Archive for September 28, 2024

Job Scams That Will Compromise Your Safety

Job Scams That Will Compromise Your SafetyJob scams are on the rise. NBC reports that they increased by 118% from 2022. Job scams are essentially fake job postings. The scammer is trying to access your bank account and looking for your personal information. The rise in remote work and advancements in AI have made it easier for scammers to create convincing fake job listings.

Mark Anthony Dyson has written an interesting article on the Job Scam Report about conducting a safe job search. He warns that job scammers are hijacking the hiring process to steal personal information in the long run. However, they are also after cash in the short run. According to the FTC, the typical job scam victim in 2023 lost $2,000. Additionally, the article details five myths about job scams that are putting job seekers at risk.

Your future

Dyson says that bad guys are running scams to compromise personal info. The Better Business Bureau reports that employment scams were the number one riskiest scam for people ages 18-44 in 2023. Consequently, if scammers get hold of data, your future financial and employment will be adversely affected. 

He points out that most scams are just old scams with new layers and better disguises. They use basic social engineering tactics, like phishing links, infected files, and fake landing pages. We’ve known about all of these tactics for decades.

Dyson says some job seekers let their guard down, and others give up on their job search. However, this critical error in judgment makes everyone more vulnerable to job scam myths like:

Job scams ONLY target the desperate.

Scammers use social engineering to cast a wide net.False: Scammers use social engineering to cast a wide net. They want to find anyone looking for something better. They create offers that are “too good to be true” and uniquely plausible. The “offers” are designed to pique the interest of the receiver. The BBB warns that if you are offered a job without a formal interview with excellent pay and benefits, it’s likely a scam.

How to stay safe: Don’t entertain the possibilities unless you know who sent it to you. One way to verify the sender is to search for the number quickly in Google. If the number is associated with a legitimate business, you should see that the business’s website appears in the first few results. Verify that the number shows up on that business’s website.

Job scams are easy to spot.

False: Job scams evolve just as the job market changes. The author points out that job scams increase when unemployment and uncertainty rise. The growing use of AI is currently driving this trend.  

How to stay safe: Read articles like this about job scams. In addition, check out the Better Business Bureau’s Scam Tracker, which catalogs over 34,000 scams. The BBB is working closely with the FBI to identify scammers.

Legitimate companies won’t ask for personal or financial information.

Legitimate companies don't ask for personal information upfrontTrue: Legitimate companies don’t ask for personal information upfront as a candidate. Once hired, your personal information, such as your social security number or bank account, is necessary, but not before you are hired. Moreover, the BBB states you should be especially wary if someone pressures you to divulge your information, saying the job offer will only last if you fill out all the forms.

How to stay safe: Follow your instincts. Never give sensitive information to anyone you aren’t sure you can trust. Does something seem “a little off?” If that is the case, disconnect and report the crime to the FBI’s ic3.gov or the FTC. You should also contact the job board if that’s where you encountered the scam. Most job sites have a mechanism for reporting these types of issues.

Additionally, Dyson says you must contact the appropriate institutions (bank, credit card, etc.) if you have given up your personal information, cash, or both.

Once scammed, you’ll know how not to get scammed again.

False: No matter how tech-savvy you may be, you are still vulnerable to social engineering tactics. You can be a victim more than once. Different scams can look the same. The bad guys take advantage of job seekers who are desperate and anxious; others are curious due to the “desirable” opportunity they seek.

How to stay safe: You must do your due diligence and research every part of your job search to ensure the opportunity is legitimate. Research the person who contacted you. Look them up. A quick LinkedIn search should reveal if they work for the company they claim to represent. Additionally, you can find the company’s contact information on their official website (check the URL) and contact them directly to ask if they are hiring for the position you’re applying for. You can go even further and verify the website at ICANN here. If they say they’ve been in business for five years, but the website was created a week ago, that is a huge red flag for a job scam.

Once scammed, there’s nothing more to do.

your personal information is their end gameFalse: Once you’re an online scam victim, the work is just beginning. The scammers may have gotten away with some money, but your personal information is their end game. They want to steal your identity and cause damage to YOUR NAME:

They can use your personal info to:

  • Get bank accounts.
  • Open Credit cards.
  • Incur Medical care resulting in medical bills.
  • Apply to multiple jobs in the same company.
  • Scam other people.

How to stay safe: Start before they scam you. Be proactive and protect your personal information. The author suggests you:

  • Regularly change your passwords.
  • Freeze your credit and bank accounts and credit reports.

Furthermore, if you fall victim to a scam, tell your network. The scammers can create social media accounts to scam others in your name.

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Can You Identify AI Images? Find Out Now!

