Here’s everything you should do to up your security before next year

Be honest: How many times this year have you skipped or scrolled past a much-needed update? Maybe you just wanted to log into Twitter, er, X without setting up multifactor authentication. Putting off these minor inconveniences adds up, and it could lead to an insecure tech setup just waiting to be exploited by an attacker.

So, now you're probably spending a few days sleeping in your childhood bed, and wondering when Uncle Dave will stop talking to you about buying gold stocks. There's never been a better time to take care of the less-than-riveting admin work of locking down your digital life. Here's a quick holiday checklist you and your loved ones (including Dave) can spend an hour doing during your holiday downtime to set up for a more secure year.

Update all your apps and devices

For the most current patches and options, you’ll need to start this security check up by updating all your devices and apps. The companies behind the tech have already done a lot of the work to keep you safe, but it’s your job to make sure that you’re taking full advantage of those updates. I’d recommend starting with operating system updates then apps second because there’s usually some new features reliant on the latest OS within other software. While you’re there, set up automatic updates so that you don’t have to worry about doing this manually in the future.

An attendee interacts with a display at the 23andMe booth at the RootsTech annual genealogical event in Salt Lake City, Utah, U.S., February 28, 2019.  REUTERS/George Frey
REUTERS / Reuters

Sign up for or update your password manager

Strong passwords are your first line of defense to keep your accounts safe, but they’re almost impossible to memorize and keep track of. Download a password manager to store this information for you, so that your passwords can be unguessable gibberish that you’ll actually use. Long term, it’s important to change these passwords every 90 days or so, and never to repeat across accounts. A password manager will help remind you of that, and even generate new password ideas for you. Unique and regularly-changing passwords help prevent attacks like credential stuffing, as we’ve seen make headlines in the recent 23andMe data breach.

Make sure you’re using MFA or, ideally, passkeys

Strong passwords are important, but it's well-known that they aren’t enough to keep unauthorized actors out of your account. Most people are familiar with using a text message code to grant access to an account. If you’re taking time out of your day to set this up, however, I would recommend using a third-party authenticator app or a hardware key for more secure options. Or, for companies that have switched to allowing passkeys at login, that’s usually your best bet.

This will be one of the more tedious parts of the checklist, so if you can’t sit down and knock out your major logins now, at least push yourself to make these changes each time you log into a website over the next couple of weeks. Being stuck with family for the holiday might not be your preferred opportunity to make this change, but there's sure to be an upcoming major snowstorm or bout seasonal depression just screaming to be harnessed for your technological well-being.

Consider a VPN, or at least a more secure browser

A strong VPN will keep your web browsing private. Whether it’s free or paid for, defaulting to using a VPN adds an extra layer of security to the work you’re doing online. Most have options to use it across different devices, or to run automatically on startup so that you can set it up once and forget about it. I would also recommend switching over to a secure browser like Tor that runs on a privacy-first platform for more sensitive online matters. Of course there’s a catch: VPNs and Tor can both slow down your browsing, or break certain website features. Updates to the services have helped over time, but even if you use it for just a portion of web browsing, some protection is better than none.

A blue glass globe-shaped paperweight rests on print headlines covering  aspects of Internet and computer-related crime.
RapidEye via Getty Images

Get up to date on the latest hacks and attack vectors

Keeping up with security news will help you determine what accounts need special attention versus where you can go on autopilot. Once you know whether a breach may have occurred or a password has been leaked, you can quickly make changes to accommodate. Websites already exist to see if you’ve been in a data breach, and most companies have an obligation to tell you if they’ve been impacted. When you also stay up to date on the latest scams and attacks, you know what red flags to look out for in your own inbox to stay proactive.

Tell brokers to stop selling your data

It’s surprisingly easy to stop companies from trading your privacy for cash. On top of getting in the habit of not sharing your cookies or granting location data, you can opt out of working with the top three major data brokers. Axiom, Oracle and Epsilon all have slightly different variations of the same form to fill out so that information like your home address and relatives’ names aren’t being sold for profit. This is a good start to getting your online privacy back, however, it can be more of a headache than just one opt out form.

