, tv, or laptop. Or faucet or click on right here for Kim’s free podcasts. 

Copyright 2022, WestStar Multimedia Leisure. All rights reserved. By clicking the buying hyperlinks, you’re supporting my analysis. As an Amazon Affiliate, I earn a small fee from qualifying purchases. I solely advocate merchandise I imagine in. 

Study all the newest know-how on The Kim Komando Present, the nation’s largest weekend radio discuss present. Kim takes calls and dispenses recommendation on immediately’s digital way of life, from smartphones and tablets to on-line privateness and knowledge hacks. For her every day ideas, free newsletters, and extra, go to her web site at Komando.com. 

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

New Social Media Networking Platform Puts The Focus On Authenticity

Published

on

New Social Media Networking Platform Puts The Focus On Authenticity

Has social media run it’s course?  Not likely. Apps like TikTok, Facebook, and Linkedin more popular than ever.  But with fewer people finding it useful and a flurry of mental health-related lawsuits, some users are complaining those big platforms just aren’t keeping up with the times, especially when it comes to workplace networking platforms, which are being criticized for not adjusting for new post-covid workplace realities.  Now social media networking is getting a big makeover, with a new focus on user authenticity.  

Krishna Dosapati, the CEO of newly-launched networking site Clockout, says the de-coupling between big tech and young professionals is becoming obvious.  “You have an entire generation of people who are joining the workforce at a time where everyone is working from home,” she told Fox News. “Meetings are taking over zoom. And so people are really, really isolated.”

And that’s creating a growing need for authenticity when it comes to online networking.  New apps like Clockout are now stressing real-life connections, with users able to create their own industry-based social clubs.  More than a thousand have been started so far, with about 40,000 users attending live, in-person events.  Dosapati says the key is combining old fashioned social gatherings with high-tech networking, especially with a recent survey showing up to 85 percent of all jobs are filled through personal connections, either virtually or in-person. 

“We make the interface so fun and organic and the focus is those connections rather than posts or likes or anything like that, she says, adding that when she sees someone she wants to connect with on Clockout, “it’s very organic for me to say, Hey, like, I see you’re a founder, you’re in New York, do you want to grab a coffee? And that sparks a really authentic and organic conversation. And that allows me to form a real connection with that other person that other platforms just don’t focus on.”

And it appears to be working; Clockout says it has a long waitlist of people waiting to get approved for the platform.  It’s just one example of how social media is evolving to help professionals build community through authentic interactions. 

Advertisement

Continue Reading

Technology

How to lock any app with Face ID on an iPhone using iOS 18

Published

on

How to lock any app with Face ID on an iPhone using iOS 18

Having to hand your iPhone over to someone can be a fairly common occurrence. Maybe your little nephew wants to play a game or your friend wants to check out the photos from your last vacation. Whatever the reason, no matter how much you trust that person, there are probably parts of your phone that you’d rather they didn’t see (even accidentally).

That’s where the new Face ID lock in iOS 18 comes in: you can now get your iPhone to ask for biometric authentication whenever a particular app is launched. (While we refer to Face ID throughout this article, if you’re on an older phone with Touch ID, you can use that instead.) This means your friend or family member can’t dive straight into your private chat conversations or your current dating app of choice.

If you’re thinking, “I’m sure I could lock apps with Face ID before iOS 18,” you’re right — up to a point. The technology was available, but it was up to app developers to implement it. And for the most part, outside of banking and financial apps, we haven’t seen many developers add Face ID logins. (With some exceptions, such as Facebook Messenger and WhatsApp.)

Lock apps in iOS 18

What’s new after the rollout of iOS 18 is that any app can be locked using Face ID, whether or not the developer has built in support for the feature. Games, chat apps, social media — anything can now be protected with a Face ID login.

Advertisement

This comes with another feature: the option to hide apps. This is available for any third-party app but not apps installed with iOS 18. Hidden apps aren’t shown on the homescreens and have their own Hidden folder in the App Library. You also won’t get any notifications from hidden apps, so keep that in mind.

You can lock and unlock apps from the homescreen or from the App Library:

1/5

Long-press on an app icon to bring up the app menu.
Screenshot: Apple
  • Long-press on an app icon to bring up the app menu.
  • Tap Require Face ID to lock the app with Face ID. 
  • The following pop-up menu will ask you to confirm by again tapping Require Face ID.
  • Alternatively, on the second menu, you can tap Hide and Require Face ID to lock the app with Face ID and hide it from your homescreens.
  • If you select to hide the app, you will be reminded that the app will only be available in the App Library and that you will no longer receive “notifications, calls, or critical alerts” from the app.

Whenever any app locked in this way is launched, Face ID approval will be required to actually open in, which means no one but you will be able to get in.

To remove the Face ID restriction, just repeat the long press on the app to get to its menu. If you chose to hide the app, you’ll need to open the Hidden folder in the App Library to get to the options again. In addition, you’ll have to replace the icon on your homescreen — it won’t automatically reappear on the same page it was on before.

Stay in a single app with Guided Access

Lock your iPhone to a specific app with Guided Access.
Screenshot: Apple

Once you open the app, you can now activate Guided Access.
Screenshot: Apple
Advertisement

There is one more trick you can use if you’re lending someone your phone: set up the iOS accessibility feature Guided Access so the other person is only able to use one app or game on the device.

The feature can be enabled from iOS Settings:

  • Tap Accessibility and Guided Access.
  • Turn on the Guided Access toggle switch.
  • Tap Passcode Settings to set a custom passcode or to enable Face ID.

