Stop! Are you putting sensitive company data into ChatGPT?

0
[ad_1]

Several companies have warned their staff about sharing confidential data with ChatGPT.

Helping to reduce costs and enhance productivity are both things that your employer will look kindly upon. But what if you use an external tool for those tasks and the tasks involve confidential data that ended up on a server outside of the control of your company? That’s a problem.

As a news writer at Tom’s Hardware reported there were 3 incidents in 20 days where Samsung staff shared confidential information with ChatGPT. In other organizations, an executive cut and pasted their firm’s 2023 strategy document into ChatGPT and asked it to create a PowerPoint deck, and a doctor submitted his patient’s name and their medical condition and asked ChatGPT to craft a letter to the patient’s insurance company.

All of these actions were performed with the best of the organization in mind, but ended up taking confidential information outside of the company. To remind employees about the dangers associated with such actions, several companies have taken action: JPMorgan has restricted workers’ use of ChatGPT, for example, and Amazon, Microsoft, Samsung Electronics, and Wal-Mart have all issued warnings to employees to take care in using generative AI services.

While there is no reason to assume that information submitted to ChatGPT will be shared with others, there is also no certainty that it will not. New gadgets and software come with new bugs, especially if they’re rushed out the door. We can see this very clearly in the race between tech giants to stay ahead in the race between large language models (LLMs) like ChatGPT and its competitors. In a recently revealed bug, ChatGPT allowed some users to see the titles of other users’ conversations.

screenshot ChatGPT conversation

Q: Hi, it’s me again. Can you keep a secret?

AI: Yes, as an AI language model, I do not have the ability to share or disclose information to anyone, so you can trust me to keep your secret.

Q: Nobody else has access to our conversations?

AI: As an AI language model, I don’t have the ability to share or disclose information to anyone else. However, please note that our conversations are recorded in the system’s logs for quality control and improvement purposes. These logs are usually accessible only to the developers and authorized personnel who maintain the system, and they are subject to strict privacy and security policies.

Getting involved with ChatGPT to work out some complex problems may lead to interesting results, faster than you could have done by yourself, but when it comes to sharing information it’s good to remember it’s like telling your friend a secret and expecting them to keep it to themselves. Only this particular friend has a great many other friends and is very chatty.

In these cases there is no reason to suspect that the information has fallen into wrong hands. The point is that is has left the realm of data in a controlled environment.

So, if you are using a LLM for work or other purposes, behave as if you are talking to a stranger that is not privileged to know company secrets. And while you are at it, restrict the amount of private information you reveal about yourself or others, too.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Google Pixel 7 Pro vs Samsung Galaxy S23+

0
[ad_1]

The Galaxy S23+ tends to live in the Galaxy S23 Ultra’s shadow, which is kind of unfair, as it’s a great phone on its own. In this article, we’ll compare it to the best of Google, in case you’re considering getting one or the other. In other words, we’ll compare the Google Pixel 7 Pro vs Samsung Galaxy S23+. The Galaxy S23+ does have a different design than the Galaxy S23 Ultra, which some of you may prefer. On top of that, some of its specs are different. It’s different in a number of ways.

Both of these phones are compelling in their own right, but it will be interesting to see how they compare across the board. We’ll first list their specifications, and will then compare their designs, displays, performance, battery life, charging, cameras, and audio performance. Let’s get started, shall we?

Specs

Google Pixel 7 ProSamsung Galaxy S23+
Screen size6.7-inch QHD+ curved OLED LTPO display (120Hz refresh rate, 1,500 nits peak brightness)6.6-inch fullHD+ Dynamic AMOLED 2X display (curved, 120Hz adaptive refresh rate, LTPO, 1,750 nits peak brightness)
Screen resolution3120 x 14402340 x 1080
SoCGoogle Tensor G2Qualcomm Snapdragon 8 Gen 2 for Galaxy
RAM12GB (LPDDR5)8GB (LPDDR5X)
Storage128GB/256GB/512GB, non-expandable (UFS 3.1)256GB/512GB, non-expandable (UFS 4.0)
Rear cameras50MP (Samsung ISOCELL GN1 sensor, 1.2um pixel size, f/1.85 aperture, 82-degree FoV)
12MP (ultrawide, 1.25um pixel size, f/2.2 aperture, 125.8-degree FoV, lens correction)
48MP (telephoto, 0.7um pixel size, f/3.5 aperture, 20.6-degree FoV, 5x optical zoom, Super Res Zoom up to 30x)
50MP (f/1.8 aperture, 24mm lens, 1.0um pixel size, OIS, Dual Pixel PDAF)
12MP (ultrawide, f/2.2 aperture, 13mm lens, 120-degree FoV, 1.4um pixel size)
10MP (telephoto, f/2.4 aperture, 70mm lens, 1.0um pixel size, OIS, 3x optical zoom, PDAF)
Front cameras10.8MP (1.22um pixel size, f/2.2 aperture, 92.8-degree FoV, Fixed Focus)12MP (f/2.2 aperture, 26mm lens, Dual Pixel PDAF)
Battery5,000mAh, non-removable, 23W wired charging, 23W wireless charging, reverse wireless charger
Charger not included
4,700mAh, non-removable, 45W wired charging, 15W Qi wireless charging, 4.5W Wireless PowerShare
Charger not included
Dimensions162.9 x 76.6 x 8.9mm157.8 x 76.2 x 7.6mm
Weight212 grams196 grams
Connectivity5G, LTE, NFC, Bluetooth 5.2, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C
SecurityFace Unlock
In-display fingerprint scanner (optical)
In-display fingerprint scanner (ultrasonic)
OSAndroid 13Android 13
One UI 5.1
Price$899/$999/$1,099$999.99/$1,119.99
BuyGoogleSamsung

Google Pixel 7 Pro vs Samsung Galaxy S23+: Design

These two phones do look quite a bit different in comparison. They both do include a display camera hole, which is centered at the top, and are both made out of metal and glass, but the overall look is different. The Pixel 7 Pro has a more squarish shape, and a curved display, compared to a flat panel on the Galaxy S23+. They both do include very thin bezels all around.