You have to do this frequently to make sure your information hasn’t been readded to any of the broker sites, and if your information has already been sold to marketing companies, it’s too late to undo it. There are subscription service sites that can help track and continuously delete whatever information pops up for you, but starting with just Axiom, Oracle and Epsilon will still be a free, worthwhile step toward more privacy.

A Samsung rugged SSD
Samsung

Back up everything

Get an external hard drive or connect to the cloud and keep all of your data backed up. Do this regularly, so that even if your device quits or gets ransomed by an attacker, you aren't completely screwed. I’d recommend opting for something that can be set up automatically, so that you don’t have to keep constant track of it. That could look like spending the 99 cents per month on extra iCloud storage (or Google Drive or another in-house cloud tool) so that your phone gets backed up each night while you’re asleep. Windows and Mac also both do auto updates to an external drive on desktop, so you can set it and forget it.

Alternatively, you could install backup software onto a device so that it’s taken care of by a third party, but that may be less intuitive to set up. Just don’t forget to clean up your data storage every once in a while, too, so that you’re not holding onto useless screenshots or pictures of your ex from years ago that are taking up valuable space.

Make a plan to check in on your security settings more frequently

It’s overwhelming to play catch up. Going through a list like this can seem intimidating if you haven’t worried about it before. If you set up automatic updates and backups, it’ll take some of those repeat tasks off your plate. But since you’ll already, hopefully, be setting new passwords once a quarter, you can do a quick check up on your other security measures too. See if you’ve been a victim of a breach or identity theft, keep telling data brokers to get their hands off your information and find out if new VPNs or other software has been released that could make your security setup more seamless. Making it a part of the routine is much easier than annual sprees, and can help you catch a cybersecurity problem before it becomes unmanageable.

This article originally appeared on Engadget at https://www.engadget.com/heres-everything-you-should-do-to-up-your-security-before-next-year-143009276.html?src=rss

Zelle may refund your money if you were scammed

Zelle recently made a huge change to its policy that would give victims of certain scams the chance to get their money back. The payment processor has confirmed to Engadget that it started reimbursing customers for impostor scams, such as those perpetrated by bad actors pretending to be banks, businesses and government agencies, as of June 30 this year. Its parent company Early Warning Services, LLC, said this "goes beyond legal requirements." 

As Reuters noted when it reported Zelle's policy change, federal laws can only compel banks to reimburse customers if payments were made without their authorization, but not when they made the transfer themselves. The payment processor, which is run by seven US banks that include Bank of America, JP Morgan Chase and Wells Fargo, explained that it defines scams as instances wherein a customer made payment but didn't get what they were promised. It had anti-fraud policy from the time it was launched in 2017, but it only started returning money to customers who were scammed, possibly due to increasing scrutiny and pressure from authorities. 

"As the operator of Zelle, we continuously review and update our operating rules and technology practices to improve the consumer experience and address the dynamic nature of fraud and scams," Early Warning Services, LLC, told Engadget. "As of June 30, 2023, our bank and credit union participants must reimburse consumers for qualifying imposter scams, like when a scammer impersonates a bank to trick a consumer into sending them money with Zelle. The change ensures consistency across our network and goes beyond legal requirements.

Zelle has driven down fraud and scam rates as a result of these prevention and mitigation efforts consistently from 2022 to 2023, with increasingly more than 99.9% of Zelle transactions are without any reported fraud or scams," it added.

A series of stories published by The New York Times in 2022 put a spotlight on the growing number of scams and fraud schemes on Zelle. The publication had interviewed customers who were tricked into sending money to scammers but were denied reimbursement, because they had authorized the transactions. Senator Elizabeth Warren also conducted an investigation last year and found that "fraud and scams [jumped] more than 250 percent from over $90 million in 2020 to a pace exceeding $255 million in 2022." In November 2022, The Times reported that the seven banks that own Zelle were gearing up for a policy change that will reimburse scam victims. 

In Zelle's "Report a Scam" information page, users can submit the scammer's details, including what they were claiming to be, their name, website and their phone number. They also have to provide the payment ID for the transfer, the date it was made and a description of what the transaction was supposed to be about. Zelle said it will report the information provided to the recipient’s bank or credit union to help prevent others from falling victim to their schemes, but it's unclear how Zelle determines whether a scam refund claim is legitimate or not. 

