Besides our class, we will be featuring a talk with Justin Janger, the Exchange Administrator for SDCCD. He will talk with us about our school emails, and the Enterprise version of SDCCD. Remember to submit questions to our padlet page. if there is something that you wish to know.
Student Diane reminded us of the Community Emergency Response Team. This provides training for volunteers who can then assist with emergencies in their community.
A student asked for more clarification on Bookmarks. As we know, the process is different with the many different browsers. I consulted with an AI called Claude, asking it to provide a detailed guide for the 4 browsers. This is what was created. Please look at the document and follow it for one browser. Was it accurate? Was it sufficient to create meaningful bookmarks? How might you edit the instructions to make it easier for others to follow?
https://www.pcworld.com/article/2530811/buy-a-usb-c-cable-avoid-six-common-mistakes.html
When purchasing a USB-C cable, it's essential to be aware of common pitfalls to ensure safety and optimal performance. Here are six key considerations:
Avoid No-Name Brands: Opt for cables from reputable manufacturers. Unknown brands may not adhere to safety standards, increasing the risk of malfunction or damage. Trusted brands include Anker, Apple, Belkin, Cable Matters, and Ugreen.
Steer Clear of USB-C to USB-A Cables: These cables are limited to data transfer speeds of 10Gbps and charging speeds of 15W. In contrast, USB-C to USB-C cables can handle up to 40Gbps and 240W, offering superior performance.
Consider Thunderbolt or USB4 Cables: Cables certified for Thunderbolt (3, 4, or 5) or USB4 standards meet stricter specifications, ensuring higher quality and performance. Investing in these can provide faster data transfer and more reliable charging.
Check the Cable's Weight: Heavier cables often indicate thicker wire gauges, which can deliver cleaner signals and better durability. Comparing weights can help identify higher-quality options.
Avoid Third-Party Magnetic Adapters: Magnetic adapters can pose risks such as exposure to environmental damage, debris shorting out pins, and electrical arcing during disconnection. It's safer to use standard connectors designed for USB-C specifications.
Dispose of Old USB-C Cables: Older cables, especially those from the early days of USB-C, may not comply with current safety standards and could potentially damage your devices. Replacing outdated cables with new, certified ones is a prudent choice.
What type should you buy? PC Mag tested them and offers some suggestions.
Amazon will be holding their annual Big Spring Sale from March 25 to March 31. Unfortunately, scammers will take it as an opportunity to take advantage of unsuspecting consumers. Here are three of the scams you should look out for:
Prime membership scams that start with a call, text or email from someone purporting to be an Amazon support person and warning of a supposed problem with your Prime account. You will see a sense of urgency in this email, and attackers will want you to click on a link where you will re-enter your credentials. If you do this, your account will be compromised.
You may receive an order confirmation claiming an issue with an order you have made such as payment failure, delivery problem, or even just asking for confirmation that it was really you that made the order for a big-ticket item. Again, you will be prompted to click a link taking you to a site where your account details, personal information or payment data gets compromised.
Sales listing scams such as fake storefronts selling fake, or non-existent, products that are designed to get your cash and then dash. You’ll either get sent counterfeit or inferior items, or nothing at all.
Amazon requests that if you are targeted, visit their help pages to find additional information on how to identify scams and report them at amazon.com/reportscam.
Also, remember to check the sender of any email or text they receive, and be aware that Amazon will never ask you to share sensitive information via phone, text or email.
https://www.pcmag.com/articles/avoid-tax-filing-scams-with-these-3-tips
1. Government Official Impersonators:
Scammers often flood their targets with various phishing messages, and with the help of AI, they’ve become more sophisticated and harder to recognize. They might claim the prospective victim owes back taxes and must pay immediately or face a severe consequence; or that the victim is in line for a massive refund but must take unusual, compromising steps to access it.
Note: The IRS only uses snail mail for communication, and documents will always have traceable reference numbers to verify if a letter is legit. Phone calls, emails, and texts claiming to be from the IRS are immediate red flags.
