Archive for October 12, 2024

Haunted Michigan: A Journey Through the State’s Supernatural Side

Haunted Michigan: A Journey Through the State's Supernatural SideWhen does the Halloween season begin?  Is it when Starbucks has pumpkin spice lattes on tap?  No matter when the spooky season officially begins, it’s time to visit some creepy places.  The Pew Research Center reports that about 18% of Americans say they’ve seen ghosts, and 29% “felt in touch with someone who has died.” Here are some of the most haunted places in Michigan to visit this fall.

Metro Detroit haunted placesThe Whitney

Historic David Whitney House is home to The Whitney, one of the most ritzy-ist restaurants in Detroit.  The mansion reflects the economic might of old Detroit.  Lumber baron David Whitney Jr. built the mansion in 1894.  Since 1894, it has been many things, including a tuberculosis ward.  Rumor has it that David Whitney Jr.’s ghost still haunts the grounds.  There have been so many sightings that the current owners have opened the Ghostbar.  If you’re into the paranormal and need a cocktail, this is the place for you.

The Masonic Temple is haunted

Whitney, Jr. David.The Detroit Masonic Temple is just 1.5 miles south of the Whitney.  It is one of the most haunted places in Detroit.  It opened at its current location on Temple Avenue in 1926.  This new, much larger Temple included a public theater, where shows like The Romantics, John Mellencamp, and Duke Ellington played.  In 2013, the Temple was facing foreclosure.  However, Detroit native Jack White put up cash to cover most of the taxes required to keep the doors open for visitors and ghosts.

The Masonic Temple’s most famous ghost is its architect, George D. Mason.  The architect lost all his money financing the construction.  His wife left him and jumped from the building’s roof.  He has been seen at the bottom of the stairs, and even after locking the door to the roof, it always somehow becomes unlocked.  Several guests who have been to the Temple and the building’s night patrolmen are said to have seen his ghost.  The Temple has various cold spots; many people feel they are being watched in the building.

The Henry

Ten miles southwest of the Masonic Temple is the Henry.  Before it became The Henry, the hotel was a Ritz-Carlton.  As the Ritz, the hotel had considerable paranormal activity.  Guests at the hotel claim that doors would open and close on their own and lights would switch on and off without the assistance of a living person.  The French doors in room 418 reportedly opened on their own.

Furthermore, once the French doors were secured, they would jiggle without anyone touching them.  The lights in that room would also reportedly turn off and on without assistance.  Some people claim that the paranormal activity stopped after the hotel’s name change, but others still believe it is one of the most haunted places in Michigan.

Eloise

The former psychiatric hospital is home to numerous spiritsEloise Hospital, also known as Eloise Asylum, is located in Westland, Michigan, 8 miles southwest of the Henry.  Eloise is haunted.  The site opened in 1839 as the Wayne County Poorhouse.  The former psychiatric hospital is home to numerous spirits.  Paranormal investigators have reported seeing apparitions, hearing unexplained noises, and experiencing other eerie phenomena.  Jeff Adkins, the Detroit Paranormal Expeditions lead investigator, claims his group found paranormal activity in the wards on the second, third, and fifth floors.  Adkins described an incident where a walker mysteriously appeared in the middle of the hallway after he cleaned up the hallway.  “… The walker was in the middle of the walkway … We had to move it, and we had just walked through there.”

Today, Eloise Asylum offers haunted attractions and paranormal investigations during Halloween.