Both phones come with a frame made out of aluminum. The Pixel 7 Pro has Gorilla Glass Victus on the back, while the Galaxy S23+ includes Gorilla Glass Victus 2. When you flip them around, the differences become even more obvious. The Pixel 7 Pro has a camera visor on the back, with three cameras inside it. That visor connects to the frame on the sides. The Galaxy S23+ has three separate camera islands on the back, each of which is for one camera sensor. Those cameras are vertically aligned, contrary to what we get on the Pixel 7 Pro.

The Pixel 7 Pro is taller than the Galaxy S23+, while it’s also slightly wider, though that difference is negligible. Google’s handset is thicker than the Galaxy S23+, and that is the difference you may actually notice. On top of everything, it’s also heavier by about 16 grams. Both smartphones are IP68 certified for water and dust resistance. It’s also worth noting that they’re both very slippery, so keep that in mind if you’re planning to get a case or something.

Google Pixel 7 Pro vs Samsung Galaxy S23+: Display

Google’s flagship includes a 6.7-inch QHD+ (3120 x 1440) LTPO AMOLED display with a 120Hz refresh rate. That display is curved, and it supports HDR10+ content. It can also get quite bright at 1,500 nits of peak brightness. It has a 19.5:9 aspect ratio, and this panel is protected by the Gorilla Glass Victus.

Samsung Galaxy S23 Plus Review AM AH 08

The Galaxy S23+, on the other hand, has a 6.6-inch fullHD+ (2340 x 1080) Dynamic AMOLED 2X panel. This display is flat, and it supports a 120Hz refresh rate. It does get a bit brighter than the panel on the Pixel 7 Pro, as it goes up to 1,750 nits when needed. The Galaxy S23+’s display has the same aspect ratio as the Pixel 7 Pro’s, and it’s protected by the Gorilla Glass Victus 2.

Both of these displays are excellent. They are vivid, have deep blacks, and great viewing angles. They’re also more than sharp enough, even though the Galaxy S23+’s panel is technically less sharp than the Pixel 7 Pro’s. Touch response is also good on both phones, we did not have issues at all. The Galaxy S23+’s panel does offer a bit more brightness under direct sunlight, but the difference is not that big, to be quite honest. You’ll be happy with either of these two panels, that’s for sure, just remember that one is curved, and the other flat.

Google Pixel 7 Pro vs Samsung Galaxy S23+: Performance

The Pixel 7 Pro is fueled by the Google Tensor G2 SoC. On top of that, Google included 12GB of LPDDR5 RAM, and UFS 3.1 flash storage. The Snapdragon 8 Gen 2 for Galaxy fuels the Galaxy S23+. That handset comes with 8GB of LPDDR5X RAM and up to 512GB of UFS 4.0 flash storage. In all three of those categories the Galaxy S23+ has an edge, as it has more powerful hardware.

They both perform great on a day-to-day basis, however. We did not experience any lagging or anything of the sort, even though the Galaxy S23+ did feel a bit snappier. When it comes to gaming, however, the Galaxy S23+ is definitely the better choice, at least if you plan on playing more graphically-advanced games. The Galaxy S23+ handled them without a problem, while the Pixel 7 Pro did have some issues with the most demanding titles. Google never claimed this phone is made for gaming, though so… there you have it.

Google Pixel 7 Pro vs Samsung Galaxy S23+: Battery

The Pixel 7 Pro features a 5,000mAh battery, while the Galaxy S23+ includes a 4,700mAh battery pack. Both phones do offer great battery life, though the Galaxy S23+ is nowhere near the numbers of the Galaxy S23 Ultra. That is a bit odd, considering their specs, but there you have it. Still, the Galaxy S23+ does offer slightly better battery life than the Pixel 7 Pro, at least that was the case for us.

The Pixel 7 Pro provided around 7-7.5 hours of screen-on-time for us, at times we were able to go to 8 hours. The Galaxy S23+ usually had no issues pulling up to 8 hours of screen-on-time. Truth be said, that should be more than enough for the vast majority of users. Do note that your mileage may vary, though, due to different apps being used, different signal strengths, etc. Also, if you’re gaming, count on worse stats than these.

If you do run out of juice ahead of time, do note that the Pixel 7 Pro supports 23W wired, 23W wireless, and reverse wireless charging too. The Galaxy S23+ supports 45W wired, 15W wireless, and 4.5 reverse wireless charging. Neither phone comes with a charger, though, so do note that you’ll need to get it separately.

Google Pixel 7 Pro vs Samsung Galaxy S23+: Cameras

There is a 50-megapixel main camera on the back of the Pixel 7 Pro, in addition to a 12-megapixel ultrawide unit (126-degree FoV), and a 48-megapixel telephoto camera (5x optical zoom). The Galaxy S23+, on the other hand, has a 50-megapixel main camera, a 12-megapixel ultrawide unit (120-degree FoV), and a 10-megapixel telephoto camera (3x optical zoom).

google pixel 7 Pro AM AH 01 2

Those are all good sensors, and both phones do provide really good pictures, though different-looking ones. The Pixel 7 Pro leans towards more contrasty shots, and it truly shines in demanding HDR situations. Those pics do look a bit processed, but also excellent in general. Pixel’s camera software has outstanding image processing capabilities. The Galaxy S23+ images are a bit less contrasty, though also very sharp, and pleasant-looking.

