WiFi 6 Has Arrived and Promises Faster Data Delivery Speeds

WiFi is inevitably part of our everyday lives. With every passing year, we add more devices in our homes that require WiFi, consequently slowing down our speeds as more devices connect to our home routers. WiFi 6 is here to help solve that issue. WiFi 6’s devices/routers offer faster speeds of the internet and some of these routers are even inexpensive to own.

Last year at CES 2019, affordable routers were announced to be coming to stores, yet consumers were met with very high price points. A small number of routers were offered for just under $200. This year’s CES event introduced quality routers that ranged around the price points of $100-$200.

In large homes, it’s recommended to have a mesh router system. However, this could be a bit more expensive than singular routers. Mesh routers also provide stronger and faster speeds of WiFi. At CES, Comcast announced the WiFi 6 version of their Gateway. This was a crucial change for many since cable providers rent out routers to their consumers. Apple’s iPhone 11 and iPhone 11 Pro both support WiFi 6 in addition to other companies like Lenovo, Samsung, and Asus that announced new laptops that also incorporate WiFi 6.

In comparison to WiFi 5, WiFi 6 has nearly doubled in speed. WiFi 5 had about 3.5 Gbps compared to WiFi 6 which now has up to 9.6 Gbps. However, that speed isn’t necessarily for one device solely. Rather, the 9.6 Gbps is  needed for connecting and using multiple devices without sacrificing quality internet speeds. 

There’s more developments coming for WiFi 6 such as WiFi 6E, which increases speed and capacity, but consumers will have to wait a while for this one since it doesn’t exist yet. WiFi 6 doesn’t instantly improve internet speeds. Rather, the wireless upgrade will show noticeable improvements through your regularly used devices once support for WiFi 6 is established.

California’s New Privacy Law Protects Consumers’ Submitted Data

California residents rejoice – a new law passed for 2020 allows for greater consumer data protection in which one can opt-out of having companies collect and sell their data to third parties. This includes any data collected from social networking websites, consumer goods retailers, banks, etc. 

The new act is called the California Consumer Privacy Act (CCPA) and ultimately protects people from having their data monetized. Under this act, consumers have the right to access copies of any data collected by companies. Those businesses that violate the Act can face State fines or sanctions placed upon them. Enforcement of the Act begins this year in July, and any company that has yet to comply with the change in data collection may not face trouble until then. 

For those companies already in compliance with the new law, consumers can find their data collection opt-out pages typically under the Privacy tab. Recently, a directory of links was created to include these company pages for easy access to opt-out requests –  if in case the page isn’t found straightforwardly on the company site homepage. 

For more information on California’s new Consumer Privacy Act, please visit this page here. The directory of opt-out request pages can be found here.

New Orleans Struck by Cyberattack, City Declares State Of Emergency

On Friday, December 13, New Orleans Mayor LaToya Cantrell declared a state of emergency for the city after a cyberattack was detected around 11 a.m. 

The incident began at around 5 a.m. when NOLA Ready – New Orleans’ emergency preparedness campaign – confirmed “suspicious activity…on the City’s network” and a “cybersecurity incident” by the time 11 a.m. rolled around. Once the threat was established, New Orleans’ IT department issued a shutdown of all employee devices and disconnection from Wi-Fi. Servers were also ordered to be powered down following the attack. Emergency response lines were still open to take calls, however. 

The City of New Orleans declared a state of emergency shortly after the cyberattack was detected. A press conference was held the Friday of the incident, in which Mayor LaToya Cantrell confirmed that a cyberattack was responsible for the unusual network activity. Officials stated how no data was lost after the attack and that there is still no indication that passwords were compromised. Chief Information Officer Kim LaGrue confirmed that phishing emails had been sent to employees that asked for their login information while the attack went underway. There was also evidence of ransomware – specifically the Ryuk strain – as cause for the cyberattack. 

Mayor Cantrell did later affirm that ransomware was behind the attack, but investigations are still ongoing to verify if Ryuk was indeed involved according to the press conference held Monday, the 16th. 