Mayo Hall

Michigan State UniversityThirty miles east of Eloise is the Michigan State University (MSU) campus.  Many MSU buildings are haunted.  One of the most widespread legends on campus is the haunting of Mary Mayo Hall. It was named after Mary Anne Mayo, a strong advocate for women’s education.  The hall has a long history of ghostly legends.  Some of the reported paranormal activities include:

Haunted Holmes Hall

Another haunted MSU site is Holmes Hall.  The paranormal activity in this building, including poltergeist activity with the elevators, is one of the most famous legends.  The five haunts of Holmes Hall are:

  • On the 6th floor of the west building, a shadowy enters an elevator; after a couple of seconds, the door immediately opens, and the elevator is empty.
  • Around 3 a.m., some have seen TWO figures waiting for a sixth-floor elevator.  These figures get into the elevator, but it doesn’t move.  Witnesses look into the elevator and see it’s empty.
  • Sometimes appliances and lights mysteriously turn on & off by themselves.
  • Some students have reported the shadowy shape of a male walking through their room during the night.
  • Doors and windows fly open and slam shut.

The Valley Camp haunted freighter

SS Valley CampFinally, 300 miles to the north is the retired freighter, SS Valley CampThe ship is now a museum in Sault Ste Marie and features exhibits on Great Lakes shipping and shipwrecks.  Among the displays are two lifeboats from the doomed SS Edmund Fitzgerald, which sank in 1975 in Lake Superior with no survivors.  The two lifeboats are among the few remnants ever recovered from the freighter.  Over the years, visitors and paranormal enthusiasts have reported an overwhelming sense of dread that subsides when they leave the Fitzgerald display.  Visitors to the ship also have reported eerie experiences, including:

  • Apparitions and shadow figures.
  • Disembodied voices and footsteps.
  • Other unexplained paranormal phenomena.

The museum offers haunted ship tours during the final weekend of October, which are particularly popular among those interested in the supernatural.

rb-

Ready to test your courage?  Plan your visit to one of these haunted destinations today.  These spooky locations, from grand mansions to historic asylums, offer a unique and thrilling experience.  Whether you believe in the paranormal or enjoy a good scare, Michigan’s haunted places will surely leave a lasting impression.

Don’t miss out on this unforgettable fall experience!

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Passkeys: The Future of Online Security

Passkeys: The Future of Online SecurityI have been writing about the impact of bad passwords since 2010. One of the most appalling bad password statistics comes from the Identity Theft Resource Center (ITRC). They have tracked over 1 billion data breach victims in the first half of 2024. Enough is enough, there is finally a workable answer to passwords: passkeys.

Passkeys were developed by the Fast Identity Online (FIDO) Alliance to log in to apps and websites without using a username and password combination. Instead, a passkey uses a pair of cryptographic keys generated by your device to unlock your account. Google and Apple will store your unique public key. Your private key is only stored on your device, and after your device authenticates your identity, the two keys combine to grant you access to your account.

According to FIDO research, 38% of consumers (PDF) are not familiar with passkey technology. A significant percentage of users do not understand passkeys, let alone trust them to protect their data and identities.

How passkeys work: A step-by-step guide

passkeys utilize public-key cryptography.Unlike traditional passwords, passkeys utilize public-key cryptography. That means every passkey has two parts: a public key and a private key. Together, they keep your accounts secure by allowing websites and apps to check that you are who you say you are. Here’s an overview of the passkey process:

  1. Creation: When you create a passkey, your device generates a pair of cryptographic keys – a public key and a private key.
  2. Storage: Apps or websites store your unique public key, while your private key is only stored on your device. After your device authenticates your identity, the two keys combine to grant you access to your account.
  3. Authentication: When you log in, the app or website sends a challenge to your device. Your device uses the private key to sign this challenge, proving your identity without revealing the private key.
  4. Verification: The app or website verifies the signed challenge using the public key. If it matches, you’re granted access.

The benefits of passkeys:

  • The benefits of passkeysStrong by default: You don’t have to create anything manually or worry about whether your private key is long or random enough.
  • No Need to Remember: You only need to authenticate with biometrics (or your device passcode) to sign in to your account.
  • Private Keys Are Never Shared: You don’t have to worry about how the website is storing your credentials.
  • Public Keys Can’t Be Used to Figure Out Your Private Key: If a criminal breaches a website’s servers, the best they can hope to find is your public key. The public key cannot be used to sign in to your account. Nor can it be reverse engineered to reveal your private key.
  • Strong Defense Against Malware: Criminals often create fake but seemingly authentic websites to trick you into sharing your login details.
  • Protection Against Ransomware: Many ransomware attacks start with social engineering emails. Once in, they continue by installing keystroke sniffing software that can watch people enter their IDs and passwords.
  • Improved User Experience: Signing in with a passkey is more convenient, faster, and smoother than using traditional passwords.

