<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Geeks for your information - Avast Blog News and Info]]></title>
		<link>https://www.geeks.fyi/</link>
		<description><![CDATA[Geeks for your information - https://www.geeks.fyi]]></description>
		<pubDate>Sun, 03 May 2026 22:24:26 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Fake e-Shop scams — How cybercriminals are cashing it in]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=20637</link>
			<pubDate>Tue, 25 Feb 2025 11:21:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1295">jasonX</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=20637</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><span style="color: #0080ff;" class="mycode_color">Fake e-Shop scams — How cybercriminals are cashing it in</span></span></span></div>
 <br />
<div style="text-align: center;" class="mycode_align">
<img src="https://i.imgur.com/dIXfNdA.png" loading="lazy"  alt="[Image: dIXfNdA.png]" class="mycode_img" /><br />
<br />
<br />
<br />
Shopping scams involve fraudsters setting up fake online stores or apps aiming to fool you. Often they are advertised through social media or other genuine sites and yes, these fake stores appear in search engine results. Most or all of these 'fake stores and shops' showcase items at temptingly low prices. Avast's Nyrmah J. Reina shares us info/tips about 'Fake e-Shop scams[/i]</div>
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">The holiday season may be over, but cybercriminals aren’t done shopping for victims. Check out how you can stay protected from these scams that put your payment details and personal data at risk.</span><br />
<br />
<br />
Our researchers <span style="font-style: italic;" class="mycode_i">(Avast researchers)</span>  first detected a <a href="https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops" target="_blank" rel="noopener" class="mycode_url">surge in fake e-shop scams</a> preying on bargain-hunting consumers during Black Friday and Christmas shopping sprees. However, just because the holiday season ended, doesn’t mean that shoppers are off the hook.  <br />
<br />
According to the <a href="https://www.gendigital.com/blog/insights/reports/threat-report-q4-2024" target="_blank" rel="noopener" class="mycode_url">Gen Q4/2024 Threat Report</a>, fake e-shops accounted for 23% of all social media scams. Those are staggering numbers. If you shopped online in the last few months, you might have been one click away from a scammer’s trap. <br />
<br />
The impact goes beyond losing money on a never-arriving package. These scams steal personal data, payment details, and even identities, leaving victims with empty wallets — and sometimes with long-term financial damage. But don’t fret! Here’s how these scams work, and more importantly, how you can help protect yourself.  <br />
<br />
<span style="font-weight: bold;" class="mycode_b">More than just a bad purchase</span><br />
<br />
Fake e-shops look like legitimate online stores, but instead of delivering your order, they deliver fraud, financial loss, and identity theft. Something to note is that most fake e-shops follow a tried-and-true formula. Here’s how they operate: <br />
 <ul class="mycode_list"><li>Step 1: The too-good-to-be-true deal <br />
<br />
- You see an ad for an expensive item at an unbelievable price. <br />
- These ads often appear on Facebook, Instagram, YouTube, and even Google search results. <br />
- Many use AI-generated ads and fake reviews to make their sites look more convincing.  <br />
<br />
</li>
<li>Step 2: Fake website, real payments <br />
- The scam website looks professional, with stolen images, fake customer reviews, and even trust badges. <br />
- Victims enter their credit card information and personal details to complete the purchase. <br />
<br />
</li>
<li>Step 3: Vanishing act <br />
- After payment, the customer never receives the product, or they get a low-quality counterfeit. <br />
- The scam site shuts down within weeks, leaving victims with no way to get a refund. <br />
<br />
</li>
<li>Step 4: Identity theft and fraud <br />
- The stolen credit card details are used for unauthorized purchases or sold on the dark web. <br />
- Personal data — think email, phone number, and address — is used for future <a href="https://www.avast.com/c-phishing" target="_blank" rel="noopener" class="mycode_url">phishing scams</a> or <a href="https://www.avast.com/c-prevent-identity-theft" target="_blank" rel="noopener" class="mycode_url">identity theft</a>. <br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Where are fake e-shops popping up?</span><br />
<br />
Scammers don’t just rely on random website traffic. They use highly targeted methods to trick victims, like: <br />
 <ul class="mycode_list"><li>Social media ads: Facebook and Instagram are hotspots for fake e-shop promotions. <br />
</li>
<li>Poisoned Google Search results: Scammers manipulate search engines to push fake stores to the top. <br />
</li>
</ul>
</blockquote>
 <br />
<div style="text-align: center;" class="mycode_align">
<span style="font-weight: bold;" class="mycode_b"><a href="https://blog.avast.com/threat-intelligence-fake-e-shops-scams" target="_blank" rel="noopener" class="mycode_url">Read FULL article HERE</a></span><br />
<br />
<span style="font-style: italic;" class="mycode_i"><span style="font-size: small;" class="mycode_size">Info derived and lifted from Avast Blog with permission</span></span></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><span style="color: #0080ff;" class="mycode_color">Fake e-Shop scams — How cybercriminals are cashing it in</span></span></span></div>
 <br />
<div style="text-align: center;" class="mycode_align">
<img src="https://i.imgur.com/dIXfNdA.png" loading="lazy"  alt="[Image: dIXfNdA.png]" class="mycode_img" /><br />
<br />
<br />
<br />
Shopping scams involve fraudsters setting up fake online stores or apps aiming to fool you. Often they are advertised through social media or other genuine sites and yes, these fake stores appear in search engine results. Most or all of these 'fake stores and shops' showcase items at temptingly low prices. Avast's Nyrmah J. Reina shares us info/tips about 'Fake e-Shop scams[/i]</div>
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">The holiday season may be over, but cybercriminals aren’t done shopping for victims. Check out how you can stay protected from these scams that put your payment details and personal data at risk.</span><br />
<br />
<br />
Our researchers <span style="font-style: italic;" class="mycode_i">(Avast researchers)</span>  first detected a <a href="https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops" target="_blank" rel="noopener" class="mycode_url">surge in fake e-shop scams</a> preying on bargain-hunting consumers during Black Friday and Christmas shopping sprees. However, just because the holiday season ended, doesn’t mean that shoppers are off the hook.  <br />
<br />
According to the <a href="https://www.gendigital.com/blog/insights/reports/threat-report-q4-2024" target="_blank" rel="noopener" class="mycode_url">Gen Q4/2024 Threat Report</a>, fake e-shops accounted for 23% of all social media scams. Those are staggering numbers. If you shopped online in the last few months, you might have been one click away from a scammer’s trap. <br />
<br />
The impact goes beyond losing money on a never-arriving package. These scams steal personal data, payment details, and even identities, leaving victims with empty wallets — and sometimes with long-term financial damage. But don’t fret! Here’s how these scams work, and more importantly, how you can help protect yourself.  <br />
<br />
<span style="font-weight: bold;" class="mycode_b">More than just a bad purchase</span><br />
<br />
Fake e-shops look like legitimate online stores, but instead of delivering your order, they deliver fraud, financial loss, and identity theft. Something to note is that most fake e-shops follow a tried-and-true formula. Here’s how they operate: <br />
 <ul class="mycode_list"><li>Step 1: The too-good-to-be-true deal <br />
<br />
- You see an ad for an expensive item at an unbelievable price. <br />
- These ads often appear on Facebook, Instagram, YouTube, and even Google search results. <br />
- Many use AI-generated ads and fake reviews to make their sites look more convincing.  <br />
<br />
</li>
<li>Step 2: Fake website, real payments <br />
- The scam website looks professional, with stolen images, fake customer reviews, and even trust badges. <br />
- Victims enter their credit card information and personal details to complete the purchase. <br />
<br />
</li>
<li>Step 3: Vanishing act <br />
- After payment, the customer never receives the product, or they get a low-quality counterfeit. <br />
- The scam site shuts down within weeks, leaving victims with no way to get a refund. <br />
<br />
</li>
<li>Step 4: Identity theft and fraud <br />
- The stolen credit card details are used for unauthorized purchases or sold on the dark web. <br />
- Personal data — think email, phone number, and address — is used for future <a href="https://www.avast.com/c-phishing" target="_blank" rel="noopener" class="mycode_url">phishing scams</a> or <a href="https://www.avast.com/c-prevent-identity-theft" target="_blank" rel="noopener" class="mycode_url">identity theft</a>. <br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Where are fake e-shops popping up?</span><br />
<br />
Scammers don’t just rely on random website traffic. They use highly targeted methods to trick victims, like: <br />
 <ul class="mycode_list"><li>Social media ads: Facebook and Instagram are hotspots for fake e-shop promotions. <br />
</li>
<li>Poisoned Google Search results: Scammers manipulate search engines to push fake stores to the top. <br />
</li>
</ul>
</blockquote>
 <br />
<div style="text-align: center;" class="mycode_align">
<span style="font-weight: bold;" class="mycode_b"><a href="https://blog.avast.com/threat-intelligence-fake-e-shops-scams" target="_blank" rel="noopener" class="mycode_url">Read FULL article HERE</a></span><br />
<br />
<span style="font-style: italic;" class="mycode_i"><span style="font-size: small;" class="mycode_size">Info derived and lifted from Avast Blog with permission</span></span></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Start the year by protecting your privacy— A stalkerware quick check from Avast Blog]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=20527</link>
			<pubDate>Sun, 26 Jan 2025 04:49:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1295">jasonX</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=20527</guid>
			<description><![CDATA[<div style="text-align: left;" class="mycode_align">
<div style="text-align: center;" class="mycode_align"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Start the year by protecting your privacy— A stalkerware quick check</span></span></div>
 <br />
<div style="text-align: center;" class="mycode_align">
<img src="https://i.imgur.com/IOWIm5b.png" loading="lazy"  alt="[Image: IOWIm5b.png]" class="mycode_img" /><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Keep your personal life personal—essential tips to spot and stop stalkerware in 2025</span></div>
<br />
Imagine starting the New Year with hopes of a fresh start, only to realize that someone might be tracking your every move without your consent. Disconcerting, to say the least.  <br />
<br />
Bad actors can do this using stalkerware, a sinister form of spyware that secretly monitors a person’s activities and takes away their privacy. But that’s not all. With location-sharing apps being the norm, the tracking risks increase. <br />
<br />
With this in mind, it’s important to take the necessary precautions to help protect yourself. Here’s what you need to know: The growing threat of stalkerware. <br />
<br />
Stalkerware isn’t new, but its use surged during the pandemic as more people turned to digital means to exert control over others. In fact, the total number of global users protected from stalkerware and spyware in 2024 has more than doubled (228%) when compared to pre-pandemic levels in 2020, according to our experts.  <br />
<br />
Unlike traditional spyware, stalkerware is often installed with malicious intent by someone known to the victim, such as a partner or family member, to track their whereabouts, communications, and more.  <br />
<br />
Also, the popularity of location-sharing features has added a new layer of risk. Many users unknowingly leave location-sharing settings on, exposing themselves to potential monitoring.  <br />
<br />
<span style="font-weight: bold;" class="mycode_b">A 5-point privacy shield</span><br />
<br />
Stalkerware may be a serious threat, but there are things you can do to help protect yourself. Here are 5 tips you can do to help shield yourself from stalkerware:   <br />
 <ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Check your app permissions.</span><br />
Stalkerware requires various permissions to function, such as access to SMS, call logs, contacts, and location. Regularly check the permissions granted to your apps and remove anything unusual or from apps you don’t recognize. <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Audit your location sharing.</span><br />
Location sharing is a convenient feature but can also be risky. Review who you’re sharing your location with, especially if it’s been a while. Also, If it doesn’t make sense for an app to have location access, revoke it.    <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Review your app list.</span><br />
Go through your installed apps and look for anything suspicious. Stalkerware apps often disguise themselves by hiding their icons or pretending to be harmless utilities like Notes or WiFi apps.   <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Watch for performance red flags.</span><br />
If your phone’s battery drains unusually fast, you notice sudden error messages, or experience strange requests for permissions, it could indicate stalkerware. Keep an eye out for any unusual behavior. <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Install security software.</span>  <br />
Use security solutions— think Avast One— to scan your phone for known malicious apps, including stalkerware and spyware. Regular scans can help you identify and remove potential threats. <br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><a href="https://blog.avast.com/start-the-year-by-protecting-your-privacy-a-stalkerware-quick-check" target="_blank" rel="noopener" class="mycode_url">More info HERE</a></span><br />
<br />
<span style="font-size: small;" class="mycode_size"><span style="font-style: italic;" class="mycode_i">Content lifted from Avast Blog - penned by Emily Lockwood - 21 Jan 2025</span></span><br />
</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: left;" class="mycode_align">
<div style="text-align: center;" class="mycode_align"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Start the year by protecting your privacy— A stalkerware quick check</span></span></div>
 <br />
<div style="text-align: center;" class="mycode_align">
<img src="https://i.imgur.com/IOWIm5b.png" loading="lazy"  alt="[Image: IOWIm5b.png]" class="mycode_img" /><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Keep your personal life personal—essential tips to spot and stop stalkerware in 2025</span></div>
<br />
Imagine starting the New Year with hopes of a fresh start, only to realize that someone might be tracking your every move without your consent. Disconcerting, to say the least.  <br />
<br />
Bad actors can do this using stalkerware, a sinister form of spyware that secretly monitors a person’s activities and takes away their privacy. But that’s not all. With location-sharing apps being the norm, the tracking risks increase. <br />
<br />
With this in mind, it’s important to take the necessary precautions to help protect yourself. Here’s what you need to know: The growing threat of stalkerware. <br />
<br />
Stalkerware isn’t new, but its use surged during the pandemic as more people turned to digital means to exert control over others. In fact, the total number of global users protected from stalkerware and spyware in 2024 has more than doubled (228%) when compared to pre-pandemic levels in 2020, according to our experts.  <br />
<br />
Unlike traditional spyware, stalkerware is often installed with malicious intent by someone known to the victim, such as a partner or family member, to track their whereabouts, communications, and more.  <br />
<br />
Also, the popularity of location-sharing features has added a new layer of risk. Many users unknowingly leave location-sharing settings on, exposing themselves to potential monitoring.  <br />
<br />
<span style="font-weight: bold;" class="mycode_b">A 5-point privacy shield</span><br />
<br />
Stalkerware may be a serious threat, but there are things you can do to help protect yourself. Here are 5 tips you can do to help shield yourself from stalkerware:   <br />
 <ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Check your app permissions.</span><br />
Stalkerware requires various permissions to function, such as access to SMS, call logs, contacts, and location. Regularly check the permissions granted to your apps and remove anything unusual or from apps you don’t recognize. <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Audit your location sharing.</span><br />
Location sharing is a convenient feature but can also be risky. Review who you’re sharing your location with, especially if it’s been a while. Also, If it doesn’t make sense for an app to have location access, revoke it.    <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Review your app list.</span><br />
Go through your installed apps and look for anything suspicious. Stalkerware apps often disguise themselves by hiding their icons or pretending to be harmless utilities like Notes or WiFi apps.   <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Watch for performance red flags.</span><br />
If your phone’s battery drains unusually fast, you notice sudden error messages, or experience strange requests for permissions, it could indicate stalkerware. Keep an eye out for any unusual behavior. <br />
<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Install security software.</span>  <br />
Use security solutions— think Avast One— to scan your phone for known malicious apps, including stalkerware and spyware. Regular scans can help you identify and remove potential threats. <br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><a href="https://blog.avast.com/start-the-year-by-protecting-your-privacy-a-stalkerware-quick-check" target="_blank" rel="noopener" class="mycode_url">More info HERE</a></span><br />
<br />
<span style="font-size: small;" class="mycode_size"><span style="font-style: italic;" class="mycode_i">Content lifted from Avast Blog - penned by Emily Lockwood - 21 Jan 2025</span></span><br />
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: How to know a student loan scam when you see one]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16226</link>
			<pubDate>Sun, 03 Oct 2021 07:53:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16226</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/student-loan-scam.jpg" loading="lazy"  alt="[Image: student-loan-scam.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">These are the red flags related to student loan fraud to be on the lookout for</span><br />
<br />
On August 6, 2021, the U.S. Department of Education announced a final extension of the student loan payment pause until January 31, 2022.<br />
<br />
The pause includes the following relief measures for eligible loans:<ul class="mycode_list"><li>    A suspension of loan payments<br />
</li>
<li>    A 0% interest rate<br />
</li>
<li>    Stopped collections on defaulted loans<br />
</li>
</ul>
While this is great news for many, there’s no doubt that fraudsters will use the pause to prey upon student borrowers. Tempting offers of instant loan repayment or special-access official financial aid services may arrive through emails, letters, phone calls, or texts. Be wise and don’t take the bait. When ads are aggressively trying to get you to buy into a loan program, chances are they aren’t coming from the U.S. Department of Education or its partners. Usually these types of companies aren’t offering any services at all — they're just after your money.<br />
<br />
Here are five warning signs that a fake student loan debt relief company may be trying to scam you:<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">1. They ask for money </span></span><br />
<br />
p-front payments, hidden monthly fees, and requests for credit card numbers or bank account information are all red flags that you are the target of a scam. Since 1996, it’s been illegal to charge in advance for help obtaining or repaying a student loan.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color">2. They force a quick decision</span></span><br />
<br />
