Posted on

UPDATE : The Surveillance State: The Nefarious Use of Bluetooth Tracking Devices

bluetoothtracker 2048px 3233 2x1 1

Image Source: New York Times

the staff of the Ridgewood blog

Ridgewood NJ, a swimsuit model says she was stalked by a stranger who slipped an Apple AirTag tracker into her coat pocket before following her for five hours.

Brooks Nader, 26, claims the disturbing incident occurred Wednesday night while she was out in New York City, and she only realized it when her iPhone alerted her to the fact that an “unknown accessory” was moving with her.

it is inevitable that items—such as keys, wallets, purses, and bags—may be lost or misplaced. To help prevent this, users can attach tracking devices to everyday items and connect them to a smart device via Bluetooth. Then, if items are lost or misplaced, users can use an app to search for them and determine their location with impressive accuracy. If the tracking devices are within Bluetooth range, the app can easily trigger an audible alert to help locate them. If the tracking devices are not within range, the app leverages nearby smart devices to transmit their location and send alert notifications to the owner and/or finder. There are multiple Bluetooth tracking devices to choose from, such as Apple AirTags and Tile tracker tags. Although their use can be a positive, legitimate, and convenient way to keep track of items, tracking devices have the potential for intentional misuse and abuse. We explore how perpetrators may use these tracking devices for nefarious purposes—committing malicious cyber activity, impacting personal safety, and enabling auto theft.

Continue reading UPDATE : The Surveillance State: The Nefarious Use of Bluetooth Tracking Devices

Posted on

Who is Spying On You?

external content.duckduckgo 45

the staff of the Ridgewood blog

What is Spyware?

Spyware refers to malicious software often used to monitor, capture, and share detail information from computers, phones, or other devices. It can collect emails, social media posts, call logs, messages on encrypted chat apps, contacts, usernames and passwords, notes, and documents such as photos, videos, and audio recordings. It can also collect GPS information to determine a user’s location, movement, and direction. Some spyware can also activate microphones and cameras as well as deliver files without any indicators or notifications to users. Spyware can be simple or sophisticated and rely on security weaknesses or unpatched software vulnerabilities. Although device and file encryption are recommended, it cannot assist in preventing spyware activity because once the encrypted message is delivered to the device, it is decrypted and made readable by both the user and the spyware.

Continue reading Who is Spying On You?

Posted on

Local Police Warn of Motor Vehicle Commission Phishing Scam

unnamed 1

 

the staff of the Ridgewood blog

Ridgewood NJ, local Police are warning people about possible identity thieves sending text messages posing as the state Motor Vehicle Commission in a phishing scam.

Continue reading Local Police Warn of Motor Vehicle Commission Phishing Scam

Posted on

Cyber Risks Associated with Traveling

external content.duckduckgo 19

the staff of the Ridgewood blog

Ridgewood NJ, many people travel for business or leisure purposes year-round to local destinations or around the globe. As people travel and access public networks, they are exposed to various cyber risks. The NJCCIC reminds users to be aware of the cyber risks associated with traveling and to employ best practices to stay safe while they are away. Users are encouraged to review the recommendations for the security of devices, accounts, networks, vehicles, and international travel.

Continue reading Cyber Risks Associated with Traveling

Posted on

Time to Update those Passwords

password infographic

the staff of the Ridgewood blog, we know we are a day late !

Ridgewood NJ, The first Thursday in May is World Password Day, which was originally created by Intel in 2013 as a global effort to address the critical need for strong, unique passwords and emphasize the importance of this first line of defense in securing information, networks, servers, devices, accounts, databases, files, and more against cyberattacks. This day also serves as a reminder to update and organize all recent passwords. Now more than ever before, many users are connected to the internet and access multiple accounts and services for business, including email, applications, and vendor websites. Users also have access to multiple personal accounts, such as email, social media, online banking, bill payment, utilities, healthcare, shopping, entertainment, food delivery, dating apps, and more. The increased use of online accounts and services, combined with users engaging in risky password management practices, puts both themselves and employers at risk of account compromise and data breaches. Therefore, it is important to practice good password hygiene to protect accounts and data, not just on World Password Day, but year-round.

Continue reading Time to Update those Passwords