We prefer the Pixel 7 Pro shots in low light, as the balance almost always seems to be on point. Both phones do a great job in that regard, however, and both have a tendency to brighten up dark scenes quite a bit. They also manage to control the noise really well, and pull out a lot of details from the shadows. Ultrawide cameras on both phones do keep up with the main camera in terms of color temperature, and generally do a good job. The Pixel 7 Pro offers better telephoto shots, however, mainly thanks to software.

Both phones do a good job with video recording, but not to the level of the iPhone 14 Pro series and the Galaxy S23 Ultra. Overall, chances are you’ll be happy with either of these cameras, but do note the differences.

Audio

There’s a pair of stereo speakers included on both the Pixel 7 Pro and the Galaxy S23+. The speakers on both phones sound really good, actually. They’re loud enough, and detailed enough, though we’d give an edge to the Galaxy S23+. The soundstage does seem a bit wider on its speakers, and the bass is also more pronounced.

A 3.5mm headphone jack is not included on either phone. You can always utilize the Type-C port for wired audio connections, though. As far as wireless audio goes, the Pixel 7 Pro offers Bluetooth 5.2 support, while the Galaxy S23+ comes with Bluetooth 5.3.


[ad_2]
Source link

Best Buy’s mail-in service lets you recycle your old smartphone

0
[ad_1]

The new Best Buy mail-in service is here to help you recycle your old gadgets. Instead of disposing of old gadgets, you can send them in for proper recycling. This approach from Best Buy is a nice approach to the environment, as the old gadgets won’t end up as pollutants.

There are a few conditions for those looking out to make use of this new recycling program. These conditions make this program accessible to shoppers that live in the US. Best Buy also provides a list of the devices that meet the criteria for this recycling program.

The retail company has also made known the steps for recycling old products to their customers. So if you shop at Best Buy and have old products you got from them lying around, this article is just for you. Here is everything you need to know about this recycling service.

How to make use of the new Best Buy mail-in service to recycle your old gadgets

Best Buy is making it easier for you to recycle your old gadgets instead of throwing them away. This isn’t the company’s first initiative to recycle its customers’ used goods. Best Buy beats its chest confidently knowing that it has recycled over 2.7 billion pounds of electronics and appliances.

With this new recycling program, Best Buy is providing a prepaid box with which shoppers mail in their old gadgets. The box is currently available for sale on the Best Buy online retail store and it comes in two sizes. There is a small and large option for users to choose from, depending on the amount or size of gadgets they wish to mail in for recycling.

After putting all recyclable gadgets into either box they purchase, the user then ships the box to Best Buy. UPS is responsible for all gadgets that customers send to Best Buy to undergo the recycling process. Well, there are a handful of gadgets that you can send in to be recycled by Best Buy.

These gadgets include TVs, computers, tablets, smartphones, appliances, printers, audio devices, smart home devices, etc. Users can also mail-in their smart home gadgets like audio systems, music gadgets, video game consoles, and other car gadgets. This list covers most of the gadgets that you have lying around in your house.

While the Best Buy mail-in service is a great idea, only shoppers in the US will have access to it. So if you stay in the US and have gadgets to recycle, head over to the Best Buy site and purchase the prepaid box today. With this, you can ship the gadgets you have at home for recycling to Best Buy instead of indiscriminately disposing of them.


[ad_2]
Source link

YouTube Music is beginning to roll out real-time lyrics on Android devices

0
[ad_1]

YouTube Music is rolling out a new feature that allows users to view real-time lyrics while listening to their favorite songs. The feature is available now to someYouTube Music users who have reported and shared how this now provides a unique and immersive experience for music enthusiasts.

The real-time lyrics feature on YouTube Music displays the lyrics of the song being played in sync with the music. This means that users can now sing along to their favorite tracks without having to worry about missing a beat or a word. The lyrics appear on the screen in real-time and change as the song progresses. This differs from the current way that YouTube Music displays song lyrics, which is simply with static text.

Several  users, who already have the feature enabled, have taken to Reddit to share their experience and some screenshots. To use this feature, users can simply open the YouTube Music app and select a song to play. Once the song starts playing, users can also choose to manually enable the real-time lyrics feature by tapping on the “lyrics” tab located at the bottom of the screen. The rollout seems to be server-side and not one that can be forced via an app update.
The real-time lyrics feature on YouTube Music is likely powered by its partnership with MusixMatch, which was finalized earlier last year, and serves to accurately synchronize the lyrics with the music. This ensures that users have a seamless and uninterrupted experience while listening to their favorite songs. Additionally, this capability was teased back in December when a Twitter poll was posted by the Team YouTube account asking subscribers which features should take priority to their developers.
This new feature is a significant improvement for YouTube Music users who can now enjoy their music in a more engaging and interactive way. The addition of real-time lyrics brings YouTube Music closer to other popular music streaming services that already offer this feature.

YouTube Music has been making significant strides in recent years to improve its service and compete with other music streaming platforms. The introduction of the real-time lyrics feature is just one of many updates and improvements that the platform has made in order to provide a better user experience.


[ad_2]
Source link

Microsoft and Fortra to Take Down Malicious Cobalt Strike Infrastructure

0
[ad_1]

The U.S. District Court for the Eastern District of New York permits Microsoft to seize malicious Cobalt Strike infrastructure used in global malware and ransomware attacks.

The U.S. District Court for the Eastern District of New York has granted permission for the seizure of domain names used by threat actors to store and share malicious versions of Cobalt Strike.

