Webcam Safety: Am I Paranoid or Smart?

Tech TuesdayMark Zuckerberg, the founder and CEO of Facebook, popularized and legitimized a crude but reliable solution to cam hacks by positioning a piece of opaque tape over the lens of the electronic camera. Is it being smart or just paranoid?

Everyday there are countless spam emails sent in to users saying they have actually been “captured” on cam. Shaming people for “unsuitable” webcam images and demanding a significant ransom in bitcoin. Many victims pay up in fear of being publicly exposed. Such scams are why there is an emerging black market for jeopardized webcams and the videos or photos they can produce. 

The idea that unethical people might be able to view you in your home or at work from numerous angles, throughout the day, every day is creepy. Even more frightening is the concept that your kids may be targeted. 

Steps You Can Take To Prevent Being Watched On Your Webcam:

  1. It’s crucial to keep the security software application up to date. Many webcam hackers utilize Trojan horse malware to covertly install and run remote desktop software without your knowledge. You might believe you’re downloading one thing, when in truth it’s bringing a concealed script. Don’t click attachments or any suspicious links in an email, text, or social media message.
  2. Make sure your wireless network has strong security settings and a great password, not the default one that is defaulted by the router. 
  3. You will want to avoid outsiders from accessing your Wi-Fi network without your permission. Resist using totally free, unsecured public Wi-Fi hotspots in cafes, hotels, and airports. Webcam safety tips webcam privacy
  4. Go to the cam’s settings/options and check which applications have permission to use your web camera and microphones.
  5. If using a laptop, you can or ask a trusted technician to disable the camera in the computer’s BIOS, and use an external one so you can full control it. 
  6. For desktop users with external cams, the simplest option is to merely disconnect the USB webcam. No amount of hacking is going to amazingly plug an unplugged gadget back in. 
  7. If you aren’t afraid of a little bit of adhesive, then the cheapest service would be to simply place plastic electrical tape over the camera. You can also cut a hole in a piece of electrical tape with a hole punch and you ‘d have a perfectly round little dot you could place right over the lens of your integrated webcam. You will get a bit of residue from the adhesive but this can be cleaned with a gentle de-greasing solution. You can also make several hole-punched circles and store on a piece of card stock to travel or to share on the road.

Webcam spying is a genuine risk. When everyone from the NSA to the kid next door has access to tools that can turn a webcam versus its owner then the danger is genuine. You should disable or obscure your computer’s webcam. It’s so easy to do that there’s no reason not to. 

How Does This Happen?

There are dozens of methods used to take control. It can start by a fraudster that says they will help with your IT problems and they quickly whitelist a trojan virus so your antivirus will not detect it.  

Another scenario is scripts are added via a phishing email that allow hackers to take control of your webcam remotely by disabling the “on” light which typically suggests the cam is active so victims are none the wiser. In fact, more than 15,000 web cam gadgets (consisting of in homes and companies) are easily available to hackers, without even requiring them to be hacked.

In Conclusion

The basics of device and software security may help prevent falling victim to webcam spying, however simply by disabling the camera with a covering or unplugging an external usb camera can be helpful to giving you peace of mind.

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

How To Make Laptops Last Longer

Making your laptop last longer

Tech TuesdayYour laptop computer is designed to be a compact electronic workspace for education, work and play. In fact, laptop computers have been so powerful and liberating, they have actually coined a new term of entrepreneurship, referred to as the “the laptop lifestyle” which involves working entirely from your laptop computer.

Increasing Life Expectancy of Your Laptop

Although it differs from laptop to laptop computer, the typical life expectancy is between three and five years of usage depending on the quality of laptop components, usage habits and application demands.

Many programs will put high demands on your CPU, on your RAM, and on your graphics card in order to operate effectively. Getting the right balance of hardware components for the daily usage behavior is key to keeping your machine fast and long-lasting.

Generally, laptop components are the first place to start when trying to make your machine last as long as possible.

Not all laptops are produced the same. Is it a business-grade laptop or has it been purchased for individual use? Budget level consumer machines could last for less time, while business-grade machines may last the far end of the life expectancy.