"Zelle's platform changes are long overdue,” Senator Warren told Reuters. "The CFPB (Consumer Financial Protection Bureau) is standing with consumers, and I urge the agency to keep the pressure on Zelle to protect consumers from bad actors." 

This article originally appeared on Engadget at https://www.engadget.com/zelle-may-refund-your-money-if-you-were-scammed-062826335.html?src=rss

Data breach of Michigan healthcare giant exposes millions of records

Michigan-based healthcare nonprofit McLaren Health Care notified more than 2 million people about a data breach exposing personal information on Thursday, according to a data breach notification report. Unauthorized access to McLaren systems began on July 28 and lasted through August, but the individual impact varies from person to person. 

According to a notice on the McLaren website, the company learned of the breach on August 31. An investigation into the impacted files concluded on October 10, and if you'll take a look at today's date, it took an additional month for the company to let the public know about the incident.

"Potentially affected current and former patients of McLaren are encouraged to remain vigilant against incidents of identity theft by reviewing account statements and explanations of benefits for unusual activity and to report any suspicious activity promptly to your insurance company, health care provider, or financial institution," the nonprofit said in a statement.

While McLaren hasn't released any details about the attack, such as who is behind it or possible motivations, the ALPHV/BlackCat ransomware group claimed responsibility for the attack, according to Bleeping Computer. Ransomware groups are known to do this for publicity, but the actor behind an attack usually can't be confirmed until a third-party security researcher independently verifies it.

McLaren encompasses 13 hospitals and employs 490 physicians across Michigan and Indiana, with an annual revenue of $6.6 billion. Its offering identity protection services to affected people that enroll by February 9. There's currently no evidence that data leaked in the breach has been misused, according to McLaren. 

This article originally appeared on Engadget at https://www.engadget.com/data-breach-of-michigan-healthcare-giant-exposes-millions-of-records-153450209.html?src=rss

FTX founder Sam Bankman-Fried found guilty of fraud, faces up to 110 years in prison

A federal jury has found FTX founder Sam Bankman-Fried guilty on all seven counts of fraud and conspiracy, which he was charged with following the downfall of his cryptocurrency exchange. According to The New York Times, he faces a maximum sentence of 110 years in federal prison. SBF, as he's now infamously known, was arrested in the Bahamas back in December 2022 after the Department of Justice took a close look at his role in the rapid collapse of FTX. The agency examined whether he transferred hundreds of millions of dollars when the exchange filed for bankruptcy. (The company claimed it was hacked after around $600 million disappeared from its funds.) The DoJ also investigated whether FTX broke the law when it moved funds to its sister company, Alameda Research.

During SBF's trial, which took place over the past month, prosecutors argued that he used FTX funds to keep Alameda Research running. The fallen entrepreneur also founded the cryptocurrency hedge fund, which was ran by his girlfriend Caroline Ellison, who was aware that he used FTX customers' money to help Alameda meet its liabilities. Bankman-Fried previously denied that he deliberately misused FTX's funds. 

The Times says his lawyers tried to portray him as a math nerd who had to grapple with "forces largely outside of his control," but the jury clearly disagreed after the prosecution called Ellison and three of Bankman-Fried's former top advisers to the witness stand. Ellison and all of those advisers had pleaded guilty, with the Alameda Research chief admitting that she committed fraud at Bankman-Fried's direction. The FTX founder himself took the stand and said that he "deeply regret not taking a deeper look into" the $8 billion his hedge fund had borrowed from the cryptocurrency exchange. 

Bankman-Fried was charged with committing wire fraud against FTX customers; wire fraud on Alameda Research lenders; conspiracy to commit wire fraud against both; conspiracy to commit securities and commodities fraud on FTX customers; as well as conspiracy to commit money laundering. He is scheduled to be sentenced on March 28, 2024 by US District Judge Lewis A. Kaplan, who also presided over the FTX trial. 

This article originally appeared on Engadget at https://www.engadget.com/ftx-founder-sam-bankman-fried-found-guilty-on-seven-charges-of-fraud-and-conspiracy-012316105.html?src=rss