This action follows legal and technical efforts by Microsoft, Health ISAC (Health Information Sharing and Analysis Center), and cybersecurity firm Fortra to prevent the abuse of Microsoft software and the Cobalt Strike exploitation tool.

It is worth noting that in 2019, Microsoft employed a similar approach to seize 50 domains utilized by North Korean hacker groups Thallium and APT37 for large-scale cyberattacks.

According to the lawsuit, cybercriminals are utilizing cracked, legacy copies of the post-exploitation tool and Microsoft software to distribute malware and ransomware.

Cobalt Strike, originally provided by Fortra for adversary simulation, is a legitimate post-exploitation tool. Despite Fortra’s efforts to prevent abuse, hackers continue to create cracked versions of older product versions and exploit them.

The recent court order enables these organizations to notify and seize IP addresses hosted in the United States that are hosting malicious versions of these tools. The domains will be taken down immediately, and the court order also allows for the ongoing seizure of such domains in the future, as cybercriminals are likely to develop new infrastructure.

Additionally, Microsoft will be notifying hosting providers in the European Union and Latin America to prevent the abuse of manipulated versions of Cobalt Strike by taking down host domains.

Microsoft has also stated that its APIs and SDKs have been abused by threat actors in the development and distribution of malware. Therefore, Fortra and Microsoft have obtained temporary restraining orders against the copyright violators of their programs to ensure that malicious versions are shut down and seized.

It is important to note that Cobalt Strike is frequently used in ransomware attacks, particularly those targeting the healthcare sector, which is why Health ISAC has been involved in the court proceedings.

Email claiming Kaseya patch drops CobaltStrike malware
An email claiming the Kaseya patch drops Cobalt Strike malware

Recently, the tool has been observed in at least 68 ransomware attacks against healthcare organizations in 19 countries. Profit-driven criminals also use malicious versions of Cobalt Strike to launch ransomware attacks, and state-sponsored actors linked with Russia, China, Vietnam, and Iran are also actively exploiting it.

The action against the abuse of Cobalt Strike and Microsoft software involves disrupting the attackers’ infrastructure, including hosting servers and domains. The court order was issued on March 31, and with the assistance of CERTs and ISPs, Microsoft and Fortra have successfully taken down attacker infrastructure and blocked cybercriminals’ access to compromised devices.

In their lawsuit, the companies have named sixteen John Does as the plaintiffs, without revealing their identities. The complaint has disclosed that these individuals are members of the Conti, LockBit, and BlackCat ransomware gangs, as well as the Evil Corp cybercrime group.

“Disrupting cracked legacy copies of Cobalt Strike will significantly hinder the monetization of these illegal copies and slow their use in cyberattacks, forcing criminals to re-evaluate and change their tactics,” Microsoft’s Digital Crimes Unit GM, Amy Hogan-Burney stated.

  1. UpdateAgent malware mimics legitimate macOS software
  2. Legitimate tool used in compromising Cloud-based assets
  3. Hackers Using BRc4 Red Team Pentest Tool in Cyberattacks
  4. What Makes External Attack Surface Management Essential?

[ad_2]
Source link

Do cyber regulations actually make K–12 schools safer?

0
[ad_1]

Over the last decade, K–12 schools have made great strides in employing technologies that facilitate learning. And while digital platforms for education continue as a mainstay, unfortunately so do cyberattacks.

Over the last decade, K–12 schools have made great strides in employing technologies that facilitate learning—especially since the onset of pandemic-induced distance education. While students have long since returned to the classroom, digital platforms for instruction, collaboration, and homework continue as a mainstay. Unfortunately, so do cyberattacks.

In a perfect storm of lightning-quick edtech adoption with limited IT support, cybercriminals have seized on the opportunity to launch an unprecedented number of strikes against schools—21 ransomware attacks in January 2023 alone—straining resources and impacting the delivery of critical education services across the US.

To safeguard learning continuity in this environment, US lawmakers have passed legislation aimed at mitigating security and privacy risks for the K–12 community. In the article below, I highlight recommendations from key security standards, including the most recent state and federal laws passed to help school districts navigate compliance requirements, all while ensuring students, staff, devices, and data are safe.

More cyberattacks on K–12 schools trigger legislative crackdown — will tougher regulations be enough?

A combination of limited technical support, outdated systems, and an increase in digital adoption has led to an unprecedented rise in cyberattacks on K–12 schools. The Cybersecurity and Infrastructure Security Agency (CISA) found that K–12 cyberattacks more than tripled over the pandemic, from 400 reported incidents in 2018 to over 1,300 in 2021.

The deluge in attack volume and severity is largely thanks to outdated and fragmented digital infrastructures supported by understaffed IT teams. This strain on resources was exasperated by the move to swiftly adopt all-digital curriculum and instruction during the pandemic, much of which carried over after distance learning requirements expired.

According to the 2022 State of EdTech Leadership Report, only one in five school districts (21 percent) have a dedicated cybersecurity professional on staff. Technicians are often dwarfed by the number of students, teachers, and devices under their charge, with IT to student ratios of 1:100+ or even 1:1,000+. With limited IT and IS personnel, educational institutions struggle to manage complex digital environments and protect networked devices without compromising the learning experience.

Adding to schools’ elevated cybersecurity risks are the students and teachers themselves, many of whom lack basic cybersecurity awareness or bring their own unsecured devices to connect to school networks. Compounding the problem further is the fact that students’ personal data is especially valuable on the dark web because kids are far less likely than adults to monitor for fraud.

Top K-12 cyberthreats

Exploits and backdoors hammered the education sector over nearly a two-year period from January 2021 through June 2022, leading to rampant ransomware attacks in the final quarter of 2022. By January 2023, education had claimed over 80 percent of all global malware incidents—a staggering lead that has held since 2020. And it should come as no surprise that the cyberthreat doing the most damage to education is ransomware.

