b2ap3_thumbnail_malware_lock_up_400.jpg

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpgThere’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

This particular piece of malware startles the user by blocking their progress within their web browser, suggesting them to contact a fake tech support hotline to “fix” their computer. It will show a screen that’s similar to the Windows fatal system error blue screen, along with a fake technical support message that pops up, informing the user of the “problem.” As you can see by the provided screenshot, this blue screen of death is deceptive because it’s only displayed within the browser, instead of taking up the entire screen like Microsoft’s real blue screen of death.

blue screen

Whatever you do, DON’T CALL THE PROVIDED PHONE NUMBER. The blog Delete Malware explains: “If you call [the number] they won’t actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords. They are crooks, don’t call them!”

Fortunately, this error isn’t as critical as what it seems. In fact, this is a common tactic of social engineering: make the problem seem much worse than it is, causing the victim to flip out and do something rash–like call the fake IT support phone number.

What then are you supposed to do? You can make the issue go away simply by closing the browser via task manager (Ctrl + Alt + Delete), or rebooting the PC. However, it’s still annoying to deal with because you’ll lose any unsaved data, along with any progress made to whatever project you’re working on. Plus, rebooting your system won’t technically solve the problem; the malware will still be embedded in your system, waiting for another chance to strike.

Therefore, to get down to the root of this problem, you’re going to want to isolate and properly delete the malicious file. For this level of real IT support, you’re going to want to call the trained professionals at NuTech Services. We’ve got the tools needed to find and eliminate such threats, and even block them from hitting your system in the first place with a Unified Threat Management solution.

Lastly, we’d like to point out that the perpetrators of this hack are relying on the fact that the user doesn’t know who to call for IT support in a crisis situation. It’s reasons like this why you and your staff need to be familiar with who to call in an emergency IT situation, like NuTech Services at 810.230.9455. When it comes to taking care of IT issues, we’re the real deal, and we take offense that hackers these days are posing as trustworthy IT technicians in order to get at a user’s personal data. It’s an unsettling trend that will only be brought down by companies being vigilant about their network security.

To that end, NuTech Services can help. Call us today to find out how we can protect you from the worst of the web.

b2ap3_thumbnail_cloud_security_400.jpg

How a Cloud Service Without Role-Based Access Controls is Asking For Trouble

b2ap3_thumbnail_cloud_security_400.jpgCloud computing started out as a trend, but it’s become a staple in the modern business environment. A recent poll of IT and business executives by Harvard Business Review and Verizon shows that 84 percent of respondents have increased their use of cloud services in the past year, 39 percent of which “increased significantly.” The issue that comes from such an increase is the idea of employees accessing information that they aren’t supposed to.

This particular type of security problem is called role-based access control, which is an increasing cause for concern in the cloud environment. Despite role-based access control being a prevalent part of network security, perhaps due to the cloud’s ease of use, user permissions are a problem that often get overlooked in cloud computing.

User permissions are an ordinary part of any traditional in-house IT infrastructure. They’re ordinarily handled by your in-house IT staff or a trusted IT professional. One of the main advantages of an in-house network is that your technicians will generally understand each employee’s role within the organization, especially if the business is small or medium-sized. The issue at hand is the fact that your cloud service provider will be responsible for the security oversight of your cloud network, and it’s more likely than not that they will be unfamiliar with your organization’s personnel infrastructure.

For the record, we aren’t suggesting that outsourced network security is bad. In fact, we highly recommend it; we’re just trying to raise awareness of the fact that cloud computing isn’t a service that can be implemented without security in mind. For example, you’ll want to make sure that your chosen cloud solution provides the level of control that you need, along with security that can be implemented on different levels according to each user’s role within the organization. Doing so will likely require a dedicated administrator within the company, or ensuring that you retain proper relations with the cloud provider so they can cater to your specific role-based control needs.

NetworkComputing explains:

When you have employees with different roles in your company, access control is a key feature that can help ensure basic cloud administrative security. You’ll need to exercise caution to prevent credentials from being compromised, and to ensure menial errors don’t spoil your day. Implementing robust and powerful access control is important to protect company resources.