Shady salesmen love to rush you into saying yes while your head is spinning with new information. If you aren’t being given the time to research your options, just say no and walk away. If it’s a limited-time opportunity, chances are you could find the same thing elsewhere for free.<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">3. They ask for personal ID information</span> </span><br />
<br />
Never share your FSA ID or sign a power of attorney. That’s like giving someone your credit card, passport, and driver’s license. Also, beware of sharing your Social Security Number, name, and date of birth. This information can easily be used to steal your identity or apply for a FSA ID and take out a loan using your name. <br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">4. They have a patriotic logo and official sounding name</span> </span><br />
<br />
Any student loan services company that uses words like “national,” “federal,” “direct,” or has an eagle or tree logo that resembles the U.S Department of Education seal, be wary. Companies that claim to have special access or federal privileged arrangements are lying. Go directly to the <a href="https://www.ed.gov/" target="_blank" rel="noopener" class="mycode_url">government website</a> for great (as well as often free) information and resources.<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">5. They promise quick or total loan forgiveness</span></span><br />
<br />
It’s just not possible to give someone immediate debt reduction or cancelation. Most government forgiveness programs require years of qualifying payments and/or employment in certain fields. There are no “special deals.” Payment levels are set by federal law.<br />
<br />
The U.S. Department of Education provides help for free. <br />
<br />
Call the Federal Student Aid Information Center at 1-800-4-FED-AID (1-800-433-3243) or visit the government's <a href="https://studentaid.gov/understand-aid/types/loans" target="_blank" rel="noopener" class="mycode_url">student loans website</a>.<br />
<br />
Read more about the coronavirus student loan payment pause on <a href="https://studentaid.gov/announcements-events/coronavirus" target="_blank" rel="noopener" class="mycode_url">the government's dedicated webpage</a>.<br />
...</blockquote>
<a href="https://blog.avast.com/warning-signs-of-student-loan-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/student-loan-scam.jpg" loading="lazy"  alt="[Image: student-loan-scam.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">These are the red flags related to student loan fraud to be on the lookout for</span><br />
<br />
On August 6, 2021, the U.S. Department of Education announced a final extension of the student loan payment pause until January 31, 2022.<br />
<br />
The pause includes the following relief measures for eligible loans:<ul class="mycode_list"><li>    A suspension of loan payments<br />
</li>
<li>    A 0% interest rate<br />
</li>
<li>    Stopped collections on defaulted loans<br />
</li>
</ul>
While this is great news for many, there’s no doubt that fraudsters will use the pause to prey upon student borrowers. Tempting offers of instant loan repayment or special-access official financial aid services may arrive through emails, letters, phone calls, or texts. Be wise and don’t take the bait. When ads are aggressively trying to get you to buy into a loan program, chances are they aren’t coming from the U.S. Department of Education or its partners. Usually these types of companies aren’t offering any services at all — they're just after your money.<br />
<br />
Here are five warning signs that a fake student loan debt relief company may be trying to scam you:<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">1. They ask for money </span></span><br />
<br />
p-front payments, hidden monthly fees, and requests for credit card numbers or bank account information are all red flags that you are the target of a scam. Since 1996, it’s been illegal to charge in advance for help obtaining or repaying a student loan.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color">2. They force a quick decision</span></span><br />
<br />
Shady salesmen love to rush you into saying yes while your head is spinning with new information. If you aren’t being given the time to research your options, just say no and walk away. If it’s a limited-time opportunity, chances are you could find the same thing elsewhere for free.<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">3. They ask for personal ID information</span> </span><br />
<br />
Never share your FSA ID or sign a power of attorney. That’s like giving someone your credit card, passport, and driver’s license. Also, beware of sharing your Social Security Number, name, and date of birth. This information can easily be used to steal your identity or apply for a FSA ID and take out a loan using your name. <br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">4. They have a patriotic logo and official sounding name</span> </span><br />
<br />
Any student loan services company that uses words like “national,” “federal,” “direct,” or has an eagle or tree logo that resembles the U.S Department of Education seal, be wary. Companies that claim to have special access or federal privileged arrangements are lying. Go directly to the <a href="https://www.ed.gov/" target="_blank" rel="noopener" class="mycode_url">government website</a> for great (as well as often free) information and resources.<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">5. They promise quick or total loan forgiveness</span></span><br />
<br />
It’s just not possible to give someone immediate debt reduction or cancelation. Most government forgiveness programs require years of qualifying payments and/or employment in certain fields. There are no “special deals.” Payment levels are set by federal law.<br />
<br />
The U.S. Department of Education provides help for free. <br />
<br />
Call the Federal Student Aid Information Center at 1-800-4-FED-AID (1-800-433-3243) or visit the government's <a href="https://studentaid.gov/understand-aid/types/loans" target="_blank" rel="noopener" class="mycode_url">student loans website</a>.<br />
<br />
Read more about the coronavirus student loan payment pause on <a href="https://studentaid.gov/announcements-events/coronavirus" target="_blank" rel="noopener" class="mycode_url">the government's dedicated webpage</a>.<br />
...</blockquote>
<a href="https://blog.avast.com/warning-signs-of-student-loan-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Latest Avast Blog entries]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16207</link>
			<pubDate>Thu, 30 Sep 2021 11:39:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16207</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://blog.avast.com/avoid-behaviors-that-endanger-your-kids-digital-identity-avast" target="_blank" rel="noopener" class="mycode_url">How does your kid’s identity get stolen?</a><br />
<br />
<a href="https://blog.avast.com/anonymization-vs.-pseudonymization-avast" target="_blank" rel="noopener" class="mycode_url">Anonymization vs. pseudonymization: The lingering data risk</a><br />
<br />
<a href="https://blog.avast.com/are-user-records-of-3.8-billion-clubhouse-and-facebook-users-for-sale" target="_blank" rel="noopener" class="mycode_url">Are user records of 3.8 billion Clubhouse and Facebook users for sale?</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://blog.avast.com/avoid-behaviors-that-endanger-your-kids-digital-identity-avast" target="_blank" rel="noopener" class="mycode_url">How does your kid’s identity get stolen?</a><br />
<br />
<a href="https://blog.avast.com/anonymization-vs.-pseudonymization-avast" target="_blank" rel="noopener" class="mycode_url">Anonymization vs. pseudonymization: The lingering data risk</a><br />
<br />
<a href="https://blog.avast.com/are-user-records-of-3.8-billion-clubhouse-and-facebook-users-for-sale" target="_blank" rel="noopener" class="mycode_url">Are user records of 3.8 billion Clubhouse and Facebook users for sale?</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast_Blog_Privacy: The dangers of government use of biometric data]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16130</link>
			<pubDate>Sun, 19 Sep 2021 07:25:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16130</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/biometric-data.jpg" loading="lazy"  alt="[Image: biometric-data.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">The adoption of biometric data usage by governments opens the door to a dystopian future</span><br />
<br />
One of the important pieces of information that has come out of the US-led withdrawal from Afghanistan is that some of the equipment left behind was used for a <a href="https://theintercept.com/2021/08/17/afghanistan-taliban-military-biometrics/" target="_blank" rel="noopener" class="mycode_url">biometric data collection program</a>. The US military had used devices to capture fingerprints, iris scans, and facial images to build a database of the Afghan population to help fight terrorists.<br />
<br />
This Handheld Interagency Identity Detection Equipment, referred to as HIIDE, is now in the possession of the Taliban, and it is feared that this information will now be used to track down Afghan citizens who aided the US and its allies. This demonstrates the danger of collection of sensitive biometric personal data and emphasizes the fact that it needs to be minimized. Inevitably, personal data <a href="https://blog.avast.com/t-mobile-data-breach-avast" target="_blank" rel="noopener" class="mycode_url">is leaked</a> or accessed by unauthorized individuals. In recent years, data leaks have been occurring with increasing frequency. However, this is not stopping world governments or large corporations from collecting high sensitive biometric data.<br />
<br />
The collection of biometric data is actually increasing as well. <br />
<br />
The <a href="https://www.gao.gov/products/gao-21-526" target="_blank" rel="noopener" class="mycode_url">US government accountability office lists</a> 24 federal agencies that are currently using or planning to use facial recognition technology. Six of those agencies mention that they will use it for domestic law enforcement.<br />
<br />
As an example, certain individuals have submitted to having their faces scanned to board a plane at the airport. This technology is rife with privacy concerns, as it could easily lead to mass surveillance and false arrests. Some states within the US have already banned the use of facial recognition technology due to these concerns, but most have not. Certainly, this technology has the potential to be very useful for law enforcement agencies — preventing terrorist attacks or tracking criminals to arrest them as well — but it comes at significant cost to personal privacy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Popular devices that collect biometric data</span><br />
<br />
Apple Watch, Fitbit, and other devices have been collecting their users’ data for years. Recently the Wall Street <a href="https://www.wsj.com/articles/apple-plans-blood-pressure-measure-wrist-thermometer-in-watch-11630501201?st=gnv7lxcz8rp1j8x&amp;reflink=article_email_share" target="_blank" rel="noopener" class="mycode_url">reported</a> that Apple watches will soon be able to record blood pressure and body temperature to help with fertility planning. The increasing collection of sensitive health and biometric data is concerning. It is just as likely that the data will be used for <a href="https://blog.avast.com/internet-price-discrimination-avast" target="_blank" rel="noopener" class="mycode_url">price discrimination</a> (charging someone a higher price due to some personal information the company is aware of) as advancing diagnosis and treatment of various illnesses.<br />
<br />
When it comes to data collected through personal devices, at least individuals have the option not to wear a smartwatch or carry a smartphone with them everywhere they go. However, when a surveillance state leverages facial recognition technology to track its citizens or requires facial scans to get access to essential services like public housing or healthcare, biometric data collection is nearly impossible to avoid. Imagine leaving your apartment to go visit a family member and knowing that the government is able to track you the entire way. This is a stunning example of how invasive technology could be used to destroy any notion of personal privacy.<br />
<br />
We applaud the efforts of governments that are banning the use of facial recognition technology and hope that other countries and states follow suit. It's a dangerous precedent to allow the mass collection of biometric data, no matter how noble the goal. The technology is too easily repurposed for something dangerous to civil liberties. We're already seeing countries like China require face scans for its citizens to access public housing, and now they plan to make <a href="https://www.theverge.com/2021/7/9/22567029/tencent-china-facial-recognition-honor-of-kings-game-for-peace" target="_blank" rel="noopener" class="mycode_url">children scan in order to play online video games</a>. Perhaps children are better off spending less time online gaming, but nevertheless, we believe that the bad outweighs the good, as personal privacy is greatly diminished.<br />
<br />
Ben Franklin is often quoted as saying, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”<br />
<br />
This notion is especially relevant in the context of government surveillance. We know that governments with this much power over their citizens are likely to abuse it.<br />
<br />
If you want to push back against these types of data collection practices, you can voice your concerns to your local politicians and policymakers. Additionally, you can take conscious steps to anonymize yourself in public (like wearing a facial mask or hat), and importantly, opt out of as many data collection settings on your personal devices as possible.<br />
...</blockquote>
<a href="https://blog.avast.com/government-use-of-biometric-data-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/biometric-data.jpg" loading="lazy"  alt="[Image: biometric-data.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">The adoption of biometric data usage by governments opens the door to a dystopian future</span><br />
<br />
One of the important pieces of information that has come out of the US-led withdrawal from Afghanistan is that some of the equipment left behind was used for a <a href="https://theintercept.com/2021/08/17/afghanistan-taliban-military-biometrics/" target="_blank" rel="noopener" class="mycode_url">biometric data collection program</a>. The US military had used devices to capture fingerprints, iris scans, and facial images to build a database of the Afghan population to help fight terrorists.<br />
<br />
This Handheld Interagency Identity Detection Equipment, referred to as HIIDE, is now in the possession of the Taliban, and it is feared that this information will now be used to track down Afghan citizens who aided the US and its allies. This demonstrates the danger of collection of sensitive biometric personal data and emphasizes the fact that it needs to be minimized. Inevitably, personal data <a href="https://blog.avast.com/t-mobile-data-breach-avast" target="_blank" rel="noopener" class="mycode_url">is leaked</a> or accessed by unauthorized individuals. In recent years, data leaks have been occurring with increasing frequency. However, this is not stopping world governments or large corporations from collecting high sensitive biometric data.<br />
<br />
The collection of biometric data is actually increasing as well. <br />
<br />
The <a href="https://www.gao.gov/products/gao-21-526" target="_blank" rel="noopener" class="mycode_url">US government accountability office lists</a> 24 federal agencies that are currently using or planning to use facial recognition technology. Six of those agencies mention that they will use it for domestic law enforcement.<br />
<br />
As an example, certain individuals have submitted to having their faces scanned to board a plane at the airport. This technology is rife with privacy concerns, as it could easily lead to mass surveillance and false arrests. Some states within the US have already banned the use of facial recognition technology due to these concerns, but most have not. Certainly, this technology has the potential to be very useful for law enforcement agencies — preventing terrorist attacks or tracking criminals to arrest them as well — but it comes at significant cost to personal privacy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Popular devices that collect biometric data</span><br />
<br />
Apple Watch, Fitbit, and other devices have been collecting their users’ data for years. Recently the Wall Street <a href="https://www.wsj.com/articles/apple-plans-blood-pressure-measure-wrist-thermometer-in-watch-11630501201?st=gnv7lxcz8rp1j8x&amp;reflink=article_email_share" target="_blank" rel="noopener" class="mycode_url">reported</a> that Apple watches will soon be able to record blood pressure and body temperature to help with fertility planning. The increasing collection of sensitive health and biometric data is concerning. It is just as likely that the data will be used for <a href="https://blog.avast.com/internet-price-discrimination-avast" target="_blank" rel="noopener" class="mycode_url">price discrimination</a> (charging someone a higher price due to some personal information the company is aware of) as advancing diagnosis and treatment of various illnesses.<br />
<br />
When it comes to data collected through personal devices, at least individuals have the option not to wear a smartwatch or carry a smartphone with them everywhere they go. However, when a surveillance state leverages facial recognition technology to track its citizens or requires facial scans to get access to essential services like public housing or healthcare, biometric data collection is nearly impossible to avoid. Imagine leaving your apartment to go visit a family member and knowing that the government is able to track you the entire way. This is a stunning example of how invasive technology could be used to destroy any notion of personal privacy.<br />
<br />
We applaud the efforts of governments that are banning the use of facial recognition technology and hope that other countries and states follow suit. It's a dangerous precedent to allow the mass collection of biometric data, no matter how noble the goal. The technology is too easily repurposed for something dangerous to civil liberties. We're already seeing countries like China require face scans for its citizens to access public housing, and now they plan to make <a href="https://www.theverge.com/2021/7/9/22567029/tencent-china-facial-recognition-honor-of-kings-game-for-peace" target="_blank" rel="noopener" class="mycode_url">children scan in order to play online video games</a>. Perhaps children are better off spending less time online gaming, but nevertheless, we believe that the bad outweighs the good, as personal privacy is greatly diminished.<br />
<br />
Ben Franklin is often quoted as saying, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”<br />
<br />
This notion is especially relevant in the context of government surveillance. We know that governments with this much power over their citizens are likely to abuse it.<br />
<br />
If you want to push back against these types of data collection practices, you can voice your concerns to your local politicians and policymakers. Additionally, you can take conscious steps to anonymize yourself in public (like wearing a facial mask or hat), and importantly, opt out of as many data collection settings on your personal devices as possible.<br />
...</blockquote>
<a href="https://blog.avast.com/government-use-of-biometric-data-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_News: Avast commits to protecting digital freedom for everyone]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16121</link>
			<pubDate>Fri, 17 Sep 2021 07:36:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16121</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/Illustration-quote.1-%281%29.jpg" loading="lazy"  alt="[Image: Illustration-quote.1-%281%29.jpg]" class="mycode_img" /></div>
<br />
<br />
<span style="font-size: medium;" class="mycode_size">Here's how we're shaping the digital landscape to be a fairer, freer, more equitable place for all</span><br />
<br />
I was just 13 years old in 1991 when the Soviet Union pulled its last troops out of what was then Czechoslovakia, my home country. I was spared living through the worst abuses of the Communist era, which choked off the Czech people’s free expression, entrepreneurialism, and ability to explore the wider world. I feel extremely lucky to have come of age in Prague at a time when democracy and capitalism were flourishing.<br />
<br />
As a young computer programmer in the ‘90s, I was captivated by the potential of information technologies to reshape the world for the better. The arrival of the internet, with its vision of a free, open, and democratic digital world without borders, gave me hope that open and immediate access to information, commerce, and people worldwide could underpin the spread of democracy and social freedoms globally. <br />