In 2021, 56 percent of K–12 schools and 64 percent of higher education institutions reported being hit by some type of ransomware. In fact, 57 percent of all ransomware incidents disclosed to the FBI involved K–12 districts at the start of the 2020/2021 school year, compared to just 28 percent the year prior.

According to Bleeping Computer, ransomware struck 89 US educational institutions last year, including 45 school districts and 44 universities and colleges, with data stolen in at least 58 attacks. Malwarebytes found that globally, education experienced 12 ransomware incidents in November, 20 in December, and a whopping 21 in January 2023 alone.

Behind the majority of these attacks: the ransomware gang known as Vice Society, a Russian-based group linked to multiple K–12 data breaches, including LA Unified, the second-largest school district in the nation. After observing Vice Society disproportionately targeting education, the FBI and CISA issued a joint Cybersecurity Advisory in September, warning about an increase in anticipated ransomware attacks over the 2022/2023 school year.

Where in previous years districts hit by ransomware might “only” worry about being frozen out of systems or losing important data, recently, double-extortion threats that have become commonplace in the private sector are spilling over into education. Schools hit by ransomware this year should not assume threat actors will refrain from publishing stolen data just because it contains sensitive student information.

After LA Unified refused to pay the ransom (a move we support, as only 2 percent of districts that pay actually recover all of their data), Vice Society published its stolen data in early October 2022, which included confidential psychological assessments of students, legal documents, business records, and contractors’ social security numbers.

Across all industries, education paid the highest price to recover from ransomware attacks—an average of $2.73 million—48 percent higher than the global average. Recovery expenditures include staff time, device and network costs, ransom, and downtime, which to K­–12 districts represents the costliest expense, as students aren’t learning when systems are down and schools are closed. In fact, an October 2022 Government Accountability Office (GAO) report found that loss of learning following a cyberattack ranged from three days to three weeks, with recovery time taking anywhere from two to nine months.

Retaining security staff: show them the money

Cybersecurity as an industry suffers from a retention problem. A study from the Kapor Center estimated that high turnover has cost the technology sector more than $16 billion annually. At the heart of such turnover: toxic workplace culture. Nearly 40 percent of employees surveyed said that unfairness or mistreatment played a major role in their decision to leave their company.

It follows, then, that creating fair policies for workload, promotion, and pay—plus treating all employees with dignity and respect—can help businesses hang onto talented security staff. Other strategies include:

  • Having a succession plan in place so employees can envision and make reality their career growth within the business.
  • Establishing a mentoring program to allow junior personnel to shadow senior staff and picture what the next stage of their career might look like.
  • Offering security staff opportunities to be involved in the planning stages of projects so they feel their voice is heard.
  • Giving employees ample time off for well-being, including mental health and personal days, to avoid burnout.
  • Allowing flexible in-office hours, including a hybrid or remote work schedule to keep competitive offers at bay.

Finally, of critical importance to attract and retain quality employees is offering a competitive salary. Currently, the median salary for cybersecurity professionals in the US is $135,000, according to (ISC)². The study also shows that 27 percent of security workers enter the sector for the high earning potential and strong compensation packages.

Salaries should increase to keep up with both market trends and increasing responsibilities related to the growing sophistication and frequency of cyberattacks. Between 2020 and 2021, some cybersecurity salaries jumped by more than 16 percent to well over six figures, according to a 2021 report from Dice, a tech recruiting platform.

Cybersecurity and privacy laws

After years of escalating K–12 cyberattacks, legislators have responded with a series of state and federal regulations shoring up both privacy and cybersecurity in schools. These will be layered on top of several existing federal protections, including:

1974 Family Educational Rights and Privacy Act (FERPA): Gives parents the right to access their children’s education records, have the records amended, and exert some control over the disclosure of personally identifiable information. When students turn 18, those rights are transferred to them.

1984  Protection of Pupil Rights Amendment (PPRA)Protects student privacy during specialized surveys and requires prior notification and consent from parents or guardians.

1998  Children’s Online Privacy Protection Act (COPPA): Limits operators of websites and online services from collecting personal data on children under 13 without parental consent.

2000 Children’s Internet Protection Act (CIPA): Requires K–12 schools to restrict children’s exposure to obscene digital content, monitor the online activity of minors, and educate students about appropriate behavior on the internet.

State laws

Since COPPA, most state education departments and legislatures have developed stricter policies to better protect student privacy online. According to the Data Quality Campaign, 45 states and Washington, DC, enacted new student privacy laws between 2014 and 2020. In fact, more than 1,000 student data privacy bills have been introduced in US states over the last 9 years, with 130 of them signed into law.

While heavy focus has been paid to state privacy regulations, policy response to cybersecurity was deemed “still insufficient” by the Consortium for School Networking in a report analyzing education-related security bills introduced in 2022. Legislators in 36 states proposed 232 security regulations last year—more than twice the amount in 2020—and 37 were adopted. However, most of the new laws focused on cybersecurity training, with little attention paid to establishing standards for securing school networks, devices, and applications, or developing consistent protocols for breach notification.

In September 2022, California became the first state to require its public school districts to report any cyberattack impacting more than 500 pupils or personnel, even if a data breach has not occurred. Currently, there are no other state or federal requirements for public schools to report security incidents—even breaches of young students’ sensitive information.

Federal laws

Despite the recent frenzy of privacy and security regulations passed at the state level, the federal government has remained mum for more than 20 years, passing its first-ever K–12 cybersecurity legislation in 2021: the K­–12 Cybersecurity Act.

