<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Family Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/family-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/family-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 09 Aug 2024 19:37:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Family Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/family-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Vacations: Connecting at Coffee Shops, Hotels, and Airports Can be Dangerous to Cybersecurity – Here are Alternatives</title>
		<link>https://fosterinstitute.com/vacationing-use-safer-internet-connections/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 29 Jul 2024 21:43:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5252</guid>

					<description><![CDATA[<p>If you are traveling for work or on vacation, using Wi-Fi wireless connections in airports, coffee shops, hotels, and in-flight is tempting. &#160; Danger: Realize that using public networks via Wi-Fi or an Ethernet cable can be very dangerous. Your laptop is still exposed to network sweeps, vulnerability scans, and other network attacks. Threat actors [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/vacationing-use-safer-internet-connections/">Vacations: Connecting at Coffee Shops, Hotels, and Airports Can be Dangerous to Cybersecurity – Here are Alternatives</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you are traveling for work or on vacation, using Wi-Fi wireless connections in airports, coffee shops, hotels, and in-flight is tempting.</p>
<p>&nbsp;</p>
<p><strong>Danger:</strong></p>
<p>Realize that using public networks via Wi-Fi or an Ethernet cable can be very dangerous. Your laptop is still exposed to network sweeps, vulnerability scans, and other network attacks. Threat actors don’t even need to be close to you; they can attack your laptop using other innocent people’s laptops.</p>
<p>&nbsp;</p>
<p><strong>Cellular Phones and Mobile Hotspots:</strong></p>
<p>Instead of connecting to a public network at a hotel, coffee shop, or similar, use your phone&#8217;s data-sharing function to connect to the Internet while traveling. When you connect your laptop to your cellular network rather than the public Wi-Fi network, your laptop is not exposed to the dangers on the public network. Most phones permit you to connect your laptop to the Internet, and the connection speeds are usually very fast. Unless you are watching movies, the amount of data you consume may be less than you think.</p>
<p>&nbsp;</p>
<p>Consider using a wireless hotspot from your phone provider. This option can be more convenient if you need to take your phone with you while stepping away, allowing you to leave your laptop connected to the internet.</p>
<p>&nbsp;</p>
<p><strong>What if a cell phone is connected to public Wi-Fi and then used as a hotspot?</strong></p>
<p>If your phone allows you to connect it to public Wi-Fi and share that connection with your laptop, it could be beneficial. Your phone might act as a buffer, providing some protection for your laptop from direct exposure to the public Wi-Fi network. However, keep in mind that your phone would still be exposed to potential risks on the public network. Additionally, many phones do not support sharing a public Wi-Fi connection with a laptop; they typically only share the cellular connection.</p>
<p>&nbsp;</p>
<p><strong>Throttling:</strong></p>
<p>Suppose you anticipate using lots of data, such as watching movies. In that case, your phone provider might slow your Internet connection to a crawl once you reach a specific data limit for that month, even if you have an unlimited data plan. They call this throttling your connection.</p>
<p>&nbsp;</p>
<p>If you need a hotspot that will not get throttled in the USA, consider getting a hotspot by donating to <a href="https://calyxinstitute.org/">https://calyxinstitute.org/</a> (We do not receive any compensation for mentioning them, and this is not an endorsement of Calyx Institute. We know many people who are very happy with their service, so it is important to tell you of a way to avoid throttling). Their website shows their coverage areas.</p>
<p>&nbsp;</p>
<p><strong>International Roaming:<br />
</strong>If you are traveling outside your country, check with your phone service to see what International Roaming plans they offer. You can often use your phone and hotspot in other countries for a small monthly fee.</p>
<p>&nbsp;</p>
<p><strong>Portable Hardware Firewalls and Travel Routers:</strong></p>
<p>If you are remote and away from your mobile phone providers’ coverage area, connecting to a public network might be your only option. Or perhaps you don’t want to use up minutes on your cellular data plan. You can help protect yourself on a public network by using a portable hardware firewall called a travel router.</p>
<p>&nbsp;</p>
<p>Most travel routers have two radios to allow simultaneous Wi-Fi connections to your laptop and a public Wi-Fi network.</p>
<p>&nbsp;</p>
<p>Note that some travel routers allow you to connect via Ethernet cables if you don’t want to use Wi-Fi. If you want to connect to the travel router via a cable, you will need an Ethernet port on your laptop or a USB to Ethernet adapter.</p>
<p>&nbsp;</p>
<p>Here&#8217;s what to expect when setting up a travel router:</p>
<p>&nbsp;</p>
<ol>
<li>Connect your laptop to the travel router like any Wi-Fi or network cable connection.</li>
<li>Use your browser to put the router into “bridge mode.” Sometimes, the setting is named something similar. Then, connect the travel router to the public network at your hotel wirelessly or with a cable.</li>
<li>If required, log into the public network (e.g., entering your hotel room number and last name). If the public network has a login screen that doesn’t appear, you can try typing this address into a new tab in your browser: nossl dot com</li>
</ol>
<p>&nbsp;</p>
<p>The process usually takes about five minutes, even in new locations.</p>
<p>&nbsp;</p>
<p>Remember, your connection speed depends on the speed of the public network and may vary throughout the day.</p>
<p>&nbsp;</p>
<p>While travel routers can enhance security, proper configuration is crucial. Always consult with your IT team for setup, training, and best practices. The phone and hotspot recommendations are generally faster and simpler to connect.</p>
<p>&nbsp;</p>
<p>If you plan to get a travel router, you should purchase it with a 30-day return policy and be sure to work on getting it up and running before you leave on your trip. Reliable travel routers are available for less than $100. I do not get any compensation for mentioning this brand, and this is not an endorsement: I have used the GL.iNet GL-MT3000 (Beryl AX) travel router successfully.</p>
<p>&nbsp;</p>
<p><strong>VPNs are Not a Shield:</strong></p>
<p>This section is a bit technical, so feel free to skip it unless you believe a Virtual Private Network (VPN) is all you need to be secure on a public network.</p>
<p>&nbsp;</p>
<p>Using a VPN is fine, but it does not shield your laptop from network sweeps, vulnerability scans, and other network attacks. You are still exposed to those attacks even if you use a VPN.</p>
<p>&nbsp;</p>
<p>VPNs encrypt your data as it travels across the network. However, know that your data is encrypted anyway when you visit a website that starts with https:// whether you are using a VPN or not. The encryption may have been compromised or misconfigured on the site, but this is not common, especially on sites such as banks and other companies that are very careful about their site’s security.</p>
<p>&nbsp;</p>
<p>A significant security advantage of using a VPN is that it helps protect against Adversary in The Middle (AiTM) attacks, where an attacker tries to insert themselves between you and the site you are visiting. These used to be called Man in The Middle (MiTM) attacks. Simplified, in an AiTM attack, the adversary convinces the bank that the adversary is you connecting to the bank. Then, the adversary tries to make your laptop believe the adversary is the bank. If the adversary is successful, they can read, change, insert, and delete data between you and the bank.</p>
<p>&nbsp;</p>
<p>But keep in mind that if you are connecting via your phone or cellular hotspot, you needn’t be as concerned about an AiTM attack unless an attacker has compromised your phone carrier’s network, which is very unlikely. And, if you use a travel router as a firewall, many of them come with a VPN service if you want to enable it.</p>
<p>&nbsp;</p>