<br />
The last three decades have seen technology develop on a truly revolutionary scale. Today, <a href="https://datareportal.com/global-digital-overview" target="_blank" rel="noopener" class="mycode_url">4.8 billion people are online</a> — that’s almost 61% of the world’s population — and it’s estimated that there are 700,000 new users coming online each day. This inspires me every day to push on innovation, to figure out how we can bring positive change to the digital world, and crucially, to be vigilant about protecting personal privacy and civil liberties. <br />
<br />
These days, nothing can be taken for granted as the world is undergoing huge, unprecedented change in response to the Covid-19 pandemic, igniting social, economic, and technological shifts. And, a huge part of that change is happening online: the battle for digital freedom, which could play an incredibly important role in defining the future of our global politics and economics. <br />
<br />
At Avast, we've been working for over 30 years to keep people safe. It used to be about protecting machines; today, it's about protecting people. And people are growing increasingly worried and feeling more vulnerable — because the cyber problem has become so much larger, and so much more complicated. <br />
<br />
Over the last year, we talked extensively with our customers and with internet citizens at large to understand their hopes, fears, and needs. <br />
<br />
The more our team at Avast talked to people, the more <a href="https://blog.avast.com/report-online-behavior-post-pandemic-avast?_ga=2.144430197.1351970993.1631714862-481298679.1631714862" target="_blank" rel="noopener" class="mycode_url">we heard</a> that the internet was vital to helping them achieve their personal potential, but also that they felt exposed when they went online more than ever before. Six in 10 people said the internet had grown more important to their lives during the pandemic, but just one in five said they felt more confident online than before. Two-thirds told us that concerns over privacy stopped them from doing something online.<br />
<br />
Avast is stepping up to tackle this challenge. Today, we are announcing our rigorous commitment to pursuing an expanded, deeper purpose — that of protecting the digital freedoms of all online citizens. You will notice that our brand has a fresh new look and feel to align with our wider mission and to engage with more people on these important digital issues of our time in a relatable, human way. Online security and privacy are complex topics, and it’s an important part of our role as a digital protection provider to ensure people get the information as well as the tools they need to feel comfortable and confident. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Challenging the status quo</span><br />
<br />
Although time has slightly tempered my youthful (and somewhat utopian) vision for the digital age, my enthusiasm for the boundless possibilities it enables hasn’t faded. But it’s clear that while the internet has enabled incredible opportunities, it has also served as a tool to restrict and limit. <br />
<br />
There are nation states that use the internet to curtail free speech. There are even governments that misuse and abuse the incredible power of big data, machine learning, and AI to oppress their own citizens. Hackers and cybercriminals mastermind increasingly sophisticated attacks that imperil everything from hospitals and oil pipelines to food companies globally. What’s more, too many tech firms and advertisers demonstrate a disregard for our privacy when they track people’s personal data and spending habits to make it easier to market their products and services. In our research, we learned how people really appreciated the internet as a backbone that connected them throughout the pandemic, but that they also felt increasingly watched and vulnerable. They told us they wanted to reset their relationship with the internet, but they were more confused than ever on how to do that, and who they could trust. <br />
<br />
Unless we’re all committed to a digital world that respects our right to privacy, the digital world has the potential to curtail our freedoms rather than enable them.<br />
<br />
Similarly, we have fallen down on promises to level the global playing field. Access to the internet is contributing to widening economic disparity, not lessening it.<br />
<br />
This digital divide has become particularly acute since the pandemic hit. People who can’t access secure, high-speed internet run the risk of being unable to work, study, manage finances, or even receive quality healthcare. Access to safe internet usage is increasingly becoming a critical right for all.<br />
<br />
It’s clear that we need to address these issues and halt this increasing inequity. We need to intervene now and reset our technology trajectory for a better, fairer digital future. <br />
...</blockquote>
<a href="https://blog.avast.com/digital-freedom-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/Illustration-quote.1-%281%29.jpg" loading="lazy"  alt="[Image: Illustration-quote.1-%281%29.jpg]" class="mycode_img" /></div>
<br />
<br />
<span style="font-size: medium;" class="mycode_size">Here's how we're shaping the digital landscape to be a fairer, freer, more equitable place for all</span><br />
<br />
I was just 13 years old in 1991 when the Soviet Union pulled its last troops out of what was then Czechoslovakia, my home country. I was spared living through the worst abuses of the Communist era, which choked off the Czech people’s free expression, entrepreneurialism, and ability to explore the wider world. I feel extremely lucky to have come of age in Prague at a time when democracy and capitalism were flourishing.<br />
<br />
As a young computer programmer in the ‘90s, I was captivated by the potential of information technologies to reshape the world for the better. The arrival of the internet, with its vision of a free, open, and democratic digital world without borders, gave me hope that open and immediate access to information, commerce, and people worldwide could underpin the spread of democracy and social freedoms globally. <br />
<br />
The last three decades have seen technology develop on a truly revolutionary scale. Today, <a href="https://datareportal.com/global-digital-overview" target="_blank" rel="noopener" class="mycode_url">4.8 billion people are online</a> — that’s almost 61% of the world’s population — and it’s estimated that there are 700,000 new users coming online each day. This inspires me every day to push on innovation, to figure out how we can bring positive change to the digital world, and crucially, to be vigilant about protecting personal privacy and civil liberties. <br />
<br />
These days, nothing can be taken for granted as the world is undergoing huge, unprecedented change in response to the Covid-19 pandemic, igniting social, economic, and technological shifts. And, a huge part of that change is happening online: the battle for digital freedom, which could play an incredibly important role in defining the future of our global politics and economics. <br />
<br />
At Avast, we've been working for over 30 years to keep people safe. It used to be about protecting machines; today, it's about protecting people. And people are growing increasingly worried and feeling more vulnerable — because the cyber problem has become so much larger, and so much more complicated. <br />
<br />
Over the last year, we talked extensively with our customers and with internet citizens at large to understand their hopes, fears, and needs. <br />
<br />
The more our team at Avast talked to people, the more <a href="https://blog.avast.com/report-online-behavior-post-pandemic-avast?_ga=2.144430197.1351970993.1631714862-481298679.1631714862" target="_blank" rel="noopener" class="mycode_url">we heard</a> that the internet was vital to helping them achieve their personal potential, but also that they felt exposed when they went online more than ever before. Six in 10 people said the internet had grown more important to their lives during the pandemic, but just one in five said they felt more confident online than before. Two-thirds told us that concerns over privacy stopped them from doing something online.<br />
<br />
Avast is stepping up to tackle this challenge. Today, we are announcing our rigorous commitment to pursuing an expanded, deeper purpose — that of protecting the digital freedoms of all online citizens. You will notice that our brand has a fresh new look and feel to align with our wider mission and to engage with more people on these important digital issues of our time in a relatable, human way. Online security and privacy are complex topics, and it’s an important part of our role as a digital protection provider to ensure people get the information as well as the tools they need to feel comfortable and confident. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Challenging the status quo</span><br />
<br />
Although time has slightly tempered my youthful (and somewhat utopian) vision for the digital age, my enthusiasm for the boundless possibilities it enables hasn’t faded. But it’s clear that while the internet has enabled incredible opportunities, it has also served as a tool to restrict and limit. <br />
<br />
There are nation states that use the internet to curtail free speech. There are even governments that misuse and abuse the incredible power of big data, machine learning, and AI to oppress their own citizens. Hackers and cybercriminals mastermind increasingly sophisticated attacks that imperil everything from hospitals and oil pipelines to food companies globally. What’s more, too many tech firms and advertisers demonstrate a disregard for our privacy when they track people’s personal data and spending habits to make it easier to market their products and services. In our research, we learned how people really appreciated the internet as a backbone that connected them throughout the pandemic, but that they also felt increasingly watched and vulnerable. They told us they wanted to reset their relationship with the internet, but they were more confused than ever on how to do that, and who they could trust. <br />
<br />
Unless we’re all committed to a digital world that respects our right to privacy, the digital world has the potential to curtail our freedoms rather than enable them.<br />
<br />
Similarly, we have fallen down on promises to level the global playing field. Access to the internet is contributing to widening economic disparity, not lessening it.<br />
<br />
This digital divide has become particularly acute since the pandemic hit. People who can’t access secure, high-speed internet run the risk of being unable to work, study, manage finances, or even receive quality healthcare. Access to safe internet usage is increasingly becoming a critical right for all.<br />
<br />
It’s clear that we need to address these issues and halt this increasing inequity. We need to intervene now and reset our technology trajectory for a better, fairer digital future. <br />
...</blockquote>
<a href="https://blog.avast.com/digital-freedom-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: What’s the difference between a firewall and a VPN?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16072</link>
			<pubDate>Fri, 10 Sep 2021 08:56:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16072</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/firewall-vs-VPN.jpg" loading="lazy"  alt="[Image: firewall-vs-VPN.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Both are essential for network security.</span><br />
<br />
You’ve probably heard of a firewall. You’ve maybe heard of a VPN. But what’s the difference? <br />
<br />
Since we’re living in a time when most people are ultra-conscious of germs and what they’re touching, maybe the easiest way to explain the difference between a firewall and a VPN is like this:<br />
<br />
Think of a firewall as a rubber glove. It blocks bad stuff from getting to you. (But it also does more than that — which we’ll get to.)<br />
<br />
A <a href="https://www.avast.com/c-what-is-a-vpn?_ga=2.264465871.1129210012.1631253705-1814458791.1631253705" target="_blank" rel="noopener" class="mycode_url">VPN</a> is more like an invisible cloak. It keeps the bad guys from knowing your location and activities. Unfortunately, it can’t block viruses, so it’s always good to pair a VPN with a firewall (and antivirus software).<br />
<br />
Companies usually use VPNs to let employees securely access remote servers from locations outside the office, while regular folks make use of VPNs when surfing the web in their coffee shop of choice. Firewalls are used by both home and corporate networks to protect computers and devices.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a VPN?</span><br />
<br />
A Virtual Private Network (VPN), hides your IP address, which is the string of numbers that identifies your device. It works by routing your network connection through a remote server, protecting you from those trying to find your location and other valuable data. A VPN is essential when you’re using public Wi-Fi or working remotely, as it encrypts your traffic and protects your information while it’s in transit. It’s like a private line to directly access a corporate server or a secure network, from anywhere. <br />
<br />
When you use a VPN, your internet service provider, government websites, and the websites you often visit won’t have a way of knowing your true location. If you really care about your browsing privacy and data security, a VPN is your best bet.<br />
<br />
On the downside, as previously mentioned, a VPN can't protect your computer from viruses. You can't set up security rules on VPNs. To monitor for and erase viruses, you’ll need antivirus software. To block viruses from entering your network and to prevent data from being stolen, you’ll need a firewall. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">What are firewalls?</span><br />
<br />
A <a href="https://www.avast.com/en-us/f-firewall?_ga=2.264465871.1129210012.1631253705-1814458791.1631253705#mac" target="_blank" rel="noopener" class="mycode_url">firewall</a> watches incoming and outgoing traffic on your network. Firewalls block attacks  automatically and also allow you to set security preferences for what you let into your network or computer. If you don’t program a firewall to block a certain kind of site, content, or traffic, it won’t, even if that site has content that could hurt your system.<br />
<br />
There are two types of firewalls:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Hardware or network firewalls</span><br />
<br />
Hardware firewalls are physical devices that are placed between your computer and the internet. Their disadvantage is that they are separate devices that often require professional support for configuration and maintenance.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Software firewalls</span><br />
<br />
Software firewalls are able to control the internet access and behavior of programs on your computer. Most computer operating systems (OSs) include a basic built-in software firewall feature, but <a href="https://www.avast.com/f-firewall#pc" target="_blank" rel="noopener" class="mycode_url">firewall software</a> is also available separately from computer stores and trusted online vendors. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Which one should you use?</span><br />
<br />
The answer is: Both! Set up a firewall along with a VPN. A VPN like <a href="https://www.avast.com/en-us/secureline-vpn?&amp;_ga=2.262827084.1129210012.1631253705-1814458791.1631253705#mac" target="_blank" rel="noopener" class="mycode_url">Avast SecureLine VPN</a> will hide your online activity and allow you to transfer data securely without slowing down your connection — even on public Wi-Fi, But, alone, it can’t protect your device from downloaded viruses or spyware. If you click a bad link on a malicious site, you may still be vulnerable. So a firewall will let you know before you visit potentially harmful sites. <br />
<br />
Even if you don't consider yourself to be tech-savvy, <a href="https://www.avast.com/f-firewall?_ga=2.262827084.1129210012.1631253705-1814458791.1631253705#pc" target="_blank" rel="noopener" class="mycode_url">Avast Advanced Firewall</a> can be quickly customized to your settings with simple controls. A smart profile setting automatically detects the number of devices on your network and sets your profile to private or public mode to protect you from intruders.<br />
<br />
Installing an efficient and strong firewall around your network is essential. It’s a great way to secure your system from invasion and data theft. <br />
...</blockquote>
<a href="https://blog.avast.com/differences-between-firewalls-and-vpns-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/firewall-vs-VPN.jpg" loading="lazy"  alt="[Image: firewall-vs-VPN.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Both are essential for network security.</span><br />
<br />
You’ve probably heard of a firewall. You’ve maybe heard of a VPN. But what’s the difference? <br />
<br />
Since we’re living in a time when most people are ultra-conscious of germs and what they’re touching, maybe the easiest way to explain the difference between a firewall and a VPN is like this:<br />
<br />
Think of a firewall as a rubber glove. It blocks bad stuff from getting to you. (But it also does more than that — which we’ll get to.)<br />
<br />
A <a href="https://www.avast.com/c-what-is-a-vpn?_ga=2.264465871.1129210012.1631253705-1814458791.1631253705" target="_blank" rel="noopener" class="mycode_url">VPN</a> is more like an invisible cloak. It keeps the bad guys from knowing your location and activities. Unfortunately, it can’t block viruses, so it’s always good to pair a VPN with a firewall (and antivirus software).<br />
<br />
Companies usually use VPNs to let employees securely access remote servers from locations outside the office, while regular folks make use of VPNs when surfing the web in their coffee shop of choice. Firewalls are used by both home and corporate networks to protect computers and devices.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a VPN?</span><br />
<br />
A Virtual Private Network (VPN), hides your IP address, which is the string of numbers that identifies your device. It works by routing your network connection through a remote server, protecting you from those trying to find your location and other valuable data. A VPN is essential when you’re using public Wi-Fi or working remotely, as it encrypts your traffic and protects your information while it’s in transit. It’s like a private line to directly access a corporate server or a secure network, from anywhere. <br />
<br />
When you use a VPN, your internet service provider, government websites, and the websites you often visit won’t have a way of knowing your true location. If you really care about your browsing privacy and data security, a VPN is your best bet.<br />
<br />
On the downside, as previously mentioned, a VPN can't protect your computer from viruses. You can't set up security rules on VPNs. To monitor for and erase viruses, you’ll need antivirus software. To block viruses from entering your network and to prevent data from being stolen, you’ll need a firewall. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">What are firewalls?</span><br />
<br />
A <a href="https://www.avast.com/en-us/f-firewall?_ga=2.264465871.1129210012.1631253705-1814458791.1631253705#mac" target="_blank" rel="noopener" class="mycode_url">firewall</a> watches incoming and outgoing traffic on your network. Firewalls block attacks  automatically and also allow you to set security preferences for what you let into your network or computer. If you don’t program a firewall to block a certain kind of site, content, or traffic, it won’t, even if that site has content that could hurt your system.<br />
<br />
There are two types of firewalls:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Hardware or network firewalls</span><br />
<br />
Hardware firewalls are physical devices that are placed between your computer and the internet. Their disadvantage is that they are separate devices that often require professional support for configuration and maintenance.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Software firewalls</span><br />
<br />
Software firewalls are able to control the internet access and behavior of programs on your computer. Most computer operating systems (OSs) include a basic built-in software firewall feature, but <a href="https://www.avast.com/f-firewall#pc" target="_blank" rel="noopener" class="mycode_url">firewall software</a> is also available separately from computer stores and trusted online vendors. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Which one should you use?</span><br />
<br />
