Sunday, August 25, 2024

Don’t Click the Ads

 



Don’t click the ads – Might be malware

When I have a question now, whether it’s finding a recipe or doing math, I’m using AI a lot more than doing a good ol’ Google Search. My go-to is ChatGPT, but Perplexity is useful, too. I often ask both AI bots the same question as a way to double-check things. Google Gemini is a big “meh” to me so far.

There are things Google Search works better than AI for — say, finding a software download, a customer service number or your doctor’s website. Keep in mind that cybercriminals and hackers are also using AI to up their game. You might not think twice about clicking a Google Search result, and cybercriminals know that. I don’t want you to become a victim.


Be careful where you click

Google doesn’t vet everyone who buys an ad. Cybercrooks have a long history of hiding nasty malware in Google Ads, and they're getting really good at SEO, driving up their malicious search results to the top.

We’re talking about everything from bogus Amazon ads to fake tech support numbers. Doctors, clinics and hospitals are a major target, too. Yep, you could end up with malware just by searching Google for your doctor’s name so you can grab the address.

Any site with a ton of traffic is risky. Think YouTube, Facebook, Target and Walmart. Those are just a few companies attackers use to get you to click on their malicious results.

How to protect yourself

With more tools than ever at their disposal, scammers are good at writing things that can trick anyone. Outsmart these jerks.

  • Don’t click on sponsored links or advertising when Googling something.
  • Type all web addresses directly into your browser so you know you’re going to the official or legitimate site.
  • Before clicking any link, hover your cursor over it to see where it goes. Does the URL look off? Don’t click it.
  • Look for extras in the URL, like “USA” added to the end. For instance, instead of target.com, scammers might send you to targetusa.com. This is an easy way to make a fake version of a site you’d otherwise 

If it’s free, you’re the product

Let’s look at what you hand out when you use that “free” email address from your internet service provider, whether it’s Google, Yahoo, AOL or some other Big Tech company. Remember, all of these are tracked and sold off to the highest bidder:

  • Phrases and particular words that appear most in your emails. Think for a moment about some topics in your email right now. These companies make more money off you when they have more data.
  • Your location and where your recipients are located, too. Again, it’s just more data points for them to sell!
  • Every single person you correspond with — business contacts, friends, family, doctors. Also, how often you exchange emails and what you talk about. Nothing is sacred when it comes to making money.
  • The specific time you’re most likely to open your emails, no matter if they’re spam or legit. That’s why the time you get a particular email may change.
  • Your website habits get pulled in, too. That includes your shopping, research, dating and even porn-watching habits. Yup, it’s all for sale and tied to your name and IP address.

Simply put, all the data in your email is gathered, tracked, recorded and sold. 


Cyber Ports




Sunday, August 18, 2024

Protect Your Network

 


The Cyber Shield 365/24/7


Protect your network

“That would never happen to me.” That’s probably what these people thought.

  • There’s the couple who woke up to a stranger talking dirty to their infant son in the middle of the night through his baby cam and monitor.
  • Then, there’s the family targeted by a hacker who cranked up their smart thermostat to unbearably high temperatures.

And don’t forget the countless other stories of home security cameras being hacked.

Get this: The average home and all its internet-connected devices experience about 10 attacks every 24 hours. Everything from your smart light bulbs to your smart thermostat is a way in. The answer isn’t to throw your hands up or ditch your smart gear. You just need to know how to protect your home the right way.

‘Wouldn’t I know if I got hacked?’

Some of these attacks are loud and in your face, like the email trying to extort you or a computer flashing with pop-ups. But some happen quietly in the background, like these:

  • Botnet recruitment: Getting into your network means hackers may be able to add you to an army of infected devices. Their goal? To use all that power to carry out bigger attacks and hacks.
  • Data theft: Most smart devices collect at least some personal details, like your location, behaviors, health data — whatever. This kind of info is worth money on the dark web.
  • Spying: Think listening in, watching, recording or otherwise stealing info, often to bolster a future attack.
  • Cryptojacking: Thieves want to steal your computer’s processing power and internet connection to mine cryptocurrency and reap the profits.


Your computer might be protected

Windows PCs and Macs both have a built-in firewall that does the bare minimum.

  • On Windows: Open Control Panel, then type firewall into the search box. Click Windows Defender Firewall. In the left pane, tap Turn Windows Defender Firewall on or off to enable it.
  • On Mac: Click the Apple menu > System Settings > Firewall, then turn it on.

Now, it’s important to know your computer’s software firewall means nothing if your security cams, smart bulbs and network are under attack. It’s common knowledge that most internet-connected devices have no security protocols.

That’s where a physical firewall comes in. It’s a safeguard between your devices and the internet. More specifically, a firewall provides:

  • Traffic monitoring: A firewall examines all incoming and outgoing traffic to your home network and limits activity based on rules you’ve set up.
  • Access control: Choose what devices access your network, plus when and how. You approve any new device (like the cable guy) and choose limits for certain groups or devices (like no internet on the iPad after 8 p.m.).
  • Intrusion detection: Spot threats to your entire network, including devices you typically can’t monitor, like cheaper smart home gear without much built-in security.
  • Content filtering: Choose what you see and don’t see at the device level. This is perfect for limiting a certain group (like kids) from accessing specific content.

Yes You Need A firewall





Understanding Cyber Security Technology

Understanding Cyber Security Technology The cyber shield 365/24/7 In today’s digital age, cyber security technology plays a vital role in pr...