top of page

Cybersecurity news from NTSC

Jan 1 Lead graphic.jpg

AI technology is advancing at an astounding pace.

 

Criminals are already using it to create realistic voice clones,

and frighten victims into wiring them money.

 

Check out these examples and a simple way to avoid being a victim.

From the Cyber Newswire.png
Delivery phish.jpg

SORRY...NO GIFT FOR YOU — Experts have identified over 1,500 phishing websites designed to look like UPS, DHL, FedEx, and other delivery companies. Scammers send bogus texts and emails about undelivered holiday packages to victims with links pointing to these fake websites and demand payment to complete the delivery. Always check the sender’s email address. Is it really from ups.com, or is it something more obscure?

ChatGPT computer.jpg

REALITY CHECK — Concerns that high school students are using artificial intelligence to do their homework and cheat on tests are apparently overblown. Pew Research says only about a third of teens know how to use AI-based tools like ChatGPT. But the New York Times says the number of kids caught cheating is about the same as before AI became popular.

Wolverine.jpg

HEY, WOLVERINE FANS — Hackers have posted a huge trove of confidential information about Sony PlayStation Insomniac video games, the group that developed the Spider-Man PlayStation franchise. The 1.6TB data dump includes detailed plans for Marvel’s Wolverine, the next installment in the series. Hackers posted all the data after someone paid for just 2% of it.  

Wolverine image © Aisyaqilumar - stock.adobe.com

January is Data Privacy Month.png
NTSC Data Privacy.jpg
Dec 1 Cartoon.jpg
This weeks news header wh.png
What's "phubbing," and how could it affect your marriage?
How major news organizations have decided to use AI.
Why did your smartphone suddenly stop working?
The latest type of fake video tailored just for you. 
Take the news quiz and get smarter!
Answers readers cybersecurity questions.png

“My iPhone wants to set up Face ID. I’ve not done that because my Touch ID is never recognized — I only want to use my 4-digit code. Also, if my husband wants to use the phone, can he do so if I’ve set up a Face ID?”

 

iPhone and Android phones are good at using facial recognition for multiple users. Go to the “settings” area of the phone to set it up. Using a code to access your phone is OK, as well. The important thing is that you require some sort of protection — face scan, fingerprint, password, ID code — to gain access to your phone.

 

-----

 

 

“I think it's a bad idea when offered to log into a website using your Facebook credentials. What are your thoughts?”

 

Using platforms like Google and Facebook to log in to multiple accounts is safe, convenient and avoids requiring you to create many passwords. But if your Google or Facebook account ever gets hacked, all of your accounts protected that way will be at risk. If you ever want to change how you handle passwords, such as moving to password management software, setting up new ones will be a hassle.

 

-----

 

 

“Google keeps asking for my birth date. They said they could help me more with searches or something like that. I don't want to give them this information. What do you think I should do?”

 

Google doesn’t require your birthdate to use Gmail, but they recommend providing it to comply with privacy laws…and, yes…to help Google send you age-appropriate advertising. You can always provide them with a fake birthday. Social media platforms in the U.S. require you to be at least 13 years old to use them. In China, it’s 14; in the European Union, 16; and in India, 18.

Send us your cybersecurity question
for possible use in a future newsletter.

Cyber cartoon © 2023 Cartoonstock | Original content © 2024 Aware Force LLC

bottom of page