The answer is: Both! Set up a firewall along with a VPN. A VPN like <a href="https://www.avast.com/en-us/secureline-vpn?&amp;_ga=2.262827084.1129210012.1631253705-1814458791.1631253705#mac" target="_blank" rel="noopener" class="mycode_url">Avast SecureLine VPN</a> will hide your online activity and allow you to transfer data securely without slowing down your connection — even on public Wi-Fi, But, alone, it can’t protect your device from downloaded viruses or spyware. If you click a bad link on a malicious site, you may still be vulnerable. So a firewall will let you know before you visit potentially harmful sites. <br />
<br />
Even if you don't consider yourself to be tech-savvy, <a href="https://www.avast.com/f-firewall?_ga=2.262827084.1129210012.1631253705-1814458791.1631253705#pc" target="_blank" rel="noopener" class="mycode_url">Avast Advanced Firewall</a> can be quickly customized to your settings with simple controls. A smart profile setting automatically detects the number of devices on your network and sets your profile to private or public mode to protect you from intruders.<br />
<br />
Installing an efficient and strong firewall around your network is essential. It’s a great way to secure your system from invasion and data theft. <br />
...</blockquote>
<a href="https://blog.avast.com/differences-between-firewalls-and-vpns-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: Wrap-up: What does the internet know about us?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16071</link>
			<pubDate>Fri, 10 Sep 2021 08:53:26 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16071</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/WDTIKAM_final-image.jpg" loading="lazy"  alt="[Image: WDTIKAM_final-image.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Looking back on our 2021 series with some new insights on our lives online</span><br />
<br />
I started this year with a deceptively simple question: What does the internet know about me? I wanted to do a deep dive into the privacy policies and data collection practices of the digital products that I use the most, in order to figure out what pieces of myself I’ve been unwittingly giving away in the 25 years I’ve been online. And, perhaps more importantly, I wanted to know if there was anything I could do about it.<br />
<br />
What I found over these past eight months was both shocking — and not. Shocking, because I think it’s important that we all keep being at least a little bit shocked at what companies get away with when it comes to privacy-violating data collection. Shocking, because it’s scary to realize that the internet essentially knows everything about me, from my <a href="https://blog.avast.com/what-does-oura-ring-track-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">heartbeat</span></a> to my <a href="https://blog.avast.com/who-can-see-your-address-online-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">address</span></a> to who <a href="https://blog.avast.com/what-amazon-ring-knows-about-you-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">walks up to my front door</span></a>. Not shocking, because — as my friend who sparked this idea for me said — “I kind of just assume everything I do online is tracked.” <br />
<br />
While most of what the internet knows about me feels fairly mild, there were some slightly salacious bits of info that I realized. For example, I use an Oura ring as a fitness tracker and because it tracks body temperature, it could theoretically know if I was pregnant, had Covid, or even had too much to drink one night. (Same goes for my Eight bed, which also tracks body temperature.) <br />
<br />
There’s no guarantee that they <span style="font-style: italic;" class="mycode_i">do </span>know those things, but there are cases of apps and services knowing about pregnancies and serving related ads, for example, before the person experiencing the pregnancy was ready to share. So it’s a fair bet that they could figure it out if they wanted to.<br />
<br />
I also realized something kind of surprising about myself: I’m willing to give up more personal information than I realized. As my conversations with my friend illustrated, there’s a certain normalization around online data tracking and collection, at least in the US. We’ve been trained to accept this model of the internet as inevitable and our general apathy toward data collection and protection reflects that. <br />
<br />
But that doesn’t mean I’m wrapping up <a href="https://blog.avast.com/what-does-the-internet-know-about-me-avast" target="_blank" rel="noopener" class="mycode_url"><span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span></a> by throwing my hands up in the air and releasing all of my personal information into the Dark Web myself. Because despite the negatives I came across, there were also a lot of positive signs that the tide is turning when it comes to online privacy.<br />
<br />
For example, the vast majority of privacy policies that I read (and I read <span style="font-style: italic;" class="mycode_i">a lot</span>), were surprisingly clear and comprehensive. They were written in plain English, had clear sections, and utilized a minimum of tricky legal language. I appreciate that a lot and also know that it hasn’t always been the case.<br />
<br />
I also saw firsthand how legislation can make a huge difference when it comes to how much or how little that we’re asked to give up in exchange for access to sites and services. I live in California but Avast is based in Europe, so I made a point to look at companies’ policies for the <a href="https://oag.ca.gov/privacy/ccpa" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">California Consumer Privacy Act</span></a> (CCPA), <a href="https://gdpr-info.eu/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">General Protection Regulation</span></a> (GDPR) in Europe — and everyone else. <br />
<br />
I found that many sites and companies have multiple sets of rules, based on where you live. That means I have more rights than my colleagues who live in North Carolina, for example, and my colleagues in the EU and the UK have even more than I do. So while the internet has no borders, the laws we enact for it certainly do. <br />
<br />
That plus the fact that many of these companies have ways to “easily” delete your data (or limit their collection) gives me some hope. I think we’re in the midst of a massive shift away from this data-sucking model to which we’ve all become accustomed. I don’t know where that shift will leave us — but I’m hopeful that it’s going to be somewhere better than where we are today. <br />
...</blockquote>
<a href="https://blog.avast.com/wrapping-up-what-does-the-internet-know-about-me-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/WDTIKAM_final-image.jpg" loading="lazy"  alt="[Image: WDTIKAM_final-image.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Looking back on our 2021 series with some new insights on our lives online</span><br />
<br />
I started this year with a deceptively simple question: What does the internet know about me? I wanted to do a deep dive into the privacy policies and data collection practices of the digital products that I use the most, in order to figure out what pieces of myself I’ve been unwittingly giving away in the 25 years I’ve been online. And, perhaps more importantly, I wanted to know if there was anything I could do about it.<br />
<br />
What I found over these past eight months was both shocking — and not. Shocking, because I think it’s important that we all keep being at least a little bit shocked at what companies get away with when it comes to privacy-violating data collection. Shocking, because it’s scary to realize that the internet essentially knows everything about me, from my <a href="https://blog.avast.com/what-does-oura-ring-track-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">heartbeat</span></a> to my <a href="https://blog.avast.com/who-can-see-your-address-online-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">address</span></a> to who <a href="https://blog.avast.com/what-amazon-ring-knows-about-you-avast?_ga=2.35046951.762426105.1631093363-1903216121.1631093362" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">walks up to my front door</span></a>. Not shocking, because — as my friend who sparked this idea for me said — “I kind of just assume everything I do online is tracked.” <br />
<br />
While most of what the internet knows about me feels fairly mild, there were some slightly salacious bits of info that I realized. For example, I use an Oura ring as a fitness tracker and because it tracks body temperature, it could theoretically know if I was pregnant, had Covid, or even had too much to drink one night. (Same goes for my Eight bed, which also tracks body temperature.) <br />
<br />
There’s no guarantee that they <span style="font-style: italic;" class="mycode_i">do </span>know those things, but there are cases of apps and services knowing about pregnancies and serving related ads, for example, before the person experiencing the pregnancy was ready to share. So it’s a fair bet that they could figure it out if they wanted to.<br />
<br />
I also realized something kind of surprising about myself: I’m willing to give up more personal information than I realized. As my conversations with my friend illustrated, there’s a certain normalization around online data tracking and collection, at least in the US. We’ve been trained to accept this model of the internet as inevitable and our general apathy toward data collection and protection reflects that. <br />
<br />
But that doesn’t mean I’m wrapping up <a href="https://blog.avast.com/what-does-the-internet-know-about-me-avast" target="_blank" rel="noopener" class="mycode_url"><span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span></a> by throwing my hands up in the air and releasing all of my personal information into the Dark Web myself. Because despite the negatives I came across, there were also a lot of positive signs that the tide is turning when it comes to online privacy.<br />
<br />
For example, the vast majority of privacy policies that I read (and I read <span style="font-style: italic;" class="mycode_i">a lot</span>), were surprisingly clear and comprehensive. They were written in plain English, had clear sections, and utilized a minimum of tricky legal language. I appreciate that a lot and also know that it hasn’t always been the case.<br />
<br />
I also saw firsthand how legislation can make a huge difference when it comes to how much or how little that we’re asked to give up in exchange for access to sites and services. I live in California but Avast is based in Europe, so I made a point to look at companies’ policies for the <a href="https://oag.ca.gov/privacy/ccpa" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">California Consumer Privacy Act</span></a> (CCPA), <a href="https://gdpr-info.eu/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">General Protection Regulation</span></a> (GDPR) in Europe — and everyone else. <br />
<br />
I found that many sites and companies have multiple sets of rules, based on where you live. That means I have more rights than my colleagues who live in North Carolina, for example, and my colleagues in the EU and the UK have even more than I do. So while the internet has no borders, the laws we enact for it certainly do. <br />
<br />
That plus the fact that many of these companies have ways to “easily” delete your data (or limit their collection) gives me some hope. I think we’re in the midst of a massive shift away from this data-sucking model to which we’ve all become accustomed. I don’t know where that shift will leave us — but I’m hopeful that it’s going to be somewhere better than where we are today. <br />
...</blockquote>
<a href="https://blog.avast.com/wrapping-up-what-does-the-internet-know-about-me-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: Back-to-school tips for distance learning]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16070</link>
			<pubDate>Fri, 10 Sep 2021 08:49:53 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16070</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/schoolboy_mask.jpg" loading="lazy"  alt="[Image: schoolboy_mask.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Make online school both safe and fun using these tips</span><br />
<br />
Covid-19 didn’t go away when school started. On top of that, <a href="https://www.cnbc.com/2021/09/01/who-says-it-is-monitoring-a-new-covid-variant-called-mu.html" target="_blank" rel="noopener" class="mycode_url">new variants</a> are being tracked because this virus isn’t done mutating and hasn’t been eradicated. Students and families could be facing yet another season of <a href="https://blog.avast.com/securing-your-home-network-for-distance-learning-avast?_ga=2.226059998.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">distance learning</a> from home, and it’s never too early to <a href="https://blog.avast.com/distance-learning-advice-for-parents-avast?_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">start preparing</a>.<br />
<br />
At Avast, we care deeply about the safety and well-being of your family, especially when it comes to easy to use and supremely effective digital security. Our <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">Back-to-School Sale</a> is still live, so please take advantage of up to 50% savings on Avast Ultimate security suite that covers an entire family’s network of devices. <br />
<br />
If your tech is already set-up to protect you and your devices against cybercrime, we have the following tips to make online learning safe and fun:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Routine is key</span><br />
<br />
Schedules are the cornerstone of sanity. Write out a daily/weekly schedule on a big white board or hang it on the refrigerator. Without the expectations and agreements established by a schedule, the days and weeks will quickly dissolve into chaos. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Environment is essential</span><br />
<br />
Finding the balance between isolation and distraction is your goal. Be creative and don’t be afraid to get wacky with your furniture. Avoid letting your students lock themselves in their room all day and avoid forcing them to sit somewhere they can’t focus.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Supervise their setup</span><br />
<br />
It’s up to you make sure your student has everything they need to be successful. From school supplies to secure, stable Wi-Fi, or note-taking apps and organization strategies, they might not realize they are missing something essential without your guidance. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">4. Review goals together</span><br />
<br />
The best part of distance learning is delighting in your time together. During scheduled snack times or family meals, ask each other about your week and what you all hope to accomplish individually and as a family. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">5. Teach them tact</span><br />
<br />
Kids don’t have years of professional experience communicating with well-trained teams over video conference, email, and project management software. Give them pointers on how to have good manners while getting their point across.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">6. Offer the carrot, not the stick</span><br />
<br />
Positive reinforcement and earned rewards always work better than threats and punishments. Start early and see it through. If you find yourself frustrated, reach out to other parents who are going through the same thing. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">7. Help them self-motivate</span><br />
<br />
It’s difficult for some kids to find motivation. Positive and negative reinforcement are both less-effective external motivations. Teaching your child to want to learn is one of the greatest investments you can make with your time and energy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">8. Gamify everything</span><br />
<br />
Work together to create a simple but visible documentation of progress using points, levels of achievement, rewards, and celebrations. Make a <a href="https://www.teachthought.com/learning/how-gamification-uncovers-nuance-in-the-learning-process/" target="_blank" rel="noopener" class="mycode_url">game out of learning</a>, to encourage both internal and external motivations for greater results.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">9. Ease your worries</span><br />
<br />
Let us help take network security off your list of things to do. Avast Ultimate is a suite of everything you need to look after all your family’s devices in one easy-to-use service complete with tuneup and cleanup tools. <br />
<br />
Advanced antivirus and anti-tracking privacy protection features prevent malware while blocking stalkers and advertisers from following your family’s online activity. <br />
<br />
Check out <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">our Back-to-School Sale</a> to save on a year’s subscription of Avast Ultimate.<br />
...</blockquote>
<a href="https://blog.avast.com/back-to-school-tips-for-safe-and-fun-online-learning-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/schoolboy_mask.jpg" loading="lazy"  alt="[Image: schoolboy_mask.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Make online school both safe and fun using these tips</span><br />
<br />
Covid-19 didn’t go away when school started. On top of that, <a href="https://www.cnbc.com/2021/09/01/who-says-it-is-monitoring-a-new-covid-variant-called-mu.html" target="_blank" rel="noopener" class="mycode_url">new variants</a> are being tracked because this virus isn’t done mutating and hasn’t been eradicated. Students and families could be facing yet another season of <a href="https://blog.avast.com/securing-your-home-network-for-distance-learning-avast?_ga=2.226059998.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">distance learning</a> from home, and it’s never too early to <a href="https://blog.avast.com/distance-learning-advice-for-parents-avast?_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">start preparing</a>.<br />
<br />
At Avast, we care deeply about the safety and well-being of your family, especially when it comes to easy to use and supremely effective digital security. Our <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">Back-to-School Sale</a> is still live, so please take advantage of up to 50% savings on Avast Ultimate security suite that covers an entire family’s network of devices. <br />
<br />
If your tech is already set-up to protect you and your devices against cybercrime, we have the following tips to make online learning safe and fun:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Routine is key</span><br />
<br />
Schedules are the cornerstone of sanity. Write out a daily/weekly schedule on a big white board or hang it on the refrigerator. Without the expectations and agreements established by a schedule, the days and weeks will quickly dissolve into chaos. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Environment is essential</span><br />
<br />
Finding the balance between isolation and distraction is your goal. Be creative and don’t be afraid to get wacky with your furniture. Avoid letting your students lock themselves in their room all day and avoid forcing them to sit somewhere they can’t focus.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Supervise their setup</span><br />
<br />
It’s up to you make sure your student has everything they need to be successful. From school supplies to secure, stable Wi-Fi, or note-taking apps and organization strategies, they might not realize they are missing something essential without your guidance. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">4. Review goals together</span><br />
<br />
The best part of distance learning is delighting in your time together. During scheduled snack times or family meals, ask each other about your week and what you all hope to accomplish individually and as a family. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">5. Teach them tact</span><br />
<br />
Kids don’t have years of professional experience communicating with well-trained teams over video conference, email, and project management software. Give them pointers on how to have good manners while getting their point across.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">6. Offer the carrot, not the stick</span><br />
<br />
Positive reinforcement and earned rewards always work better than threats and punishments. Start early and see it through. If you find yourself frustrated, reach out to other parents who are going through the same thing. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">7. Help them self-motivate</span><br />
<br />
It’s difficult for some kids to find motivation. Positive and negative reinforcement are both less-effective external motivations. Teaching your child to want to learn is one of the greatest investments you can make with your time and energy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">8. Gamify everything</span><br />
<br />