Can You Identify AI Images? Find Out Now!Artificial Intelligence (AI) is the tech-du jour.  A significant 77% of consumers have already interacted with AI platforms in their daily lives. Nevertheless, when distinguishing between machine-generated images and real ones, only 40% of people are successful. Although some images are straightforward, prepare to be amazed by how realistic AI-generated images can be—or how peculiar real-life photos can appear. To test your AI acumen, Microsoft has designed a quiz. Can you accurately identify AI-generated images from real ones?

Real or Not quiz

SpidermanThe Real or Not quiz features fifteen distinct photos curated by Brad Smith, Microsoft’s Vice Chair and president. To begin with, your task is to determine whether each image is machine-generated or a genuine photograph. Furthermore, the quiz dynamically selects different images for each attempt, allowing you to test your AI senses continually.

My repeated attempts at the quiz yielded no straightforward answers. The BOT’s ability to produce convincing images is impressive. My highest score was 11 out of 15, achieving a commendable 73%. Finally, the results also provide context by comparing your score to other Real or Not participants. You can also include your scores at the bottom of this to see how you score compared to other Bach Seat readers.

Clues to AI

When examining images, watch for subtle clues that reveal whether they are AI-generated or authentic. While the expert AI excels at creating overall authentic scenes, scrutinizing finer details often reveals peculiarities.

AI Yoga Fail Pay attention to:

  • Doors merging.
  • Ladders that lead to nowhere.
  • Heavy machinery that is oddly placed and appears pristine.

Consider the eyes: Are they natural or flat? As for hands, AI still struggles. While improvements have been made, odd-looking fingers persist in AI images. Conversely, complex hand gestures or positions often indicate real photos.

rb-

These Artificial Intelligence-generated images pose a significant threat in political and cultural contexts. Any user can fabricate compromising images of public figures. This underscores the importance of vigilant scrutiny. Those who mindlessly doom scrolling may miss the subtle clues that reveal the true nature of the images they encounter.

Remember, as AI technology continues to evolve, our ability to discern between real and AI-generated content becomes even more critical. Stay curious, stay informed, and always question what you see online. 

Take the Microsoft Artificial Intelligence quiz and post your results here.

View Results

Loading ... Loading ...

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Passwords: Don’t Make These Mistakes to Stay Safe

Passwords: Don’t Make These Mistakes to Stay SafeIn 2023, over 1.7 billion passwords were compromised. This number is over five times the population of the United States or an average of over 46,000 passwords per minute. Compromised records refer to personal data, such as passwords, that have been stolen or leaked, often through data breaches or hacking attacks. Chances are good that some of your credentials are out there. These compromised records often end up on the dark web. The dark web, a hidden part of the internet accessible only through specialized software, is known for its anonymity and is often used for illegal activities. Hackers use the dark web to buy, sell, trade, or steal data, as seen in the recent Rockyou2024 data leak. This makes it a popular marketplace for hackers to acquire compromised passwords and other sensitive information. Once hackers have the data, they engage in a process of guessing, information gathering, and tricking to commit identity theft. Each phase is designed to exploit the data that the attackers already possess.

The hackers try to guess your password

Don't Be Hacked! Avoid These Password MistakesHackers can launch a brute-force attack with just an email address. A brute force attack is an automated, trial-and-error method known as “password spraying.” In password spraying, a cyber attacker tries common passwords across many accounts, avoiding account lockouts and remaining undetected. For hackers, a list of passwords is merely a starting point. Bad actors employ a variety of tactics to decipher your credentials.

They try sequential number combinations – Hackers often try sequential number combinations. As the table below shows, most passwords share a common feature: sequential numbers, such as 12345. Avoid using these in your passwords as they make them predictable and easy to guess

NordPass top 5 worst passwords 2019 - 2023

20192020202120222023
0112345123456123456password123456
02123456123456789123456789123456admin
03123456789picture11234512345678912345678
04test1passwordqwertyguest123456789
05password12345678passwordqwerty1234
NordPass

Using sequential numbers is also a bad idea for the four-digit PIN of your debit card.

They guess common phrases – Hackers often guess common phrases. Therefore, avoid using common words or phrases. Common words or phrases in passwords are predictable and can be easily cracked. While they may be easy for you to remember, they are also among the first passwords that hackers will guess.

In lists of the most common passwords, the word “password” has consistently been in the top 10 for the past five years. Phrases such as “Admin,” “iloveyou,” “qwerty,” and “guest” frequently appear in the top 25.

substitutions in passwordsThey look for substitutions – Hackers often look for substitutions. Using common words with case and numerical substitutions in a password is risky. Attackers frequently use dictionary attacks. Dictionary attacks occur when the bad guys attempt common words, phrases, and predictable substitutions. Attackers often use common words with case and numerical substitutions, such as ‘4’ for ‘A,’ ‘3’ for ‘E,’ ‘1’ for ‘I,’ and ‘0’ for ‘O’.” Therefore, even with these substitutions, your password could still be relatively easy to crack. For example, they will try “password,” “Password,” “Pa$$word,” and “Passw0rd” too.