The K–12 Cybersecurity Act required CISA to study the cyberthreats confronting public schools, such as ransomware, as well as the challenges faced in implementing security protocols and protecting student and staff data. After evaluating school districts’ capacity to prevent and mitigate attacks, CISA was to report back to Congress with suggestions for appropriate solutions.

In January 2023, CISA released a comprehensive report titled Protecting Our Future: Partnering to Safeguard K–12 Organizations from Cybersecurity Threats. The report provides school districts with insights into the current education threat landscape and guidelines to address systemic cybersecurity risks, along with simple steps school leaders can take to strengthen their security posture.

While it’s encouraging to see the federal government taking action on the growing number of cyberattacks against schools, there is still much work to be done. Two years prior to the release of Protecting Our Future, CISA partnered with the FBI to publish recommendations for schools to defend against ransomware, and the problem has only escalated since then. Ultimately, the advice offered by CISA is still voluntary—schools are not yet required to comply.

The K–12 Cybersecurity Act sets the stage for a measured approach to implementing standardized cybersecurity requirements in American public schools. And because federal policymakers promise this legislation is just the first step in addressing heightened K–12 security risks, it’s a good idea to stay on top of CISA recommendations and get ahead on compliance while aligning with security best practices.

Requirements and recommendations

What do K–12 schools need to do in order to be compliant with state and federal regulations in 2023? Most states require strong data privacy controls, which typically include encrypting any sensitive personal information of staff and students. Secure data storage is also a requirement of FERPA. To comply with CIPA, schools must certify they have an internet safety policy that blocks or filters access to pictures that are obscene, child abuse material, or other content harmful to minors.

While CIPA may help prevent students from accessing inappropriate content on the internet, it does not protect them from the full range of online threats. According to GAO, thousands of K–12 students had their personal information compromised in data breaches between 2016 and 2020. Compromised data included grades, bullying reports, and Social Security numbers, leaving students vulnerable to emotional, physical, and financial harm.

To protect students’ wellbeing, K–12 schools must do more than meet the basic minimum requirements for compliance. They also need to safeguard children against inappropriate online content, cyberbullying, scams, and other nebulous digital threats. A high percentage of children are exposed to unsafe online content, including:

  • Sexual content: 33 percent
  • Violence: 30 percent
  • Hate speech: 23 percent
  • Self-harm content: 18 percent
  • Suicide content: 15 percent

Beyond cyber safety and privacy considerations, there are few other requirements schools need to be compliant. However, federal policymakers promise the K–12 Cybersecurity Act is just the first step in addressing heightened security risks. Both state and federal legislators are ramping up on K–12 security regulations, so getting a jump-start on some of the recommendations from major government agencies is prudent both for compliance and protection.

Guidelines emerging from the K–12 Cybersecurity Act, for example, can help school leaders understand how to build, operate, and maintain resilient security programs. CISA provides three such recommendations in its 2023 report:

  1. With finite resources, K–12 institutions can take small steps to significantly reduce security risk in the near-term. Invest in the most impactful measures today and build toward a mature cybersecurity plan tomorrow by:
    • Implementing the highest-priority security controls first: e.g., multifactor authentication (MFA), patch management, data backups, content filtering, etc.
    • Prioritizing additional near-term investments that align with the full list of CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs).
    • Over the long-term, developing a unique cybersecurity plan that leverages the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
  2. Many school districts struggle with insufficient IT resources and cybersecurity capacity. Recognize and actively address resource constraints by:
    • Working with the state planning committee to leverage the State and Local Cybersecurity Grant Program (SLCGP).
    • Utilizing free or low-cost services to make near-term improvements in resource-constrained environments.
    • Calling for technology providers to enable strong security controls by default for no additional charge.
    • Minimizing the burden of security by migrating on-premises IT services to the (more secure) cloud.
  3. No K–12 entity can singlehandedly identify and prioritize emerging threats, vulnerabilities, and risks. Focus on collaboration and information sharing by:
    • Joining relevant collaboration groups, such as MS-ISAC and K12 Security Information eXchange (K12 SIX).
    • Working with other information-sharing organizations, such as fusion centers, school safety centers, and other regional and state agencies.
    • Building a strong relationship with CISA and FBI regional cybersecurity personnel.

In addition, the FBI and CISA recommend school network defenders apply the following mitigations to reduce the risk of ransomware compromise:

  • Maintain offline backups of data and ensure it is encrypted and immutable (i.e., cannot be altered or deleted).
  • Review the security posture of all third-party vendors. 
  • Implement policies for applications and remote access that only allow systems to execute permitted programs. 
  • Require all accounts with credentialed logins to comply with NIST standards for password policies.
  • Require phishing-resistant MFA. 
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege. 
  • Segment networks to prevent the spread of ransomware.
  • Identify, detect, and investigate abnormal activity and potential traversal of ransomware with a networking monitoring tool.
  • Install, regularly update, and enable real-time detection for antivirus software. 
  • Secure and closely monitor remote desktop protocol (RDP) use.
  • Keep all operating systems, software, and firmware up to date. Districts should prioritize patching vulnerabilities on CISA’s Known Exploited Vulnerabilities catalog.

Education for educators

Recommendations, warnings, and guidelines issued from the major government agencies all come with a caveat: Change must come from the top down. K–12 school leaders must establish and reinforce a culture of cybersecurity within their districts and the education sector as a whole. IT and IS professionals simply cannot bear the burden alone.

To foster a sense of shared responsibility for cybersecurity, schools should invest in simple training materials—even if just posters hung around campus—that establish security awareness for teachers, administrators, and students. Basic hygiene, such as keeping passwords private, logging out of accounts on shared devices, and staying away from unknown websites can assist with K–12 cybersecurity efforts. In addition, adopting digital citizenship curriculum for students can enhance cyber safety initiatives, empowering minors to police themselves.