Work together to create a simple but visible documentation of progress using points, levels of achievement, rewards, and celebrations. Make a <a href="https://www.teachthought.com/learning/how-gamification-uncovers-nuance-in-the-learning-process/" target="_blank" rel="noopener" class="mycode_url">game out of learning</a>, to encourage both internal and external motivations for greater results.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">9. Ease your worries</span><br />
<br />
Let us help take network security off your list of things to do. Avast Ultimate is a suite of everything you need to look after all your family’s devices in one easy-to-use service complete with tuneup and cleanup tools. <br />
<br />
Advanced antivirus and anti-tracking privacy protection features prevent malware while blocking stalkers and advertisers from following your family’s online activity. <br />
<br />
Check out <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.255568716.570516941.1630998658-986123709.1630998657" target="_blank" rel="noopener" class="mycode_url">our Back-to-School Sale</a> to save on a year’s subscription of Avast Ultimate.<br />
...</blockquote>
<a href="https://blog.avast.com/back-to-school-tips-for-safe-and-fun-online-learning-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Privacy: FTC issues first ban ever on a stalkerware company]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16035</link>
			<pubDate>Mon, 06 Sep 2021 07:17:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16035</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/FTC-bans-stalkerware.jpg" loading="lazy"  alt="[Image: FTC-bans-stalkerware.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Activists applaud the ban as a great first step toward protecting survivors</span><br />
<br />
The US Federal Trade Commission (FTC) recently announced a <a href="https://www.ftc.gov/news-events/press-releases/2021/09/ftc-bans-spyfone-and-ceo-from-surveillance-business" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">ban on the stalkerware company SpyFone</span></a> and ordered them to delete all of the data they had illegally harvested from victims. Additionally, they banned the company’s CEO, Scott Zuckerman, from working in the surveillance industry ever again and ordered the company to notify everyone who had the app installed on their phone.<br />
<br />
<span style="font-style: italic;" class="mycode_i">“</span>I think that this is a sign that the FTC is getting more serious about this kind of abuse,”<a href="https://www.eff.org/about/staff/eva-galperin" target="_blank" rel="noopener" class="mycode_url"> <span style="color: #1155cc;" class="mycode_color">Eva Galperin</span></a>, Director of Cybersecurity at the <a href="https://www.eff.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Electronic Frontier Foundation (EFF)</span></a>, a founding member of the Coalition Against Stalkerware, tells Avast. “And I’m really glad to see them calling out stalkerware and the company’s CEO in such a direct way.”<br />
<br />
According to the FTC press release on the ruling, SpyFone (which is registered as Support King LLC) sold stalkerware apps that allowed people to surreptitiously monitor other people’s devices. The monitoring could include messages, photos, web histories, GPS locations, and other personal information. The company also provided instructions on how to install their apps without the device owner’s knowledge. <br />
<br />
SpyFone additionally failed to secure the personal data it stole, by “not encrypting personal information it stored, including photos and text messages; failing to ensure that only authorized users could access personal information; and transmitting purchasers’ passwords in plain text,” according to the press release. In fact, a hacker gained access to one of the company’s servers in 2018 and obtained the private information of 2,200 consumers. After that breach, the company promised to work with a date security firm and law enforcement — which the FTC says never happened. <br />
<br />
This move by the FTC — the first ban of its kind and the <a href="https://blog.avast.com/the-stalkerware-threat-avast?_ga=2.201033006.1603831684.1630536339-1315752224.1630536339" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">second time the agency has taken action against a stalkerware company</span></a> — is “the tip of the iceberg” in fighting stalkerware, according to Galperin.<br />
<br />
“Start with a ban, start with a decree, then move forward to do what you can in order to enforce these things,” she says. “And I think it makes stalkerware companies think twice about whether or not this type of business will be profitable for them.”<br />
<br />
Christopher Budd, Senior Global Threat Communications Manager at Avast, also lauds the FTC move, but wonders what might happen next.<br />
<br />
“Now that this has happened, does this mean this program disappears from the internet entirely? Or is there a way the company could start selling it on third party sites from abroad?” Budd says. “We see this with ransomware groups all the time: They close up shop, throw their code out to the wider world, and someone else picks up it up and carries on the work — or they set up shop somewhere else.”<br />
<br />
In the meantime, there are <a href="https://blog.avast.com/prevent-stalkerware-in-ex-relationships-avast?_ga=2.201033006.1603831684.1630536339-1315752224.1630536339" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">steps a survivor can take</span></a> if they receive the warning that a SpyFone app has been installed on their phone. And while Galperin acknowledges that we don’t yet know exactly what the warning will say, she hopes that the “notification process includes tips on how to remove it and for clarification about whether or not the spying is current and ongoing or whether it’s in the past.” <br />
<br />
Galperin also warns that removing a stalkerware app can further escalate a domestic violence situation, as the abuser could become enraged at the removal of access. That doesn’t mean, however, that a survivor must simply tolerate being stalked. Erica Olsen, Safety Net project director for the <a href="https://nnedv.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">National Network to End Domestic Violence (NNEDV)</span></a>, tells Avast that the first step to clearing any stalkerware from a device is to “trust your instincts.”<br />
<br />
"Most of the time, a survivor believes this is happening because the abuser just knows too much about their activity, is in their accounts, etc.,” Olsen says. “We suggest that survivors try to pay attention to what the abusive person seems to know and narrow down options for how they may know it. If there is no other explanation for the person knowing device activity, accessing accounts, and knowing the survivor’s location, and the abusive person had physical access to the device at some time, then it’s possible it could be stalkerware.”<br />
...</blockquote>
<a href="https://blog.avast.com/ftc-bans-stalkerware-company-spyfone-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/FTC-bans-stalkerware.jpg" loading="lazy"  alt="[Image: FTC-bans-stalkerware.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Activists applaud the ban as a great first step toward protecting survivors</span><br />
<br />
The US Federal Trade Commission (FTC) recently announced a <a href="https://www.ftc.gov/news-events/press-releases/2021/09/ftc-bans-spyfone-and-ceo-from-surveillance-business" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">ban on the stalkerware company SpyFone</span></a> and ordered them to delete all of the data they had illegally harvested from victims. Additionally, they banned the company’s CEO, Scott Zuckerman, from working in the surveillance industry ever again and ordered the company to notify everyone who had the app installed on their phone.<br />
<br />
<span style="font-style: italic;" class="mycode_i">“</span>I think that this is a sign that the FTC is getting more serious about this kind of abuse,”<a href="https://www.eff.org/about/staff/eva-galperin" target="_blank" rel="noopener" class="mycode_url"> <span style="color: #1155cc;" class="mycode_color">Eva Galperin</span></a>, Director of Cybersecurity at the <a href="https://www.eff.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Electronic Frontier Foundation (EFF)</span></a>, a founding member of the Coalition Against Stalkerware, tells Avast. “And I’m really glad to see them calling out stalkerware and the company’s CEO in such a direct way.”<br />
<br />
According to the FTC press release on the ruling, SpyFone (which is registered as Support King LLC) sold stalkerware apps that allowed people to surreptitiously monitor other people’s devices. The monitoring could include messages, photos, web histories, GPS locations, and other personal information. The company also provided instructions on how to install their apps without the device owner’s knowledge. <br />
<br />
SpyFone additionally failed to secure the personal data it stole, by “not encrypting personal information it stored, including photos and text messages; failing to ensure that only authorized users could access personal information; and transmitting purchasers’ passwords in plain text,” according to the press release. In fact, a hacker gained access to one of the company’s servers in 2018 and obtained the private information of 2,200 consumers. After that breach, the company promised to work with a date security firm and law enforcement — which the FTC says never happened. <br />
<br />
This move by the FTC — the first ban of its kind and the <a href="https://blog.avast.com/the-stalkerware-threat-avast?_ga=2.201033006.1603831684.1630536339-1315752224.1630536339" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">second time the agency has taken action against a stalkerware company</span></a> — is “the tip of the iceberg” in fighting stalkerware, according to Galperin.<br />
<br />
“Start with a ban, start with a decree, then move forward to do what you can in order to enforce these things,” she says. “And I think it makes stalkerware companies think twice about whether or not this type of business will be profitable for them.”<br />
<br />
Christopher Budd, Senior Global Threat Communications Manager at Avast, also lauds the FTC move, but wonders what might happen next.<br />
<br />
“Now that this has happened, does this mean this program disappears from the internet entirely? Or is there a way the company could start selling it on third party sites from abroad?” Budd says. “We see this with ransomware groups all the time: They close up shop, throw their code out to the wider world, and someone else picks up it up and carries on the work — or they set up shop somewhere else.”<br />
<br />
In the meantime, there are <a href="https://blog.avast.com/prevent-stalkerware-in-ex-relationships-avast?_ga=2.201033006.1603831684.1630536339-1315752224.1630536339" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">steps a survivor can take</span></a> if they receive the warning that a SpyFone app has been installed on their phone. And while Galperin acknowledges that we don’t yet know exactly what the warning will say, she hopes that the “notification process includes tips on how to remove it and for clarification about whether or not the spying is current and ongoing or whether it’s in the past.” <br />
<br />
Galperin also warns that removing a stalkerware app can further escalate a domestic violence situation, as the abuser could become enraged at the removal of access. That doesn’t mean, however, that a survivor must simply tolerate being stalked. Erica Olsen, Safety Net project director for the <a href="https://nnedv.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">National Network to End Domestic Violence (NNEDV)</span></a>, tells Avast that the first step to clearing any stalkerware from a device is to “trust your instincts.”<br />
<br />
"Most of the time, a survivor believes this is happening because the abuser just knows too much about their activity, is in their accounts, etc.,” Olsen says. “We suggest that survivors try to pay attention to what the abusive person seems to know and narrow down options for how they may know it. If there is no other explanation for the person knowing device activity, accessing accounts, and knowing the survivor’s location, and the abusive person had physical access to the device at some time, then it’s possible it could be stalkerware.”<br />
...</blockquote>
<a href="https://blog.avast.com/ftc-bans-stalkerware-company-spyfone-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: Beware: Hurricane Ida relief efforts will be accompanied b]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=16034</link>
			<pubDate>Mon, 06 Sep 2021 07:14:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=16034</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/hurricane-ida-scams.jpg" loading="lazy"  alt="[Image: hurricane-ida-scams.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Ignore lures and reach out to reputable charities like the Red Cross</span><br />
<br />
Hurricane Ida has left a path of destruction along the entire east coast of the United States. While the storm has passed, millions of Americans have been displaced by record-breaking rain, deadly flash flooding, and power outages amid a Covid-19 ridden heat wave. While recovery efforts have already started, it’ll be days before rivers crest and potentially weeks before power is restored.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">We encourage you to reach out to trusted, mainstream organizations to make financial donations.</span><br />
<br />
When it comes to unsolicited, inbound requests for money for Hurricane Ida victims, it’s best to ignore them. <a href="https://www.avast.com/c-scam?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">Scammers</a> often use major disasters to lure unsuspecting (and often elderly) victims who want to help using various methods. They’ll use <a href="https://blog.avast.com/how-to-identify-phone-scams-avast?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">phone calls</a>, <a href="https://blog.avast.com/seo-moving-scams-avast?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">web ads</a>, fake emails, and even <a href="https://www.forbes.com/sites/jamiegold/2021/08/31/new-hurricane-scams-target-homeowners-in-person-and-online/?sh=f3a808f3ba48" target="_blank" rel="noopener" class="mycode_url">in-person</a> visits to ask for relief donations. No matter how convincing or legitimate they may seem — just ignore them.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How you can help</span><br />
<br />
If you want to help those in need, it’s up to you to take the first step and reach out to a reputable charity. If you want to check up on a charity before reaching out, use one of these trusted resources: Better Business Bureau's <a href="https://give.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Wise Giving Alliance</span></a>, the <a href="https://www.charitynavigator.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Charity Navigator</span></a>, <a href="https://www.charitywatch.org/charities" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Charity Watch</span></a>, or <a href="https://www2.guidestar.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">GuideStar</span></a>.<br />
<br />
What’s more, if you suspect that you’ve come across an Ida-related scam, here’s how you can <a href="https://www.avast.com/c-report-internet-scam?_ga=2.194017896.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">report online scams and fraud</a>.<br />
The following list of agencies helping with Hurricane Ida relief has been published by <a href="https://weather.com/news/news/2021-08-30-hurricane-ida-how-to-help" target="_blank" rel="noopener" class="mycode_url">Weather.com</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">American Red Cross</span><br />
<br />
Help people affected by Hurricane Ida by visiting <a href="https://www.redcross.org/donate/cm/weathercomibm-emp.html/" target="_blank" rel="noopener" class="mycode_url">the Red Cross website</a> or calling 800-RED-CROSS. Donations directed toward Hurricane Ida enable the Red Cross to respond to and help people recover from this disaster. This includes providing food, shelter, relief supplies, emotional support and other assistance. If you have the time, you can make a significant impact as a Red Cross volunteer. Review the <a href="https://www.redcross.org/volunteer/become-a-volunteer/urgent-need-for-volunteers.html" target="_blank" rel="noopener" class="mycode_url">most urgently needed volunteer positions</a> online.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">GoFundMe</span><br />
<br />
<a href="https://www.gofundme.com/c/about-us" target="_blank" rel="noopener" class="mycode_url">GoFundMe</a> connects you to people who need help. The Weather Channel and GoFundMe have teamed up to help people in the path of a natural disaster be prepared and recover quicker than ever before. If a hurricane has impacted you or someone you know, you can start a GoFundMe to get on the road to recovery. You can <a href="https://www.gofundme.com/c/act/theweatherchannel?utm_source=weather-channel&amp;utm_medium=partner&amp;utm_content=link&amp;utm_campaign=start-gofundme%20" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">request help</span></a> or <a href="https://www.gofundme.com/c/act/hurricane-ida-fundraisers?utm_source=weather-channel&amp;utm_medium=partner&amp;utm_content=link&amp;utm_campaign=ida" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">donate</span></a> to someone in need.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Catholic Charities</span><br />
<br />
Catholic Charities of Acadiana is listing ways for people to help the victims of Hurricane Ida, whether it be by monetary donation or volunteer work. Check the links and information below for ways to help.<ul class="mycode_list"><li>Monetary donations: Use <a href="https://www.classy.org/give/135136/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">this online form</a> or text RELIEF to 797979. Checks can be mailed to: Catholic Charities of Acadiana, PO Box 3177, Lafayette, LA 70502.<br />
<br />
</li>
<li>Disaster Amazon Wishlist: Make <a href="https://bit.ly/CCADisasterAmazon" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">In-kind donations</span></a> to assist in the disaster.<br />
<br />
</li>
<li>To volunteer: Fill out the Hurricane Idea <a href="https://airtable.com/shrT6cWNA1e8uJMru" target="_blank" rel="noopener" class="mycode_url">support form</a>.<br />
<br />
</li>
<li>To request help: Request help from Catholic Charities of Acadiana and Acadiana VOAD partners by texting DISASTER to 797979 or fill out the <a href="https://bit.ly/2021DisasterRecoveryForm" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">disaster recovery form</span></a>.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">United Way</span><br />
<br />
United Way of Southeast Louisiana is accepting donations and looking for volunteers. It has set up a fund to support both short- and long-term relief efforts. You can find more information on its <a href="https://www.unitedway.org/local/united-states/louisiana/united-way-of-southeast-louisiana" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">website</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Salvation Army</span><br />
<br />
The Salvation Army also operates a command unit, refrigerated truck, a laundry unit, shower unit, bunkhouse, and two Field Kitchens. These kitchens can produce between 15,000-20,000 meals per day. Visit The Salvation Army <a href="https://give.helpsalvationarmy.org/give/166081/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">online</a> or call 1-800-SAL-ARMY (1-800-725-2769).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">World Central Kitchen</span><br />
<br />
Chef José Andrés, who leads an organization that provides food relief in areas hit by disaster, tweeted that a team in New Orleans would activate its three kitchen facilities in the city. He said they have supplies already on hand for more than 100,000 meals. Those who wish to help can <a href="https://donate.wck.org/give/236738/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">donate using the WCK website</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Mercy Chefs</span><br />
<br />
Mercy Chefs has served more than 15 million meals to people affected by natural disasters or who have other needs. The group has deployed two mobile kitchens to serve hot meals in Ida’s wake. Donate through <a href="https://mercychefs.com/donation/" target="_blank" rel="noopener" class="mycode_url">Mercy Chefs' website</a>. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">All Hands and Hearts</span><br />
<br />
All Hands and Hearts deploys volunteers to disaster sites to help with cleaning, rebuilding homes and creating a long-term recovery plan. You can donate to its <a href="https://www.allhandsandhearts.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Ida fund</span></a> or sign up to volunteer.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Americares</span><br />
<br />