It’s always important to take precautionary steps in making sure you’re prepared for an impending cyberattack. Some cybersecurity steps you can take include:

-Backing up all your data

-Being mindful of what email links and attachments you click on

-Patching software vulnerabilities

-Using strong passwords and activating two-factor authentication for your accounts

Inverselogic’s 2019 Holiday Gift Guide

It seems like yesterday that we celebrated the New Year, and in a blink of an eye, the holiday season has arrived once again. Inverselogic’s 2019 year was quite eventful and exciting with the onboarding of new client projects such as the establishment of Second Home’s new Los Angeles based location – a co-working space that evokes a futuristic atmosphere, the debut of Cellar Thief’s new website – an e-commerce store for wine enthusiasts – in addition to the site launches for Walker Wines and Blacksmith Wines – two stores that celebrate discriminating collectors who seek rare wines from the world, such as French Bordeaux or Italian Barolo. Even though the year is coming to a close, we are still busy with ongoing Windows 10 operating system upgrades as well as our preparation for the upcoming 106th Annual Rosebowl Game – a perfect way to kickstart 2020 with one of the year’s largest sporting events. 

While 2019’s conclusion is fast approaching, our enthusiasm for imparting valuable cyber security information never wanes. Alongside this, Inverselogic strives to provide all our clients with top quality technology services, and our dedication to client satisfaction has been and always will be one of our principal missions. Additionally, our team is committed to delivering innovative technology solutions that best serve our clients’ needs and ensure their continued success.

We would like to express our sincerest gratitude to all our wonderful clients for making 2019 another fantastic, prosperous year. Every year brings us the opportunity to learn, grow, and succeed with our clients. We’re thankful for our business partnerships and the goals that we achieve through every project together. From our team to yours, we hope your 2019 was just as successful.

Inverselogic welcomes the forthcoming new year as we look forward to what 2020 may bring. We would like to wish you a fun and safe holiday season and a very Happy New Year!

Please enjoy our annual Holiday Tech Gift Guide, which features all of this year’s newest and coolest gadgets. We understand that holiday shopping can be hectic around this time, so we’re here to make your experience stress-free as you search for that perfect gift for your loved ones!

Some App Developers Had Access to Facebook Users’ Data Through the Platform’s Groups

Earlier this month, Facebook admitted that about 100 application developers still had access to Facebook user data, specifically those in Groups on the platform. The news comes as a surprise considering how Facebook took measures to restrict access to sensitive data in April 2018 after the Cambridge Analytica scandal. At the time, Facebook’s newly enforced rules limited third party access to users’ personal data – such as names and profile pictures – and instead allowed access to Group content.

Even after nearly a year and a half later, Facebook still has issues with controlling how much access third parties have. A post published by Facebook director Konstantinos Papamiltiadis stated that the platform’s implemented rules in 2018 were inconsistently carried out, allowing developers to collect personal information from users. Those 100 application developers have now been restricted from doing so. 

Facebook’s director stated that 11 developers had access to user’s data in the last 60 days but had not used the data in any unethical practices. Facebook is now requesting that all data collected by those developers be deleted. Papamiltiadis did not specify what personal data they had access to, however, he did state that the developer apps consisted mainly of “social media management [tools] and video streaming app[lications]…”

UPS Drones Began Delivering Prescription Medications in US

Image Source: UPS

A subsidiary of UPS called UPS Flight Forward began its drone delivery in North Carolina at the beginning of November. Through a partnership with CVS Pharmacy and Matternet, the company successfully delivered medication to both a home and retirement community. 

The drone delivered packages without human operation, although it was monitored remotely. During its delivery, the machine lowered the package it carried through use of a cable. This approach to delivering residents’ packages has taken the burden off those who have restricted mobility. 

