[Fox News] Quick tech tips on how to save printer ink, avoid malware, speed browsing — and more

You need a timer and you need it fast. Do a Google search for “timer” and one appears right there for you to use. There’s a stopwatch option, too. Easy, right?

Here’s another smart tech tip I’m surprised so many people mess up. Most people fill in the email recipient section before writing the message. That’s a mistake. Make that your very last step — that way, there’s a much lower chance you’ll send an email before it’s truly ready to send. 

Don’t stop there. Let’s dive into easy, quick tech tips you’ll use all the time.

REVEALED: SECRET WORDS IT PROS USE TO DESCRIBE YOU

Cybersecurity 101: After you download a PDF file online, look at the file extension. You’re looking for .pdf. If the filename ends with .exe, delete it — it’s likely malware.

Get tips like this straight to your email with my free daily newsletter. Join over 509K people and sign up here.

Shhh: You can instantly silence incoming calls on your smartphone by simply pressing the side button, volume up or volume down button once. Nice.

YouTube shortcuts: On your computer, tap keys 0 through 9 to skip to a specific percentage of the video. Press 5 for 50%, 8 for 80% and so on. But wait, there’s more! Press J to rewind and L to fast forward. (“JLo” is an easy way to remember that.) But press K to pause first.

Forgetful? Do this! Are you that person who reads an email or text, mentally reminds yourself to reply later … and never does? Stop relying on memory alone! Mark the text or email as unread. You’ll find this in the options of your email or convo. You can also say, “Hey Siri/Google, remind me to share Kim’s newsletter at noon.”

Skip the garage: Next time you hang a frame, grab your phone instead of finding a level. On iPhone, open the pre-installed Measure app. Tap Level, then hold your iPhone against an object. On Android, open the Google app and search for “bubble level.”

7 DEFAULT SETTINGS TECH COMPANIES DON’T EVER WANT YOU TO CHANGE

Perfect podcast: Get tech smarts every single day with my award-winning daily podcast. I pass along the latest tech news, tips and give advice to callers like you.

Quick text search: You know you sent someone a pic but can’t find it. On iPhone, open Messages, tap a convo then the person’s profile photo or group name. Scroll to Photos > See All. On Android, open Messages, then tap the search bar at the top.

Get perfect action shots: Touch and hold the shutter button if you have an iPhone X or earlier. Swipe the shutter button to the left if you have an iPhone Xs or later. Either way, lift your finger to stop burst mode. Select the best shots by tapping Burst > Select > Done. On Android phones, hold down your camera’s shutter button to enable burst mode.

Tab shortcuts: Here’s a faster way to navigate when you have lots of tabs open. Hit Ctrl + 1, 2, 3 and so on to go to that tab number. On Mac, it’s Command + a number. To cycle through tabs, hit Ctrl + Tab on Windows or Cmd + Tab on Mac.

Send it later: It’s 9 p.m. and you’re writing an email. Instead of sending it immediately, schedule it for the morning when you know your recipient will see it. In Gmail, click the arrow next to Send, then Schedule send. Most providers have something similar.

Getting rid of an old printer? Factory reset it to erase the details of what you’ve printed over the years (like, you know, your tax forms). Unplug the printer, then find the Reset button on the back or bottom. While holding Reset, plug it back in. Once the lights stop flashing, all your personal data has been erased.

Printer out of black ink? Change the color to #010101. It’ll look black, but it’s really 99% gray. While you’re at it, knock down the font size and switch to Courier New or Garamond. They use the least ink.

Hard refresh: Clearing the cache on your browser can fix those annoying display or loading issues in a pinch. With your browser open, hit Ctrl + Shift + R on Windows or hold down Shift + click your browser’s Refresh button (the one that looks like this — ⟳ — next to the address bar).

Keep your tech-know going 

My popular podcast is called “Kim Komando Today.” It’s a solid 30 minutes of tech news, tips, and callers with tech questions like you from all over the country. Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode.