The problems of rampant ransomware, limited IT staff, and outdated digital infrastructures won’t be solved overnight. But with the same diligence adopted by the private sector, K–12 schools can follow regulation protocols to keep cybercrime at bay so that teachers and students remained focused on what matters: their education.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

How to delete a Google review

0
[ad_1]

Google reviews are a great way to get some insight into an establishment’s reputation. They’re especially useful if you’re going to be spending money at said establishment. The thing is that there will come a time when you’ll need to delete a Google review that you wrote.

Maybe you made a mistake. Maybe your opinion of the place changed over time. Whatever the reason, it’s possible to scrub a review that you left for a business. How? Here’s a handy guide to show you.

Before we start

We have a ton of handy How-To articles here at AH to help you on your tech journey. You can check out How To Quickly Translate Text On Your Android Device. If you’re into artificial intelligence, you can check out How To Use ChatGPT. Lastly, you can boost your Gmail experience by reading How To Use Gmail Keyboard Shortcuts.

How to delete a Google review

So, these steps teach you how to delete a Google review that you yourself wrote about a business. Obviously, if you want to get rid of a review that someone wrote about your business, it’s not that easy of a process. It’s possible to have a comment about your business removed, but it’s a much different process. We’ll explain later on in the article.

Using your phone

So, the first step to deleting your review is finding it. If you’re using your phone, tap on your profile picture in the upper right corner of the Google Maps app. In the popup, tap on the Your profile button- if this is your first time going there, you’ll see a page asking you to set up your public profile. Just tap Not now if you want to avoid any extra steps.

Delete google review 5

On your profile page, it will show you the images you posted from different businesses. Scroll down to the Reviews section. In this section, it will show you a list of the reviews that you posted starting with your most recent one.

On the review, tap on the three-dot menu on the right side of the screen. In the resulting dropdown menu, you’ll see the option to delete the review. When you tap on it, you’ll see a confirmation screen pop up. It will ask you if you’re sure that you want to delete that review. The process can not be undone.

Delete google review 6

Using your computer

Deleting a review using your computer is similar, but there are some differences. Go to the Google Maps website and click on the “hamburger-style” menu on the top left of the UI. In the resulting panel, tap on the Your contributions button.

The panel will change to show you a list of your reviews and pictures. On the top of the panel, you’ll see tabs that let you control what contributions you see. If you don’t see the review you want to delete right away, you can click on the Reviews tab.

Delete google review 3

When you find the review that you want to delete, click on the three-dot menu on the right of the item. After that, you’ll see a popup appear giving you the option to delete the message. Just like on mobile, Maps will confirm that you really want to delete the review.

Delete google review 4

Whether you’re using your phone or your computer, you have the option to simply edit your review. So, if you have a change of heart, but you don’t want to completely delete your review, you can just edit it. The Edit review button is right above the Delete review button on the menu.

How to remove a review that someone wrote about your business

Now, this is not a surefire thing. Obviously, it’s not fair for you to just remove any sort of negative comment a person says about your establishment. However, there are exceptions. There are people who leave untruthful, offensive, or troll reviews just to drive down your business. At that point, it’s necessary to step in.

Getting a review removed is a pretty involved process, and there’s no guarantee that it will work. But, why not give it that old college try?

On your phone, go to the Google Maps app and tap your profile picture on the top right of the screen. There, you’re going to tap on the Your business profile button. It will be right under the regular profile button.

It will show you a dashboard with different tabs that you can navigate to. Tap on the Reviews tab. There, you’re going to find the review in question and tap on the three-dot menu on the right side.

On the menu, Tap on the Report button. This will take you to a UI where you can type up why you’re reporting the review. This is a very important step, as you’re making your case for why you’re reporting the review. So, you’ll need to be detailed in your report and outline why the comment is generally inappropriate.

After that point, you’ll need to wait several days for Google to weigh in and tell you its decision.

Why a review could be reported

Now, it’s highly unlikely that Google will remove a comment because it hurt your feelings. So, if a customer says something like “Horrible service!”, whether you agree with it or not, that’s something that you’re going to have to deal with.

Reporting a review is something that you should do if the review is downright offensive, unnecessary, irrelevant, spam, or obviously a troll. Think of it like the comment section on a social media site. So, if you’re running a nail salon, and you get a review reading, “The food here is terrible”, you should report it.

If a review says something like “These [offensive term] can’t make a burger”, then you’ll be able to report it.  So, you get the picture. While it’s not a surefire thing, it’s still worth a try.


[ad_2]
Source link

Samsung estimates Q1 2023 profit to drop 96%, hit a 14-year low

0
[ad_1]

Samsung has shared its earnings estimates for the first three months of 2023, and the figures are unsightly for its investors and well-wishers. The company is staring at an eye-popping 96 percent year-on-year (YoY) decline in profit in Q1 2023. It is hoping to take home just about KRW 0.6 trillion (roughly $450 million), down from KRW 14.12 trillion (nearly $11 billion) in Q1 2022. Overall consolidated sales revenue for the first quarter of the year is expected to clock in at around KRW 63 trillion (roughly $47 billion).

Samsung reports a massive profit decline in Q1 2023 amid dwindling chip demand

Samsung made truckloads of money in 2021 and started 2022 with a bang. However, midway through last year, the company’s earnings started to decline. A drop in demand for semiconductors, particularly memory chips, severely affected its business.

Since the majority of the Korean firm’s income comes from the semiconductor business, the drop hit where it hurts the most. By the end of 2022, its yearly profits were down 16%. More notably, the Q4 income hit an eight-year low.