Americares has a <a href="https://secure.americares.org/site/Donation2?26635.donation=form1&amp;df_id=26635&amp;utm_source=DI22H5U4&amp;utm_medium=web&amp;utm_campaign=22_august_emergency_response" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">fund</span></a> to support its deliveries of medicine, personal protective equipment and medical supplies to disaster areas.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Save the Children</span><br />
<br />
Save the Children is mobilizing its emergency response team to help children and families in the affected areas. The organization will be collaborating with local education partners in Louisiana and Mississippi to help restore child care and early learning centers impacted by Ida. It has set up an <a href="https://support.savethechildren.org/site/Donation2?df_id=5383&amp;mfc_&amp;5383.donation=form1" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Ida Children's Relief Fund</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Operation Blessing</span><br />
<br />
Operation Blessing partners, staff, and disaster relief volunteers are the first on the ground, partnering with emergency management and local churches to bring food, clean water, medicine and other vital supplies to meet the immediate needs of those suffering. <a href="https://www.ob.org/" target="_blank" rel="noopener" class="mycode_url">Donate online</a> or visit the <a href="https://www.ob.org/disaster-relief/volunteer/" target="_blank" rel="noopener" class="mycode_url">Operation Blessing website</a> to find out how you can volunteer.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Rebuilding Together</span><br />
<br />
Rebuilding Together helps local homeowners make critical repairs. There are three ways to help: Donate materials through <a href="https://www.amazon.com/hz/wishlist/genericItemsPage/2D2R21IZQHRDA" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Rebuilding Together New Orleans’ Amazon wish list</span></a>. If you know anyone who has been impacted, share the crisis clean-up hotline number with them: (844) 965-1386. Make a donation to Rebuilding Together’s Hurricane Ida <a href="https://rebuildingtogether.org/hurricaneida" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">disaster recovery fund</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">International Medical Corps</span><br />
<br />
International Medical Corps provides emergency relief to those struck by disaster and disease. Donate using their <a href="https://give.internationalmedicalcorps.org/page/89106/donate/1?ea.tracking.id=DP~ERHI~DPHHS2208" target="_blank" rel="noopener" class="mycode_url">dedicated donation web page</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Pet Relief Agencies</span><br />
<br />
Humane Society Disaster Relief: Donate <a href="https://www.humanesociety.org/disaster-relief" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">online</span></a>.<br />
Louisiana SPCA: Donate <a href="https://give.louisianaspca.org/production?cl=LASPC&amp;pg=hurricane__template&amp;amt=30,50,70,150&amp;ref=rkd_lb_hurricaneida" target="_blank" rel="noopener" class="mycode_url">online</a>.<br />
Mississippi ASPCA: Donate <a href="https://secure.aspca.org/donate/donate?ms=wb_rig_cat-20210219&amp;initialms=wb_rig_cat-20210219&amp;pcode=WEBMEMBER&amp;lpcode=WEBGUARD" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">online</span></a>.<br />
...</blockquote>
<a href="https://blog.avast.com/beware-hurricane-ida-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/hurricane-ida-scams.jpg" loading="lazy"  alt="[Image: hurricane-ida-scams.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Ignore lures and reach out to reputable charities like the Red Cross</span><br />
<br />
Hurricane Ida has left a path of destruction along the entire east coast of the United States. While the storm has passed, millions of Americans have been displaced by record-breaking rain, deadly flash flooding, and power outages amid a Covid-19 ridden heat wave. While recovery efforts have already started, it’ll be days before rivers crest and potentially weeks before power is restored.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">We encourage you to reach out to trusted, mainstream organizations to make financial donations.</span><br />
<br />
When it comes to unsolicited, inbound requests for money for Hurricane Ida victims, it’s best to ignore them. <a href="https://www.avast.com/c-scam?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">Scammers</a> often use major disasters to lure unsuspecting (and often elderly) victims who want to help using various methods. They’ll use <a href="https://blog.avast.com/how-to-identify-phone-scams-avast?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">phone calls</a>, <a href="https://blog.avast.com/seo-moving-scams-avast?_ga=2.240082246.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">web ads</a>, fake emails, and even <a href="https://www.forbes.com/sites/jamiegold/2021/08/31/new-hurricane-scams-target-homeowners-in-person-and-online/?sh=f3a808f3ba48" target="_blank" rel="noopener" class="mycode_url">in-person</a> visits to ask for relief donations. No matter how convincing or legitimate they may seem — just ignore them.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How you can help</span><br />
<br />
If you want to help those in need, it’s up to you to take the first step and reach out to a reputable charity. If you want to check up on a charity before reaching out, use one of these trusted resources: Better Business Bureau's <a href="https://give.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Wise Giving Alliance</span></a>, the <a href="https://www.charitynavigator.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Charity Navigator</span></a>, <a href="https://www.charitywatch.org/charities" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Charity Watch</span></a>, or <a href="https://www2.guidestar.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">GuideStar</span></a>.<br />
<br />
What’s more, if you suspect that you’ve come across an Ida-related scam, here’s how you can <a href="https://www.avast.com/c-report-internet-scam?_ga=2.194017896.457280323.1630665350-815330206.1630665350" target="_blank" rel="noopener" class="mycode_url">report online scams and fraud</a>.<br />
The following list of agencies helping with Hurricane Ida relief has been published by <a href="https://weather.com/news/news/2021-08-30-hurricane-ida-how-to-help" target="_blank" rel="noopener" class="mycode_url">Weather.com</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">American Red Cross</span><br />
<br />
Help people affected by Hurricane Ida by visiting <a href="https://www.redcross.org/donate/cm/weathercomibm-emp.html/" target="_blank" rel="noopener" class="mycode_url">the Red Cross website</a> or calling 800-RED-CROSS. Donations directed toward Hurricane Ida enable the Red Cross to respond to and help people recover from this disaster. This includes providing food, shelter, relief supplies, emotional support and other assistance. If you have the time, you can make a significant impact as a Red Cross volunteer. Review the <a href="https://www.redcross.org/volunteer/become-a-volunteer/urgent-need-for-volunteers.html" target="_blank" rel="noopener" class="mycode_url">most urgently needed volunteer positions</a> online.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">GoFundMe</span><br />
<br />
<a href="https://www.gofundme.com/c/about-us" target="_blank" rel="noopener" class="mycode_url">GoFundMe</a> connects you to people who need help. The Weather Channel and GoFundMe have teamed up to help people in the path of a natural disaster be prepared and recover quicker than ever before. If a hurricane has impacted you or someone you know, you can start a GoFundMe to get on the road to recovery. You can <a href="https://www.gofundme.com/c/act/theweatherchannel?utm_source=weather-channel&amp;utm_medium=partner&amp;utm_content=link&amp;utm_campaign=start-gofundme%20" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">request help</span></a> or <a href="https://www.gofundme.com/c/act/hurricane-ida-fundraisers?utm_source=weather-channel&amp;utm_medium=partner&amp;utm_content=link&amp;utm_campaign=ida" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">donate</span></a> to someone in need.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Catholic Charities</span><br />
<br />
Catholic Charities of Acadiana is listing ways for people to help the victims of Hurricane Ida, whether it be by monetary donation or volunteer work. Check the links and information below for ways to help.<ul class="mycode_list"><li>Monetary donations: Use <a href="https://www.classy.org/give/135136/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">this online form</a> or text RELIEF to 797979. Checks can be mailed to: Catholic Charities of Acadiana, PO Box 3177, Lafayette, LA 70502.<br />
<br />
</li>
<li>Disaster Amazon Wishlist: Make <a href="https://bit.ly/CCADisasterAmazon" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">In-kind donations</span></a> to assist in the disaster.<br />
<br />
</li>
<li>To volunteer: Fill out the Hurricane Idea <a href="https://airtable.com/shrT6cWNA1e8uJMru" target="_blank" rel="noopener" class="mycode_url">support form</a>.<br />
<br />
</li>
<li>To request help: Request help from Catholic Charities of Acadiana and Acadiana VOAD partners by texting DISASTER to 797979 or fill out the <a href="https://bit.ly/2021DisasterRecoveryForm" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">disaster recovery form</span></a>.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">United Way</span><br />
<br />
United Way of Southeast Louisiana is accepting donations and looking for volunteers. It has set up a fund to support both short- and long-term relief efforts. You can find more information on its <a href="https://www.unitedway.org/local/united-states/louisiana/united-way-of-southeast-louisiana" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">website</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Salvation Army</span><br />
<br />
The Salvation Army also operates a command unit, refrigerated truck, a laundry unit, shower unit, bunkhouse, and two Field Kitchens. These kitchens can produce between 15,000-20,000 meals per day. Visit The Salvation Army <a href="https://give.helpsalvationarmy.org/give/166081/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">online</a> or call 1-800-SAL-ARMY (1-800-725-2769).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">World Central Kitchen</span><br />
<br />
Chef José Andrés, who leads an organization that provides food relief in areas hit by disaster, tweeted that a team in New Orleans would activate its three kitchen facilities in the city. He said they have supplies already on hand for more than 100,000 meals. Those who wish to help can <a href="https://donate.wck.org/give/236738/#!/donation/checkout" target="_blank" rel="noopener" class="mycode_url">donate using the WCK website</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Mercy Chefs</span><br />
<br />
Mercy Chefs has served more than 15 million meals to people affected by natural disasters or who have other needs. The group has deployed two mobile kitchens to serve hot meals in Ida’s wake. Donate through <a href="https://mercychefs.com/donation/" target="_blank" rel="noopener" class="mycode_url">Mercy Chefs' website</a>. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">All Hands and Hearts</span><br />
<br />
All Hands and Hearts deploys volunteers to disaster sites to help with cleaning, rebuilding homes and creating a long-term recovery plan. You can donate to its <a href="https://www.allhandsandhearts.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Ida fund</span></a> or sign up to volunteer.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Americares</span><br />
<br />
Americares has a <a href="https://secure.americares.org/site/Donation2?26635.donation=form1&amp;df_id=26635&amp;utm_source=DI22H5U4&amp;utm_medium=web&amp;utm_campaign=22_august_emergency_response" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">fund</span></a> to support its deliveries of medicine, personal protective equipment and medical supplies to disaster areas.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Save the Children</span><br />
<br />
Save the Children is mobilizing its emergency response team to help children and families in the affected areas. The organization will be collaborating with local education partners in Louisiana and Mississippi to help restore child care and early learning centers impacted by Ida. It has set up an <a href="https://support.savethechildren.org/site/Donation2?df_id=5383&amp;mfc_&amp;5383.donation=form1" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Ida Children's Relief Fund</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Operation Blessing</span><br />
<br />
Operation Blessing partners, staff, and disaster relief volunteers are the first on the ground, partnering with emergency management and local churches to bring food, clean water, medicine and other vital supplies to meet the immediate needs of those suffering. <a href="https://www.ob.org/" target="_blank" rel="noopener" class="mycode_url">Donate online</a> or visit the <a href="https://www.ob.org/disaster-relief/volunteer/" target="_blank" rel="noopener" class="mycode_url">Operation Blessing website</a> to find out how you can volunteer.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Rebuilding Together</span><br />
<br />
Rebuilding Together helps local homeowners make critical repairs. There are three ways to help: Donate materials through <a href="https://www.amazon.com/hz/wishlist/genericItemsPage/2D2R21IZQHRDA" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Rebuilding Together New Orleans’ Amazon wish list</span></a>. If you know anyone who has been impacted, share the crisis clean-up hotline number with them: (844) 965-1386. Make a donation to Rebuilding Together’s Hurricane Ida <a href="https://rebuildingtogether.org/hurricaneida" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">disaster recovery fund</span></a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">International Medical Corps</span><br />
<br />
International Medical Corps provides emergency relief to those struck by disaster and disease. Donate using their <a href="https://give.internationalmedicalcorps.org/page/89106/donate/1?ea.tracking.id=DP~ERHI~DPHHS2208" target="_blank" rel="noopener" class="mycode_url">dedicated donation web page</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Pet Relief Agencies</span><br />
<br />
Humane Society Disaster Relief: Donate <a href="https://www.humanesociety.org/disaster-relief" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">online</span></a>.<br />
Louisiana SPCA: Donate <a href="https://give.louisianaspca.org/production?cl=LASPC&amp;pg=hurricane__template&amp;amt=30,50,70,150&amp;ref=rkd_lb_hurricaneida" target="_blank" rel="noopener" class="mycode_url">online</a>.<br />
Mississippi ASPCA: Donate <a href="https://secure.aspca.org/donate/donate?ms=wb_rig_cat-20210219&amp;initialms=wb_rig_cat-20210219&amp;pcode=WEBMEMBER&amp;lpcode=WEBGUARD" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">online</span></a>.<br />
...</blockquote>
<a href="https://blog.avast.com/beware-hurricane-ida-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: What happens if classrooms get sent home again?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=15996</link>
			<pubDate>Wed, 01 Sep 2021 07:10:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=15996</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/empty-covid-classroom.jpg" loading="lazy"  alt="[Image: empty-covid-classroom.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">How to be prepared for a surprise school shutdown</span><br />
<br />
School is back in session. But for how long? The <a href="https://www.cdc.gov/coronavirus/2019-ncov/variants/delta-variant.html#:~:text=data%20are%20published%20or%20released,CDC%20is%20continuing%20to%20asses" target="_blank" rel="noopener" class="mycode_url">Delta variant</a> has caused a significant rise in cases and has reversed the steady decline of Covid-19 infections since January. The variant is more contagious, causes more severe illnesses, and in some cases, has even infected people who have already been vaccinated. <br />
<br />
It’s entirely possible that not long after the few weeks of school, we may need to go back to attending school from home. Are you prepared? Are your devices and home network still secure? <br />
<br />
Here’s a short list of simple tips to help you get prepared for another school shutdown:<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Revisit your router.</span><br />
</li>
</ol>
When’s the last time you checked your connection? Restart your network router and update your account credentials. Your router is your home network’s main connection to the internet–and to cyber threats. Updates help keep your network safe. Consider a <a href="https://www.avast.com/en-us/omni?&amp;_ga=2.93163925.989396075.1630308042-1890565304.1630308041#omni" target="_blank" rel="noopener" class="mycode_url">physical firewall</a> device to protect against infiltration. <br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Vaccinate your device.</span><br />
</li>
</ol>
It’s not a perfect analogy. Of course a vaccination doesn’t really work the same as <a href="https://www.avast.com/en-us/ultimate?_ga=2.93163925.989396075.1630308042-1890565304.1630308041" target="_blank" rel="noopener" class="mycode_url">anti-virus software protection</a>, but did you know while parents believe that distance learning is a major concern for data privacy and digital security, they haven’t done anything about it? No virus is a good virus. Knock 'em out.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Get creative with your passphrases.</span><br />
</li>
</ol>
Reset ALL of your device and account passwords with long passphrases that are easy for your family to remember, but hard to be hacked. If you have too many to remember, use a secure credential service to help you out.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Have THE talk.</span><br />
</li>
</ol>
Birds and bees aside, sit your kids down to remind and reinforce good habits about safe surfing and the dangers of online predators. Be honest about why you may have set up parental controls, limited screen time, and <a href="https://www.avast.com/en-us/ultimate?&amp;_ga=2.92044050.989396075.1630308042-1890565304.1630308041#media-header" target="_blank" rel="noopener" class="mycode_url">anti-tracking</a> protocols on your network. It’s for their safety and your entire family’s privacy and security.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Practice what you preach.</span><br />
</li>
</ol>
Kids have an amazing sense for hypocrisy. Setting up appropriate digital boundaries doesn’t just apply to privacy and security, it also applies to the habits we form as families. If you don’t structure time away from screens, chances are, it won’t happen. Use the potential of school cancelation as an amazing opportunity to plan to spend more quality time outdoors and face-to-face with your kids instead of driving them back and forth to school.<br />
<br />
Every cloud has a silver lining. If you are open to seeking the positive opportunities that come with surprises–which is easier when you plan ahead–you’ll spend less time stressing and more time enjoying life. Time with your family is precious. Seize every moment you have together. These are trying times. Stay safe and healthy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Be ultimately prepared</span><br />
<br />
Avast Ultimate is a suite of everything you need to look after all your family’s devices in one easy-to-use service complete with tuneup and cleanup tools.<br />
<br />
Advanced antivirus and anti-tracking privacy protection features prevent malware while blocking stalkers and advertisers from following your family’s online activity. <br />
<br />
Check out <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.92044050.989396075.1630308042-1890565304.1630308041" target="_blank" rel="noopener" class="mycode_url">our Back-to-School Sale</a> to save on a year’s subscription of Avast Ultimate.<br />
...</blockquote>
<a href="https://blog.avast.com/back-to-school-tips-for-a-surprise-quarantine-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/empty-covid-classroom.jpg" loading="lazy"  alt="[Image: empty-covid-classroom.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">How to be prepared for a surprise school shutdown</span><br />
<br />
School is back in session. But for how long? The <a href="https://www.cdc.gov/coronavirus/2019-ncov/variants/delta-variant.html#:~:text=data%20are%20published%20or%20released,CDC%20is%20continuing%20to%20asses" target="_blank" rel="noopener" class="mycode_url">Delta variant</a> has caused a significant rise in cases and has reversed the steady decline of Covid-19 infections since January. The variant is more contagious, causes more severe illnesses, and in some cases, has even infected people who have already been vaccinated. <br />
<br />
