Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
Haunted Michigan: A Journey Through the State’s Supernatural Side
When does the Halloween season begin? Is it when Starbucks has pumpkin spice lattes on tap? No matter when the spooky season officially begins, it’s time to visit some creepy places. The Pew Research Center reports that about 18% of Americans say they’ve seen ghosts, and 29% “felt in touch with someone who has died.” Here are some of the most haunted places in Michigan to visit this fall.
The Whitney
Historic David Whitney House is home to The Whitney, one of the most ritzy-ist restaurants in Detroit. The mansion reflects the economic might of old Detroit. Lumber baron David Whitney Jr. built the mansion in 1894. Since 1894, it has been many things, including a tuberculosis ward. Rumor has it that David Whitney Jr.’s ghost still haunts the grounds. There have been so many sightings that the current owners have opened the Ghostbar. If you’re into the paranormal and need a cocktail, this is the place for you.
The Masonic Temple is haunted
The Detroit Masonic Temple is just 1.5 miles south of the Whitney. It is one of the most haunted places in Detroit. It opened at its current location on Temple Avenue in 1926. This new, much larger Temple included a public theater, where shows like The Romantics, John Mellencamp, and Duke Ellington played. In 2013, the Temple was facing foreclosure. However, Detroit native Jack White put up cash to cover most of the taxes required to keep the doors open for visitors and ghosts.
The Masonic Temple’s most famous ghost is its architect, George D. Mason. The architect lost all his money financing the construction. His wife left him and jumped from the building’s roof. He has been seen at the bottom of the stairs, and even after locking the door to the roof, it always somehow becomes unlocked. Several guests who have been to the Temple and the building’s night patrolmen are said to have seen his ghost. The Temple has various cold spots; many people feel they are being watched in the building.
The Henry
Ten miles southwest of the Masonic Temple is the Henry. Before it became The Henry, the hotel was a Ritz-Carlton. As the Ritz, the hotel had considerable paranormal activity. Guests at the hotel claim that doors would open and close on their own and lights would switch on and off without the assistance of a living person. The French doors in room 418 reportedly opened on their own.
Furthermore, once the French doors were secured, they would jiggle without anyone touching them. The lights in that room would also reportedly turn off and on without assistance. Some people claim that the paranormal activity stopped after the hotel’s name change, but others still believe it is one of the most haunted places in Michigan.
Eloise
Eloise Hospital, also known as Eloise Asylum, is located in Westland, Michigan, 8 miles southwest of the Henry. Eloise is haunted. The site opened in 1839 as the Wayne County Poorhouse. The former psychiatric hospital is home to numerous spirits. Paranormal investigators have reported seeing apparitions, hearing unexplained noises, and experiencing other eerie phenomena. Jeff Adkins, the Detroit Paranormal Expeditions lead investigator, claims his group found paranormal activity in the wards on the second, third, and fifth floors. Adkins described an incident where a walker mysteriously appeared in the middle of the hallway after he cleaned up the hallway. “… The walker was in the middle of the walkway … We had to move it, and we had just walked through there.”
Today, Eloise Asylum offers haunted attractions and paranormal investigations during Halloween.
Thirty miles east of Eloise is the Michigan State University (MSU) campus. Many MSU buildings are haunted. One of the most widespread legends on campus is the haunting of Mary Mayo Hall. It was named after Mary Anne Mayo, a strong advocate for women’s education. The hall has a long history of ghostly legends. Some of the reported paranormal activities include:
- A piano that plays itself.
- Mysterious flickering lights.
- Apparitions of a woman believed to be Mary Mayo.
- Satanic rituals and a young woman hanging herself have left the fourth floor “Red Room” sealed off.
- A portrait of the building’s namesake hangs on the first floor, and its eyes reportedly follow visitors through the room.
- Unexplained lights and figures in the windows of the fourth floor are seen from time to time.
Haunted Holmes Hall
Another haunted MSU site is Holmes Hall. The paranormal activity in this building, including poltergeist activity with the elevators, is one of the most famous legends. The five haunts of Holmes Hall are:
- On the 6th floor of the west building, a shadowy enters an elevator; after a couple of seconds, the door immediately opens, and the elevator is empty.
- Around 3 a.m., some have seen TWO figures waiting for a sixth-floor elevator. These figures get into the elevator, but it doesn’t move. Witnesses look into the elevator and see it’s empty.