Drone deliveries have been happening since earlier this year, with UPS delivering medical supplies to North Carolina’s WakeMed Hospital beginning in March. Google also launched its own drone delivery operation called Wing in October this year, transporting supplies like over-the-counter medications to residents in Virginia. UPS’s Flight Forward now allows for easy, stress-free delivery of prescription medications to residents.

In order for companies to operate drone delivery services, they must receive a Part 135 Standard certification that is administered through the Federal Aviation Administration, granting said companies the ability to carry packages weighed over 55 pounds and fly an unlimited amount of drones during day or night. UPS recently received its Part 135 certification this September. With this granted certification, companies like UPS can explore new possibilities for their drone delivery services, perhaps extending their delivery locations and even categories beyond prescription medications or medical supplies. Google’s Wing has already tested delivering a range of items from Walgreens and a gift shop called Sugar Magnolia in Virginia.

New Google Pixel 4 has One Big Privacy Issue with Face Unlock Feature

Google has created their own version of the face recognition unlock system for their Pixel 4 and 4 XL. Google’s system is similar to that of Apple’s Face ID technology and has changed their fingerprint authentication on the Pixel 4 to solely implement this method of phone unlock. However, there’s a huge privacy issue with their system: the phone can be unlocked even if your eyes are fully closed. 

The phone can be unlocked by someone else if the device is held up to your face – eyes closed or not. The unlock system will also work if you’re asleep and someone wanted to unlock your phone without you knowing. Contrary to Google’s unlock system, Apple’s requires your eyes to be fully open to unlock, thus making it more secure for its device users. 

Whether or not Pixel has intentions to add more security to the face unlock system remains unknown. A Google representative commented on the issue in a statement to The Verge, explaining: “We don’t have anything specific to announce regarding future features or timing, but like most of our products, this feature is designed to get better over time with future software updates”. With nothing yet officially announced, the privacy issue still stands, allowing a nosy friend or significant other to access a user’s device at ease. 

As of now, the only way to combat this issue is a lockdown function equipped on Android phones. Lockdown can be accessed through the power menu, and once pressed, the device disables the face unlock feature until the user’s PIN code is entered. If you choose to do lockdown, notifications will not be displayed on your phone screen. Bluetooth devices also lose the ability to unlock the phone.

5 Cybersecurity Threats That You Should Look Out for

Ransomware attacks, cyber attacks, data breaches – these are just a few cybersecurity threats that catches one’s attention. However, here are some other types of threats you may not have expected:

Malicious USBs That Could Carry Viruses 

Some USB Sticks could be very dangerous if initially tampered with and – once plugged in – can install a backdoor on PCs. You should be very cautious of plugging in a USB drive to your PC if you are unsure of where it’s from. Other USB sticks may not start causing immediate damage once inserted. Instead, such USBs could carry viruses that could wreak havoc on your computer after initial download. Always make sure you know where the USB comes from, keep your computer’s operating system up-to-date, and have the proper security tools installed.  

Browser Extensions That May Do More Harm Than Good

Browser extensions have everyday useful features, but some extensions need close evaluation from its users. Extension developers could use these programs to collect data on what you search online. If you happen to choose the wrong extension, it could end up annoying you with pop-ups, installing unneeded software, and could also sell your browser data. To help prevent this, minimize your extension downloads, do your research on the developers behind each extension, and just stick to the ones you know of. 

Charging Cables That Could Give Hackers Access To Your Device

The purpose of a charging cable is to give power to your device and help sync information. However, there are some charging cables out there that look very similar to your everyday charger, but they could give hackers access to your device’s information. All you would have to do is click “trust this computer” when a malicious cable is plugged in, and the hacker would have access to your device. To help prevent this issue, be mindful of the charging cables you purchase or only use the charging cables that come with your device.

Photo Uploads That Give More Information Away Than Wanted

There’s nothing wrong with posting photos on social media. However, you should be careful with putting your pictures on “public”, as uploaded photos can carry your location data. Apps like Facebook and Instagram remove this information, but apps like Google Photos track the location of where the photo has been taken. Posting the photo online with a location tag can add the location back to a photo even if you remove the location data. This photo data can put you at risk of identity theft or online stalking if a cybercriminal were to use your pictures for these malicious purposes. To prevent this, keep your social profiles on “private” mode.

