This project is used to explore what different possibilities such as risks and threats there are when using computers. We will do this by locating two news articles recently that express cyber security issues.
This article shares how when you connect a Bluetooth device to your phone, hackers are able to gain access to everything you are listening to or hearing. This includes conversations that are being held. They also found that if this Bluetooth device had never been connected to a google account, they were able to pair it with a malicious google account to then be able to track where the device goes. This isn't as big of an issue as it may seem. They did a lot of research and found that the only way someone is able to do this is if they are within close proximity. Public spaces are where you need to be safer. Make sure you have the most up to date updates. Make sure you turn off your Bluetooth when you are not using it. Make sure you have your phone connected to a google account. We want to limit the amount someone is able to take from us.
Who published the content? Max Eddy
Where was it published? The New York Times
When was it published? January 16, 2026
The truthfulness and integrity of the facts: Considered accurate, had lots of data and research, had ways to solve the problem
How is it written and presented? Had no adds, written very well, had headings to separate each topic, and got right to the point
Links and Citations: Links to different headphones that have been affected, which ones are the best, and more articles with information
Wireless Earbuds Can Be Hacked. Here’s How to Protect Yourself. | Reviews by Wirecutter
This article is about how county officials sent two payments to a fraudulent bank account. These payments were sent out about a week apart. They are investigating both of these cases in attempt to get their money back, however it is not guaranteed. There are many different groups working on this report, the sheriffs office, the state police, the U.S. Department of Justice, and the comptrollers office. This article gives no information as to how this affects everyone, whether the people who submitted the payment are being held for their actions, or whether they will be having people go through more training to prevent this in the future. But, in my opinion, if this happens there should definitely be more training, whether it is $3, $33, or $3.3M.
Who published the content? Felix Day
Where was it published? 6 News WRGB ALBANY
When was it published? December 31, 2025
The truthfulness and integrity of the facts: Considered accurate, provided facts, letting everyone know what happened
How is it written and presented? No ads, provided the video link when they announced it live, not enough information presented
Links and Citations: No links used
Warren County Treasurer's Office mistakenly sends $3.3M in phishing scam
Through this assignment, I was able to see how much and how often these cyber issues are happening. It is probably best not to keep up to date with it too much. Do your best to do all the right things, keep your technology updated, check for accuracy, be careful.