<p>Outside of encrypting data in transit, the added benefits of using a personal VPN service, as opposed to your company’s, would be to hide what websites you visit, and you could disguise what country you’re in. However, many people avoid the VPN option since it doesn’t provide a shield against the attacks mentioned above, and using a VPN might make your data rate seem slower due to the VPN’s overhead and the network distance to the VPN server.</p>
<p>&nbsp;</p>
<p>If your company uses a VPN, they might insist you use a VPN, or Secure Access Service Edge (SASE), to protect privacy.</p>
<p><strong> </strong></p>
<p><strong>Conclusion:</strong></p>
<p>Connecting to a public network can be very risky. You are more secure if you connect to the cellular network via phone or cellular hotspot. If you must connect to a public network, strongly consider using a portable hardware firewall, commonly called a travel router.</p>
<p>&nbsp;</p>
<p>Wishing you cyber-safe travels!</p>
<p>The post <a href="https://fosterinstitute.com/vacationing-use-safer-internet-connections/">Vacations: Connecting at Coffee Shops, Hotels, and Airports Can be Dangerous to Cybersecurity – Here are Alternatives</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</title>
		<link>https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 25 May 2024 21:38:42 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5809</guid>

					<description><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices. A Real-World Example from the Workplace: Recently, a new employee at a company received a fraudulent [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices.</p>
<p><strong>A Real-World Example from the Workplace</strong>: Recently, a new employee at a company received a fraudulent text message on her personal phone, supposedly from the company&#8217;s president. The president had not sent any text, and the company had not stored her personal phone number. How did the threat actor know? It’s possible that a data broker linked the new employee’s private phone number with the president’s name at the new company by eavesdropping on a conversation, such as her telling a friend about her new job. Upon investigation, the employee found that some unexpected apps had access to her microphone.</p>
<p><strong>A Real-Word Family Example</strong>: Last week, a husband and wife discussed dental options for their child at the breakfast table with their phones nearby. They hadn&#8217;t typed anything into a computer or searched online, yet less than an hour later, one received a text message from a company offering dental aligners. How could this happen? An app on their phone might have accessed the microphone, listened to the conversation, and shared the information with a data broker. The data broker then provided this information to a company selling dental aligners, prompting them to send a targeted text message. Have you or someone you know had similar experiences?</p>
<p><strong>How It Happens</strong>: Some apps collect data, including audio data from a microphone, and sell it to data brokers, also known as Marketing Data Aggregation Warehouses. These brokers aggregate and sell data to various businesses, including marketing and advertising firms. These businesses then use the information to send targeted advertisements or, in the case of threat actors, perform sophisticated phishing attacks designed to extract sensitive information or commit fraud.</p>
<p><strong>Apps are supposed to request your permission</strong> to access your microphone. However, this &#8220;user&#8217;s consent&#8221; often comes from clicking &#8220;Do you agree to the privacy policy&#8221; during installation. Most users do not read these policies and agree just to use the app. Privacy policies can be vague, stating that the user allows the app to collect information and share data with third parties.</p>
<p>Several types of apps can gather information for sale to data brokers and request microphone access in their privacy policies. These include:</p>
<ul>
<li><strong>Social Media and Communication Apps:</strong> Use microphone access for features like voice messaging and video recording, sharing collected data for advertising.</li>
<li><strong>Virtual Assistants:</strong> Require microphone access for functionality, collecting voice queries and background noise for service improvement and advertising.</li>
<li><strong>Gaming Apps:</strong> Mobile games with voice chat request microphone access for communication, sharing user data for advertising.</li>
<li><strong>Productivity Apps:</strong> Note-taking and voice recorder apps request access for audio notes and transcriptions, collecting valuable user data.</li>
<li><strong>Health and Fitness Apps:</strong> Fitness trackers and health apps request microphone access for voice input, collecting sensitive health data.</li>
<li><strong>Utility Apps:</strong> Simple apps like flashlights and calculators sometimes request unnecessary permissions, including microphone access, to gather user data covertly.</li>
<li><strong>Marketing and Rewards Apps:</strong> Request location and microphone access to collect user data, which is then sold to data brokers.</li>
</ul>
<p>These apps often include clauses in their privacy policies that allow microphone data collection, which users might unknowingly grant, leading to targeted advertising and other uses by data brokers.</p>
<p>For further reading, refer to articles like &#8220;FTC Cracks Down on Mass Data Collectors&#8221; by the Federal Trade Commission.</p>
<p><strong>Protecting Your Privacy:</strong> To protect against such risks, Apple, Google, and Microsoft have all implemented ways to help ensure your microphone&#8217;s privacy even if users agree to the privacy policy. Instructions for disabling access to your mic are listed below. It’s crucial to regularly review and update app permissions on your devices, ensuring that only essential apps have access to sensitive data like the microphone.</p>
<p><strong>Beyond Annoying Ads</strong>: Threat actors can use similar tactics to perform targeted attacks and commit fraud against individuals and their companies. For instance, the fraudulent text message received by the new employee could lead to more sophisticated phishing attacks intended for extracting sensitive information, transferring money, or other financial fraud.</p>
<p><strong>Follow the instructions in the following draft memo you can send your workers and tell your family</strong>:</p>
<h3><strong>Memo to All Employees: Securing Your Microphone Privacy Settings</strong></h3>
<p>Dear Team,</p>
<p>We are committed to ensuring the privacy and security of our employees&#8217; personal and professional information. Recent reports have highlighted the risks associated with apps accessing device microphones without explicit consent, potentially leading to targeted fraud and privacy breaches.</p>
<p>To protect your privacy and our organization&#8217;s security, we ask all employees to take a few moments to review and update the microphone privacy settings on their devices. Below are step-by-step instructions for various platforms:</p>
<p><strong>For Apple Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all applications that do not need access to your mic.</li>
</ol>
<p><strong>For Android Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Type Microphone, Privacy, or Permission Manager in the search box. </strong>If you do not see the privacy settings, you might need to use a search engine or chatbot to find specific instructions for your device model and version of Android.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Windows:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Macs:</strong></p>
<ol>
<li>Click on the <strong>Apple symbol &gt; System Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>Practical Steps:</strong></p>
<ul>
<li><strong>Revoke Unnecessary Access:</strong> Disable microphone access for all apps that do not need it. Allow exceptions for essential apps such as video conferencing tools and browsers if you use them for meetings. If you are uncertain, restrict access; the app will request permission if it needs access in the future.</li>
<li><strong>Test Essential Apps:</strong> Before your next meeting, verify that the apps you frequently use for video conferencing and other essential functions work correctly with the microphone settings you have configured.</li>