Next they gather information

They try pet and family names – Hackers often try pet and family names. In your passwords, do not use easily guessable information such as your pet’s, child’s, or spouse’s name. Bing warns that this kind of personal information can often be found on social media or through other means. This makes it easier for someone to guess your password. An attacker who has obtained some of your personal information may also check your family’s accounts to try to access your records.

They use significant dates – Hackers often use significant dates. Just like family names, it’s not good to use significant dates such as a birthday, anniversary, or a loved one’s birthday as passwords. These dates are easy to guess because they are memorable. Hackers can easily guess or discover special dates through social media. Hackers can also figure them out quite easily if they have access to your personal information.

Hackers try to trick you into giving them your passwords

trick you into giving them your passwordThey go phishing – Hackers often go phishing. Phishing is one of the easiest ways for attackers to obtain your credentials. They send out bogus emails disguised as legitimate ones. Malicious actors send phishing emails to trick you into revealing personal information (such as passwords and credit card numbers) through fake emails or websites.

Clicking on a phishing email will redirect you to a fake website. Once there, they will capture your user ID and password. Therefore, don’t open emails from unknown sources.

Job phishingJob phishing is a scam that takes advantage of the unemployed or those looking to change jobs. Job scammers may send emails or create fake job listings that require applicants to provide personal information or pay fees upfront. Be wary of job offers that seem too good or ask for sensitive information before an interview.

Hackers often use password reset questions – Have you ever registered your username and password with a company for tech support or some swag? And then later, did you receive an email asking if you requested a password change, even though you didn’t? It was probably a hacker.

Cybercriminals can use your password reset questions to change your password and lock you out of your account. For instance, if you suddenly find yourself unable to access your Facebook account, you may have been hacked.

One way to prevent this is by providing nonsensical answers to security questions. Instead of providing accurate information, provide quirky responses that only you would know. The next time your account asks where you were born, You could say Butterfly.

SPAM BotsThey create bots –If they have exhausted their resources, hackers have one final tool to break your code. They can create a bot. A phishing bot is a program that automatically sends fake emails or messages to trick people into revealing personal information. The bot can try every possible combination of user ID and password. Modern computers can be very fast at guessing passwords. Here’s a breakdown:

  • Faster guesses for simpler passwords: Hackers can very quickly try millions of simple passwords (like “password123”).
  • Slower guesses for stronger passwords: More complex passwords with a mix of uppercase and lowercase letters, numbers, and symbols take much longer to crack.

rb-

The key is to make it as difficult as possible for hackers by using strong passwords. Even with powerful computers, a strong password can take years to crack.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

What You Could do with the NVIDIA Record Loss this Week?

Artificial intelligence bellwether stock NVIDIA (NVDA) announced its 2025 Q2 fiscal results on Tuesday. America’s second-largest public company ended the quarter with $30.04 billion in revenue. However, shares dropped 9.5%, leading to a $278.9 billion reduction in the company’s value.

What You Could do with the NVIDIA Record loss this week?

Analysts attribute NVIDIA’s stock decline to its Q3 revenue guidance of $32.5 billion, below the Wall Street ‘whisper number’ of $33 billion to $34 billion.

NVIDIA’s $278.9 billion loss is the largest single-day loss by a U.S. company, surpassing Meta’s $237 billion loss in February 2022.

Unexpected NVIDIA Q3 guidance

The unexpected Q3 guidance miss triggered a sell-off, likely driven by NVIDIA’s AI chips in trading systems, causing the $278.9 billion decline.

RB-

Sure, I could write about an AI Hype Cycle, a rickety economy, or a DOJ investigation with a 50/50 chance of a convicted felon becoming President. But it seemed more fun to put this loss into perspective:

  • A stack of $100 bills totaling $1 million would be about 43 inches tall (just over 3.5 feet). To put the enormity of NVIDIA's loss into perspective
  • Stacking $278.9 billion in $100 bills would reach approximately 189 miles, the distance from New York City to Washington, D.C.
  • It would also fill the Empire State Building 25 times over.