- Sometimes appliances and lights mysteriously turn on & off by themselves.
- Some students have reported the shadowy shape of a male walking through their room during the night.
- Doors and windows fly open and slam shut.
The Valley Camp haunted freighter
Finally, 300 miles to the north is the retired freighter, SS Valley Camp. The ship is now a museum in Sault Ste Marie and features exhibits on Great Lakes shipping and shipwrecks. Among the displays are two lifeboats from the doomed SS Edmund Fitzgerald, which sank in 1975 in Lake Superior with no survivors. The two lifeboats are among the few remnants ever recovered from the freighter. Over the years, visitors and paranormal enthusiasts have reported an overwhelming sense of dread that subsides when they leave the Fitzgerald display. Visitors to the ship also have reported eerie experiences, including:
- Apparitions and shadow figures.
- Disembodied voices and footsteps.
- Other unexplained paranormal phenomena.
The museum offers haunted ship tours during the final weekend of October, which are particularly popular among those interested in the supernatural.
rb-
Ready to test your courage? Plan your visit to one of these haunted destinations today. These spooky locations, from grand mansions to historic asylums, offer a unique and thrilling experience. Whether you believe in the paranormal or enjoy a good scare, Michigan’s haunted places will surely leave a lasting impression.
Don’t miss out on this unforgettable fall experience!
Related article
Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.
Passkeys: The Future of Online Security
I have been writing about the impact of bad passwords since 2010. One of the most appalling bad password statistics comes from the Identity Theft Resource Center (ITRC). They have tracked over 1 billion data breach victims in the first half of 2024. Enough is enough, there is finally a workable answer to passwords: passkeys.
Passkeys were developed by the Fast Identity Online (FIDO) Alliance to log in to apps and websites without using a username and password combination. Instead, a passkey uses a pair of cryptographic keys generated by your device to unlock your account. Google and Apple will store your unique public key. Your private key is only stored on your device, and after your device authenticates your identity, the two keys combine to grant you access to your account.
According to FIDO research, 38% of consumers (PDF) are not familiar with passkey technology. A significant percentage of users do not understand passkeys, let alone trust them to protect their data and identities.
How passkeys work: A step-by-step guide
Unlike traditional passwords, passkeys utilize public-key cryptography. That means every passkey has two parts: a public key and a private key. Together, they keep your accounts secure by allowing websites and apps to check that you are who you say you are. Here’s an overview of the passkey process:
- Creation: When you create a passkey, your device generates a pair of cryptographic keys – a public key and a private key.
- Storage: Apps or websites store your unique public key, while your private key is only stored on your device. After your device authenticates your identity, the two keys combine to grant you access to your account.
- Authentication: When you log in, the app or website sends a challenge to your device. Your device uses the private key to sign this challenge, proving your identity without revealing the private key.
- Verification: The app or website verifies the signed challenge using the public key. If it matches, you’re granted access.
The benefits of passkeys:
Strong by default: You don’t have to create anything manually or worry about whether your private key is long or random enough.- No Need to Remember: You only need to authenticate with biometrics (or your device passcode) to sign in to your account.
- Private Keys Are Never Shared: You don’t have to worry about how the website is storing your credentials.
- Public Keys Can’t Be Used to Figure Out Your Private Key: If a criminal breaches a website’s servers, the best they can hope to find is your public key. The public key cannot be used to sign in to your account. Nor can it be reverse engineered to reveal your private key.
- Strong Defense Against Malware: Criminals often create fake but seemingly authentic websites to trick you into sharing your login details.
- Protection Against Ransomware: Many ransomware attacks start with social engineering emails. Once in, they continue by installing keystroke sniffing software that can watch people enter their IDs and passwords.
- Improved User Experience: Signing in with a passkey is more convenient, faster, and smoother than using traditional passwords.
Why you should use a passkey instead of a password
Securing your online accounts is more important than ever in today’s digital age. Traditional passwords have been the go-to method for authentication for decades, but they come with several drawbacks. Here’s why you should consider using passkeys instead of passwords:
Enhanced Security: Passkeys use public-key cryptography, which involves a pair of cryptographic keys: a public key and a private key.- Convenience and Ease of Use: Remembering multiple complex passwords can be a hassle.
- Protection Against Phishing: Phishing attacks are a common method used by cybercriminals to steal passwords.
- Reduced Risk of Data Breaches: Data breaches often result in the exposure of millions of passwords.