<li><strong>Restrict Other Permissions:</strong> While adjusting your microphone settings, you&#8217;ll see other settings. To further protect your privacy, consider restricting access to your camera, location, contacts, and other sensitive data.</li>
</ul>
<p>We live in a world where protecting our privacy is increasingly our responsibility. Threat actors are becoming more sophisticated, so it&#8217;s crucial to stay vigilant and proactive in securing our devices.</p>
<p>Thank you for your attention to this important matter. If you have any questions or need assistance, please ask.</p>
<p>(In the last sentence, you can give them more specific guidance on what to do if they have a question)</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<h6></h6>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Your Financial Interests in the Wake of a Major Data Breach</title>
		<link>https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 21 Apr 2024 13:33:01 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Anti-virus]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5779</guid>

					<description><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only names and contact details but also sensitive information such as social security numbers, dates of birth, and account credentials. The potential financial repercussions are substantial, making it imperative to take action to safeguard your assets. Follow these guidelines to mitigate risks and ensure your financial security remains uncompromised.</p>
<h3>Credit Freeze</h3>
<p>If you haven’t already, consider freezing your credit to prevent new credit accounts from being opened in your name without your permission. Here are in-depth instructions and details: <a href="https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/" target="_blank" rel="noopener">Help Protect Your Financial Future: Freeze Your Credit &#8211; Foster Institute</a></p>
<h3>Monitor Financial Accounts</h3>
<p>Keep a close watch on your financial accounts for any unauthorized activity or transactions. Consider subscribing to an identity theft protection service, which can help monitor your information and alert you to potential misuse of your personal data. If you didn’t place the credit freeze mentioned above, doing so is essential.</p>
<h3>Beware of Fraud and Scams</h3>
<p>Beware of email, text, phone calls, or messages popping up on your computer that claim you are hacked and offer tech support help. Familiarize yourself and your family with the latest fraud techniques. Be skeptical of emails, phone calls, or messages that request personal information or direct you to websites asking for personal or financial data.</p>
<h3>Be Cautious with Search Engine Results that are Ads</h3>
<p>Threat actors can purchase ads so that, if you search for keywords such as &#8216;My phone provider database was hacked,&#8217; the ad, disguised as a helpful search result, will appear at the top. This can lead you to a page designed to defraud you or compromise your computer</p>
<p>To help protect yourself, when you search, scroll down and click on the organic search results rather than the ads. You are more likely to access safer websites.</p>
<p>Malicious advertising is not limited to search engines. Advertisements on websites can be just as dangerous. These attacks are called malvertising and trick millions of users each year.</p>
<h3>Change Passwords Immediately</h3>
<p>If you haven’t recently, change passwords for all your accounts including phone provider, social media, banking, and other sensitive accounts, especially if you’ve used the same password for multiple accounts.</p>
<h3>Use a Password Manager</h3>
<p>Consider using a password manager to manage your unique passwords on every website. Detailed information about using password managers: <a href="https://fosterinstitute.com/password-managers-speed-your-workflow/" target="_blank" rel="noopener">Password Managers Speed Your Workflow &#8211; Foster Institute</a></p>
<h3>Set Up Unique Security Questions</h3>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. Instead, use fictional answers like, “The fourth crater on the moon.” Save your secret answers in a randomly named file such as “socks.docx,” and consider encrypting this file for added safety.</p>
<h3>Enable Two-Step Verification</h3>
<p>Enable two-step verification for accounts. Prioritize setting this up on sensitive websites and services where it&#8217;s available.</p>
<h3>Update Operating Systems and Software</h3>
<p>Ensure that all your devices have the latest security software, web browsers, and operating systems updates and patches. This is one of the best defenses against viruses, malware, and other online threats.</p>
<h3>Secure Your Tax Identity with an ID.me Account</h3>
<p>Given that social security numbers were compromised, there&#8217;s an elevated risk of someone attempting to file a fraudulent federal tax return in your name. To combat this, consider registering for an ID.me account which provides access to IRS services. With this account, you can also apply for an IRS Identity Protection PIN (IP PIN) that adds an extra layer of security to your tax filings by requiring this unique six-digit number on your tax return.</p>
<h3>Protect Your Property Records</h3>
<p>With personal details like your SSN in the wrong hands, even your home ownership documents could be targeted. It&#8217;s advisable to monitor and possibly register your property deeds with services that alert you to any unauthorized filings or changes. While a universal solution for this isn&#8217;t available yet, taking initial steps such as contacting your local county clerk&#8217;s office to inquire about protective measures can be beneficial.</p>
<h3>Awareness for Business Impact</h3>
<p>Businesses, particularly those utilizing services from the breached provider, should be acutely aware of the implications this breach can have on their operations. It&#8217;s crucial for business owners to assess their exposure and strengthen their internal security measures, including employee training on data privacy and regular security audits to prevent further damage.</p>
<h3>Register for Online Tax Accounts in All States</h3>
<p>To prevent the misuse of your personal information for fraudulent state tax filings, consider registering for an online tax account in each of the 50 states. This pre-emptive registration can block identity thieves from creating accounts in your name, a tactic increasingly used to commit tax fraud across state lines.</p>
<h3>Digital Footprint and Data Sharing</h3>
<p>Be vigilant about the information you share online and through mobile applications. It&#8217;s crucial to minimize data sharing and scrutinize the permissions you grant to apps, especially those that request access to sensitive personal information. Educate yourself and limit exposures to safeguard against unauthorized data usage. The less information threat actors can gather about you, the more difficult it will be for them to misuse your identity.</p>
<h3>Review and Update Privacy Settings</h3>
<p>Regularly review and update your privacy settings on social media and other online platforms to ensure minimal public exposure of personal information. This proactive measure can significantly deter fraudsters from using accessible data to facilitate identity theft or scams.</p>
<h3>Legal and Financial Consultation</h3>
<p>Consult with legal and financial advisors to explore additional protective measures tailored to your personal or business circumstances. Discuss setting up legal structures such as trusts to shield assets, or other strategies that may offer enhanced security against identity theft and financial fraud.</p>
<h3>Emergency Contacts and Protocols</h3>
<p>Prepare an emergency contact list and establish protocols for immediate action if you suspect identity theft or if a data breach occurs. Include the contact information for essential services such as credit bureaus, your bank, and legal advisers, to ensure a swift and organized response to security threats.</p>
<p>Forward this message to your friends so they can follow these steps can help mitigate the damage from the breach and protect their personal information.</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 23 Mar 2024 20:06:07 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5743</guid>

					<description><![CDATA[<p>Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-preserver-spaces="true">Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, business owner, or top-level executive, you&#8217;re likely familiar with the convenience of connecting your devices to Wi-Fi networks once, and if you allow your device to &#8220;remember&#8221; the network names, your device can automatically reconnect to any networks with those names from then on. </span></p>