It’s entirely possible that not long after the few weeks of school, we may need to go back to attending school from home. Are you prepared? Are your devices and home network still secure? <br />
<br />
Here’s a short list of simple tips to help you get prepared for another school shutdown:<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Revisit your router.</span><br />
</li>
</ol>
When’s the last time you checked your connection? Restart your network router and update your account credentials. Your router is your home network’s main connection to the internet–and to cyber threats. Updates help keep your network safe. Consider a <a href="https://www.avast.com/en-us/omni?&amp;_ga=2.93163925.989396075.1630308042-1890565304.1630308041#omni" target="_blank" rel="noopener" class="mycode_url">physical firewall</a> device to protect against infiltration. <br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Vaccinate your device.</span><br />
</li>
</ol>
It’s not a perfect analogy. Of course a vaccination doesn’t really work the same as <a href="https://www.avast.com/en-us/ultimate?_ga=2.93163925.989396075.1630308042-1890565304.1630308041" target="_blank" rel="noopener" class="mycode_url">anti-virus software protection</a>, but did you know while parents believe that distance learning is a major concern for data privacy and digital security, they haven’t done anything about it? No virus is a good virus. Knock 'em out.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Get creative with your passphrases.</span><br />
</li>
</ol>
Reset ALL of your device and account passwords with long passphrases that are easy for your family to remember, but hard to be hacked. If you have too many to remember, use a secure credential service to help you out.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Have THE talk.</span><br />
</li>
</ol>
Birds and bees aside, sit your kids down to remind and reinforce good habits about safe surfing and the dangers of online predators. Be honest about why you may have set up parental controls, limited screen time, and <a href="https://www.avast.com/en-us/ultimate?&amp;_ga=2.92044050.989396075.1630308042-1890565304.1630308041#media-header" target="_blank" rel="noopener" class="mycode_url">anti-tracking</a> protocols on your network. It’s for their safety and your entire family’s privacy and security.<br />
<ol type="1" class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Practice what you preach.</span><br />
</li>
</ol>
Kids have an amazing sense for hypocrisy. Setting up appropriate digital boundaries doesn’t just apply to privacy and security, it also applies to the habits we form as families. If you don’t structure time away from screens, chances are, it won’t happen. Use the potential of school cancelation as an amazing opportunity to plan to spend more quality time outdoors and face-to-face with your kids instead of driving them back and forth to school.<br />
<br />
Every cloud has a silver lining. If you are open to seeking the positive opportunities that come with surprises–which is easier when you plan ahead–you’ll spend less time stressing and more time enjoying life. Time with your family is precious. Seize every moment you have together. These are trying times. Stay safe and healthy.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Be ultimately prepared</span><br />
<br />
Avast Ultimate is a suite of everything you need to look after all your family’s devices in one easy-to-use service complete with tuneup and cleanup tools.<br />
<br />
Advanced antivirus and anti-tracking privacy protection features prevent malware while blocking stalkers and advertisers from following your family’s online activity. <br />
<br />
Check out <a href="https://www.avast.com/ultimate?utm_source=avastblog&amp;utm_medium=blogpost&amp;utm_campaign=back_to_school21&amp;utm_id=bts21&amp;utm_content=blog3aug21&amp;_ga=2.92044050.989396075.1630308042-1890565304.1630308041" target="_blank" rel="noopener" class="mycode_url">our Back-to-School Sale</a> to save on a year’s subscription of Avast Ultimate.<br />
...</blockquote>
<a href="https://blog.avast.com/back-to-school-tips-for-a-surprise-quarantine-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: What does Apple know about you?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=15972</link>
			<pubDate>Sun, 29 Aug 2021 10:16:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=15972</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/WDTIKAM_Apple.jpg" loading="lazy"  alt="[Image: WDTIKAM_Apple.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">In this world of data collection and processing, Apple takes the lead on privacy</span><br />
<br />
When it comes to online privacy, one Big Tech company has taken the lead. I’ll give you a hint: Their name is a fruit and their founder really liked black turtlenecks. <br />
<br />
Ding ding ding! If you guessed Apple, you’re right on the money. The tech behemoth has planted a flag in the privacy space, doubling down on the idea that it’s a “fundamental human right” and cracking down on apps and services that track users and compile data. This year alone we’ve seen them roll out <a href="https://blog.avast.com/apple-and-digital-identity-avast?_ga=2.156761139.925485066.1630045926-865712009.1630045926" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">anti-tracking features</span></a> — including the option to opt-out of app tracking — and a <a href="https://blog.avast.com/apple-hide-my-email-avast?_ga=2.156761139.925485066.1630045926-865712009.1630045926" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Hide My Email feature</span></a> that helps protect people from data breaches. <br />
<br />
They’re not perfect, of course. Apple has been criticized for the potential for <a href="https://www.wired.com/story/opinion-apples-privacy-mythology-doesnt-match-reality/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">law enforcement to access data that’s stored on iCloud</span></a>. There are serious questions about <a href="https://www.politico.eu/article/apple-privacy-problem/" target="_blank" rel="noopener" class="mycode_url">how data is collected and used within the Apple ecosystem</a>. But I spend all day every day writing about online security and privacy and I’m being completely up front when I tell you that I recommend Apple to my friends and family because of their privacy measures. Again: it’s definitely not perfect. But Apple is further along the privacy path than the majority of their competitors. <br />
<br />
So with all of that in mind, let’s take a look at Apple for this installment of <span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What does Apple track?</span><br />
<br />
Apple obviously has <span style="font-style: italic;" class="mycode_i">a lot</span> of different products, so let’s take a look at their overarching<a href="https://www.apple.com/legal/privacy/" target="_blank" rel="noopener" class="mycode_url"> <span style="color: #1155cc;" class="mycode_color">Privacy Policy</span></a>. They explicitly state the situations in which they’ll collect data, which include when you “create an Apple ID, apply for commercial credit, purchase and/or activate a product or device, download a software update, register for a class at an Apple Store, connect to our services, contact us (including by social media), participate in an online survey, or otherwise interact with Apple.”<br />
<br />
If you do any of those things, they might ask for the following:<ul class="mycode_list"><li>Account information, including your Apple ID, email, devices, account status, and age<br />
</li>
<li>Device information, like your serial number or browser type<br />
</li>
<li>Contact info you provide<br />
</li>
<li>Payment info you provide<br />
</li>
<li>Transaction info, like which Apple products you’ve purchased and when <br />
</li>
<li>Fraud prevention information<br />
</li>
<li>Usage data, like which apps you’re using, your browsing and search history, product interaction, crash data, and performance and other diagnostic data<br />
</li>
<li>Location info, which is only precise when using “Find My,” otherwise it’s not exact<br />
</li>
<li>Health information, if you use their Health app or the health features of Apple Watch<br />
</li>
<li>Financial information, if you provide it for any “Apple-branded financial offerings”<br />
</li>
<li>Government ID, if required by your local government for certain services <br />
</li>
<li>Anything you share via email, social, or other communication with Apple<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">What does Apple do with my data?</span><br />
<br />
Apple primarily uses my data to deliver the services I’ve asked for. They specifically state in their Privacy Policy that they retain personal data “only for so long as necessary to fulfill the purposes for which it was collected.” They also might share it with service providers, who are bound by Apple’s Privacy Policy, and third parties like financial institutions they partner with in order to provide services like Apple Card or Apple Cash. <br />
<br />
The most ambiguous group that Apple may share my data with is titled “Others.” That category includes neutral “others,” like my carrier when I activated my account, and much less neutral “others,” like law enforcement or national security officers. However, Apple has so far been pretty resistant to law enforcement efforts to access individuals’ devices, even when they’ve been accused of atrocious crimes. So do with that what you will. <br />
<br />
There’s a noticeable group missing from the list of who Apple shares data with and if you’ve been reading along with <span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span> for a while, you’ve probably already spotted it: Advertisers. Apple doesn’t share my data with advertisers and doesn’t compile it with other data sets to serve me targeted ads.<br />
<br />
They do, however, process a lot of my data and use it to sell ads within their own ecosystem. It’s kind of a weird grey area, because they’re not sharing it with third parties but they’re still collecting and using it. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Is it worth it?</span><br />
<br />
I kind of gave away the verdict in the opening of this article, but I’ll reiterate it here: If you care about privacy, Apple is the way to go. Is it perfect? No. Are there still advances to be made? Absolutely. Do I have concerns? One hundred percent. But in this world of data collection and processing, they’re better than nothing.<br />
...</blockquote>
<a href="https://blog.avast.com/what-apple-knows-about-you-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/WDTIKAM_Apple.jpg" loading="lazy"  alt="[Image: WDTIKAM_Apple.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">In this world of data collection and processing, Apple takes the lead on privacy</span><br />
<br />
When it comes to online privacy, one Big Tech company has taken the lead. I’ll give you a hint: Their name is a fruit and their founder really liked black turtlenecks. <br />
<br />
Ding ding ding! If you guessed Apple, you’re right on the money. The tech behemoth has planted a flag in the privacy space, doubling down on the idea that it’s a “fundamental human right” and cracking down on apps and services that track users and compile data. This year alone we’ve seen them roll out <a href="https://blog.avast.com/apple-and-digital-identity-avast?_ga=2.156761139.925485066.1630045926-865712009.1630045926" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">anti-tracking features</span></a> — including the option to opt-out of app tracking — and a <a href="https://blog.avast.com/apple-hide-my-email-avast?_ga=2.156761139.925485066.1630045926-865712009.1630045926" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Hide My Email feature</span></a> that helps protect people from data breaches. <br />
<br />
They’re not perfect, of course. Apple has been criticized for the potential for <a href="https://www.wired.com/story/opinion-apples-privacy-mythology-doesnt-match-reality/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">law enforcement to access data that’s stored on iCloud</span></a>. There are serious questions about <a href="https://www.politico.eu/article/apple-privacy-problem/" target="_blank" rel="noopener" class="mycode_url">how data is collected and used within the Apple ecosystem</a>. But I spend all day every day writing about online security and privacy and I’m being completely up front when I tell you that I recommend Apple to my friends and family because of their privacy measures. Again: it’s definitely not perfect. But Apple is further along the privacy path than the majority of their competitors. <br />
<br />
So with all of that in mind, let’s take a look at Apple for this installment of <span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What does Apple track?</span><br />
<br />
Apple obviously has <span style="font-style: italic;" class="mycode_i">a lot</span> of different products, so let’s take a look at their overarching<a href="https://www.apple.com/legal/privacy/" target="_blank" rel="noopener" class="mycode_url"> <span style="color: #1155cc;" class="mycode_color">Privacy Policy</span></a>. They explicitly state the situations in which they’ll collect data, which include when you “create an Apple ID, apply for commercial credit, purchase and/or activate a product or device, download a software update, register for a class at an Apple Store, connect to our services, contact us (including by social media), participate in an online survey, or otherwise interact with Apple.”<br />
<br />
If you do any of those things, they might ask for the following:<ul class="mycode_list"><li>Account information, including your Apple ID, email, devices, account status, and age<br />
</li>
<li>Device information, like your serial number or browser type<br />
</li>
<li>Contact info you provide<br />
</li>
<li>Payment info you provide<br />
</li>
<li>Transaction info, like which Apple products you’ve purchased and when <br />
</li>
<li>Fraud prevention information<br />
</li>
<li>Usage data, like which apps you’re using, your browsing and search history, product interaction, crash data, and performance and other diagnostic data<br />
</li>
<li>Location info, which is only precise when using “Find My,” otherwise it’s not exact<br />
</li>
<li>Health information, if you use their Health app or the health features of Apple Watch<br />
</li>
<li>Financial information, if you provide it for any “Apple-branded financial offerings”<br />
</li>
<li>Government ID, if required by your local government for certain services <br />
</li>
<li>Anything you share via email, social, or other communication with Apple<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">What does Apple do with my data?</span><br />
<br />
Apple primarily uses my data to deliver the services I’ve asked for. They specifically state in their Privacy Policy that they retain personal data “only for so long as necessary to fulfill the purposes for which it was collected.” They also might share it with service providers, who are bound by Apple’s Privacy Policy, and third parties like financial institutions they partner with in order to provide services like Apple Card or Apple Cash. <br />
<br />
The most ambiguous group that Apple may share my data with is titled “Others.” That category includes neutral “others,” like my carrier when I activated my account, and much less neutral “others,” like law enforcement or national security officers. However, Apple has so far been pretty resistant to law enforcement efforts to access individuals’ devices, even when they’ve been accused of atrocious crimes. So do with that what you will. <br />
<br />
There’s a noticeable group missing from the list of who Apple shares data with and if you’ve been reading along with <span style="font-style: italic;" class="mycode_i">What Does the Internet Know About Me?</span> for a while, you’ve probably already spotted it: Advertisers. Apple doesn’t share my data with advertisers and doesn’t compile it with other data sets to serve me targeted ads.<br />
<br />
They do, however, process a lot of my data and use it to sell ads within their own ecosystem. It’s kind of a weird grey area, because they’re not sharing it with third parties but they’re still collecting and using it. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Is it worth it?</span><br />
<br />
I kind of gave away the verdict in the opening of this article, but I’ll reiterate it here: If you care about privacy, Apple is the way to go. Is it perfect? No. Are there still advances to be made? Absolutely. Do I have concerns? One hundred percent. But in this world of data collection and processing, they’re better than nothing.<br />
...</blockquote>
<a href="https://blog.avast.com/what-apple-knows-about-you-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: Download a copy of your Facebook data using these steps]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=15955</link>
			<pubDate>Fri, 27 Aug 2021 06:59:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=15955</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/facebook-photos.jpg" loading="lazy"  alt="[Image: facebook-photos.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Prevent data loss by keeping a backup safe and sound on a local drive</span><br />
<br />
We’ve all heard its origin story. Facebook, originally <span style="font-style: italic;" class="mycode_i">TheFacebook</span>, was started in 2004 by Mark Zuckerberg and some of his Harvard classmates as a social site for the school alone. It was a big hit, of course, and suddenly other campuses wanted in. Over time, more and more schools were granted use of the platform, and soon certain businesses were allowed to use it as well. Then, in September 2006, Facebook opened its digital doors to any and all users (as long as they were over 13). <br />
<br />
This means next month marks the 15-year anniversary of that moment. The realization made me stop and think, <span style="font-style: italic;" class="mycode_i">when did I join Facebook? </span><br />
First, I remembered with nostalgia that it was back in 2008. Then, I realized with alarm that 13 years of my photos, comments, shares, and announcements – essentially all of my social media activity – have been logged and stored on Facebook’s servers, but not my own. If my account were to get hacked, I could lose it all. <br />
<br />
NPR <a href="https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299?t=1627968331530" target="_blank" rel="noopener" class="mycode_url">reported</a> that Facebook account hacks seem to be surging, which is why we strongly recommend <a href="https://blog.avast.com/how-to-enable-2fa-in-facebook-avast?_ga=2.210306901.1901658805.1629957932-209528666.1629957932" target="_blank" rel="noopener" class="mycode_url">setting up two-factor authentication</a> on your account. But while protecting data is good, having a backup copy is even better. That way, you’ll never experience data loss, no matter what happens. <br />
<br />
If you’re thinking, <span style="font-style: italic;" class="mycode_i">whoa, all my Facebook activity would comprise a pretty darn big file, </span>you’re right. It takes a few days for Facebook just to prep the file for your download. But it’s a very easy process and there is really no reason not to do it. Here’s how.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to download a copy of your Facebook info</span><br />
<ol type="1" class="mycode_list"><li>Click the “down arrow” account button in the upper right corner of Facebook<br />
<br />
</li>
<li>Select<span style="font-weight: bold;" class="mycode_b"> Settings &amp; Privacy</span>, then <span style="font-weight: bold;" class="mycode_b">Settings</span><br />
<br />
</li>
<li>On the left, click <span style="font-weight: bold;" class="mycode_b">Your Facebook Information</span><br />
<br />
</li>
<li>Next to <span style="font-weight: bold;" class="mycode_b">Download Your Information</span>, click <span style="font-weight: bold;" class="mycode_b">View</span><br />
<br />
</li>
<li>On this screen, you select your date range (it includes an <span style="font-weight: bold;" class="mycode_b">All Time</span> option), and you can choose categories of data to include in or leave out of your download. You also choose which quality you want for the photos and media, and in which format you want the download, HTML or JSON. (HTML will display your data like a web page in your browser, but JSON will give you more easily editable data.) <br />
<br />
</li>
<li>Click <span style="font-weight: bold;" class="mycode_b">Create File. </span>Your request will appear as <span style="font-weight: bold;" class="mycode_b">Pending</span> in the <span style="font-weight: bold;" class="mycode_b">Available Copies</span> section of the <span style="font-weight: bold;" class="mycode_b">Download Your Information</span> tool. It may take a few days, but once the file is ready, Facebook will send you a notification. <br />
<br />
</li>
<li>When it’s ready, transfer the file to an external hard drive so you’ll always have a backup copy. <br />