- Seamless Cross-Platform Experience: Passkeys are designed to work seamlessly across different devices and platforms.
- Future-Proof Technology: As technology evolves, so do the methods used by cybercriminals.
Some consumers still don’t trust this form of security because they assume that anyone stealing their phone could log into their accounts. This isn’t true, as the criminal would still need your face, fingers, or eyes.
rb-
Even if you don’t fully trust passkeys, you should distrust your passwords more. It’s likely that your credentials have already been stolen and are on the dark web.
There is wide consensus in the tech community that passwords are an unsustainable security framework. Even password managers that let you use one strong master password could be at risk. First, some of them have been hacked and then there is the risk that those protected passwords are no longer secure.
A reasonable answer
A passwordless system is the only reasonable answer.
There is not a single passkey to solve all problems. You will have different passkeys for different systems and platforms.
However, this doesn’t really matter. The signup for passkeys is easy and consistent on all platforms in that there will never be a password attached to it. It will use the same biometrics you use for your other platforms, services, and their respective passkeys. In other words, it can feel like it’s one passkey for all online systems.
While passwords have served us well for decades, it’s time to embrace a more secure and convenient alternative. Passkeys offer enhanced security, ease of use, and protection against phishing and data breaches. By making the switch to passkeys, you can enjoy a safer and more seamless online experience. It’s true that the industry is still doing a poor job of explaining why you should embrace passkeys, you should like it because passkeys will ultimately save your data and digital identity.
Are you ready to make the switch to passkeys? Let us know your thoughts!
Related article
Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.
Secure Your Printer: Protect Personal Data from Hackers
Did you know your printer could be a gateway for hackers to access your data? I have been writing about safeguarding personal data since 2005. By now, everyone should know how to protect personal data on computers and phones—meticulously encrypting emails, using passkeys, and regularly updating software. Despite the hard work, one vulnerability often gets overlooked: the printer. Figuring out how to dispose of a printer safely can make or break online security.
New revelations about certain printers recently highlighted the unforeseen security risks lurking in our offices and homes. However, with the following tech tips from cybersecurity experts, you can combat the unexpected threat found in many printers and fortify your data against hackers.
Why Printers Pose a Security Risk
Any digital device that connects to Wi-Fi, including printers, stores data about the network on its hard drive. This is usually beneficial since it allows the printer to automatically connect to the network without requiring you to re-enter the information every time. However, Chris Pierson, CEO of the cybersecurity company BlackCloak, warns that when you sell or recycle a printer, you should delete this saved data by performing a memory wipe or factory reset. The reset prevents cybercriminals from discovering and exploiting the information on the printer.
There’s just one problem: Canon has announced a security flaw in several printers. The security flaw leaves behind the stored Wi-Fi information even after the reset process. If a hacker gains access to the printer after you sell it or throw it away, they could find these wireless settings simply by going to the Wi-Fi option in the main menu. Canon reports that this issue affects several printer models, including the E, G, GX, iB, iP, MB, MG, MX, PRO, TR, TS, and XK series.
What information is at risk?
Data about your wireless settings—including your Wi-Fi name, Internet Protocol address, and network password—could all stick around even after resetting your Canon printer. Once hackers find that information through the menu commands, they could easily log in to the Wi-Fi network and spy on your online activity, including sensitive information like your bank account login, credit card numbers, and personal photos.
Is this a problem with all printers?
BlackCloak CEO Pierson says the current notice is specific to Canon’s printers and “serves as a reminder [of the risks] to everyone with any electronic device that connects to a … network.” That includes other Wi-Fi connected printers and smart devices like Ring doorbells, refrigerators, dryers, and light bulbs.
You might be surprised by all the devices in your house that access and store your Wi-Fi settings—and consequently might leave your data vulnerable. “Wi-Fi-connected devices have proliferated, and [they include] things that we may not think of,” says Alex Hamerstone, a director at security consulting firm TrustedSec. “A lot of low-priced consumer electronics from previously unknown manufacturers have Wi-Fi access now, and I would be more worried about those.”
Steps to Safely Dispose of Printers
Before you throw away, donate, or even send your printer in for repair, you should always perform a factory reset to erase all stored information. The specific steps for a factory reset will vary depending on your printer model. Still, the reset function resides under the “General” or “Setup” setting in the main menu.