Head to the app your friend or family member wants to use and launch Guided Access by triple-pressing on the power button and choosing Guided Access and then Start.

The navigation bar disappears, and there’s no way to switch to the homescreens or any other app. The only way out of Guided Access is to triple-press on the power button again — at which point Face ID authentication (or your custom passcode) is required.

Through Face ID lock or Guided Access — or a combination of both — you should be able to lend out your iPhone without worrying what other people are up to on it.

Advertisement
Continue Reading

Technology

MoneyGram hack exposes customers' sensitive data, cripples services

Published

on

MoneyGram hack exposes customers' sensitive data, cripples services

MoneyGram has confirmed a data breach that exposed sensitive customer data to hackers, forcing its services offline for five days in September 2024. 

The American payment and money transfer platform, which operates through 350,000 locations across 200 countries and via its mobile app and website, revealed hackers stole a varied amount of sensitive customer information. 

This includes transaction details, email and postal addresses, names, phone numbers, utility bills, government IDs and Social Security numbers.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A woman at a desktop computer (Kurt “CyberGuy” Knutsson)

Advertisement

What you need to know

BleepingComputer first reported the news of the MoneyGram cyberattack on Oct. 5, noting that hackers used a social engineering attack on the company’s internal help desk. At the time, the company didn’t disclose much information about the attack, stating,After working with leading external cybersecurity experts, including CrowdStrike, and coordinating with U.S. law enforcement, the majority of our systems are now operational, and we have resumed money transfer services.”

In an email to the publication, MoneyGram also confirmed that it has found “no evidence that this issue involves ransomware nor do we have any reason to believe that this has impacted our agents’ systems.”

However, in a notification on its website, MoneyGram has now revealed more information about the cyberattack. The company says that the threat actors had access to its network even earlier, between Sept. 20 and Sept. 22. It got to know about the breach on Sept. 27.

woman with cellphone

A woman with a cellphone (Kurt “CyberGuy” Knutsson)

MASSIVE FREE VPN DATA BREACH EXPOSES 360 MILLION RECORDS

What information got stolen?

During the time hackers had access to MoneyGram’s network, they stole a significant amount of sensitive information, including consumer names, contact details (such as phone numbers, email addresses and postal addresses), dates of birth, a limited number of Social Security numbers, copies of government-issued identification documents (such as driver’s licenses), other identification documents (such as utility bills) and bank account numbers.

Advertisement

For a limited number of customers, MoneyGram says hackers also accessed MoneyGram Plus Rewards numbers, transaction details (like dates and amounts) and criminal investigation info (such as fraud cases). The types of information exposed varied by individual.

CLICK HERE FOR MORE US NEWS

woman at laptop

A woman working on a laptop (Kurt “CyberGuy” Knutsson)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

6 ways to protect yourself from a data breach

1. Enable two-factor authentication (2FA) on all accounts: One of the most effective ways to protect your personal and financial information from hackers is to enable two-factor authentication wherever possible. This adds an extra layer of security by requiring two forms of verification before granting access to your account, such as a password and a one-time code sent to your phone. Even if your password is stolen, 2FA can stop hackers from getting into your accounts.

2. Monitor your financial accounts regularly: After a data breach, especially when sensitive financial information like transaction details and bank account numbers have been compromised, it’s crucial to regularly monitor your bank statements, credit card transactions and even small purchases. Look for unauthorized activity, no matter how minor it seems, and report it to your bank or service provider immediately.

Advertisement

With the MoneyGram breach, hackers accessed customers’ financial transaction details, which could lead to fraud or unauthorized transactions. By reviewing your account statements frequently, you can catch any unusual activity early and take action before significant damage is done.

3. Change your passwords and use strong, unique passwords: MoneyGram customers who reused passwords across multiple accounts should update their login information immediately. A strong password combines uppercase and lowercase letters, numbers and symbols, making it harder for hackers to guess or crack. Consider using a password manager to securely store and generate complex passwords.

4. Sign up for identity theft protection: Given that hackers stole Social Security numbers, government-issued IDs and other sensitive information in the MoneyGram breach, affected customers should consider enrolling in identity theft protection. These services notify you if someone attempts to open new lines of credit or loans in your name, allowing you to take immediate action to prevent identity theft. Additionally, you can place fraud alerts or freezes on your credit reports to prevent unauthorized access.

For those impacted by the MoneyGram breach, where personally identifiable information such as government IDs and Social Security numbers were compromised, signing up for identity theft protection services can offer an extra level of security. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

5. Be wary of phishing attacks and scams: After a data breach, there is often an uptick in phishing attacks, where scammers try to trick you into revealing additional personal information by posing as legitimate companies. Always double-check the authenticity of emails, especially those asking for sensitive information. Never click on links or download attachments from suspicious sources, and verify any requests for information by contacting the company directly. Since the MoneyGram breach occurred through a social engineering attack, customers should be on the lookout for emails, phone calls or text messages pretending to be from MoneyGram or related entities. Always verify any communication before taking action.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Kurt’s key takeaways

Big tech companies are struggling to curb cyberattacks. Every month, we hear about a new data breach that puts the data of millions of Americans at risk, and most of the time, these firms face nothing more than a slap on the wrist. Meanwhile, the individuals whose data is stolen suffer the consequences for years to come. MoneyGram and other companies should invest more in their cybersecurity infrastructure to ensure that breaches like this don’t become the norm.

Advertisement

Do you believe that legislation should enforce stricter penalties on companies that fail to protect customer data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Trending