What are Coronavirus Contact Tracing Apps?

Two of the biggest tech companies, Google and Apple, are pairing up to build software that could tell people if they were recently in contact with someone with coronavirus. This tool is due out in a couple of months, and it will be built into iPhones and Androids. People would have to opt in to use the tool, and if they become infected, they must voluntarily report it.

coronavirusIt is pretty unusual to see these tech giants partnering up, since they are generally rivals who are constantly working to outperform the other. This shows us that the coronavirus is a pretty serious thing.

This software could be highly significant in regard to slowing down the spread of the virus. In fact, public health authorities have implied that better tracking of those stricken with coronavirus could absolutely slow the pandemic.

This all sounds well and good, but think about this, too. We can now see that two of the largest tech companies on the face of the Earth have a huge impact on our lives. A tool like this could raise some privacy issues, of course, and it won’t be the only solution, but it could help in the long run.

Tim Cook, the CEO of Apple, confirms that the goal of this software is to track the virus, but he also says that they are focused on respecting “transparency & consent.” The CEO of Google, Sundar Pichai said that the software has “strong controls and protections” in place for the privacy of the users.

With this tool, a person who has been infected with coronavirus would send a notification to an app, which would then send an alert to the phones of people who had been close to that person’s device. Sounds cool, but there is a catch; Google and Apple have to get public health authorities to agree to letting this information get accessed.

There are also a number of third-party tools already out there for contact tracing. This is why Apple and Google are stepping up and trying to reach more people. The companies also said that they would offer up the technology they were using to other apps, in order to make them even more reliable.

The goal, here, of course is to make us safer…we just have to make sure that our privacy isn’t being compromised in the process.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program and the home security expert for Porch.com

Beware of IRS Stimulus Check Scams

The IRS has been urging taxpayers to be aware of calls and emails that might lead victims to give up their personal information to cyberthieves.

IRS Commissioner, Chuck Rettig, has been urging people to take more care during this time. He reminds taxpayers that the IRS won’t ever call to verify or collect financial information in order for you to get your refund faster. The IRS will also never email taxpayers asking for this information. Fraudulent text messages are also on the rise.

Cybercriminals have always taken advantage of times of trouble, and now that we are in the throes of coronavirus, they are continuing this. While people are waiting to get their stimulus payments and tax refunds, it is extremely important to remain vigilant.

Don’t Fall for These Scams

The IRS has definitely seen many more phishing schemes. In most cases, the IRS deposits these payments directly into the bank accounts of the taxpayer. Those who have previously filed, but have not provided direct deposit information, must provide this on the IRS.gov website. If they don’t do that, the IRS will mail a paper check to the taxpayer.

It is also important to mention that the IRS has reminded those who have retired and don’t have to file a tax return that they don’t have to do anything in order to receive their stimulus check. Cybercriminals tend to focus on seniors, and they may try to reach out by mail, phone, or email and ask for information such as Social Security numbers, bank account numbers or other identifying info. The IRS will not contact these people, so don’t give any info if you are in this group.

Other Information from the IRS

The IRS is also reminding taxpayers that there are signs that something is a scam. Here are some of them:

  • The official term of the payment is “economic impact payment.” If you see terms like “Stimulus Payment” or “Stimulus Check, it’s probably a scam.
  • It is a scam if someone asks you to sign over your check to them.
  • It’s a scam if they ask you to verify your personal or financial information via phone, text, social media, mail, or email.
  • If they suggest that you can get your money faster by supplying information, it is a scam.
  • If you get a check in the mail that seems a bit off, and then you are asked to verify information online, it is a scam.

Reporting These Scams

If you believe that you might be a target or victim of a scam like this, you should do your best to report it. If you get an email, for instance, you should forward it to phishing@irs.gov.

It is also recommended that you do not engage with potential scammers on the phone or internet. There are guidelines on how to deal with this on the IRS.gov website.

Official information about the IRS and how it is dealing with the COVID-19 pandemic is also available online at the Coronavirus Tax Relief page online.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program and the home security expert for Porch.com

Protect Your Identity From Thieves

There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered.

Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix this problem immediately by investing in a password manager software. Avoid using actual words or names, or keyboard sequences. Password managers facilitate the password creation process.

Never post anything personal on social media.This includes your pet’s name, name of your kids’ school or teacher, where you’re going on vacation, the town your parents live in, etc.

Ignore e-mails whose senders you don’t know. Never click links in e-mails or open attachments you’re not expecting.

Set your phone up with a password. If it’s lost or stolen, you’ll have no worries.