If you are looking to get the longest life-span on your lap, please follow these tips: making your laptop machine last

Battery

Although your laptop computer could last 5 to 10 years, your battery will live a fairly shorter life. As your battery grows older, its capability to hold charge reduces. Usually, a laptop battery will last in between 18 and 24 months, depending on how you use it. As it approaches the end of its life-span, it will hold its charge for much shorter durations.

Batteries aren’t designed to last the lifetime of the laptop computer, which’s why if you examine the fine print on the service warranty declaration, you’ll most likely discover that the battery isn’t covered, or is ensured for a shorter duration than the laptop computer. In time, batteries deteriorate and after a number of years of tough usage, you’ll probably discover the battery just has half of its initial capacity and lasts just half the time.

https://youtu.be/FXd0d5U3PyQ

If your laptop does have a removable battery, it can be worth purchasing a spare. They’re offered for many laptops, and you may even find that your laptop computer can accept a higher-capacity than was supplied originally. 

Today’s lithium batteries break no matter what you do. If you’re going to be operating on A/C power for a while, close down or hibernate the computer system, get rid of the battery, and work without it.

RAM

Presuming you have actually ruled out the fixable factors that your computer is sluggish, including a virus or malware, a faulty hard disk, and any other program shortage, you can look at upgrading that RAM, which will enhance your computer’s ability to run efficiently.

Increasing RAM is tricky as each motherboard has a suggested RAM type, speed and size to make it compatible. New RAM may not be compatible in an older laptop, so we suggest you do some research or ask an expert.

SSD DrivesSSD Drives

Mechanical hard drives (HDD), which are common in laptop computers, need more power to spin their platters than a solid-state drive (SSD) with no moving parts. As well as a small improvement in battery life from this upgrade, an SSD will also make your laptop computer a lot faster and more responsive.

An internal solid-state drive upgrade provides a significant increase in performance for both Macs and PCs.

Temperature

Heat can be a real killer for your laptop, making it especially vulnerable to internal overheating. You should also never position your laptop on a very soft surface, and keep it far from external sources of heat.

You need to prevent placing your laptop computer anywhere it might become hot. That includes your vehicle on a hot summer season day, underneath a window that gets direct sunshine, or near a space heating unit. Uncommon conditions such as these can do a great deal of damage to a battery

Too much cold can likewise eliminate the battery completely or minimize its life-span. Never leave your laptop in your car overnight in sub-freezing temperatures.

Anti-virus

Viruses and Malware can be as destructive as unexpected drops or spills.

You can always avoid them by using an excellent antivirus package that’s continuously updated. The best method to keep them off however, is to avoid browsing through dangerous sites. 

Separate Graphics Card

As video games are demanding more of your hardware, your laptop has a tough time keeping up. Of course, if you do not mind lower resolutions and slower FPS rates, you’ll be great for longer. If you buy a mid-range video gaming laptop, with advances in graphics and complexity of games, you can anticipate that laptop to last just a couple of years before it ends up being outdated.

Having a “Gaming Laptop” is the best way to get power and performance for video game usage. The components are supercharged, the cooling systems are enhanced, and most include a separate graphics card, which can improve frame rate and reduce demand on RAM and CPU (making them last longer and run cooler).

Keep it Clean

Get a screen wipe to keep your sensitive screen clean. Avoid the use of damaging compounds and dry the screen complete lt before you turn on.

Laptop touch-sensitive screens build up a lot of fingerprints and germs, so cleaning is a must. Make sure the device is powered off before you begin this cleaning process.

You can blow dust out of air vents, using canned air to keep them clear enough for cool air to flow through. These provide your laptop with extra fans on a firm surface to enhance the airflow. You ought to also attempt not to drop your laptop computer or spill any liquids on it.

Spill coffee on your laptop keyboard, and you could short out the motherboard. Keep your drinks away from your machine at all costs. This repair could cost as much as a new laptop itself.

Conclusion

Overall, laptops can last for many years if properly handled and maintained. The “laptop lifestyle” is becoming a true liberator for “digital nomads” around the world. They allow us to be connected while untethered at the same time. 

