Technology Tips: April 2024
#Tips
Skyward IT Services
by
Skyward IT Services
Skyward IT Services Network Infrastructure and Security Specialists |
The pros and cons of contactless payments
The use of contactless payments is rising for many convenient reasons. As with all new technology, you may be wondering what the risks are.The pros:
1. Time savings: Contactless means that you aren’t handling cash or waiting for change, and it also keeps lines going a bit quicker.
2. Flexibility: You can have your cards digitally saved to your phone, so you no longer need a bulky wallet.
3. Health: Not having to handle cash or touch a card reader is a perk for those with health concerns.
The cons:
1. Limits: Not all retailers accept contactless payments, so it’s important to have a back up option when shopping.
2. Safety concerns: A PIN is not used in these transactions, so there isn’t a way for cashiers to determine if the device being used is stolen.
3. Technical: A contactless payment option is not for consumers that may face technical barriers, such as technical knowledge or not having a compliant smart phone.
Spotting hidden cameras in a vacation rental
Security is the last thing on your mind when you are getting settled into your relaxing vacation rental. However, it’s worth doing a quick sweep to check for any possible hidden cameras.First, turn off the lights and use a flashlight to look around the room. Look for any reflections or blinking lights, specifically on the smoke detectors, outlets, clocks, and shower heads. Have extra caution in bedrooms, bathrooms, and saunas/hot tubs. Be on the lookout for things that may be out of place, such as wires coming from a plant, bookshelf, or even tissue box.
Did you know that you can scan to see what devices are connected to Wi-Fi? Download a scanner app (such as Fing) to see if there are any smart devices, or cameras, that are hooked up. Don’t be alarmed if there is a smart thermostat, TV, doorbell, or kitchen appliance that are already connected to the Wi-Fi.
If you do find a camera, make sure to take photos and videos and then report it with whatever booking platform you used (Airbnb, VRBO, etc).
QR code phishing attacks
QR codes are gaining in popularity, and are frequently found in restaurant menus, flyers, mailers, and even business cards. They are most often harmless and helpful, but it’s always good to be cautious.QR codes are essentially digital hieroglyphs that link to other information when scanned (including websites, map addresses, etc). This gives hackers an opportunity to link them to malicious websites. If a QR code is in an unsuspecting email that is riddled with urgency, there’s a good chance you should not scan it.
Keep the software on your devices up-to-date so that they have the strongest defenses against fraudulent links. As always, stay vigilant!
Malware of the month: The hack that took two years to make
TheIn fact, a recent supply chain attack on XZ Utils took a hacker two years to implement. XZ Utils is a free software tool that is widely used in Linux systems. The hacker slowly helped build code over the two years to develop trust in the online community before he built a backdoor. He eventually suggested disabling a tool that detected software vulnerabilities. The backdoor stayed undetected until Microsoft software engineer Andres Freund discovered it on March 29, 2024. Security company Binarly has a free tool which determines who is affected by the XZ backdoor.
For fun
Grab a coworker and fill in the blanks of this hack-themed madlib!Hi ________(your name), This is _______ (CEO/CFO/handsome prince) and I need you to send me five ______(hundred, thousand, million) dollars in the form of ______ (gift cards/cash/money wire) as I have an emergency. Please send it to ______(my home address/email/venmo) and I’ll send you _____ (more PTO/a free car/cash/Taylor Swift concert tickets) as a token of my gratitude.
With _____(appreciation/sincerity/love), ______ (CEO/CFO/handsome prince)
Skyward IT Services Network Infrastructure and Security Specialists |
|