Furthermore, you’ll want to make sure that any information that’s required for a user’s role will available to them, and only them. For example, in-house IT workers have access to more information than the average worker, much of which is sensitive in nature. Despite this, according to a recent study by Intermedia and Precision Sample, IT workers are 10 percent more likely than non-IT staff to give away their login credentials for superfluous reasons.

The idea behind limiting access to data on a per-user basis is to limit the data’s exposure to potential threats. Much of the time, however, you want to have secondary layers of protection up and running in order to maximize the security of your business. For example, two-factor authentication uses an SMS message or a phone call to deliver a secondary credential for use when accessing an account. These types of precautions can aid in role-based access to information, making it much more difficult for other users to access critical information.

Cloud computing is such a powerful and efficient practice that it’s no surprise it’s grown so rapidly over the past few years. The best way to approach cloud security is by understanding the services you’re taking advantage of, and relying on a trustworthy cloud service provider. NuTech Services can assist your business with all of its cloud computing needs, including the maintenance, upkeep, and management of your cloud data.

For more information about how we can help your business with cloud computing, contact NuTech Services at 810.230.9455.

b2ap3_thumbnail_gmail_logo_400.jpg

Gmail Implements Warning System to Notify Users of Unencrypted Messages

b2ap3_thumbnail_gmail_logo_400.jpgAn email could be just about anything, and you should always approach them with caution. What appears to be a harmless attachment could be a spam message in disguise, with malware or viruses attached. Keeping this kind of security in mind can be difficult for the average business, but if your organization uses Gmail, you’ll be warned of whether or not your received messages are sent over a secured connection.

In other words, Gmail will tell you if there’s a chance that your received messages were tampered with by hackers while in transit. By doing so, Google is hoping to emphasize the importance of improving online security to all users and service providers for webmail. Encryption is necessary in today’s security-minded online society, and Google wants to raise awareness of this important fact. While Gmail already takes advantage of an HTTPS encryption protocol for its own mail service, this is only a small step toward increasing the security of online email services. The HTTPS only encrypts the browser’s connection with the server, rather than all of the traffic to and from senders and receivers.

Basically, email providers need to be using encryption to shield messages while they’re in transit, or risk the possibility of hackers compromising the messages. Many email providers have already started taking advantage of encryption protocol, a trend known as STARTTLS, for their messaging systems, including Google, Comcast, Microsoft, Yahoo, and a few others.

As explained by ZDNet:

A lot of providers don’t support STARTTLS, meaning that any email encrypted by the sender can’t be read when it’s received on the other end. This so-called opportunistic encryption works when both email providers support STARTTLS. If one doesn’t, then the other provider falls back to an unencrypted form.

The most important thing that email providers should take away from this shift in encryption policy is the need to make their user-security a top priority, just like major players like Google and Microsoft do.

While this new encryption protocol by email providers can help you potentially avoid an unsecured email, you don’t want to rely on it to keep all of your important digital assets safe. What your organization needs is a comprehensive security solution that’s designed to maximize network security, without sacrificing ease of use. Even the most basic security solutions, like a firewall and antivirus solution, are effective at limiting a user’s exposure to online threats. Still, you want something with a bit more power, especially when it comes to guaranteeing the security of your business’s assets.

The solution that your business needs is a Unified Threat Management tool, that’s designed to augment common security practices with powerful, enterprise-level measures. A UTM uses a firewall and antivirus, but also provides preventative measures like content filtering and spam blocking. This helps your organization stay productive without sacrificing security. To find out how your business can reap the benefits of a UTM solution, contact NuTech Services at 810.230.9455.

b2ap3_thumbnail_smartphone_battery_life_400.jpg

Tip of the Week: 7 Tips to Extend the Life of Your Android’s Battery

b2ap3_thumbnail_smartphone_battery_life_400.jpgOne experience shared by every mobile device user is batteries losing power faster than they’d like. Until someone invents a battery that never again needs to be recharged, this struggle will always be real. Here are seven ways to make your mobile device’s battery last longer.

Dim Your Screen
Go to Settings > Display and toggle Adaptive brightness.

Your screen is likely your device’s biggest energy hog. The longer it’s powered on and the brighter it is, the more power it will sap from the batteries. For example, you don’t really need your screen to remain powered on for a full minute after you’re done checking a notification. Therefore, make adjustments to your screen’s settings accordingly.

Turn Off Location Service (GPS)
Go to Settings > General > Location.