2. Shady Ghost-Like Tax Helpers
These scammers trick you with the promise of a bigger tax refund if they file your taxes for you, but they won't sign the return with a tax ID number (PTIN).
A “ghost preparer” is an unethical tax preparer who may charge inflated or fake fees and divert tax refunds to themselves instead of the taxpayer, allowing them to steal or skim funds. Red flags include if they will not sign your return, ask for a cash-only payment or base their fee on your refund amount. They may also create fake income or deductions to increase your refund and may ask to deposit your refund into their account. Always verify references and be cautious of promises that are too good to be true.
3. Tax Refund Looters
There are many good reasons to file your annual tax return early in the season. Getting it over with is one. But it also mitigates the risk that a hacker might undercut you by filing a fake return in your name. You can decrease the risk by getting g a unique identity protection PIN (IP PIN) from the IRS that enables you—and only you—to file your taxes.
From this article, we see 10 ways to prevent hacking. Nothing new, but good to remind us all!
Use an Antivirus: Ensure your computer has antivirus software. Windows 10 and 11 come with Microsoft Defender, offering basic protection. Alternatively, consider reputable third-party antivirus programs.
Utilize a Password Manager: To manage strong, unique passwords for each account, use a password manager. This tool securely stores and autofills your credentials, reducing the risk associated with password reuse.
Keep Software Updated: Regularly update your operating system and applications to patch security vulnerabilities. Enable automatic updates to ensure timely protection.
Avoid Unsupported Software: Discontinue the use of outdated operating systems and applications that no longer receive security updates, as they are susceptible to exploits.
Practice Safe Browsing: Be cautious when visiting unfamiliar websites or downloading files. Stick to reputable sites and avoid clicking on suspicious links.
Download from Trusted Sources: Only obtain software and files from official or well-known sources to minimize the risk of malware infections.
Recognize Phishing Scams: Learn to identify fraudulent communications that attempt to steal personal information. Be wary of unsolicited emails or messages requesting sensitive data.
Avoid Clicking Unsolicited Links: Refrain from clicking on unexpected links in emails, texts, or social media messages, as they may lead to malicious sites.
Use a Standard User Account: Operate your computer using a standard (non-administrator) account for daily activities. This limits the potential impact of malicious software
Enable Two-Factor Authentication (2FA): Activate 2FA on your accounts to add an extra layer of security, requiring a second form of verification beyond just a password.
Implementing these measures can significantly reduce your vulnerability to cyber threats.
https://www.theverge.com/news/629620/apple-iphone-e2ee-encryption-rcs-messaging-android
iPhone and Android users will be able to exchange end-to-end encrypted (E2EE) RCS messages in the near future thanks to newly updated RCS specifications. The GSM Association is a global organization unifying the mobile ecosystem. They announced that the latest RCS standard includes E2EE based on the Messaging Layer Security (MLS) protocol, enabling interoperable encryption between different platform providers for the first time. They stated that they had started working to enable E2EE on messages sent between Android and iPhone in September of last year.
E2EE is a privacy and security feature that prevents third parties, such as messaging providers or cell carriers, from viewing the content of your texts. The GSMA says the new RCS standard was developed in collaboration with “mobile operators, device manufacturers, and technology providers,” including Apple.
Apple introduced RCS support to iPhones as part of an iOS 18 update in September. While Apple’s proprietary iMessage system already supported E2EE, this wasn’t extended to RCS messaging because the previous RCS standard didn’t provide cross-platform support. Google messages enabled E2EE by default for RCS texts, but only conversations between Google Messages users were E2EE, and not those exchanged with iMessage users or users of other RCS clients on Android.
Apple has confirmed that they will add support for end-to-end encrypted RCS messages to iOS, iPadOS, macOS, and watchOS in future software updates. While no specific timeline has been provided by Apple, it is likely that this feature will be introduced with iOS 19.0 in the fall of 2025.