<br />
</li>
<li>In six months, do this again, but only choose the <span style="font-weight: bold;" class="mycode_b">Last 6 Months</span> date range. (Or do it every three months if you want. Or every month.)<br />
</li>
</ol>
Getting in the regular habit of downloading your Facebook data and adding it to the external hard drive will ensure that your social media pics, your witticisms, observations, and heartfelt words are all safely backed up, should anything ever go wrong with your account.<br />
<br />
I have always been an evangelist for <a href="https://blog.avast.com/world-backup-day-avast?_ga=2.162189052.1901658805.1629957932-209528666.1629957932" target="_blank" rel="noopener" class="mycode_url">backing up your data</a>, and with Facebook’s 15-year anniversary coming up, I just had to share this tip with you. I hope you pass it on to your loved ones. Facebook’s much too fun to have the threat of data loss hovering over it at all times. Toss away your worries by backing up your data.<br />
...</blockquote>
<br />
<a href="https://blog.avast.com/how-to-download-your-facebook-data-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/facebook-photos.jpg" loading="lazy"  alt="[Image: facebook-photos.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Prevent data loss by keeping a backup safe and sound on a local drive</span><br />
<br />
We’ve all heard its origin story. Facebook, originally <span style="font-style: italic;" class="mycode_i">TheFacebook</span>, was started in 2004 by Mark Zuckerberg and some of his Harvard classmates as a social site for the school alone. It was a big hit, of course, and suddenly other campuses wanted in. Over time, more and more schools were granted use of the platform, and soon certain businesses were allowed to use it as well. Then, in September 2006, Facebook opened its digital doors to any and all users (as long as they were over 13). <br />
<br />
This means next month marks the 15-year anniversary of that moment. The realization made me stop and think, <span style="font-style: italic;" class="mycode_i">when did I join Facebook? </span><br />
First, I remembered with nostalgia that it was back in 2008. Then, I realized with alarm that 13 years of my photos, comments, shares, and announcements – essentially all of my social media activity – have been logged and stored on Facebook’s servers, but not my own. If my account were to get hacked, I could lose it all. <br />
<br />
NPR <a href="https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299?t=1627968331530" target="_blank" rel="noopener" class="mycode_url">reported</a> that Facebook account hacks seem to be surging, which is why we strongly recommend <a href="https://blog.avast.com/how-to-enable-2fa-in-facebook-avast?_ga=2.210306901.1901658805.1629957932-209528666.1629957932" target="_blank" rel="noopener" class="mycode_url">setting up two-factor authentication</a> on your account. But while protecting data is good, having a backup copy is even better. That way, you’ll never experience data loss, no matter what happens. <br />
<br />
If you’re thinking, <span style="font-style: italic;" class="mycode_i">whoa, all my Facebook activity would comprise a pretty darn big file, </span>you’re right. It takes a few days for Facebook just to prep the file for your download. But it’s a very easy process and there is really no reason not to do it. Here’s how.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to download a copy of your Facebook info</span><br />
<ol type="1" class="mycode_list"><li>Click the “down arrow” account button in the upper right corner of Facebook<br />
<br />
</li>
<li>Select<span style="font-weight: bold;" class="mycode_b"> Settings &amp; Privacy</span>, then <span style="font-weight: bold;" class="mycode_b">Settings</span><br />
<br />
</li>
<li>On the left, click <span style="font-weight: bold;" class="mycode_b">Your Facebook Information</span><br />
<br />
</li>
<li>Next to <span style="font-weight: bold;" class="mycode_b">Download Your Information</span>, click <span style="font-weight: bold;" class="mycode_b">View</span><br />
<br />
</li>
<li>On this screen, you select your date range (it includes an <span style="font-weight: bold;" class="mycode_b">All Time</span> option), and you can choose categories of data to include in or leave out of your download. You also choose which quality you want for the photos and media, and in which format you want the download, HTML or JSON. (HTML will display your data like a web page in your browser, but JSON will give you more easily editable data.) <br />
<br />
</li>
<li>Click <span style="font-weight: bold;" class="mycode_b">Create File. </span>Your request will appear as <span style="font-weight: bold;" class="mycode_b">Pending</span> in the <span style="font-weight: bold;" class="mycode_b">Available Copies</span> section of the <span style="font-weight: bold;" class="mycode_b">Download Your Information</span> tool. It may take a few days, but once the file is ready, Facebook will send you a notification. <br />
<br />
</li>
<li>When it’s ready, transfer the file to an external hard drive so you’ll always have a backup copy. <br />
<br />
</li>
<li>In six months, do this again, but only choose the <span style="font-weight: bold;" class="mycode_b">Last 6 Months</span> date range. (Or do it every three months if you want. Or every month.)<br />
</li>
</ol>
Getting in the regular habit of downloading your Facebook data and adding it to the external hard drive will ensure that your social media pics, your witticisms, observations, and heartfelt words are all safely backed up, should anything ever go wrong with your account.<br />
<br />
I have always been an evangelist for <a href="https://blog.avast.com/world-backup-day-avast?_ga=2.162189052.1901658805.1629957932-209528666.1629957932" target="_blank" rel="noopener" class="mycode_url">backing up your data</a>, and with Facebook’s 15-year anniversary coming up, I just had to share this tip with you. I hope you pass it on to your loved ones. Facebook’s much too fun to have the threat of data loss hovering over it at all times. Toss away your worries by backing up your data.<br />
...</blockquote>
<br />
<a href="https://blog.avast.com/how-to-download-your-facebook-data-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Avast Blog_Tips & Advices: How to identify scam calls]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=15954</link>
			<pubDate>Fri, 27 Aug 2021 06:57:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=15954</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/CDC-covid-survey.jpg" loading="lazy"  alt="[Image: CDC-covid-survey.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Recently, someone called me from the CDC. How can I verify that they're legit?</span><br />
<br />
I got a weird call this weekend. That’s nothing special — my phone blows up with robocalls all day every day, just like everyone else’s — but the caller ID for this call caught my eye. It said “Cdc Natl Immun.” I thought about it for a second, then silenced it, assuming it was just another <a href="https://blog.avast.com/tag/covid-19-scams?_ga=2.179402029.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Covid-19 scam</span></a> call. Because, really, does the CDC show up like <span style="font-style: italic;" class="mycode_i">that</span> on caller ID? Seemed shady.<br />
<br />
Then they called back, from the same number, a few minutes later. So I thought, okay, maybe this really is the CDC! We <span style="font-style: italic;" class="mycode_i">are</span> in a pandemic and I want to do my civic duty, so let’s give them a shot.<br />
<br />
But when I picked up, I was immediately on guard. Remember: I write all day every day about scams, be they online or over the phone, so I know the tricky technology — <a href="https://blog.avast.com/tech-support-scammer-language-avast?_ga=2.179402029.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">and even language</span></a> — that scammers use to scam. This “CDC” guy was going to have to really prove himself to get me on his side. <br />
<br />
And he just… Didn’t. Convince me, that is. He had a weird affect and didn’t really explain why he was calling and started by asking me about whether I was over 18, if I was driving, and whether or not I had kids in the house. The whole thing just felt so strange to me, so I told him that I wasn’t convinced this was a real call and I hung up the phone.<br />
<br />
Turns out, I was wrong. A quick search for “CDC survey scam” led me to <a href="https://www.cdc.gov/vaccines/imz-managers/nis/participant/faqs.html" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">the CDC page explaining that it was legitimate</span></a>. Apparently, they’re making calls from three numbers with Chicago area codes — 312-871-4241, 312-871-4242, and 312-871-4243 — and the call I received appeared to be from one of those. (And I say “appeared” because, as we’ll get into later, it’s very easy to spoof a caller ID.)<br />
<br />
I realized I’d hung up on some poor dude who’s been hired by the CDC to do a national survey about kids and vaccines. And I felt like a jerk.<br />
So I thought, okay, how could this have gone better? Here’s what I found for next time.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Verify the caller ID.</span><br />
<br />
While Avast Threat Intelligence Director Michal Salát says he tells people to “never” answer phone surveys, he does say that if you want to participate, then the <span style="font-style: italic;" class="mycode_i">least</span> you can do is <a href="https://www.avast.com/en-us/breachguard?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">verify the caller ID number</a>. <br />
<br />
In the case of the call I received, it was really easy to find the CDC page that explained what was going on. I double-checked the URL of the website, to make sure it was really the CDC, and checked the security certificate. That felt like good verification to me.<br />
<br />
However, it’s important to remember: <a href="https://www.avast.com/c-spoofing?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">caller IDs <span style="font-style: italic;" class="mycode_i"><span style="color: #1155cc;" class="mycode_color">can</span></span><span style="color: #1155cc;" class="mycode_color"> be spoofed</span></a>. It’s probably a good idea to do one of the other tips here as well. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Call back on a verified number.</span><br />
<br />
Salát also recommends not giving any information to the person who calls you directly, but instead going online to find a verified phone number from a legitimate source.<br />
<br />
For example, in <a href="https://www.avast.com/c-tech-support-scams?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">tech support scams</a> it’s common for scammers to say they’re calling from Microsoft. It’s pretty easy to go to the official Microsoft “contact” information and figure out if the number that’s calling you is actually Microsoft. (Spoiler alert: It’s not.) <br />
<br />
For the CDC vaccine survey, I found the phone number 1-877-220-4805 to call in order to verify whether or not it was real. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Don’t give them any personal info.</span><br />
<br />
This is one of the reasons my scammer Spidey-senses were tingling on this call: I felt like he was about to ask me personal information and I know that’s a big no-no. “In general, if they are asking any personal questions or ask for personal data, you should hang up or tell them that you'll call back,” Salát says.<br />
<br />
But I realized after talking to Salát about the types of personal information you should never share — namely, any kind of ID number (like a social security number, for example), date of birth, where you live, what type of internet service you have, and any answers to popular security questions, for example — that the caller wasn’t asking for specifics. He literally asked me if I was over 18, whether I was driving at that exact moment, and whether there were children under the age of 18 in my house. <br />
<br />
Those are all legitimate questions that someone doing a survey for the CDC about kids and vaccines would ask. And I hung up on him. Yup, I’m a jerk.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Never pay.</span><br />
<br />
Finally, don’t send money — of any kind — to anyone who calls you out of the blue.<br />
<br />
“If they ask you to take some specific action which involves money in any form (checks, gift cards, money orders, Zelle, PayPal, etc.) — don't do it, “Avast Global Head of Security Jeff Williams says. Anyone with a legitimate need for this should not be doing this sort of thing by phone, email, Discord, SnapChat or anything similar.” <br />
<br />
This one is less relevant in the case of the CDC vaccine survey call but it’s <span style="font-style: italic;" class="mycode_i">so</span> common in other types of phone scams, so it’s worth mentioning. <br />
<br />
In conclusion, I didn’t do my civic duty. I hung up on a guy who was just trying to do his job. I felt like a jerk — but I don’t regret it. Because, ultimately, I’d rather be overly cautious with this type of thing than get scammed out of my life savings or have all the data on my computer or my identity stolen. <br />
<br />
But I do know that sometimes these calls are legitimate and important. So, CDC, if you’re reading? It might be time to do some trainings around what scam calls sound like, so you don’t sound like one. In the meantime, I think you’re going to get a lot of hung up calls.<br />
...</blockquote>
<a href="https://blog.avast.com/how-to-identify-phone-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><div style="text-align: center;" class="mycode_align"><img src="https://f.hubspotusercontent40.net/hub/4650993/CDC-covid-survey.jpg" loading="lazy"  alt="[Image: CDC-covid-survey.jpg]" class="mycode_img" /></div>
<br />
<span style="font-size: medium;" class="mycode_size">Recently, someone called me from the CDC. How can I verify that they're legit?</span><br />
<br />
I got a weird call this weekend. That’s nothing special — my phone blows up with robocalls all day every day, just like everyone else’s — but the caller ID for this call caught my eye. It said “Cdc Natl Immun.” I thought about it for a second, then silenced it, assuming it was just another <a href="https://blog.avast.com/tag/covid-19-scams?_ga=2.179402029.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">Covid-19 scam</span></a> call. Because, really, does the CDC show up like <span style="font-style: italic;" class="mycode_i">that</span> on caller ID? Seemed shady.<br />
<br />
Then they called back, from the same number, a few minutes later. So I thought, okay, maybe this really is the CDC! We <span style="font-style: italic;" class="mycode_i">are</span> in a pandemic and I want to do my civic duty, so let’s give them a shot.<br />
<br />
But when I picked up, I was immediately on guard. Remember: I write all day every day about scams, be they online or over the phone, so I know the tricky technology — <a href="https://blog.avast.com/tech-support-scammer-language-avast?_ga=2.179402029.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">and even language</span></a> — that scammers use to scam. This “CDC” guy was going to have to really prove himself to get me on his side. <br />
<br />
And he just… Didn’t. Convince me, that is. He had a weird affect and didn’t really explain why he was calling and started by asking me about whether I was over 18, if I was driving, and whether or not I had kids in the house. The whole thing just felt so strange to me, so I told him that I wasn’t convinced this was a real call and I hung up the phone.<br />
<br />
Turns out, I was wrong. A quick search for “CDC survey scam” led me to <a href="https://www.cdc.gov/vaccines/imz-managers/nis/participant/faqs.html" target="_blank" rel="noopener" class="mycode_url"><span style="color: #1155cc;" class="mycode_color">the CDC page explaining that it was legitimate</span></a>. Apparently, they’re making calls from three numbers with Chicago area codes — 312-871-4241, 312-871-4242, and 312-871-4243 — and the call I received appeared to be from one of those. (And I say “appeared” because, as we’ll get into later, it’s very easy to spoof a caller ID.)<br />
<br />
I realized I’d hung up on some poor dude who’s been hired by the CDC to do a national survey about kids and vaccines. And I felt like a jerk.<br />
So I thought, okay, how could this have gone better? Here’s what I found for next time.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Verify the caller ID.</span><br />
<br />
While Avast Threat Intelligence Director Michal Salát says he tells people to “never” answer phone surveys, he does say that if you want to participate, then the <span style="font-style: italic;" class="mycode_i">least</span> you can do is <a href="https://www.avast.com/en-us/breachguard?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">verify the caller ID number</a>. <br />
<br />
In the case of the call I received, it was really easy to find the CDC page that explained what was going on. I double-checked the URL of the website, to make sure it was really the CDC, and checked the security certificate. That felt like good verification to me.<br />
<br />
However, it’s important to remember: <a href="https://www.avast.com/c-spoofing?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">caller IDs <span style="font-style: italic;" class="mycode_i"><span style="color: #1155cc;" class="mycode_color">can</span></span><span style="color: #1155cc;" class="mycode_color"> be spoofed</span></a>. It’s probably a good idea to do one of the other tips here as well. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Call back on a verified number.</span><br />
<br />
Salát also recommends not giving any information to the person who calls you directly, but instead going online to find a verified phone number from a legitimate source.<br />
<br />
For example, in <a href="https://www.avast.com/c-tech-support-scams?_ga=2.147346494.881810979.1629707244-542470067.1629707244" target="_blank" rel="noopener" class="mycode_url">tech support scams</a> it’s common for scammers to say they’re calling from Microsoft. It’s pretty easy to go to the official Microsoft “contact” information and figure out if the number that’s calling you is actually Microsoft. (Spoiler alert: It’s not.) <br />
<br />
For the CDC vaccine survey, I found the phone number 1-877-220-4805 to call in order to verify whether or not it was real. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Don’t give them any personal info.</span><br />
<br />
This is one of the reasons my scammer Spidey-senses were tingling on this call: I felt like he was about to ask me personal information and I know that’s a big no-no. “In general, if they are asking any personal questions or ask for personal data, you should hang up or tell them that you'll call back,” Salát says.<br />
<br />
But I realized after talking to Salát about the types of personal information you should never share — namely, any kind of ID number (like a social security number, for example), date of birth, where you live, what type of internet service you have, and any answers to popular security questions, for example — that the caller wasn’t asking for specifics. He literally asked me if I was over 18, whether I was driving at that exact moment, and whether there were children under the age of 18 in my house. <br />
<br />
Those are all legitimate questions that someone doing a survey for the CDC about kids and vaccines would ask. And I hung up on him. Yup, I’m a jerk.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Never pay.</span><br />
<br />
Finally, don’t send money — of any kind — to anyone who calls you out of the blue.<br />
<br />
“If they ask you to take some specific action which involves money in any form (checks, gift cards, money orders, Zelle, PayPal, etc.) — don't do it, “Avast Global Head of Security Jeff Williams says. Anyone with a legitimate need for this should not be doing this sort of thing by phone, email, Discord, SnapChat or anything similar.” <br />
<br />
This one is less relevant in the case of the CDC vaccine survey call but it’s <span style="font-style: italic;" class="mycode_i">so</span> common in other types of phone scams, so it’s worth mentioning. <br />
<br />
In conclusion, I didn’t do my civic duty. I hung up on a guy who was just trying to do his job. I felt like a jerk — but I don’t regret it. Because, ultimately, I’d rather be overly cautious with this type of thing than get scammed out of my life savings or have all the data on my computer or my identity stolen. <br />
<br />
But I do know that sometimes these calls are legitimate and important. So, CDC, if you’re reading? It might be time to do some trainings around what scam calls sound like, so you don’t sound like one. In the meantime, I think you’re going to get a lot of hung up calls.<br />
...</blockquote>
<a href="https://blog.avast.com/how-to-identify-phone-scams-avast" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
	</channel>
</rss>