<h3><span data-preserver-spaces="true">The Risk: When Convenience Becomes a Liability</span></h3>
<p><span data-preserver-spaces="true">Imagine this: You&#8217;ve visited a coffee shop and connected your smartphone to their Wi-Fi network. Your device remembers this network to connect automatically next time. Seems harmless, right? Here&#8217;s where the risk creeps in.</span></p>
<p>Once you tell a device to automatically reconnect to a remembered network in range, your device will continuously send out &#8220;probes&#8221; or signals looking for that network, typically one to four times a minute and more often when other events can trigger a probe. A threat actor can set up a Wi-Fi access point with a common SSID name, such as &#8220;home.&#8221; And what if your device is configured to automatically connect to a network you trust named &#8220;home?&#8221; When your device, say your smartphone or laptop, is within range, it might automatically connect to this rogue Wi-Fi network without your knowledge.</p>
<h3><span data-preserver-spaces="true">The Trap: A Deceptive Doppelgänger</span></h3>
<p><span data-preserver-spaces="true">This rogue network, set up by the threat actor, is a doppelgänger of your trusted network but with nefarious purposes.</span></p>
<p><span data-preserver-spaces="true">Remember: Your device connects to the rogue access point <em>automatically</em> and often <em>without alerting you at all.</em> (see &#8220;what about passwords&#8221; below). This attack does not need you to make any mistakes to succeed, and it can happen without your knowledge.</span></p>
<p><span data-preserver-spaces="true">Ten common network names threat actors can use that will often lure devices from unsuspecting users to connect include:</span></p>
<ul>
<li><span data-preserver-spaces="true">xfinitywifi</span></li>
<li><span data-preserver-spaces="true">linksys</span></li>
<li><span data-preserver-spaces="true">Marriott_Guest</span></li>
<li><span data-preserver-spaces="true">Hyatt</span></li>
<li><span data-preserver-spaces="true">hhonors</span></li>
<li><span data-preserver-spaces="true">NETGEAR</span></li>
<li><span data-preserver-spaces="true">Guest</span></li>
<li><span data-preserver-spaces="true">dlink</span></li>
<li><span data-preserver-spaces="true">FreeWifi</span></li>
<li><span data-preserver-spaces="true">Home</span></li>
</ul>
<p><span data-preserver-spaces="true">To make it even easier to connect, there are commercially available devices that listen for the SSID name in a probe from an unsuspecting user&#8217;s device and then broadcast that name in an effort to capture the device&#8217;s connection. In that case, it doesn&#8217;t matter how unique your SSID is, an automated device can attempt to establish a connection without your knowledge. </span><span data-preserver-spaces="true">If you are technically minded, you can read the section at the bottom of this article for a detailed explanation of how probing works.</span></p>
<p><span data-preserver-spaces="true">Once connected, the attacker can intercept your device&#8217;s data. This interception could be called a “Man-in-the-Middle” attack. Thanks to encryption technology, the attacks are more complicated than they used to be, but they are still possible in some circumstances. If the attacker successfully establishes the Man-in-the-Middle connection, imagine sending confidential emails, accessing your company’s financial data, or even logging into your personal banking app, all while an unseen cybercriminal is potentially recording every keystroke and data transfer.</span></p>
<p><span data-preserver-spaces="true">Another serious concern is if threat actors know of undiscovered vulnerabilities that will allow them to hack into your device. This is one of the most important reasons to always apply security updates when they are released and always keep backups for the unlikely scenario of an update causing a problem on your device. Even if you applied all of your security updates, sometimes attackers know of ways to break in that haven&#8217;t been discovered by the device&#8217;s manufacturer, operating system producer, or app developer yet. Thus, there are no updates written. Bad actors can use tools to scan your device and exploit vulnerabilities quickly. Their ultimate goal would be to take control of, or pwn, your device. This isn&#8217;t always easy if you have all your updates in place, but it isn&#8217;t impossible either.</span></p>
<h3><span data-preserver-spaces="true">The Consequences: A Digital Pandora&#8217;s Box</span></h3>
<p><span data-preserver-spaces="true">The consequences from attackers successfully tricking your device into connecting to their rogue access point and exploiting vulnerabilities can range from private information exposure to significant breaches:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Personal Data Theft</span></strong><span data-preserver-spaces="true">: Sensitive personal information can be stolen.</span></li>
<li><strong><span data-preserver-spaces="true">Corporate Espionage</span></strong><span data-preserver-spaces="true">: Confidential business information could be compromised.</span></li>
<li><strong><span data-preserver-spaces="true">Identity Theft</span></strong><span data-preserver-spaces="true">: Your digital identity could be used for fraudulent activities.</span></li>
<li><strong><span data-preserver-spaces="true">Network Infiltration</span></strong><span data-preserver-spaces="true">: Once a device is compromised, it can serve as a gateway to your business’s entire network.</span></li>
</ol>
<h3><span data-preserver-spaces="true">Prevention: Turning Awareness into Action</span></h3>
<p><span data-preserver-spaces="true">As executives, instructing your workers to implement security measures is crucial. Here are some actionable steps you can take in the Wi-Fi settings of your laptops, phones, and tablets:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Forget Networks</span></strong><span data-preserver-spaces="true">: In your device&#8217;s Wi-Fi settings, examine the network names identified as &#8220;remembered&#8221; or &#8220;my networks.&#8221; Tell your device to ‘forget’ networks by removing them from the &#8216;my networks&#8217; list, except those you use frequently. Were any of the ten listed above remembered on your device? To establish the unauthorized connection, the threat actor would need to use the name of one of the networks you leave remembered or use the device mentioned above that responds to probes for names your device sends.</span></li>
<li><strong><span data-preserver-spaces="true">Avoid a False Sense of Security</span></strong><span data-preserver-spaces="true">: If your device has the &#8220;Ask to Join Networks&#8221; setting, read the fine print. The device will still join known network names without asking. The setting is usually more about asking before joining new or unknown networks, rather than known ones.</span></li>
<li><strong><span data-preserver-spaces="true">Turn off Wi-Fi When You Aren&#8217;t Using it</span></strong><span data-preserver-spaces="true">: To reduce your exposure dramatically, disable Wi-Fi when you are not using it. Your device will stop probing, stop listening for access points broadcasting their name, and won&#8217;t connect to any Wi-Fi networks. Some devices have a quick shortcut to turn off Wi-Fi from an easily accessible menu, but they might turn Wi-Fi back on again after a while or when you move to a new location. On those devices, if you go into &#8220;Settings&#8221; to disable Wi-Fi, it should stay off until you manually change the setting to &#8220;on&#8221; again.</span></li>
</ol>
<h3><span data-preserver-spaces="true">What about Wireless Passwords?</span></h3>
<p><span data-preserver-spaces="true">If the original remembered network you connected to, such as the coffee shop network, had no password, your device would join the network automatically and not alert you. This is a common risk with some remembered networks. You may have noticed that many hotels and some coffee shops and restaurants now require no Wi-Fi password; this is undoubtedly to reduce guest frustration and the number of calls from hotel rooms to the front desk asking for the password. The prevalence of public networks without passwords makes it especially important for you to tell your device to forget networks and be sure to forget the ones with no passwords. </span></p>
