Technology
Valve celebrates Steam’s birthday with a $112 discount on the 512GB Steam Deck LCD
The Steam Summer Sale, like summer itself, is sadly well behind us, but Valve is beating one of its best deals on its own gaming handheld. That’s because in addition to the Steam Deck LCD with 256GB of storage once again selling for $296.65 (around $52 off), the 512GB version, complete with its fancier antiglare etched screen, is selling for a new low of $336.75 (about $112 off).
Whichever Steam Deck you choose, you’re getting an excellent PC gaming handheld with a seven-inch, 1280 x 800 display that’s compatible with many games on Steam. It may be a couple years old and not as nice as the refreshed Steam Deck OLED model, but it’s hard to beat even the cheapest Deck when it comes to playing indie games and even some massive open-world AAA titles that are tuned well for it — like Elden Ring. Plus, it’s such a flexible platform that allows you to install all kinds of things, including apps for in-home console game streaming, GeForce Now cloud streaming, and even a whole Windows OS.
The Steam Deck started out a little buggy and unfinished when it came out in early 2022, but after frequent updates and the addition of new features via software, it’s now an easy recommendation for even the non-tinkering types. Other formidable handhelds have come after it, but many are either clunkier to use (thanks, Windows) or, in the case of the excellent Asus ROG Ally X, much pricier.
Technology
Is your baby monitor safe? How to secure it from hackers
Did you know that baby monitors have been around since the 1930s? Parents have long relied on these devices to keep a watchful eye on their little ones and ensure their safety. Over the years, baby monitors have come a long way, evolving with technology to offer even more features.
However, with these advancements come new challenges, namely, the risk of hacking. Different types of baby monitors come with varying levels of security, which means some are more vulnerable than others.
Here are some practical tips to help you keep your baby monitor safe from hackers so you can have peace of mind while your baby sleeps.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
Yes, baby monitors can be hacked
Like most technological devices, baby monitors can be hacked. Several factors, however, determine the susceptibility to hacking, such as overall network security, device security features and type of monitor.
Network security
First, let’s talk about your home Wi-Fi network. You know how you wouldn’t leave your front door wide open, right? Well, an unsecured Wi-Fi network is kind of like that, but for all your online stuff. Think about it. Your baby monitor, your phones, your laptops, even your smart fridge, they’re all hanging out on this network. If it’s not locked down tight with a strong password and solid encryption, it’s like inviting the whole neighborhood to peek through your windows.
Device security
Now let’s chat about your actual baby monitor. You’d think all baby monitors would come with top-notch security, right? Well, sadly, that’s not always the case. Some baby monitors are like fortresses; they encrypt every bit of data they send out. That means all those adorable coos and gurgles (and occasional 3 a.m. screaming sessions) are scrambled up so only you can understand them.
But here’s the catch: Not all baby monitors do this. Some of them are broadcasting your baby’s greatest hits for anyone with the right equipment to tune in. It’s like they’re running their own little radio station, and you definitely don’t want random people tuning in.
So, what’s a parent to do? When you’re shopping for a baby monitor, look for words like “encrypted” or “secure transmission” in the product description. If you can’t find that info, reach out to the manufacturer and ask. Your baby’s privacy is worth the extra effort.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Understanding baby monitor security
While most types of baby monitors can be hacked, the likelihood and type of hacking varies based on the type of device.
Analog baby monitors: While these operate on older technology, hackers in proximity might be able to intercept their frequency.
Frequency-hopping spread spectrum baby monitors: While these are also analog, their technology switches frequencies quickly, making it much harder to intercept the signal. Of the three different types of baby monitors, these are considered the safest or hardest for hackers to infiltrate.
Internet-enabled baby monitors: These are more modern baby monitors that can be connected to the internet via a wired or wireless connection. These are the easiest to hack because they can be accessed through the internet networks they are connected to, as well as security measures specific to the device, which can be compromised.
BEST BABY MONITORS FOR SAFETY AND SECURITY IN 2024
HOW TO CHECK IF SOMEONE IS STEALING YOUR WI-FI
How to find out if hackers have compromised your baby monitor
Now that you know baby monitors can be hacked, below are signs that your baby monitor might be hacked.
1. Changes in behavior: If the camera, audio or functions of the baby monitor change suddenly, it can mean someone else has access to your device.
2. Unrecognizable devices on your network: If you’re using an internet-enabled baby monitor and notice any unrecognizable devices connected to your internet network, it could mean that hackers have gained access to your network and that your baby monitor is in jeopardy.