Canon printers
For Canon printers, follow these steps for a factory reset:
Go to the Setup option in the main menu.- Select Device settings > OK, then select Reset settings > OK.
- Find Reset, then choose OK.
- Select Yes to restore the printer to factory settings.
In addition, users with one of the affected Canon printers must follow these additional steps to remove their Wi-Fi data.
- In the menu, go to Reset Settings> Reset All.
- Enable the wireless LAN.
- Follow the first step again: Reset settings > Reset all.
If you have a Canon printer model that does not have the “Reset all settings” function, do this instead:
- Select Reset LAN settings.
- Enable the wireless LAN.
- Select Reset LAN settings one more time.
HP printers
For HP LaserJet Pro 4001n printers, follow these steps from HP for a factory reset:
Turn Off the Printer: Turn the printer completely turned off.- Turn On the Printer: Turn the printer back on and wait for the HP logo to appear on the screen.
- Access the Preboot Menu: As soon as the HP logo appears, press and hold the “Cancel” button (usually marked with an “X”) until the “Preboot” menu appears on the display.
- Navigate to Administrator Settings: Use the arrow buttons to navigate to “Administrator” and press the “OK” button.
- Restore Factory Settings: In the “Administrator” menu, find and select “Restore Factory Settings.” Confirm your choice when prompted. The printer will begin restoring factory settings.
- Wait for the Process to Complete: The printer will restart during this process. Wait until it fully restarts and displays the home screen.
Additional Tips for Printer Security
- Disable or limit the printer’s network connectivity, such as Wi-Fi, Bluetooth, or cloud services, if you don’t use them.
- You can also turn off the printer’s memory or hard drive to erase your data after printing.
- Enable the printer’s password, PIN, or biometric authentication to prevent anyone from accessing its data without permission.
- Keep your printer’s software up to date. Patches will close any security vulnerabilities that hackers could exploit.
- Avoid connecting your printer to public Wi-Fi, which could make it vulnerable to spyware and other security risks.
rb-
Ensuring the security of your personal data extends beyond computers and smartphones to include often-overlooked devices like printers. Following the steps outlined in this article, you can effectively decommission your printer and protect sensitive information from potential cyber threats. Stay vigilant, keep your devices updated, and always perform a factory reset before disposing of any electronic device. Secure your printer today to safeguard your data and maintain your online privacy.
Related article
Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.
Job Scams That Will Compromise Your Safety
Job scams are on the rise. NBC reports that they increased by 118% from 2022. Job scams are essentially fake job postings. The scammer is trying to access your bank account and looking for your personal information. The rise in remote work and advancements in AI have made it easier for scammers to create convincing fake job listings.
Mark Anthony Dyson has written an interesting article on the Job Scam Report about conducting a safe job search. He warns that job scammers are hijacking the hiring process to steal personal information in the long run. However, they are also after cash in the short run. According to the FTC, the typical job scam victim in 2023 lost $2,000. Additionally, the article details five myths about job scams that are putting job seekers at risk.
Your future
Dyson says that bad guys are running scams to compromise personal info. The Better Business Bureau reports that employment scams were the number one riskiest scam for people ages 18-44 in 2023. Consequently, if scammers get hold of data, your future financial and employment will be adversely affected.
He points out that most scams are just old scams with new layers and better disguises. They use basic social engineering tactics, like phishing links, infected files, and fake landing pages. We’ve known about all of these tactics for decades.
Dyson says some job seekers let their guard down, and others give up on their job search. However, this critical error in judgment makes everyone more vulnerable to job scam myths like:
Job scams ONLY target the desperate.
False: Scammers use social engineering to cast a wide net. They want to find anyone looking for something better. They create offers that are “too good to be true” and uniquely plausible. The “offers” are designed to pique the interest of the receiver. The BBB warns that if you are offered a job without a formal interview with excellent pay and benefits, it’s likely a scam.
How to stay safe: Don’t entertain the possibilities unless you know who sent it to you. One way to verify the sender is to search for the number quickly in Google. If the number is associated with a legitimate business, you should see that the business’s website appears in the first few results. Verify that the number shows up on that business’s website.
Job scams are easy to spot.
False: Job scams evolve just as the job market changes. The author points out that job scams increase when unemployment and uncertainty rise. The growing use of AI is currently driving this trend.
How to stay safe: Read articles like this about job scams. In addition, check out the Better Business Bureau’s Scam Tracker, which catalogs over 34,000 scams. The BBB is working closely with the FBI to identify scammers.