PODCAST PICK: Google date-me docs, light bulb bans & burner email addres

All rise: Emojis have entered the court. Plus, three WFH jobs that pay $20 per hour, a popular game for kids goes woke, and a high-tech way to protect your logins that’s better than 2FA texts.

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify, or your favorite podcast player.

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, “Komando.”

Get more tech know-how on The Kim Komando Show, broadcast on 425+ radio stations and available as a podcast. Sign up for Kim’s 5-minute free morning roundup for the latest security breaches and tech news. Need help? Drop your question for Kim here.

Copyright 2023, WestStar Multimedia Entertainment. All rights reserved.

Read More 

[Fox News] Department of Defense establishes generative AI task force

The Department of Defense on Thursday announced the establishment of a generative artificial intelligence task force

Task Force Lima is an initiative that the DOD says reflects its commitment to harnessing the power of artificial intelligence in a responsible and strategic way.

The task force will play a pivotal role in analyzing and integrating generative AI tools, such as large language models, across the department.

“The establishment of Task Force Lima underlines the Department of Defense’s unwavering commitment to leading the charge in AI innovation,” Deputy Secretary of Defense Dr. Kathleen Hicks, who directed the organization of Task Force Lima, said in a release. 

WHAT IS AI?

“As we navigate the transformative power of generative AI, our focus remains steadfast on ensuring national security, minimizing risks and responsibly integrating these technologies. The future of defense is not just about adopting cutting-edge technologies, but doing so with foresight, responsibility, and a deep understanding of the broader implications for our nation,” she added. 

Task Force Lima — which is led by the Chief Digital and Artificial Intelligence Office — will assess, synchronize and employ generative AI capabilities across the department. The office, founded last year, is dedicated to integrating and optimizing artificial intelligence capabilities across the department and accelerating the department’s adoption of data, analytics and AI.

WHAT IS CHATGPT?

In addition to safeguarding national security, the task force will ensure the department remains at the forefront of such “cutting-edge” technologies.

The department said Task Force Lima will help to minimize risk and redundancy while also pursuing generative AI initiatives. The release said the department aims to enhance operations in areas including warfighting, business affairs, health, policy and readiness.

“The DOD has an imperative to responsibly pursue the adoption of generative AI models while identifying proper protective measures and mitigating national security risks that may result from issues such as poorly managed training data,” Dr. Craig Martell, the Department of Defense Chief Digital and Artificial Intelligence Officer, said. “We must also consider the extent to which our adversaries will employ this technology and seek to disrupt our own use of AI-based solutions.”

Read More 

[Fox News] Perseid meteor shower peaks this weekend with ideal conditions

The Perseid meteor shower peaks late Saturday night, with conditions ideal for skywatchers. 

NASA says its All Sky Fireball Network is already detecting the first meteors of this year’s shower as the Earth passes through the debris from the comet Swift-Tuttle. 

The peak will start at around 11 p.m. local time on Saturday, Cooke told the Associated Press.

Unlike last year’s full moon, this year’s moon will be a waning crescent, allowing even some of the fainter meteors to be visible. A bright moon can make it harder to spot the meteors. 

HUBBLE SPACE TELESCOPE FINDS BOULDERS POTENTIALLY SHAKEN OFF ASTEROID FOLLOWING DART EXPERIMENT

“People in the U.S. can reasonably expect to see around 40 Perseids in the hour just before dawn on the peak nights. That’s about one every couple of minutes, which is not bad,” Bill Cooke, who leads NASA’s Meteoroid Environment Office, said in a statement. “However, we are assuming you are out in the country, well away from cities and suburbs.”

The agency noted that last year’s shower coincided with the full moon and that brighter skies in suburban areas greatly reduce the rates, with ten or fewer expected within an hour. 

PERSEID METEOR SHOWER 2023: WHAT SKYWATCHERS SHOULD KNOW

The Perseid meteor shower is often considered the best of the year due to its high meteor rates and pleasant weather conditions. 

It is also the only meteor shower to delay a Space Shuttle launch, delaying the NASA – STS-51 launch in 1993.

Viewers can best see the meteor shower in the Northern Hemisphere. 