<p><span data-preserver-spaces="true">However, if the &#8220;remembered&#8221; network did have a password, then to get your device to connect automatically without warning you, the threat actor will need to set the same password on the rogue access point. It is simple for an attacker to know the password for coffee shops and other networks that share the password with guests. </span></p>
<p><span data-preserver-spaces="true">Many companies will set passwords on networks and hopefully don&#8217;t write the password on dry-erase boards in the meeting room. Even if the passwords are configured at the company, and users do not know the password since the IT Professionals configure their computers, if an attacker is able to access one computer, in-person or remotely, there is a chance they can run a script to find out the wireless password for the company. This is why some companies use enterprise-level Wi-Fi authentication that does not rely on a shared password.  Or, attackers can use social engineering to successfully trick a user into providing the network password. If a user&#8217;s device doesn&#8217;t detect any anomalies between the rogue access point and the access point it is used to connecting to, the user will not be alerted they are connecting to a rogue access point, and their device will connect automatically.<br />
</span></p>
<p><span data-preserver-spaces="true">An exception that might generate an alert is when there is a discrepancy between the security settings of the known network and the one to which the device is trying to connect. An example is when the rogue access point does not have a password, but the remembered network does. In this case, some devices will prompt you: &#8220;Are you sure you want to join this network?&#8221; The default button, &#8220;join,&#8221; is preselected. Unless you are on the lookout for this kind of message and know the seriousness, you might click &#8220;join&#8221; and not think anything of it. Sometimes, the device will connect and not alert the user but will quietly list the word “open” or “insecure” under the network name on the list of networks under settings. Most people do not periodically look at the Wi-Fi settings, so the label often goes unnoticed. Even if a user does notice the label, there is a good chance the attacker already probed for weaknesses and exploited any vulnerabilities they discovered.</span></p>
<p>However, if you ever see a prompt asking you to re-enter a password, that is a huge red flag, and you need to assess the situation carefully to determine if your device is attempting to connect to a rogue access point with an inaccurate password.</p>
<p><span data-preserver-spaces="true">And to be sure you don’t have a false sense of security, remember that devices do not prompt the user if the security settings of the new network match those of the remembered network, and the device will quietly automatically connect even if it’s a rogue access point.</span></p>
<h3><span data-preserver-spaces="true">What about a VPN?</span></h3>
<p>A Virtual Private Network (VPN) is a technology that encrypts data as it moves to and from your device. This encryption can prevent attackers from reading your data. However, it&#8217;s important to note that a VPN doesn&#8217;t protect you from attackers who scan for unpatched vulnerabilities, search for open ports, and exploit weaknesses on your device. Even if you use a VPN, you&#8217;re still vulnerable to such attacks. Follow the instructions above to help ensure your online safety.</p>
<h3><span data-preserver-spaces="true">Final Thoughts: Balancing Convenience with Caution</span></h3>
<p><span data-preserver-spaces="true">In today&#8217;s fast-paced digital world, convenience often beats caution. However, in the realm of cybersecurity, this trade-off can have dire consequences. As leaders, our role extends beyond making decisions; it includes understanding and mitigating the risks associated with the technology we use every day. Stay safe, stay informed, and lead your organization confidently in this digital age.</span></p>
<h3><span data-preserver-spaces="true">Technical Details About the Probing Process</span></h3>
<p>For the more technically minded, here is more information about the probing process. When we say that devices are constantly probing, they are, and the probing might be once every 15 to 60 seconds. The probing frequency can vary, for example, if you put your device in low battery mode.</p>
<p>In addition to devices probing, know that Wi-Fi access points, including rogue access points attackers use, broadcast their network name, a process called beaconing, sometimes as often as ten times every second. The rate of beaconing is usually configurable by your IT Professionals.</p>
<p>If you look at “available networks” in &#8220;settings&#8221; on your device, you might notice that the list takes a few seconds to build because your device is cycling through multiple Wi-Fi frequencies, listening for the beacons.</p>
<p>An interesting setting not everyone is familiar with on wireless access points is that you can instruct the access point to be “hidden.” If you do, then the access point will not send out beacons. However, hidden networks, while not broadcasting their SSID, will still respond to direct probes that contain their SSID name. So, as soon as your device sends out a probe looking for the remembered hidden network, which it does regularly, as described above, the access point will respond, and your device will connect. Just because a network you “remembered” is hidden at your home or office doesn’t affect a threat actor’s ability to lure your device into connecting to their rogue access point, even if the hacker’s access point is not hidden.</p>
<p>Additionally, to reduce the delay in connecting, your device will send immediate probes in certain circumstances, such as when it wakes from sleep, when you open your laptop&#8217;s lid, or if you just disabled airplane mode. Your device will quickly find access points, even rogue ones, especially if they are &#8220;remembered.&#8221;</p>
<p>A significant benefit to attackers of your device probing periodically, such as every 15 to 60 seconds, is when the attacker doesn&#8217;t already know the network names your device has remembered. The attacker tools wait for the probe, then know the name, and the rogue access point automatically claims to have that network’s name. This is a very powerful way for attackers to capture as many unsuspecting users as possible without needing to predict the names of remembered networks.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</title>
		<link>https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 15 Jul 2023 15:20:44 +0000</pubDate>
				<category><![CDATA[ACH Fraud]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5537</guid>

					<description><![CDATA[<p>AI helps bad actors be more effective than ever. They create deep fake videos, AI-generated phone calls, and other scams, some of which have led to devastating consequences. Use these tips to protect yourself from AI-generated scams: Realize Even Photos Can Give an AI Attacker All they Need to Know: AI-based facial recognition enables bad [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/">AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>AI helps bad actors be more effective than ever. They create deep fake videos, AI-generated phone calls, and other scams, some of which have led to devastating consequences. Use these tips to protect yourself from AI-generated scams:</p>
<p><strong>Realize Even Photos Can Give an AI Attacker All they Need to Know:</strong><br />
AI-based facial recognition enables bad actors to link you to locations, people, and your daily activities. Some photos you take with your phone contain exact location data. Protect yourself and inform your friends:<br />
-Adjust privacy settings on social media, making profiles private and sharing only with trusted connections.<br />
-Be cautious when posting photos that reveal sensitive details about you and your loved ones.<br />
-Disable geotagging on your smartphone&#8217;s camera app to prevent automatic location embedding.</p>
<p><strong>Verify the Identity of the Caller:</strong><br />
Attackers can change their Caller-ID to match whomever they’re impersonating. When receiving a suspicious call, verify the caller&#8217;s identity by asking a question that only they would know the answer to. Avoid questions that could be answered with information on social media or online. If you receive a call from a loved one in distress, hang up and call them back on a known number.</p>