As long as your phone’s location service is enabled, it will use energy to stay connected to GPS satellites. Unless you’re actively using an app that requires GPS, like Google Maps, it’s likely that you won’t need GPS and you can go ahead and turn it off.

Disable WiFi When Out and About
Go to Settings > WiFi, Bluetooth, or Data Usage.

If you ever get a chance to connect your device to WiFi, do it and save yourself some precious data. However, when you’re traveling from place-to-place and you’re outside the range of any usable WiFi, then you’ll want to go ahead and disable your device’s WiFi. Otherwise, your device will use a significant amount of energy looking for and trying to connect to usable WiFi signals.

Turn Vibration Off
Hit the Volume Down key until you feel the phone vibrate, then hit it once more to silence all notifications.

When in social situations, having your phone vibrate for notifications is a great way to not annoy others. However, it requires significant battery power to get your phone to buzz and shake like that. By turning off your phone’s vibration setting, you’ll extend the battery of your phone just a wee bit more, especially if you’re one to receive constant notifications.

Manually Update App
Go to Play Store > Settings > Auto-update apps, and turn auto-update off or set it to update over WiFi only.

By default, your phone is set to automatically update its apps. While this works out fine if you’ve got a full battery, if you’re trying to conserve battery power, the last thing you’ll want is for your phone to connect to the Play Store and start downloading data.

Disable Background Data
Go to Settings > Data Usage.

Just because you’ve closed an app doesn’t mean that it’s not doing something behind the scenes. For some of your apps, they might be consuming more background data than you think (like GPS information). Disabling the collection of background data will save you battery power, but it also might cause some of your apps to not function properly when you go use them, so just be aware of that.

Airplane Mode
Go to Settings > Connections > More networks > Airplane mode.

Before you get desperate enough to conserve power that you turn off your phone entirely, try airplane mode. This is a handy feature that gives you access to several of your device’s useful apps, like clock, calendar, and contacts while cutting off its connection to networks like the Internet. If your phone isn’t trying to push data to all of its Internet-connected apps, then it will eat up much less power. Obviously, you won’t be able to send or receive messages or calls, but you’ll be able to reserve power until you need it.

These are just some of the battery-saving tips you can try, there are actually several more things you can try if you’ve gone through this list and still find your battery dying quicker than you’d like. What are some ways that you keep your batteries powered? Let us know in the comments.

b2ap3_thumbnail_windows_10_rollout_400.jpg

Windows 10 On Pace to Be the Most Popular OS By 2017

b2ap3_thumbnail_windows_10_rollout_400.jpgWith Windows 10 making leaps and bounds in the business environment, Microsoft has created another commercial success for both consumer use and workplace productivity. In recent weeks, Windows 10’s adoption has slowed significantly, but in a few years it’s expected to surpass other Windows operating systems in terms of usability.

Gartner has made a prediction that, by January 2017, Windows 10 will be used by half of all businesses, making it the most widely used Windows version so far. This comes off as a surprise, especially since its adoption rate has seemingly plateaued as of late. Businesses still tend to stick to operating systems that they know and love, like Windows 7, and feel little need to move to something bigger and better. Still, there are some factors that can change Windows 10’s adoption rate for the better.

For example, Windows 7, which is widely considered to be the favored Windows operating system at the present moment, will reach its end of support date in January 2020. While this sounds like it’s far off, it doesn’t change the fact that Microsoft will eventually stop supporting Windows 7, just like it stopped supporting Windows XP. Considering the fact that Windows 8 and 8.1 aren’t very popular, the clear cut winner here is Windows 10.

According to ZDNet:

Gartner said many organizations are planning to begin pilots for Windows 10 in the first half of 2016, and will broaden their deployments later in the year. It expects that at least half of organizations will have started some production deployments by the beginning of 2017, with an eye to completing their migrations in 2019.

Up until fairly recently, Windows 10 was a huge hit, which can be attributed to the free download from Windows 7 and 8.1 for the first year of Windows 10’s existence. This pushed Windows 10’s growth rate far past that of Windows 7 and 8, and while the consumer might see nothing wrong with an immediate upgrade to Windows 10, businesses might see things differently. Basically, businesses that want to adopt Windows 10 won’t do so right away. Instead, they’ll be making plans to do so in the near future.