Shred everything. All your credit card offers, medical records and other personal information before tossing.

Never give it out your Social Security number unless it’s absolutely mandatory like a credit application. However, just because someone says they can’t process your request without your SSN doesn’t mean you must hand it over. The objective is to minimize how much your SSN is “out there.”

Request your free credit report every year from the three major credit reporting bureaus. Refute unauthorized accounts immediately.

Inspect your statements such as credit card and banking statements every month for suspicious activity.

Use a locking mailbox or have your mail delivered to the post office and pick up.

Stop mail delivery when taking long trips.

Get a credit freeze. This is a no brainer to protect you from new account fraud.

Invest in identity theft protection. There is no cure for identity theft. But with a protection plan in place, the restoration component will fix most of what goes wrong.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program and the home security expert for Porch.com

How to Kick Your Mobile Phone Addiction

Most of us know about the tricks that advertisers play when trying to get our attention. What you might not realize, however, is that our mobile phone and other digital objects are doing something similar, and you are probably falling for it every time.

One thing that designers do is use the color red for notifications. Why? Because red triggers a natural emotional response, and that makes us want to swipe or click. This also can easily make us feel “attached” to our phones, and addiction to phones and things like social media, are very real. Don’t get caught up in this; here are some tips to help you kick your mobile phone addiction:

Turn Off Your App Notifications

Notifications are helpful, and sometimes, they are very important. However, most app notifications are not. These are the ones that are designed to get you to interact with your app. For instance, if you get a Facebook notification that someone posted something to your wall, you are likely going to check it immediately. Turn those off and check your apps when you have time.

Screen Time

In your Setting menu seek “Screen Time” and scroll through to see how much time you are spending on various apps. You can set tis up to be notified daily, but that’s also another distraction. If your Screen Time settings are telling you that you are excessively on social media, gaming, or activities that are simply mind numbing, unproductive, and might be considered addictive behaviors, stop.

Go Gray

As mentioned, color plays with our minds, and app developers know this. So, consider making your phone screen black and white, called Grayscale. On the iPhone, you can do this in the Settings app.

Clean Up Your Home Screen

You should also consider cleaning up your home screen. Only keep things you need like your calendar, map app, and email. Everything else should be moved to another screen.

Type, Don’t Tap

Also, try to get into the habit of typing in the search box for apps you want to open instead of tapping them. This gives you a second to consider if you really want to get involved with the app.

Remove Social Media Apps

You might want to take off the social media apps you have on your phone, too. You will be shocked by how much time you spend on those apps if you are like most people. You can always check later on a computer or by typing it into your browser.

Charge Your Phone Away from Your Bed

Most of us charge our phones overnight, and more often than not, we do it right on our nightstand. This makes it very easy and tempting to grab it and start using it. So, consider keeping it out of the bedroom at night.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

Your Amazon Alexa Is a Spy

Digital assistants like Google Assistant and Alexa, from Amazon, have a secret: they are secretly learning everything about you. They can hear your conversations, they know the tone of your voice, and they are recording it all.

Confidential

Now, all of this is important, according to Google and Amazon, because once these devices learn these things about you, they will work even better. However, it’s causing issues with consumers. For instance, a family reported that their Echo began spontaneously laughing at them. Another family reported that their Alexa recorded and sent a conversation to a friend without them knowing about it. Amazon claims that it’s likely the devices misheard something in the conversations and thought they were commands.

Do you want to know what your Alexa device is hearing in your home? Here’s how:

First, open up the app for Alexa, and then open menu options. Click on “Settings,” and then “History.” You should see a list of all of the commands you have ever said to Alexa, and you can sort your results to see them more clearly. If you see a note that says “text not available,” and you click it, you can hear a recording of what it picked up.

If you don’t feel comfortable having a recording in your device’s history, it is possible to delete it. You can do this in one of two ways: you can delete it directly from the device’s app, or you can go to the Amazon.com website. There, you can choose the option called “Manage Your Content and Devices.” Here, you can totally delete the information. Amazon, of course, doesn’t actually want people do to this. They claim that it will “degrade” your experience when using Alexa.

Amazon does keep these recordings, and the company claims that they record and store them to help to personalize Alexa to better cater to your household. It then uses these recordings to create a model of your voice. The device keeps a voice profile for every use that it recognizes, but after three years, it deletes the model…it does not, however, automatically delete the conversations.

For people who use Alexa a lot, it could be a big job to go through these conversations and delete what they no longer want to keep. But, it might very well be worth your time to go through them, as you never know when Echo might send those conversations elsewhere due to a miscommunication.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.