In its financial outlook for 2023, Samsung said it isn’t expecting much improvement. The company estimated its earnings from the semiconductor business to be halved this year. While it hasn’t shared its detailed earnings report for the first quarter yet (it will come in April end), early estimates point to a gloomy future.

On average, the world’s largest smartphone maker, which also leads the industry on several other fronts, made just about $150 million in the first three months of 2023. This is its lowest quarterly profit in 14 years (since the 2008 economic recession).

The Korean media recently reported that Samsung will also post its first-ever quarterly loss from the semiconductor business since 2008 in Q1 2023. It could lose about KRW 4 trillion or more than $3 billion from the memory chips unit.

Looking at the company’s earnings estimates, it may have made about as much from all other businesses in the first quarter. Overall, it just about broke even between January and March 2023. We’ll have to wait for the full report to find out where Samsung made the most money this past quarter.

Samsung will not scale back semiconductor investments

Despite losing money from semiconductors, Samsung doesn’t plan to scale back investment. Many rivals have reduced their spending in the business until the market rebounds. But, the Korean firm sees continued investment and innovation as the key to staying afloat in the long term.

It has even borrowed about $16 billion from its sister firm to fund the planned investments. Time will tell whether Samsung reaps the benefits of these investments anytime soon. Stay tuned for its full Q1 2023 earnings report later this month.


[ad_2]
Source link

Microsoft adds Bing’s AI chatbot to the Android SwiftKey app; feature will improve your texts

0
[ad_1]
Thanks to its investment in OpenAI, Microsoft has been adding access to AI chatbot ChatGPT to everything. Bing, of course, has ChatGPT integration, and enabling a flag on both the Android and iOS version of the Edge app will put a button on the Edge toolbox giving you one-tap access to the conversational AI chatbot. Now Microsoft is adding Bing Chat AI to its popular third-party QWERTY app for Android, SwiftKey.
Per The Verge, with this integration, SwiftKey for Android users will be able to access the chatbot like they already can on Bing. The process starts by installing the SwiftKey Beta app from the Google Play Store which can be done by tapping on this link. After opening the app, you will need to sign in with your Microsoft Account information. Microsoft’s CTO of mobile and commerce Pedram Rezaei said on Twitter that the feature is “slowly rolling out.” Some Android users say that they have not yet seen the chatbot after installing the app.

Android users with the SwiftKey Beta app installed will be able to access Bing AI from a button above the keys. Tapping that button opens the search feature and Bing Chat which accesses the AI chatbot. In addition, with the SwiftKey for Android app, users will be able to improve text messages by typing what they want to write in a field and having the AI feature rewrite it using different tones. On Bing and Edge, the same functionality can be used to create documents and emails.

Last year Microsoft pulled SwiftKey from iOS before bringing it back. You can install the app for your iPhone by clicking on this link. Microsoft might feel pressured to quickly integrate the AI chat feature with the iOS version of SwiftKey considering the competition from other iOS third-party QWERTY keyboard apps with AI functionality.

Google is expected to integrate many of its apps including Search, Gboard, and others with its conversational AI chatbot Bard.


[ad_2]
Source link

IoT garage door exploit allows for remote opening attack

0
[ad_1]

Multiple exploits are impacting a line of smart products for the home.

A popular and reasonably cheap garage door controller is making waves in the news, and not in a good way. Ars Technica reports that the $80 devices created by Nexx are suffering from a number of security issues which could compromise the safety of your home.

A Medium post by researcher Sam Sabetan reveals the details.

At the tail end of 2022, Sam discovered a “series of critical vulnerabilities” in the Nexx range of smart devices. These issues not only affected garage door openers, but also smart plug switches and alarms too.

Working with the US Cybersecurity and Infrastructure Security Agency (CISA), five CVEs were eventually assigned. As per the advisory, successful exploitation of these vulnerabilities could allow an attacker to receive sensitive information or hijack devices and not a huge amount of technical ability is required to perform the attacks.

Developers keep making the hard coded password mistake

What are some of the issues at play here? Well, one of the biggest is that hard coded credentials are used to talk to Nexx servers. What this means is that the password shipped with the product can never be changed. If someone finds out what it is, either from a list online or by socially engineering the victim, the game is indeed up.

As Ars Technica notes, this alongside controllers broadcasting unencrypted email addresses along with messages needed to open or close doors all means a fairly easy win for a competent attacker. Indeed, someone could potentially open your garage door from the other side of the planet if they wanted to. Sabetan estimates that somewhere in the region of more than 40,000 devices might be impacted by this issue, both commercial and residential users.

Additional vulnerabilities include smart alarm impersonation, which would allow attackers to ultimately control the branded home alarm system that the Nexx smart alarm controller operates.

Elsewhere, we have smart alarm hijacking which could allow an attacker to essentially remove all control from a home alarm out of the owner’s hands, granting them full access in the process.

The suggested fix: replace these devices

This is all very bad. Worse, Sabetan reports that Nexx has “consistently ignored communication attempts from myself, the Department of Homeland Security, and the media”. One has to wonder if the company is unwilling or unable to fix the issue. With this in mind, the only real advice which Sabetan has is the same as when you realise your phone is running an abandoned app. As painful as it may be to start reorganising how your physical home meshes with the digital world, it’s time to start ripping everything out and look for other home security solutions.

From the CISA mitigations page, which doesn’t go quite as far as Sabetan’s advice to remove all of the Nexx products from your home or place of business:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
  • CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

The Internet of Things can be a perilous place, and the lack of effective security in these tools we entrust our homes to is far from ideal. If you have devices and apps being used to power your home, alarms, doors, windows, or anything else, now is the time to check if those passwords are hard coded.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link