3. Strange audio: If you hear unrecognizable voices or noises coming from your monitor that supports two-way communications, it may mean your baby monitor was hacked.
4. Increase in your data usage: Most monitors use data when being actively viewed or used, so if you notice an increase in data usage, it can mean hackers are accessing it.
5. Security setting changes: Changes to the security settings of your baby monitor, such as password changes or reset requests, can be a red flag. Especially if the password has been changed to access your device, it could mean that hackers have compromised your baby monitor.
HOW YOUR CONNECTED HOME DEVICES COULD BE LEAVING YOU EXPOSED
How to secure your baby monitor
While the level of security will be determined by the type of baby monitor and its individual features, below are some ways to increase the security of your baby monitor:
1. Limit remote access: If possible, disable or limit remote features of the baby monitor when not needed. This reduces potential access points for hackers.
2. Use a strong, unique alphanumeric password: Some users use the default password provided by the manufacturer, which leaves those devices as primary targets for hackers. Changing the password to be strong, complex and unique will make it less likely a target for hackers. We’re talking about a mix of uppercase, lowercase, numbers and symbols. And please, for the love of sleepless nights, don’t use “baby123” or your kid’s birthday. Hackers love that stuff. Also, consider using a password manager to generate and store complex passwords.
3. Enable additional security features: If your device supports features like two-factor authentication or biometric login, enable them. These add extra layers of security, making it harder for unauthorized users to access your system.
4. Secure your internet network: Make sure the internet network the baby monitor is connecting to is behind a strong password. Consider creating a separate guest network for your baby monitor. Check your router settings via the router’s IP address (often located on the back or underside of the physical router) or through your router’s admin interface. Look for WPA3 encryption; it’s the latest and greatest for keeping your network safe. If that’s not an option, WPA2 is still pretty good. Just steer clear of WEP; it’s about as secure as a paper lock on a bank vault. Check out our “Top Routers for Best Security 2024.”
5. Update your device’s software and firmware: Some baby monitors get firmware and software upgrades to keep up with changing security issues. Keep your device updated so that any known vulnerabilities can’t be exploited by hackers.
6. Turn off the monitor when not in use: This simple step can significantly reduce the window of opportunity for potential hackers.
HOW TO UPDATE ALL OF YOUR DEVICES AND KEEP THEM SAFE
Kurt’s key takeaways
As with any other piece of technology, where hackers can find a vulnerability, they will exploit it. Unfortunately, baby monitors, depending on their type and features, can be as susceptible as any other type of consumer technology. The more connected it is to a network that can be compromised, the more vulnerable it is to hackers. But just like other consumer electronics, key security measures such as strong, complex passwords and two-step authentication can go a long way in dissuading hackers from compromising your baby monitor.
Have you used a baby monitor before? Have you noticed any unusual activity with the use of your baby monitor? What security measures have you taken to make sure your baby monitor is safe from hackers? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
GM and EVgo plan more ‘flagship’ EV charging locations that look like gas stations
GM and EVgo are collaborating to build “flagship” EV charging stations at urban sites with a total of 400 EV charging stalls.
The flagship stations are cobranded by GM Energy, the automaker’s battery and charging division, and EVgo. The stations will be located in Arizona, California, Florida, Georgia, Michigan, New York, and Texas at places with shopping, food, coffee shops, and other amenities.
Each station will include 20 fast charging stalls with units supporting up to 350kW speeds, pull-through stations, security cameras, and gas station-style canopies with ample lighting. The first locations featuring EVgo’s latest easy-deploying and modular prefabricated charging stations will open in 2025.
GM said it has opened 1,000 fast charging stalls with EVgo as of August 2023 and expects to have 2,000 of the planned 2,850 DC fast charging stalls open by the end of the year. The GM / EVgo urban stations are separate from a broader strategy to build a coast-to-coast network with 2,000 DC fast charging stations at up to 500 Pilot and Flying J travel centers.
Technology
What’s behind those ridiculous random ‘hello’ text messages
Across the country, people are experiencing a sudden surge of anonymous messages that often begin with a simple “hello” or a similar greeting like “hi.” These unexpected communications can leave you feeling confused and even concerned about their origins.
While this phenomenon is particularly prevalent on WhatsApp, it’s important to recognize that similar incidents are occurring with regular text messages as well.