The Perseids appear to radiate from a point in the constellation Perseus. Meteor showers take their name from the location of their point of origin.

“All you need to catch the show is a clear sky, darkness and a bit of patience. You don’t need to look in any particular direction; meteors can generally be seen all over the sky,” NASA said. 

The Associated Press contributed to this report.

Read More 

[Fox News] Don’t fall for this Instagram art scam

Picture this: You’re sipping your morning coffee, nestled in your favorite chair, scrolling through Instagram. It’s the usual spread — cat videos, foodies showcasing their avocado toast, and your friend’s 100th vacation pic.

Among these regulars is a picture you posted yesterday. It’s nothing extravagant, just a candid shot of the city park during sunset or maybe a quirky selfie you took with that vintage hat you found.

Then – ding! A message. An account with an artistic name featuring ethereal murals and vibrant canvases has DM’d you. They praise your photo and claim it’s perfect for their next project. Even better, they’re willing to pay for it. Your eyebrows raise. Your mind races. Money for that random pic? In an era where influencers reign supreme, could this be your golden ticket?

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

Here’s the twist: After discussing payment methods, the “artist” explains some past issues with international transactions. They ask for a “few minor details” to ensure a smooth process – primarily, your full name, the primary email linked to your bank, and your bank’s name.

This may sound benign. However, with these details, scammers can potentially initiate phishing attacks, spam emails, or even fraudulent requests that could put your finances at risk. While they might not directly access your funds, they could utilize this information to try and trick you further or deceive others. 

5 WAYS TO REMOVE CREEPY CLICKBAIT ADS FROM YOUR INSTAGRAM FEED 

Moreover, banks typically have security protocols, including 2FA, to protect account holders. But remember, many scams hinge on manipulating individuals to bypass these securities willingly. 

A scammer might not drain your account with just your email and bank name, but they’re making a start. And no, typically usernames and passwords aren’t provided at this stage, but once trust is established, who knows what a victim might reveal? 

Some of these self-proclaimed art aficionados even send over checks that momentarily sparkle with legitimacy. They clear, and you might feel like you’ve just walked into a Monet sunrise. However, those checks bounce back quicker than a snap of Mona Lisa’s elusive smile.

You’re left stunned, perhaps thinking, “Was that check even real, or just another mirage in this desert of deception?” If you dare to pause or display a hint of skepticism, these scammers pivot, nudging you to wire funds via Venmo or CashApp – this should be a major red flag.

Trust, but verify: Before getting swept up in the excitement of the offer, quickly search for the person or entity reaching out. Real artists or organizations usually have a digital footprint beyond an Instagram account. 

Keep it close: Never, and I mean never, give out personal banking or identity details through DMs. If an offer seems too good to be true, it likely is. 

Consult the experts: If you’re ever considering going into a transaction, consult with someone knowledgeable. A simple review from a trusted friend or family member can save you from a scam. 

WHAT HAPPENS WHEN A CYBERCRIMINAL GETS ACCESS TO YOUR EMAIL ADDRESS?  

Report and block: If you suspect a scam, report the account to Instagram and block them. It’s a digital world equivalent of showing them the exit door. 

Go to the Profile: Click on the suspicious user’s name to view their profile 

Tap the Three Dots: Located on the top right corner of the profile page 

Choose ‘Block’: You’ll see a list of options pop up. Click on ‘Block’ and then confirm. This will prevent the user from viewing your profile or contacting you 

Contact your bank: Inform them of the suspicious activity, and they can guide you on the following steps to protect your account 

Change your passwords: Update passwords for accounts linked to the provided information. Make them complex and unique. Think about using a password manager to help you out. Check out my best expert-reviewed password managers of 2023 by heading to Cyberguy.com/Passwords 

Activate two-factor authentication (2FA): It’s an extra layer of security that will stop hackers from accessing your accounts, even if they crack your password. 