Why you should use a passkey instead of a password

Securing your online accounts is more important than ever in today’s digital age. Traditional passwords have been the go-to method for authentication for decades, but they come with several drawbacks. Here’s why you should consider using passkeys instead of passwords:

  • Enhanced Security: Passkeys use public-key cryptography, which involves a pair of cryptographic keys: a public key and a private key.
  • Convenience and Ease of Use: Remembering multiple complex passwords can be a hassle.
  • Protection Against Phishing: Phishing attacks are a common method used by cybercriminals to steal passwords.
  • Reduced Risk of Data Breaches: Data breaches often result in the exposure of millions of passwords.
  • Seamless Cross-Platform Experience: Passkeys are designed to work seamlessly across different devices and platforms.
  • Future-Proof Technology: As technology evolves, so do the methods used by cybercriminals.

Some consumers still don’t trust this form of security because they assume that anyone stealing their phone could log into their accounts. This isn’t true, as the criminal would still need your face, fingers, or eyes.

rb-

Even if you don’t fully trust passkeys, you should distrust your passwords more. It’s likely that your credentials have already been stolen and are on the dark web.

There is wide consensus in the tech community that passwords are an unsustainable security framework. Even password managers that let you use one strong master password could be at risk. First, some of them have been hacked and then there is the risk that those protected passwords are no longer secure.

A reasonable answer

A passwordless system is the only reasonable answer.

There is not a single passkey to solve all problems. You will have different passkeys for different systems and platforms.

However, this doesn’t really matter. The signup for passkeys is easy and consistent on all platforms in that there will never be a password attached to it. It will use the same biometrics you use for your other platforms, services, and their respective passkeys. In other words, it can feel like it’s one passkey for all online systems.

While passwords have served us well for decades, it’s time to embrace a more secure and convenient alternative. Passkeys offer enhanced security, ease of use, and protection against phishing and data breaches. By making the switch to passkeys, you can enjoy a safer and more seamless online experience. It’s true that the industry is still doing a poor job of explaining why you should embrace passkeys, you should like it because passkeys will ultimately save your data and digital identity.

Are you ready to make the switch to passkeys? Let us know your thoughts!

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Secure Your Printer: Protect Personal Data from Hackers

Secure Your Printer: Protect Personal Data from HackersDid you know your printer could be a gateway for hackers to access your data? I have been writing about safeguarding personal data since 2005. By now, everyone should know how to protect personal data on computers and phones—meticulously encrypting emails, using passkeys, and regularly updating software. Despite the hard work, one vulnerability often gets overlooked: the printer. Figuring out how to dispose of a printer safely can make or break online security.

New revelations about certain printers recently highlighted the unforeseen security risks lurking in our offices and homes.  However, with the following tech tips from cybersecurity experts, you can combat the unexpected threat found in many printers and fortify your data against hackers.

Why Printers Pose a Security Risk

Any digital device that connects to Wi-Fi, including printers, stores data about the network on its hard drive.  This is usually beneficial since it allows the printer to automatically connect to the network without requiring you to re-enter the information every time. However, Chris Pierson, CEO of the cybersecurity company BlackCloak, warns that when you sell or recycle a printer, you should delete this saved data by performing a memory wipe or factory reset. The reset prevents cybercriminals from discovering and exploiting the information on the printer.

There’s just one problem: Canon has announced a security flaw in several printers. The security flaw leaves behind the stored Wi-Fi information even after the reset process.  If a hacker gains access to the printer after you sell it or throw it away, they could find these wireless settings simply by going to the Wi-Fi option in the main menu.  Canon reports that this issue affects several printer models, including the E, G, GX, iB, iP, MB, MG, MX, PRO, TR, TS, and XK series.

