Run out of data before you run out of month? These tweaks will help [Read more…] about Episode 54 Data Savers
Be warned parents and Android users: If you download “Fortnite” on an Android device, you’re installing a fake app from a malware developer. [Read more…] about Episode 53 Fake Fortnite and How to Insta Like a Star
A Washington couple discovers their Amazon Alexa device secretly recorded one of their random conversations and sent it as a message to one of their contacts. And she’s recorded you too!!
In this podcast we explain how and why this happens and how to see everything Alexa has ever recorded when you’ve been talking.
This is a departure from the usual topic of What the Tech? but I was thinking today about the pros and cons of working remotely. Technology makes it very easy for many people to work from wherever they want to be. All you need is a laptop and internet connection and many people can do everything they do in the office.
In this podcast, I talk about working remotely, which I have for the past 14 years. How to weigh the freedom and more time with being all alone for 8 hours a day. Do you have a dream of starting your own business? Do you want to leave the corporate job to work for yourself?
Here are some of the things I’ve discovered in the decade-plus of working solo. Plus a little background on how I got here.
Seriously. Do you have a problem?
How do you know? Take this quiz and hear from a recovering addict.
Talked to a Samsung customer service rep today, she didn’t know what I should do about a Note 7 because I purchased it from Samsung.com
Oh brother, this is bad
How well do you know your Facebook friends?
Some of them may not be your friends at all, and could be putting your information and identity at risk.
It’s happening more often on the social network.
Con-artists use the social network to get all kinds of information on unsuspecting people who accept friend requests from strangers.
A typical scam involves an imposter setting up an account and friending someone at random. When they accept, they are able to send other requests to their friends and will often use one of those friends profile photo and information to set up an identical but fake account.
Then the fraudster will send out multiple requests from that person’s list of friends.
By accepting a fried request from one of these con-artists, the Facebook user grants permission for the faker to gain access to any and all information they’ve posted to Facebook. That include email addresses, phone numbers, family members, photos, education, workplace and address which is enough to get started on stealing a person’s identity.
While it is rare, other incidents involve the unkown friend to monitor when someone is out of town and have broken into homes using this tactic.
There are signs to look for to determine whether a friend request is coming from an actual person:
- Has the Facebook user posted more than a few updates? Facebook does catch on to fake profiles and will shut them down. A profile with only a few posts and few friends is likely a fake.
- What does the profile photo look like? Most times the fraudster will steal a photo they find online. It is often of a pretty girl. The fake profile we found used a photo from a model stolen from a website.
- To check the photo, go to www.tineye.com to search the web for where the photo has been used before.