Monitor your accounts: Keep an eye on your banking and online accounts for any unusual activity 

HOW TO CHANGE YOUR PRIVACY SETTINGS ON INSTAGRAM 

Report the scam: Contact local authorities and also inform Instagram. Your report might just save someone else from the scam 

Use identity theft protection: In light of the potential risks associated with the Instagram art scam, it is important to consider taking steps to protect yourself from identity theft. Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft by heading to Cyberguy.com/IdentityTheft.

Head to their profile: Click on the username of the suspicious account. 

Tap the Three Dots: These are in the top right corner. 

Choose ‘Report’: A menu will appear. Select the ‘Report’ option. 

Follow the prompts: Instagram will guide you through a few questions to understand the reason. For scams, you’d typically select ‘It’s spam’ or the option that best describes the suspicious activity you’ve encountered. 

DON’T FALL FOR THIS SNEAKY NOTIFICATION THAT’S FOOLING PEOPLE ON FACEBOOK AND INSTAGRAM 

In the grand art gallery of Instagram, where every Joe, Jane, and their parakeet become overnight Monets, there’s a new kind of “artist” on the prowl. No, they’re not wielding paintbrushes, but rather, a palette of scams that could make even the Mona Lisa frown.

So, we’ve laid out a fancy tapestry of tips to keep those artful dodgers at bay. From the “trust but verify” waltz to the “block and report” tango, it’s a dance of digital self-defense.

But here’s the kicker: In a world where a cat playing the piano can be art, how do you keep your digital masterpiece (and your wallet) safe from these artful bamboozlers?

What’s your brushstroke of genius when navigating these murky waters? Share your masterpiece of a strategy by writing us at Cyberguy.com/Contact 

For more of my security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Copyright 2023 CyberGuy.com. All rights reserved.

Read More 

[Fox News] AI can determine personal information through AR, VR users’ motion data, studies say

People who participate in augmented and virtual realities are reportedly sharing more information than previously understood through motion data, according to researchers at U.C. Berkeley. 

In two studies published earlier this year, led by the university, authors found users can be identified using just minutes of their head and hand movements. 

Such data, which is collected, can be used to infer dozens of related characteristics, like age and disability status. 

“Users are revealing way more information than they think. They’re revealing it, not just to the device or application, but to all the other users. And there’s very little that they can do to prevent that,” Vivek Nair, the studies’ lead author and a Ph.D. student at Berkeley’s Department of Electrical Engineering and Computer Sciences, said in a release. “That makes it a particularly salient threat.”

WHAT IS AI?

Both papers were completed through U.C. Berkeley’s Center for Responsible, Decentralized Intelligence as a part of the center’s Metaverse security and privacy research effort.

One study was based on a dataset that is more than 100 times larger than those in past studies, and authors used open source data from more than 50,000 Beat Saber virtual reality gamers. The release said it demonstrated that body movements are “as singular and reliable an identifier as fingerprints.”

Researchers trained a machine learning classification model on an individual player’s motion data for 5 minutes each, finding that the model could identify that user in just 10 and 100 seconds with 73% and 94% accuracy, respectively.

In the second paper, academics created an adversarial virtual reality game aimed at collecting as much data as possible from 50 participants in a lab setting in just 10 to 20 minutes. 

WHAT IS CHATGPT?

Authors were able to accurately identify or infer more than 25 characteristics, including location, age and height. 

While, based on ethical considerations, the study did not attempt to ascertain other personal indicators like sexual or political preference, researchers believe these kinds of inferences may also be possible.

Next, Nair aims to research defensive technologies to protect users’ privacy, raising concerns about bad actors using these worlds to steal identities or expose information.

“We’ve done an extensive job of proving that there is a privacy risk here and that it is a different kind of privacy risk than what we have seen on the web,” he said. “These kinds of approaches for how to either transform the data or control who has access to it, that’s going to be our main focus moving forward.”

Privacy and security risks posed here are currently most relevant to gamers. People purchased nearly 10 million virtual reality headsets last year, according to U.C. Berkeley.

Nearly half of the participants in both studies used Meta Platforms Inc.’s Quest 2, as well as the Valve Index and other headsets. 

Meta did not immediately respond to Fox News’ request for comment.

Read More