What information is at risk?

Printers store data about the network on it's hard drive.Data about your wireless settings—including your Wi-Fi name, Internet Protocol address, and network password—could all stick around even after resetting your Canon printer.  Once hackers find that information through the menu commands, they could easily log in to the Wi-Fi network and spy on your online activity, including sensitive information like your bank account login, credit card numbers, and personal photos.

Is this a problem with all printers?

BlackCloak CEO Pierson says the current notice is specific to Canon’s printers and “serves as a reminder [of the risks] to everyone with any electronic device that connects to a … network.” That includes other Wi-Fi connected printers and smart devices like Ring doorbells, refrigerators, dryers, and light bulbs.

You might be surprised by all the devices in your house that access and store your Wi-Fi settings—and consequently might leave your data vulnerable.  “Wi-Fi-connected devices have proliferated, and [they include] things that we may not think of,” says Alex Hamerstone, a director at security consulting firm TrustedSec.  “A lot of low-priced consumer electronics from previously unknown manufacturers have Wi-Fi access now, and I would be more worried about those.”

Steps to Safely Dispose of Printers

Before you throw away, donate, or even send your printer in for repair, you should always perform a factory reset to erase all stored informationThe specific steps for a factory reset will vary depending on your printer model.  Still, the reset function resides under the “General” or “Setup” setting in the main menu.

Canon printers

For Canon printers, follow these steps for a factory reset:

  1. Canon printersGo to the Setup option in the main menu.
  2. Select Device settings > OK, then select Reset settings > OK.
  3. Find Reset, then choose OK.
  4. Select Yes to restore the printer to factory settings.

In addition, users with one of the affected Canon printers must follow these additional steps to remove their Wi-Fi data.

  1. In the menu, go to Reset Settings> Reset All.
  2. Enable the wireless LAN.
  3. Follow the first step again: Reset settings > Reset all.

If you have a Canon printer model that does not have the “Reset all settings” function, do this instead:

  1. Select Reset LAN settings.
  2. Enable the wireless LAN.
  3. Select Reset LAN settings one more time.

HP printers

For HP LaserJet Pro 4001n printers, follow these steps from HP for a factory reset:

  1. HP printersTurn Off the Printer: Turn the printer completely turned off.
  2. Turn On the Printer: Turn the printer back on and wait for the HP logo to appear on the screen.
  3. Access the Preboot Menu: As soon as the HP logo appears, press and hold the “Cancel” button (usually marked with an “X”) until the “Preboot” menu appears on the display.
  4. Navigate to Administrator Settings: Use the arrow buttons to navigate to “Administrator” and press the “OK” button.
  5. Restore Factory Settings: In the “Administrator” menu, find and select “Restore Factory Settings.” Confirm your choice when prompted.  The printer will begin restoring factory settings.
  6. Wait for the Process to Complete: The printer will restart during this process.  Wait until it fully restarts and displays the home screen.

Additional Tips for Printer Security

  • Disable or limit the printer’s network connectivity, such as Wi-Fi, Bluetooth, or cloud services, if you don’t use them.
  • You can also turn off the printer’s memory or hard drive to erase your data after printing.
  • Enable the printer’s password, PIN, or biometric authentication to prevent anyone from accessing its data without permission.
  • Keep your printer’s software up to date.  Patches will close any security vulnerabilities that hackers could exploit.
  • Avoid connecting your printer to public Wi-Fi, which could make it vulnerable to spyware and other security risks.

rb-

Ensuring the security of your personal data extends beyond computers and smartphones to include often-overlooked devices like printers. Following the steps outlined in this article, you can effectively decommission your printer and protect sensitive information from potential cyber threats. Stay vigilant, keep your devices updated, and always perform a factory reset before disposing of any electronic device. Secure your printer today to safeguard your data and maintain your online privacy.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.