Take Bruce from Lititz, Pennsylvania, for example. He wrote to us asking, “Why all of a sudden am I receiving anonymous ‘hello’ messages on my WhatsApp?”
Let’s explore the possible reasons behind these unsolicited messages, how they may have obtained your number and what steps you can take to protect yourself from potential scams.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
Why is this happening?
One of the primary reasons for these messages is the increasing prevalence of spam and scam attempts. Cybercriminals are constantly evolving their tactics, and a seemingly innocent “hello” could be their latest strategy. Sometimes, it’s as simple as someone mistyping a number. It’s easy for messages to end up in the wrong inbox.
However, more often than not, these messages are the first step in a more elaborate phishing scheme. Scammers often start with a friendly greeting to build trust before attempting to extract personal information.
HOW TO RECLAIM YOUR PHONE AND BLOCK UNWELCOME POLITICAL TEXT MESSAGES
How did they get your number in the first place?
Receiving unexpected messages from unknown contacts can leave you wondering how they obtained your number. There are several ways this can happen. One common method is through data breaches, where personal information, including phone numbers, is leaked online.
Scammers can also acquire numbers through social media platforms, where users often share their contact details publicly. Additionally, if you’ve ever participated in contests or giveaways, your information may have been sold to third parties without your consent.
Lastly, it’s possible that someone you know inadvertently shared your number, leading to these unsolicited messages. Understanding these avenues can help you take proactive steps to protect your privacy and reduce the likelihood of receiving unwanted communications in the future.
HOW HACKERS CAN SEND TEXT MESSAGES FROM YOUR PHONE WITHOUT YOU KNOWING
How to protect yourself
With the rise of anonymous messages, it’s essential to take steps to safeguard your personal information and avoid potential scams. Here are six crucial measures you can take:
1. Block and report suspicious contacts
Don’t respond to these text messages and block and report any suspicious messages. Here’s how to do it on different platforms:
On Android:
Settings may vary depending on your Android phone’s manufacturer
- Open the conversation with the suspicious contact
- Tap the three-dot menu in the upper-right corner
- Select More or Details
- Click Block & report scam
- Tap OK to confirm your decision
On iPhone:
- Open the chat with the suspicious contact
- Tap the contact’s number at the top of the screen
- Then click the info menu
- Scroll down and select Block Caller
- Choose Block Contact
On WhatsApp:
- Open the conversation and click the contact name
- Scroll down and select Block
- Click Block to confirm
2. Have strong antivirus software
Don’t click on any links within these text messages, as they may contain malicious software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to install strong antivirus software on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
3. Regularly update your passwords
Ensure your accounts are secure by using strong, unique passwords and updating them regularly. Consider using a password manager to generate and store complex passwords. This can help protect your information in case of a data breach.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
4. Keep your devices updated
Regularly update your smartphone’s operating system and apps. These updates often include crucial security patches that protect against the latest threats.
5. Invest in personal data removal services
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
6. Be cautious with personal information
Refrain from posting your phone number on public forums, social media platforms or websites lacking robust privacy measures. Scammers often scour these platforms for personal information to target potential victims.
Also, only provide your contact information to reputable organizations and trusted individuals. Before entering your phone number on any website, ensure it is legitimate and secure. Look for signs such as HTTPS in the URL and read reviews or feedback from other users.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
The rise of anonymous messages can feel unsettling. While a simple “hello” might seem harmless, it often signals the start of more insidious tactics from scammers. By understanding how these messages arise and taking proactive steps to protect your personal information, you can significantly reduce your risk of falling victim to scams.
Have you experienced receiving anonymous messages like these? Share your story with us and let us know how you handled it. Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
-
Business1 week ago
How Self-Driving Cars Get Help From Humans Hundreds of Miles Away
-
World1 week ago
Meloni says 'we are making history' as Italy’s FDI reviews progress
-
World1 week ago
Israeli forces using ‘war-like’ tactics in occupied West Bank: OCHA
-
Movie Reviews1 week ago
Queer: Daniel Craig shines in Luca Guadagnino’s steamy drama
-
World1 week ago
How Venezuela’s recent history can inform its present-day election crisis
-
News1 week ago
Georgia school shooting live updates: Casualties reported at Apalachee High School, suspect in custody
-
World1 week ago
Frontex chief: NGO rescue ships don't embolden Mediterranean migration
-
Politics1 week ago
Trump, Kamala aiming for the middle with varying degrees of success