Smart Home Devices That Could Be Hacked

As homes get smarter, hackers have the chance to target them. If hackers are able to access homes, they could make sure doors remain unlocked or check your security cameras. To combat this, buy devices that are well-known and make certain that all your devices – including your router – are always up-to-date with the latest software. Also, do not keep default passwords for your smart home device accounts. Make sure your passwords are hard to guess and are not used elsewhere. For more protection, turn on two-factor authentication for your device accounts.

Google’s New Application Tools for Maps, YouTube, and Assistant Put Privacy in the Hands of Its Users

Image Source: www.iStock.com/IngusKruklitis

Just in time for National Cybersecurity Awareness Month, Google Maps, YouTube, and Google Assistant were recently announced to have new tools related to user privacy and security. The new updates to these applications give users more control over what data Google can retrieve, and even gives the option for users to delete already collected data such as within Google Voice Assistant. 

Google Maps has now included an incognito mode to keep the application from tracking which places you search for and where you travel to, this thus giving its application users more control over privacy. Incognito mode also helps to keep users’ personalized recommendations from including any locations that would otherwise be irrelevant. Android and iOS users are expected to have this feature available to their Maps application this month.

Image Source: Google | https://www.blog.google/technology/safety-security/keeping-privacy-and-security-simple-you/

 

YouTube is receiving an update as well, with users now able to choose when the app will automatically delete accumulated history. You can choose to keep your watch history for three or 18 months, or just choose to keep the data until you delete it manually.

Google Assistant is also getting an update that allows users to delete any saved voice data. By saying phrases like “Hey Google, delete the last thing I said to you,” or “Hey Google, delete everything I said to you last week,” to your device, Google Assistant will delete its “Assistant Activity”. Deleting voice data from a while back would require you to go into account settings.

After it was revealed that actual people could listen to voice recordings for the purposes of improving voice assistants, Google, Amazon, and Apple all took action to remedy the privacy situation. Alexa, for instance, was implemented with the option for consumers to choose whether recordings will be reviewed. Two months ago, Apple also stated the suspension of its Siri grading program which similarly recorded user audio. The company commented on how they would incorporate consumer participation choice in the grading program with a future update. 

Image Source: Google | https://www.blog.google/technology/safety-security/keeping-privacy-and-security-simple-you/

 

This Google Assistant feature is expected to be released in all languages by next month. The English commands will be available this month. 

Lastly, Google had released Password Checkup within its Password Manager tool. The Checkup feature notifies its users if their passwords have been compromised from a data breach, weak and need to be strengthened, or whether a password has been reused. Google will be adding this tool to Chrome soon, but users can still take advantage of the feature at passwords.google.com.

Apple Will Release a Special iPhone for Security Research Purposes

Apple will release a special modified iPhone for research purposes only. With new software installed within its operating system, this modified iPhone is set to be a part of Apple’s bug-bounty program. While Apple’s bug-bounty program was initially introduced in 2016, this is the first time such iPhones will be used for this service.  

These new iPhones will be included in Apple’s iOS Security Research Device Program and will only available to the security research team. The program supplies security researchers with this uniquely modified iPhone to which these analysts will use to help with making security-related improvements. This would make it easier for ‘experienced bug hunters’ to work on Apple products. 

These modified iPhones will have “advanced debugging capabilities and a root shell, among other modifications designed to make the software more open and accessible for researchers,” says Lisa Eadicicco of Business Insider

In August, Apple announced that the new Research Device Program is one of many updates in their bug-bounty program. They have yet to announce how many applications they will accept into this program. Apple will pay a $1 million reward to researchers who find flaws and to whoever could take control of a device with no user interaction involved. The company will expand their bug-bounty program, so it will include most of Apple’s products, such as the Apple Watch, Mac computers, and their Apple TV, in addition to the current iOS.