The lesson that you can learn here is that, while upgrading to the latest Windows operating system has its merits, you should be approaching it in a logical manner. If other businesses are waiting to take advantage of Windows 10, doesn’t it make sense to get a head start on them by leveraging the latest and greatest Windows operating system? Doing so will help you take better advantage of your resources, including your current (and future) technology solutions. Plus, you’ll be able to rest easy knowing that your technology is up to date.

Still, you don’t want to blindly upgrade. You need to make sure that the upgrade isn’t going to complicate your usage of legacy applications. This means that you’ll want to consult a trained technician before upgrading. For help answering any questions you have about Windows 10, give us a call at 810.230.9455.

b2ap3_thumbnail_bad_cell_phone_etiquitte_400.jpg

Tip of the Week: 4 Social Taboos Smartphone Users Should Never Break

b2ap3_thumbnail_bad_cell_phone_etiquitte_400.jpgCellphone etiquette goes hand-in-hand with common sense. Here are four cellphone etiquette tips that every device owner should know.

Don’t Use Your Phone During Mealtime
Mealtime is a social time for pretty much every culture around the globe. During this time, it’s expected that you are fully present and engaged in conversation–which is super hard to do if you’re glued to your phone. Even the quick glance at the screen to check notifications can be construed as rude.

Solution: Turn your phone off during mealtime, or at least, keep it off the table.

A restaurant in Iowa, Sneaky’s Chicken, offers a 10 percent discount for diners who don’t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated “cell-phone section.”

Use a Voice Level That’s Appropriate for Your Setting
While it’s okay to use your phone in a room with other people, it’s not okay to talk on your phone using such a high volume that others around you can’t focus or must talk over you. The problem here often comes from phone calls with poor connections, causing the caller to feel the need to talk louder so they can be heard. Then there are those who feel the need to speak in abnormally high volumes when using the phone, no matter the situation or quality of their connection, much to the chagrin of those in the same room. Awareness of the volume of one’s own voice is the best deterrent here, which for some people, is easier said than done.

Solution: If you need to speak at higher-than-normal volume when using the phone, step outside or go to the next room

Hang Up Before Checking Out
While it’s perfectly acceptable to shop and use your phone at the same time, it’s rather rude to continue talking on your phone while a cashier is ringing you out. Even if you don’t plan on having a grand conversation with the person behind the register, talking on the phone still communicates that you essentially don’t think very highly of them and their time. Plus, it just makes things awkward for the poor cashier if they have to interrupt your conversation in order to ask you a question about your purchase.

Solution: In a scenario where you must stay on the phone while the cashier is ringing you out, at the very least, apologize for the inconvenience and be attentive to them just in case they need to ask you a question.

Don’t Leave Long Voicemails
Just because you can explain every detail possible in a voicemail, doesn’t mean that you should. When a voicemail goes beyond the one minute mark with no prospect of coming to an end anytime soon, it can overwhelm a person. This is especially the case if the message goes into great detail, requiring you to scramble to find a pen and paper; then you don’t get to a pen in time and have to listen to the long message all over again. Grrrr.

Solution: If you’ve got a lot to share, make the voicemail primarily about having the person call you back. Otherwise, it’s best to just leave your name, what you’re calling about, your callback number, and nothing more.

Surprisingly, as common sense as these tips are, we see cellphone users break them all the time. When it comes to preventing annoyances such as these, spreading knowledge about proper cell phone usage goes a long way. Therefore, if you know of any offenders of cell phone etiquette, share this article with them–in a subtle way.

What are some of the most annoying cellphone usage habits that you’ve observed (or are guilty of)? Let us know in the comments.

b2ap3_thumbnail_google_fiber_400.jpg

Google Fiber and the Race to Provide Consumers With the Fastest Internet Possible

b2ap3_thumbnail_google_fiber_400.jpgYour business relies on a steady Internet connection to maintain operations. The inner workings of your cabling infrastructure are what ensure that you constantly have access to both online and offline networks for your organization. Most businesses utilize the services of major cable companies like Time Warner Cable and Comcast to facilitate this need, but some cities around the United States have access to another option: Google Fiber.