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

Is Facebook Advertising Spying On Me?

Is Facebook Spying On Me

Tech TuesdayIf you’ve ever felt like Facebook or any other app on your phone was listening to your conversations, you’re not entirely wrong. While it may look like Facebook is “listening” to you, it’s highly unlikely the social media network is tracking your every word through your phone’s microphone.

Many users say their phone’s microphone has been pirated by Facebook to target ads. If you’ve ever been paranoid that Facebook is listening to you based on how scarry the relevance of ads and content are to your interests, you are not alone. 

The question is… is it real? Facebook has actually been really clear about the matter, and states it isn’t utilizing microphone recordings to target ads much better.

Facebook does not require to spy on your real-life conversations, since you turn over so much info anyhow. Follow this link and you’ll have the ability to download everything Facebook learns about you. https://www.alphr.com/facebook/1003521/see-everything-facebook-knows-about-you-here-s-how/  

You will rapidly understand it’s a staggering amount of info. 

Advertisers can use info gleaned from your activity all across the web, on several gadgets, even if you’re not logged into Facebook or other services.

So when you get ads for something you’ve spoken about aloud, it’s probably just advertisers being really good at anticipating your interests. It’s also possible that there’s an advertising campaign running that is highly targeted. Perhaps you spent time on a an advertisement or web page and similar ads are shown. When this happens, you may see similar ads in several places repeatedly, and it may seem suspicious. But it’s actually ALL about business and efficiency of advertising spending.

The Facebook Advertising Platform

For advertisers, what makes Facebook advertisements truly efficient is the level of audience targeting, the number of users on the platform, and the level of analytics and insights. These benefits combined with a fantastic method is why Facebook ads work for so numerous types of services.

Facebook boasts the largest user-base of any social media network and among the most engaged.  Facebook’s ad targeting is remarkably extensive and it can seem almost creepy how well it “knows us” and our interests.

How are these ads so relevant? It all comes down to a thing called a “remarketing pixel”. 

What Is a Facebook Pixel?

Facebook, Google and other media platforms have what is called a remarketing pixel to track you online. For example, the Facebook Pixel is a piece of code that can be included on any site allowing Facebook to gather information about what you do on the site, what links you click on, what articles you read or what items you purchase.

As an advertiser, a pixel gathers information that helps you track conversions from Facebook ads, optimized advertisements, build target market for future advertisements, find “look-a-like” audiences and remarket to people who have actually already taken some sort of similar action. 

Facebook tracking pixel data helps guarantee that ads are seen by the individuals who are most likely to take your preferred action. This allows businesses to enhance Facebook ad conversion rate and improve ROI. 

Tracking Cookies
The data is collected utilizing “cookies”. Cookies are used to control shown advertisements and to track usage patterns on websites. This data is utilized by companies and websites to infer individuals’s age, gender, and possible purchase interests so that they could make customized ads that you would be most likely to click on. 

An advertisement network business such as Facebook or Google utilizes cookies to deliver ads that relate to the interests of the user, control the variety of times that the user sees an ad and evaluate whether they are marketing the specific item to the customer’s choices.

Cookies act as web beacons to third-party advertisers to automatically collect info about site users and website activity. Some servers even collect the data of the page that referred them, websites you go to after them, which advertisements you see and which advertisements you click on. This is a lot of data that can be used to place powerfully relevant ads or content in front of the user.

You may see a message on a website to accept the use of cookies or leave a website. This is required by law in some states and countries. And the European Union’s GDPR provides even more protections for user data privacy and the control over one’s data.

Big Data and Data Brokers
There are whole industries around data that make billions in just harvesting, holding and reselling massive amounts of data about us, our interests, activities and spending habits. Facebook and other social media advertising platforms are just the tip of the iceberg and as the next decade starts, many debates, court rulings and legislation will need to be introduced to try to regulate this industry. Data privacy is a hot topic, and striking a balance for business and consumers is always a difficult process.

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

What Makes For A Strong Password?

Tech TuesdayIt all starts with a strong password. We all have more passwords than we care to have. It might sound simplistic, but strong passwords are a MUST for protecting our identity, reputation, and assets in this digital age.