Or I could:

  • Buy Pebble Beach golf course for $3.2 Billion,
  • All 32 teams in the National Hockey League. The NHL can be got for $41.9 Billion, as well,
  • All 32 National Football League franchises. The entire NFL is worth $162 Billion,
  • End Homelessness in the U.S.
  • And still have cash on hand.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Labor Day 2024: Honoring Technology Workers

Labor Day 2024: Honoring Technology WorkersIn addition to honoring blue-collar workers, Labor Day also recognizes the vital role of technology workers. Traditionally associated with blue-collar labor, this day also acknowledges the essential role of technology workers who drive innovation and progress in our modern world. This year let’s shine a light on the growing unionization movement within the tech sector.

The Evolution of Labor Day

Labor Day originated in the late 19th century, during the height of the industrial age. At that time, labor unions fought for fair wages, reasonable working hours, and safer working conditions. Today, the labor landscape has evolved significantly, with technology workers at the forefront of this transformation.

The role of technology workers

The role of technology workers is multifaceted. Technology workers include developers, IT specialists, data scientists, and cybersecurity experts. These professionals drive modern innovations, ensuring smooth system operations, secure data, and continuous technological advancements.

Innovation and Progress: Tech workers drive many modern innovations we take for granted today. From developing cutting-edge software to creating sophisticated algorithms, their work has revolutionized industries such as healthcare, finance, and entertainment.

Adapting to Change: In the face of rapid technological evolution, tech workers must continually acquire new skills. This relentless pace necessitates a dedication to lifelong learning and a zeal for staying at the forefront of change. There is a growing trend of technology workers resorting to unionization to meet these challenges.

Remote Work and Flexibility: COVID-19 sped up remote work. As a result, tech workers adapted quickly. Their ability to work from anywhere has set a precedent for other industries, highlighting the importance of flexibility in the modern workplace.

Tech workers face a variety of challenges in today’s rapidly evolving industry. Some of the key issues they encounter include…

  1. Overwork is caused by talent shortages in high-skill jobs.
  2. Time-consuming and demanding continuous learning and development to maintain their jobs.
  3. New challenges from the shift to remote work in maintaining productivity, collaboration, and work-life balance.

The rise of Labor Day in the tech sector

However, despite their significant contributions, technology workers face unique challenges. Unionization is becoming an increasingly important tool for addressing these issues.

Burnout and Work-Life Balance: Tech jobs can be demanding, leading to burnout. Unions can help by advocating for better conditions. Long hours, tight deadlines, and the pressure to constantly innovate can also damage mental and physical health. Unions can advocate for better working conditions, reasonable hours, and mental health support.

Diversity and Inclusion: The tech industry has made strides in promoting diversity and inclusion, but work still needs to be done. Unions can be crucial in ensuring that technology workers from diverse backgrounds have equal opportunities and are treated fairly.

Job Security and Automation: As technology advances, there is a growing concern about job security. Automation and artificial intelligence have the potential to replace certain roles, making it essential for technology workers to continuously upskill and stay relevant in the job market. Unions can help negotiate retraining programs and job security measures.

Notable unionization efforts

Tech workers are increasingly unionizing. For instance, workers at companies like Google, Kickstarter, and Glitch have formed unions. These efforts are often met with resistance from management, but they represent a critical shift in the industry.

Alphabet Workers Union: In 2021, Google employees formed the Alphabet Workers Union, which aims to address issues such as pay disparity, harassment, and ethical concerns.
Kickstarter Union: Kickstarter employees successfully unionized in 2020, becoming one of the first tech companies to do so. Their union focuses on issues like job security, diversity, and fair wages.
Glitch Union: Software engineers at Glitch made history by signing a collective bargaining agreement, highlighting the growing unionization trend among tech workers.

The future of tech on Labor Day

Looking ahead, the role of technology workers will only become more critical. Emerging fields such as artificial intelligence, quantum computing, and biotechnology will require skilled professionals to navigate complex challenges and drive progress.

Sustainable Technology: Tech workers will help develop sustainable solutions for climate change. Their work will be instrumental in building a greener future, from creating energy-efficient systems to advancing renewable energy technologies.

Ethical Considerations: With great power comes great responsibility. Technology workers must consider the ethical implications of their work, ensuring that advancements are used for the greater good and do not perpetuate harm or inequality.

Global Collaboration: The tech industry is inherently global, with professionals collaborating across borders to solve complex problems. This interconnectedness fosters a spirit of cooperation and innovation, driving progress on a global scale.

Conclusion

Therefore, as we celebrate Labor Day, it’s important to recognize the contributions of technology workers and support their efforts to unionize. As we celebrate Labor Day, it’s important to recognize the invaluable contributions of technology workers and the growing movement of unionization within the tech sector. Their dedication, innovation, and resilience have shaped the modern world and will continue to drive progress in the years to come. Let’s honor their efforts and support them in overcoming the challenges they face, ensuring a brighter future for all.

Happy Labor Day to all the technology workers out there! Your hard work and ingenuity are truly appreciated.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.