MacDirectory magazine is the premiere creative lifestyle magazine for Apple enthusiasts featuring interviews, in-depth tech reviews, Apple news, insights, latest Apple patents, apps, market analysis, entertainment and more.
Issue link: https://digital.macdirectory.com/i/1505412
accuracy. These tools are rapidly taking us to a future in which it will be difficult to know whether that familiar voice on the phone really is who they say they are! How to defend against AI voice scams The authors of the McAfee report on AI voice scams offer some suggestions for how to protect yourself from this futuristic risk: Set all of your social media accounts to private: Bad actors often find their targets using social networks. So make yourself hard to find. Don’t overshare your voice or video online: AI cloning tools need a sample in order to be effective. The larger the sample, the easier it is for these tools to impersonate you. Ask a challenge question: If you receive a suspicious call, verify the identity of the person calling by asking a question that a scammer wouldn’t know the answer to. Make sure the question is something you’ve never talked about online, and something that only the person calling would know—if they are who they say they are! Set up a codeword with kids and family: A codeword can be used to authenticate themselves if they need to call for help in an emergency—in other words, in the type of real-world situation that bad guys use as AI voice scam pretexts. Tips for security when working remotely Remote work went mainstream during the pandemic, and it’s likely here to stay. But that opens up a vast new attack surface for bad actors. The folks at ZDNet have put together a list of tips to help remote workers stay safe. The article is well worth reading in full, but here’s a highlights-only version if you’re short on time: • If you must use public Wi-Fi, make sure you’re protected by a VPN. • Use an anti-malware tool. Your company has probably already provided one—but if not, install a reputable security app on your device. • Update your devices regularly—including IoT devices and routers. This will help reduce your home network’s vulnerability to attack. • Always use strong, unique passwords. To this we’d add: Be sure to use 2FA for better security. • Be aware of household risks. This includes physical risks to your devices (a curious cat and a cup of coffee can kill a laptop) as well as privacy risks from people in your house. Keep your devices in safe places and never leave them unlocked if you need to step away. About SecureMac Founded in 1999, SecureMac (www.securemac.com) has been a leading contributor to Apple security since the 2005 release of the original MacScan anti-malware tool. In the years since, SecureMac has continued to play an essential role in providing macOS users with straightforward options for better security. From the development of the faster and more powerful MacScan 3 to the company’s ongoing development of online privacy tool PrivacyScan, users can easily equip themselves for protection. With the addition of The Checklist, SecureMac continues to showcase a deep commitment to accessible security and the importance of digital awareness for all Mac users. For more info visit www.securemac.com