The Composition of a Good Password

  • A four-character password is much weaker than an 8 to 12-character password. A good rule of thumb is never to use password shorter than eight characters, with both numbers and symbols.
  • In no way should you use the default password
  • Never make a word found in a dictionary your password. One of the most common methods to break into systems is to run scripts that try using dictionary words to guess your password. The less your password looks like a dictionary word, the less likely will someone guess what it is.
  • ALWAYS Include numbers and special characters
  • Avoid repeated numbers, characters or sequences such as 123456789, 11111111, or aaaaaaaa
  • Never use the user name, or any combination of it, as your password. Don’t use your domain name as your password either.
  • Don’t use look alike substitutions like “P@55W0RD”, or n0t@home”
  • Use the entire keyboard, and try to use the less common keys
  • Use different passwords for different accounts. If you use the same password for all of your accounts, you may find multiple of your accounts compromised simultaneously.
  • Never, ever use a blank password.

Change Passwords RegularlyExamples of strong passwords are:

A combination of several words that aren’t themselves a word interspersed with special characters (e.g., !4scOrE&s*efdNYeaRs_Pu0)

A word with digits of a memorable date sprinkled inside it (e.g., vacation -> 0vac2a0t9io19ln99)

Stay away from the obvious. Come up with unique passwords that does not include any personal info such as your name, street, city or date of birth.

Keep Your Passwords Safe

Ideally, you would never write down your passwords, but it is becoming difficult to do with so many accounts. If you have to write them down, keep them locked in a safe or some other secure environment. Passwords on Post It notes are a recipe for disaster. Don’t do it!

Avoid typing your password on public computers or public WiFI. Unfortunately, many public computers have been compromised, making their users vulnerable for malicious keystroke logging scripts.

If someone has to use one of your accounts, log them in instead of sharing your password. Don’t give out your password over the phone unless you have initiated the phone call. Telephone conversations are not considered secure. Neither are online chat, email, or instant messaging.

Change your passwords regularly. A new password every 45 days is a good practice. Having the same passwords for years is a weak security practice. Set yourself reminders in your calendar. Make it a routine procedure. You’ll see that after a few months, it becomes a habit.

Are Your Passwords Are For Sale?

Beyond the risks of having your password cracked, cybercriminals may simply buy your passwords off the dark web.  Yes, there is a marketplace to buy people’s passwords and that is precisely why you need to change your passwords frequently. When there is a data breach on some website you use, your email and password are not likely to be sold on the darkweb.

Other Risks:

Out-Dated or No Anti-Virus: Make sure you use a firewall and virus protection on your machine. Non-existent or outdated virus protection make you many times more at risk for loosing your passwords to cyber criminals.

Phishing: Another popular method to obtain your password is via “Phishing “. Cybercriminals try to trick, intimidate, or pressure you through social engineering into unwittingly doing what they want. A phishing email may tell you (falsely) that there’s something wrong with your credit card account. It will direct you to click a link, which takes you to a phony website built to resemble your credit card company to log in. Once you do that, they have your valuable password and email combination.

Check for SSL (https):  Does it have https in the address bar, ensuring a secure connection? That helps to keep your connection secure when entering your password online. However, just because you see the https lock, doesn’t mean that the site is 100% safe.

Use Two-Factor Authorization Where PossibleTwo-factor authentication (2FA) and multi-factor authentication (MFA) add an extra layer of protection (which becomes your first layer of protection should your account details ever get leaked). They require something in addition to a password, such as a code sent to your phone, biometrics (fingerprint, eye scan, etc.), or a physical token. This way, as simple or complex as your password is, it’s only half of the puzzle.

No matter how strong your password, malware such as keyloggers can capture it, and using an open WiFi hotspot without proper security could be the moral equivalent of writing your password on the wall for all to see.

Password managers suck as BitWarden and Lastpass will remember your complex passwords to make it easier. You will just have to remember a solid master password (that you update regularly) or use biometrics to unlock the filling in of your passwords into various website and app login screens. Moreover, they can generate super-complicated, extra-long passwords that are infinitely more difficult to crack than any passwords a human might come up with.