<p><strong>Set a Code Word with Loved Ones:</strong><br />
Set a &#8216;code word&#8217; with your kids, family members, or trusted close friends that only you and they would know. They can use this code word to confirm their identity in a genuine emergency and contact you.</p>
<p><strong>Educate Yourself About Deepfakes:</strong><br />
Deepfakes are AI-generated videos or audio that can convincingly mimic real people. Familiarize yourself with the signs of a deepfake, such as suspiciously good voice recording quality, no discernible background noise, unnatural blinking patterns, poor lip-syncing, or anything that seems a little off. People can use AI to put your face on a scantily clad body doing embarrassing things. The deepfake videos look convincing, and the bad actors will threaten to share the pictures online or with your friends or family and demand money. Cyberbullying is real.</p>
<p><strong>Be Aware of Current AI Scams:</strong><br />
Common scams include a caller claiming they are from the IRS or that you have a warrant out for your arrest. The IRS provides an updated list of scams here: <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">https://www.irs.gov/newsroom/tax-scams-consumer-alerts</a>. One of the most prominent organizations in the UK that provides information and guidance on scams is the &#8220;Action Fraud&#8221; website: <a href="http://www.actionfraud.police.uk">www.actionfraud.police.uk</a></p>
<p><strong>Recognize AI Hallucinations:</strong><br />
Another red flag is inconsistency in the story or information provided. Like when using a chatbot, you sometimes identify responses sounding goofy. If you notice contradictions or a seemingly confused train of thought, that is a clue that AI might be generating the audio.</p>
<p><strong>Teach Your Youngsters:</strong><br />
Teach them that AI can allow attackers to figure out lots about them, and they should not share their real names, family members&#8217; names, city names, addresses, phone numbers, school names, or birthday information. They must assume that every person they chat with or meet in games may not be who they claim to be, even if they sound like friends from school, due to knowing accurate details. You don’t want to terrify your young people to the point that they cannot sleep, so you might choose to limit the number of and how frequently you share horror stories.</p>
<p><strong>Use Verified Communication Channels:</strong><br />
Whenever possible, use verified communication channels, especially for sensitive conversations. For example, use your bank&#8217;s official app for financial transactions instead of a link sent via email. Use encrypted email to communicate sensitive information.</p>
<p><strong>Keep Your Cool:</strong><br />
Scammers often impersonate trusted individuals or organizations in some crisis or drama to trigger your brain into fight or flight mode. Attackers try to freak you out so you make poor choices. Beware of urgent, unexpected, or out-of-character phone calls.</p>
<p>Please forward this to your friends and coworkers so they know these top strategies to protect themselves from falling victim to AI-generated scams.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/">AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rise of Passkeys: A Paradigm Shift in Authentication Technology</title>
		<link>https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2023 16:17:51 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5466</guid>

					<description><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now. Passkey authentication can be configured to be very secure based on four conditions: You must have your mobile device with you. (An attacker is unlikely to have the device with them.) You must be able [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now.</p>
<p>Passkey authentication can be configured to be very secure based on four conditions:</p>
<ol>
<li>You must have your mobile device with you. (An attacker is unlikely to have the device with them.)</li>
<li>You must be able to log in to your mobile device using facial recognition, a fingerprint, PIN, pattern, USB token, etc. Some people call passkeys a &#8220;Face&#8221; or &#8220;Fingerprint&#8221; sign-in.</li>
<li>Your device must have a unique key assigned to you that ties to a unique key at the site or application.</li>
<li>If you log into a site or application from a computer, the mobile device must be physically close to the computer where you&#8217;re logging in.</li>
</ol>
<p>Passkeys are new, and there is varying support for specific browsers, operating systems, and devices.</p>
<h2>Tips for Using Passkeys:</h2>
<ol>
<li>Start setting passkeys up on your mobile device, such as a smartphone, before you use your computer.</li>
<li>If the website or application does not allow you to set up a passkey on your computer:
<ul>
<li>Look for and select an option on the computer that says, &#8220;Use a passkey to log in,&#8221; Your computer will display a QR code image.</li>
<li>Use your phone&#8217;s camera to scan the QR code image displayed on your computer.</li>
<li>After scanning the QR code, your phone completes the passkey login process.</li>
</ul>
</li>
<li>It&#8217;s essential to confirm that passkeys work on all devices and browsers before disabling the old login method for each website or application. This way, you can avoid problems accessing your account if the passkey login method doesn&#8217;t work on some of your devices or browsers.</li>
</ol>
<p>As the adoption is just starting, you might discover limitations or frustrations, but they&#8217;ll disappear soon. Some people have great luck experimenting with setting up their first passkey at best buy dot com even if they don&#8217;t shop there.</p>
<p>Apple uses the Apple Keychain to store a passkey that should work on all your Apple devices after enrolling one. Google uses the Google Password Manager in the Chrome browser and Android. Microsoft uses Microsoft Hello. Some password managers store keys.</p>
<p>Mobile device backups and some password managers are designed to back up the passkeys in case you lose your phone. If you do lose your phone, it is a good idea to go to the apps and sites to set up a new key and disable your old key. One concern is that, if an attacker can access your backups or the passkey manager and obtain a key from there, they might find a way to bypass passkey protection. But that doesn&#8217;t necessarily make passkeys less secure than other authentication methods; they may well be the best protection available when implemented properly since they offer so many benefits:</p>
<ol>
<li>Users cannot be tricked into giving away passkey values they do not know in social engineering and phishing attacks.</li>
<li>Since passkeys come in unique pairs, users cannot re-use passwords, another user mistake that leads to compromised passwords.</li>
<li>Keyloggers cannot capture passwords since users are not typing passwords.</li>
</ol>
<p>Your IT team might choose to eliminate your existing Multi-Factor authentication process since using passkeys involves multiple factors already. Unlike SMS text messages, passkeys cannot be redirected to attackers. Passkeys are immune to MFA Fatigue addressed here <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>Please forward this to your friends so they can explore eliminating passwords and eventually start adopting passkeys as Passkey support expands.</p>
<p>Prepare yourself for what would happen if an attacker steals a phone containing passkeys: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Technical Details &#8211; If You are Interested</h2>
<p>You do not need to know this to use passkeys. But if you wonder how these keys can be so secure, read on.</p>
<p>Passkeys are much more secure because passkeys come in key pairs. When you use one key of the pair to lock something, you must use the paired key to unlock it. Only the paired key can unlock what the first key locked.</p>
<p>So for each site or application you set up to use a passkey, your mobile device generates a pair of keys:<br />
&#8211; A unique private key for that site or application is stored on your device.<br />
&#8211; A paired key that your device sends to the site or application which stores the key just for you.</p>
