Tag Archive for: dumb

5 dumb tech security mistakes you’re making


You might think you have a solid cybersecurity plan. You use strong passwords and defensive measures like VPNs and firewalls. But even the strongest shield gets dented from time to time.

It’s hard to remember all the settings you’ve adjusted and the passwords you’ve made over the years. Let this be your reminder to go in and make a few quick changes to protect yourself. 

I’m giving away an iPhone 15 (valued at $799). To enter, try one issue of my free daily tech newsletter. That’s it. It’s one click to cancel the newsletter if it’s not for you, but I bet it will be.

YOUR SMART ASSISTANT IS LISTENING, BUT DOES THAT IMPACT THE ADS YOU SEE?

1. Using the same PIN for your phone lock screen as your bank

You don’t want to remember a bunch of codes. They’re easy to forget, so you keep it simple and reuse the same PIN.

Don’t give in to temptation! It could lead you to financial ruin. Say you’re relaxing in the coffee shop, and you open your phone. Someone standing behind you could notice your code, write it down and start using it to access your bank account within minutes.

To protect yourself, use different PINs. If you’re struggling to remember them all, consider a password manager. 

A mobile phone passcode security screen

A mobile phone passcode security screen is seen in this photo illustration. (Photo by STR/NurPhoto via Getty Images)

2. You keep Bluetooth on 24/7

Bluetooth is a short-range wireless radio technology that works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data.

As with a Wi-Fi network or other connection, Bluetooth has vulnerabilities. Hackers and scammers must be close to you to use Bluetooth to hijack your phone — but in just about any public space, you’re arm’s length from strangers.

There are a couple of ways to disable Bluetooth on your iPhone. Go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.

TO DO: CHANGE YOUR SMART SPEAKER SETTINGS BEFORE THE HOLIDAYS

The same steps work for Android phones: Go to Settings > Connected Devices >…

Source…

Really dumb hack targets terminally stupid Mac owners

Someone impersonating administrators of cryptocurrency-related discussion channels on Slack, Discord, and other social messaging platforms has been attempting to lure others into installing macOS malw…
mac hacker – read more

Really dumb malware targets cryptocurrency fans using Macs

Enlarge (credit: Lucasfilm)

Someone impersonating administrators of cryptocurrency-related discussion channels on Slack, Discord, and other social messaging platforms has been attempting to lure others into installing macOS malware. The social-engineering campaign consists of posting a script in discussions and encouraging people to copy and paste that script into a Terminal window on their Macs. The command downloads a huge (34 megabyte) file and executes it, establishing a remote connection that acts as a backdoor for the attacker.

Patrick Wardle, a Mac malware expert, also examined the malware and dubbed it “OSX.Dummy” because, as he wrote:

  • the infection method is dumb
  • the massive size of the binary is dumb
  • the persistence mechanism is lame (and thus also dumb)
  • the capabilities are rather limited (and thus rather dumb)
  • it’s trivial to detect at every step (that dumb)
  • … and finally, the malware saves the user’s password to dumpdummy

The attack, first noted by Remco Verhoef of SANS today, downloads its awkward payload from a remote server, makes that file executable, and runs it. It looks something like this:

Read 3 remaining paragraphs | Comments

Biz & IT – Ars Technica

The GDPR: Ghastly, Dumb, Paralyzing Regulation It’s Hard To Celebrate

Happy GDPR day! At least if you can manage to be happy about a cumbersome, punitive, unprecedentedly extraterritorial legal regime that hijacks the resources of businesses everywhere without actually delivering privacy protection commensurate with the enormous toll attempts to comply with it extract. It’s a regulatory response due significant criticism, including for how it poorly advances the important policy goals purportedly prompting it.

In terms of policy goals, there’s no quarrel that user privacy is important. And it’s not controversial to say that many providers of digital products and services to date may have been… let’s just say, insufficiently attentive to how those products and services handled user privacy. Data-handling is an important design consideration that should always be given serious attention. To the extent the GDPR encourages this sort of “privacy by design,” it is something to praise.

But that noble mission is overwhelmed by the rest of the regulatory structure not nearly so adeptly focused on achieving this end, which ultimately impugns the overall effort. Just because a regulatory response may be motivated by a worthwhile policy value, or even incorporate a few constructive requirements, it is not automatically a good regulatory response. Unless the goal is to ruin, rather than regulate, knotty policy problems need nuanced solutions, and when the costs of complying with a regulatory response drown out the intended benefit it can’t be considered a good, or even effective, policy response. Here, even if all the GDPR requirements were constructive ones – and while some are, some are quite troubling – as a regulatory regime it’s still exceptionally problematic, in particular given the enormous costs of compliance. Instead of encouraging entities to produce more privacy-protective products and services, it’s instead diverted their resources, forcing them to spend significant sums of money seeking advice or make their own guesses on how to act based on assumptions that may not be correct. These guesses themselves can be costly if it results in resources being spent needlessly, or for enormous sums to be put in jeopardy if the guesses turn out to be wrong.

The rational panic we see in the flurry of emails we’ve all been getting, with subject lines of varying degrees of grief, and often with plaintive appeals to re-join previously vibrant subscriber communities now being split apart by regulatory pressure, reveals fundamental defects in the regulation’s implementation. As does the blocking of EU users by terrified entities afraid that doing so is the only way to cope with the GDPR’s troubling scope.

The GDPR’s list of infirmities is long, ranging from its complexity and corresponding ambiguity, to some notably expensive requirements, to the lack of harmonization among crucial aspects of member states’ local implementations, to the failure of many of these member states to produce these local regulations at any point usefully in advance of today, and to the GDPR’s untested global reach. And they fairly raise the concern that the GDPR is poorly tailored to its overall policy purpose. A sound regulatory structure, especially one trying to advance something as important as user privacy, should not be this hard to comport with, and the consequences for not doing so should not be so dire for the Internet remaining the vibrant tool for community and communication that many people – in Europe and elsewhere – wish it to remain being.

Permalink | Comments | Email This Story

Techdirt.