Legitimate companies won’t ask for personal or financial information.
True: Legitimate companies don’t ask for personal information upfront as a candidate. Once hired, your personal information, such as your social security number or bank account, is necessary, but not before you are hired. Moreover, the BBB states you should be especially wary if someone pressures you to divulge your information, saying the job offer will only last if you fill out all the forms.
How to stay safe: Follow your instincts. Never give sensitive information to anyone you aren’t sure you can trust. Does something seem “a little off?” If that is the case, disconnect and report the crime to the FBI’s ic3.gov or the FTC. You should also contact the job board if that’s where you encountered the scam. Most job sites have a mechanism for reporting these types of issues.
Additionally, Dyson says you must contact the appropriate institutions (bank, credit card, etc.) if you have given up your personal information, cash, or both.
Once scammed, you’ll know how not to get scammed again.
False: No matter how tech-savvy you may be, you are still vulnerable to social engineering tactics. You can be a victim more than once. Different scams can look the same. The bad guys take advantage of job seekers who are desperate and anxious; others are curious due to the “desirable” opportunity they seek.
How to stay safe: You must do your due diligence and research every part of your job search to ensure the opportunity is legitimate. Research the person who contacted you. Look them up. A quick LinkedIn search should reveal if they work for the company they claim to represent. Additionally, you can find the company’s contact information on their official website (check the URL) and contact them directly to ask if they are hiring for the position you’re applying for. You can go even further and verify the website at ICANN here. If they say they’ve been in business for five years, but the website was created a week ago, that is a huge red flag for a job scam.
Once scammed, there’s nothing more to do.
False: Once you’re an online scam victim, the work is just beginning. The scammers may have gotten away with some money, but your personal information is their end game. They want to steal your identity and cause damage to YOUR NAME:
They can use your personal info to:
- Get bank accounts.
- Open Credit cards.
- Incur Medical care resulting in medical bills.
- Apply to multiple jobs in the same company.
- Scam other people.
How to stay safe: Start before they scam you. Be proactive and protect your personal information. The author suggests you:
- Regularly change your passwords.
- Freeze your credit and bank accounts and credit reports.
Furthermore, if you fall victim to a scam, tell your network. The scammers can create social media accounts to scam others in your name.
Related article
Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.
Can You Identify AI Images? Find Out Now!
Artificial Intelligence (AI) is the tech-du jour. A significant 77% of consumers have already interacted with AI platforms in their daily lives. Nevertheless, when distinguishing between machine-generated images and real ones, only 40% of people are successful. Although some images are straightforward, prepare to be amazed by how realistic AI-generated images can be—or how peculiar real-life photos can appear. To test your AI acumen, Microsoft has designed a quiz. Can you accurately identify AI-generated images from real ones?
Real or Not quiz
The Real or Not quiz features fifteen distinct photos curated by Brad Smith, Microsoft’s Vice Chair and president. To begin with, your task is to determine whether each image is machine-generated or a genuine photograph. Furthermore, the quiz dynamically selects different images for each attempt, allowing you to test your AI senses continually.
My repeated attempts at the quiz yielded no straightforward answers. The BOT’s ability to produce convincing images is impressive. My highest score was 11 out of 15, achieving a commendable 73%. Finally, the results also provide context by comparing your score to other Real or Not participants. You can also include your scores at the bottom of this to see how you score compared to other Bach Seat readers.
Clues to AI
When examining images, watch for subtle clues that reveal whether they are AI-generated or authentic. While the expert AI excels at creating overall authentic scenes, scrutinizing finer details often reveals peculiarities.
- Doors merging.
- Ladders that lead to nowhere.
- Heavy machinery that is oddly placed and appears pristine.
Consider the eyes: Are they natural or flat? As for hands, AI still struggles. While improvements have been made, odd-looking fingers persist in AI images. Conversely, complex hand gestures or positions often indicate real photos.
rb-
These Artificial Intelligence-generated images pose a significant threat in political and cultural contexts. Any user can fabricate compromising images of public figures. This underscores the importance of vigilant scrutiny. Those who mindlessly doom scrolling may miss the subtle clues that reveal the true nature of the images they encounter.
Remember, as AI technology continues to evolve, our ability to discern between real and AI-generated content becomes even more critical. Stay curious, stay informed, and always question what you see online.
Related article
Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.