<p>If you have a passkey set up for 100 sites or applications, your device will store 100 keys. Sites that have 100 million users will have 100 million keys. Each key is half of a pair. The private key must be kept secret on your device to be secure. Even if attackers access all the keys for a site or application, your account is still protected since they won&#8217;t have the second key stored solely on your device.</p>
<p>If you want to get more technical and understand why passkeys are so resistant to person-in-the-middle attacks: Websites that start with https:// and most web applications use PKI encryption to protect data during transit. SSL (deprecated) and TLS (use the newest version) protocols use public-private key pairs to initiate a multi-step process to secure traffic to websites or web applications. Attackers can use person-in-the-middle attacks to defeat that encryption. They generate key pairs to make the user&#8217;s connection think the attacker is the website and make the website believe the attacker is the user&#8217;s connection. Bad actors insert themselves between the user and the website and can access the data as it goes through their connection.</p>
<p>When a user creates a passkey, the user’s device generates a key pair. It stores one key locally on the device and sends the other to the site or application for passkey authentication. The site or web application stores a unique key for each passkey a user generates. The secret key never leaves the user&#8217;s device during the authentication process, and the unique paired key is stored at the website or application. Hence, passkeys are extremely resistant to person-in-the-middle attacks.</p>
<p>Where supported, consider using passkeys. Hopefully they&#8217;ll be the common standard soon.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</title>
		<link>https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 May 2023 20:06:50 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5450</guid>

					<description><![CDATA[<p>Why to Go Passwordless: When you eliminate passwords: &#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords. &#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords. &#8211; Hackers will not try to trick users into disclosing passwords because the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Why to Go Passwordless:</h2>
<p>When you eliminate passwords:<br />
&#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords.<br />
&#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords.<br />
&#8211; Hackers will not try to trick users into disclosing passwords because the user won&#8217;t know passwords.</p>
<p>Microsoft, and others, continue to make their big push for people to go passwordless.</p>
<h2>Alternatives to Passwords:</h2>
<p>Today, determine where and how you can eliminate passwords from your life. Focus on using:</p>
<p>Something you have:<br />
&#8211; A USB Token such as a YubiKey<br />
&#8211; A proximity badge you wear around your neck or carry in your pocket<br />
&#8211; An authenticator app on your smartphone or tablet<br />
&#8211; A text message, phone call, or email with a one-time code</p>
<p>Or, something you are:<br />
&#8211; A fingerprint scan<br />
&#8211; Facial recognition<br />
&#8211; Eye recognition</p>
<p>And the real magic is when you combine two for multi-factor authentication (MFA) without passwords.</p>
<p>Note that USB tokens can include fingerprint scanners for built-in MFA. Your IT Team might need to get creative using mobile phone technology to accomplish both. If you decide to use push notifications, be sure to refer to <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>There are few ways attackers can exploit some of these login methods, and your IT Team can help you shore up weaknesses. Visit with your IT Team about ways you can eliminate passwords. Be sure they&#8217;ve seen this post: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Know About Passkeys:</h2>
<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now: <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</a></p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Concerns and Fun with ChatGPT</title>
		<link>https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 25 Jan 2023 23:13:06 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5368</guid>

					<description><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: chat.openai.com/chat. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed. Most people I encounter [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: <a href="http://chat.openai.com/chat" target="_blank" rel="noopener">chat.openai.com/chat</a>. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed.</p>
<p>Most people I encounter talk about their fun with ChatGPT, and I can relate. Type “Write a Valentine’s day note to my lover who likes (activities). I’m attracted to their (attractions) and want them to know (details).” Keep adding details. And, of course, you can say, “Make it rhyme” or “write it like Shakespeare.” You’ll have a smile on your face.</p>
<p>Be sure to select “New chat” whenever you change topics. After you get a surprisingly fun Valentine’s message, open a new chat to ask, “Remind me of the Excel formula to return the first twenty characters of a string.” ChatGPT remembers conversations in chat segments, so avoid mixing topics to get the best results.</p>
<p>AI has given a new meaning to the term Virtual Assistant. Sometimes I compose long email messages and want to shorten them. I first compose the message with no sensitive information, give it to ChatGPT, and say, “Write this shorter.” It is stunning how capable it is at combining sentences and summarizing ideas while mostly keeping the whole meaning. Sometimes it elaborates and incorporates new ideas into the message. I find that amusing and occasionally helpful. I must re-read the output carefully and often make changes since ChatGPT is not perfect at knowing precisely what I mean, but for long messages, it sometimes helps me make them concise, saving the recipient time.</p>
<p>Do not be duped – AI does not know everything and can accidentally produce inaccurate information that sounds very convincing.</p>
<p>When I hear people discussing the risks of ChatGPT, they usually focus on students using it to write their essay assignments for them. They have not considered more severe concerns. If you are interested, search the web for: chatbot ai can be used to create ransomware video.</p>
<p>Fortunately, ChatGPT is implementing safeguards to help prevent malicious use, and there are ways to trick it. Values and ethics vary from person to person, and some people, or governments, might feel justified in using AI to help create weapons, influence elections, or help them with strategies to harm.</p>
<p>Before his death, the famous physicist Stephen Hawking warned that AI could “end mankind.” Elon Musk has donated millions of dollars to OpenAI but intensely voiced concerns about the dangers of AI.</p>
<p>Some of our clients now block access to ChatGPT on company networks and devices. Some won’t.</p>
<p>Please forward this to your friends so they will consider the risks and enjoy AI-related fun. ChatGPT is impressive, and the business world will never be the same.</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</title>
		<link>https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 22:36:53 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5351</guid>

					<description><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection. If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection.</p>
<p>If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They receive a text message with a code to complete the login process. Alternatively, the user might have an authenticator app on their phone that provides a code. Another option is for the user to receive a “push” notification asking the user to approve the login through the app. The latter is sometimes referred to as one-tap login. There are other options for the factors, including approving specific computers, geo-location, USB hardware keys, and biometrics, including fingerprints, facial recognition, and iris scans. There are pros and cons to each.</p>
<p>Summarized steps you can take to help protect yourself from attackers bypassing multi-factor authentication:</p>
<p>= Know how to protect yourself against a thief stealing a phone if MFA uses text or email messages as the second step.<br />
= If supported, instead of a code number from a text message or authenticator app, consider using a USB token, fingerprint, or facial recognition for the second factor.<br />