Use Commonsense:

Protect your login information further with these common sense high-security tips: Use a VPN when on public Wi-Fi. That way, when you log into accounts, no one is intercepting your username and password.
Never text or email anyone your password. When selecting security questions while creating an account, choose hard-to-guess options to which only you know the answer.

If you give your password to a family member or friend, you should change it after they are done accessing the software or account. You never know where your password information may accidentally end up.

Remind your family and friends to protect themselves too. Breaches continue to happen, so just by sharing this information with friends and family, you will be helping them to protect themselves in this scary digital age.

For a more technical overview of password and multi-factor authentication, the National Institute of Standards and Technology (NIST) has published a very comprehensive document for IT professionals to follow when creating a standard for password policies for their clients.  Read it here

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

Wifi Mesh Networks Vs. Range Extenders

wifi mesh vs range extenders

Tech TuesdayIf getting WiFi coverage right across your home or small office is a constant battle, a top mesh system, powered by one of the best mesh WiFi wireless routers, could well be the answer to your connectivity woes. Bad WiFi coverage doesn’t have to be the nightmare it once was, thanks to the recent rise mesh networks.

Mesh systems and extenders are primarily designed to solve one problem: bad signal strength. Mesh network systems are a great way to fix dead spots in your home, but how are they different from range extenders, and are they worth the extra cost?

What is a Mesh WiFi network?
Mesh WiFi or Whole Home WiFi systems consists of a main router that connects directly to your modem, and a series of satellite modules, or nodes, placed around your house for full WiFi coverage. They are all part of a single wireless network and share the same SSID and password, unlike traditional WiFi routersWIFI CONNECTION HELP FOR BUSINESS

A modular mesh system is flexible and scalable, giving you a customizable method of expanding your WiFi without the need to add range extenders, which have performance and ease-of-use issues. It’s just like installing lighting fixtures to illuminate your home; you can place your nodes anywhere in your home.

While it might not have been a big deal that you didn’t get a WiFi signal on your porch in the past, if you are trying to hook up a video doorbell or WiFi security cameras it will be an issue now. And then there is the fact your house is now awash with 4K HD streaming, high definition audio and the like – all of which require a fast, reliable WiFi connection.

The beauty of a mesh network is that it is modular, so you can keep adding nodes to the – there is no maximum node count. The idea of a mesh network is that, unlike repeaters and range extending devices that just relay your router’s WiFi signal with deterioration, the nodes all communicate with each other, so even the one furthest from the router has a great signal as it hops around the system from one node to another.

Before you decide whether to purchase a WiFi extender or mesh network system, you can try improving our WiFi signal on your own. For example, try moving your router to a more central location in your home, changing your router’s WiFi channel to a less congested channel, and if your router is dual-band, you can try switching the WiFi frequency bands to which your devices are connecting.

Like real estate, wireless networking is about three things: location, location, location. That is because wireless access points can only put out a network signal that is as strong as the incoming wireless signal from the router.  If you are using a phone, disable cellular while you run this test. You will want to move around in your home, running a few speed tests at a time in each room where your WiFi connection matters. Average those download speed results in each room to get a sense of where your connection is and is not up to snuff. The best bet is to look at your speed test data and find the room closest to your dead zone with a strong signal from the router.

If you have just got one or two rooms where the connection is not usable, then a simple WiFi range extender might be all you need.

On average, mesh networks can cost as much as $300, whereas a good WiFi extender can cost as little as $50. The reason for this discrepancy is the simple fact that WiFi extenders are simply an add-on to your existing network setup whereas mesh networks are an entirely new network setup that require multiple new devices to be placed around your home.

Other Resources To Learn More:
15 things you didn’t know about WiFi

8 Great WiFi Facts You Need To Know

Wi-Fi Range Extender vs. Mesh Network: What’s the Difference?

One last thing worth remembering: Wireless connectivity is all well and good, but a wired Ethernet connection will always give you speeds that are as fast as possible.  It is best practice to use a wired connection (when possible) for security, reliability, and overall speed.

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.