= Reduce the duration a code is valid. For example, perhaps change the code every 60 seconds so an older code won’t work.<br />
= Limit the number of failed login attempts in a specific period.<br />
= Implement web content filtering to help protect users from being exposed to fake login screens.<br />
= Limit logins to specific countries.<br />
= If users primarily use the same device, restrict logins to specific devices.<br />
= Train users to beware of fraudulent login prompts.</p>
<p>Please see the details below:</p>
<p>If MFA to sends a text message to a stolen phone, the thief might see the text message. For websites or services that only support text messages for the second step, consider investing in an inexpensive flip phone with a different phone number to receive text messages. Similarly, if MFA involves an email, and the thief can easily access your email on the stolen phone, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use an email address that requires some other form of authentication on the phone to access email messages. Ensure email messages do not pop up on the preview screen when received.</p>
<p>Another way attackers bypass MFA:<br />
Step 1: Trick the user into clicking a link that takes the user to a fake login screen for Microsoft 365, LinkedIn, or any other valuable site.<br />
Step 2: The user enters their username and password into the fake login form. Now the attacker knows the user’s login name and password.<br />
Step 3: The attacker’s computer pulls up the genuine login form and enters the username and password the victim just provided.<br />
Step 4: The legitimate website sends the user the text message, sends a push notification, or performs another second factor the user is used to. The user expects this, and the process seems normal to them.<br />
Step 5: The attacker can create a fake form for the user to enter the code from their text message or app. When the victim enters the data, the attacker’s computer inserts the data into the genuine website. If the user received a push notification, they could approve the login because the user believes they are indeed logging into the site.<br />
Step 6: The attacker is logged in and has the user’s full access. The attacker needed no previous knowledge of the user’s username, password, or text key.</p>
<p>One strategy to fight his kind of attack is to use a second factor that isn’t a text code. For example, a user doesn’t need to enter a code if the second factor is a fingerprint or USB token plugged into the computer. The user cannot enter that information into a fraudulent login screen.</p>
<p>Another common strategy attackers use to bypass MFA is to reduce the time an OTP (One Time Password) code can work without the user requesting and receiving a new text message or generating a new code in the authenticator app. Shorter expiration times mean the attackers must use the stolen credentials and second factor to log in more quickly.</p>
<p>Another strategy, though slightly less effective but can be used in conjunction, is to limit the number of failed login attempts within a period. An example rule is if there is a failed login attempt for a user account three times in a row within five minutes, lock their account so they cannot try logging in again for ten minutes.</p>
<p>A useful cybersecurity control that is underutilized is conditional access by country. If your users will always log in from specific countries, block logins from all other countries. That will make it more difficult for foreign adversaries to compromise your users’ accounts. Identifying a user’s location is sometimes referred to as geolocation.</p>
<p>Another method to bypass MFA is to use social engineering to trick the user into disclosing their username, password, and code or another second factor. A typical example is for a bad actor to contact a user, impersonate a technical support person, and ask the user to provide the information to help prevent some fake problem that doesn’t exist. Some trusting users walk the attacker through the login process, bypassing the protection of MFA.</p>
<p>Another strategy bad actors use is called MFA fatigue. The hacker will make so many attempts to log on that the user finally tires of receiving push notification alerts. The fatigued user approves the login to make their phone be quiet, and the attacker is in the system.</p>
<p>Attackers could use SIM Swapping to reroute calls and text messages to their phones. Therefore, text and callbacks can be less secure than other second factors. However, many sites only offer those two options.</p>
<p>As your IT team can tell you, there are more technical ways for attackers to bypass MFA by creating person-in-the-middle attacks using something called a proxy. Another strategy attackers can utilize is captured authentication cookies or tokens. Authentication can rely on digital key values that must be kept secret inside servers. If attackers get access to the keys, they can gain access.</p>
<p>Your IT Team can implement some form of web content filtering and configure it to block communications with known malicious sites and attacker command-and-control servers. This isn’t perfect because attackers frequently change command servers, but it helps.</p>
<p>Using SSO (Single Sign On) reduces the number of opportunities an attacker has to trick the user. Of course, the flip side is that if an attacker successfully gains access to the single sign-on, the attacker won’t need any other credentials to access everything the user can access.</p>
<p>User training is essential, as is keeping the computer safe.</p>
<p>As you can see, using MFA does not mean your authentication process is secure. Whenever a new security control is invented, someone finds a way to break it. The strategies above will help you be more secure.</p>
<p>Alert your friends to some of the ways attackers can bypass MFA. They might decide to consider using USB keys, biometrics, or cryptographic codes stored in a computer or hardware.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</title>
		<link>https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 26 Sep 2022 17:59:05 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5334</guid>

					<description><![CDATA[<p>You’ve likely seen the video or at least heard the story of how a Southwest Airlines pilot responded to complaints from passengers that they received images of an unclothed person on their phone. The captain used the intercom system to scold the unknown passenger and threatened to return to the gate. This so-called cyber-flashing is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/">How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely seen the video or at least heard the story of how a Southwest Airlines pilot responded to complaints from passengers that they received images of an unclothed person on their phone. The captain used the intercom system to scold the unknown passenger and threatened to return to the gate.</p>
<p>This so-called cyber-flashing is a growing problem with Apple’s AirDrop feature and Android’s Nearby Share feature that allow you to send and receive images, videos, and files from other users nearby.</p>
<p>Yes, you get prompted to decline or accept the image, but you cannot unsee the preview image in the prompt.</p>
<p>To protect yourself on your Apple device, Click on Settings, General, and AirDrop to choose Receiving Off, Contacts Only, or Everyone. I recommend you select Receiving Off. Temporarily enable receiving when you wish to exchange photos. Apple provides a detailed explanation of AirDrop at <a href="https://support.apple.com/en-us/HT204144" target="_blank" rel="noopener">https://support.apple.com/en-us/HT204144</a></p>
<p>To protect yourself on an Android device, choose Hidden your Nearby Share settings. The steps will differ depending on your device and version: Settings, Connected Devices, Connection preferences, Nearby Share, and choose Hidden. Or your device might have you go to Settings, Google, Devices &amp; Sharing, Nearby Share, and set Use Nearby Share to Off. You can learn more about Nearby Share at <a href="https://support.google.com/android/answer/9286773?hl=en" target="_blank" rel="noopener">https://support.google.com/android/answer/9286773?hl=en</a></p>
<p>Bad actors strive to find ways to affect users of any brand and type of device and service. Please forward this to your friends, so they don’t receive shocking images via AirDrop or Nearby Share!</p>
<p>The post <a href="https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/">How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