Explaining Google Fiber
Originally, Google Fiber was only an experiment that was designed to deliver high-speed Internet and cable television to the Kansas City metropolitan area. Now, it’s a full-fledged Internet service provider, although its locations are limited to only a few cities within the United States.

map ib

As explained by CIO:

And optical fiber is the only choice for connectivity that exceed 1,000 Mbps, aka Gigabit Internet. Optical fiber provides higher bandwidths – download speeds 40 times faster and upload speeds more than 300 times faster than garden variety broadband – and spans much longer distances than electrical cabling. And some companies, such as Bell Labs, Cisco, and Comcast are claiming that their new “fiber optic” services (when eventually installed) will be 10 times faster than Google.

Does It Work?
The common consensus so far is that Google Fiber isn’t much different from other Internet service providers, and it’s a convenient service for those who want to keep their personal lives and businesses connected to the Internet. Unlike big names in the cable industry like Time Warner Cable and Comcast, however, Google Fiber isn’t associated with scandal and lackluster customer service, making it an attractive third-party choice. Businesses in areas where Google Fiber is available often cite that the service is cheap and convenient for their purposes, stating that they appreciate the fast Internet option.

In other cases, some users were dissatisfied with Google’s bundled service offerings, claiming that privacy is a major concern. Google’s systems scan users’ Internet activity in order to customize ads from Google and YouTube, which doesn’t sit well with some privacy advocates. These settings can be altered, but shouldn’t be touched without the knowledge of a trained professional technician.

Your business shouldn’t question whether or not you have reliable access to both your wired and wireless networks, especially for your applications and data stored in the cloud. If you lose access to both information and your software solutions, your business could be crushed by unexpected downtime costs. Therefore, what you require is reliability and scalability; the ability to shift your networking requirements in accordance with your business’s needs.

If you want to ensure reliability for both your wired and wireless technology, NuTech Services’s skillful technicians can help your organization optimize its Internet deployment strategy. For more information, give us a call at 810.230.9455.

b2ap3_thumbnail_cloud_backup_and_security_400.jpg

Why the Cloud is the Best Option For Your Data’s Backup Policy

b2ap3_thumbnail_cloud_backup_and_security_400.jpgThe cloud is a great tool that can help your business fully leverage its technology solutions, but one of the most common problems that people associate with the cloud is that they believe it’s not nearly as secure as a private in-house IT network. However, contrary to popular belief, the cloud is a very secure medium for your data storage and deployment, particularly for your data backup needs.

For a demonstration, let’s take a common problem, like the storage of backed-up copies of data, and apply it to the cloud. There are two common ways to store data backups: on tape, which is prone to user error and requires a significant amount of physical space for effective use; and then there’s cloud-based backup. Normally, data backups would take up a ton of space on your in-house network. Furthermore, storing your data backups on the network that you’re backing up is just plain silly. Therefore, it makes the most sense to store your data off-site in a secure data center, or in the cloud.

The Shortcomings of Tape
Though tape backups have been used by businesses for a very long time, they’re an outdated technology that doesn’t appeal to the average small and medium-sized business. Tape can be considered a manual mode of data backup because it relies on human interaction to work properly. This means that it’s the responsibility of your staff to set the backup and make sure that it happens every night. Otherwise, you could potentially lose an entire day’s worth of work. Furthermore, processing a backup is a resource-intensive task that shouldn’t be done during normal work hours. In general, the tape backup process is inefficient and dated at best, especially in light of more modern backup solutions.

The Benefits of Cloud Backup
The benefits of a cloud backup solution are overwhelming when compared to the typical tape backup solution. While tape requires humans to set and perform backups, a cloud-based data backup solution automatically takes snapshots of data that’s been changed since the last backup was taken. This eliminates the chance of user error, and ensures that the backups are taken without a hitch. Unlike tape backups, which effectively take a backup of ALL data on the network, a cloud backup solution only tracks changes made to files. This means that there’s less strain placed on the system during the backup, meaning that data can be backed up multiple times without the severe repercussion of downtime.

The cloud makes storing data both more efficient and more secure, especially for backup and disaster recovery processes. NuTech Services’s backup and disaster recovery (BDR) solution is a device that’s capable of changing the way that your business handles data backups. With our BDR device, your organization can take advantage of multiple backups that are taken periodically throughout the day. Then, thanks to your data’s convenient location in the cloud, the BDR device can rapidly deploy the backed-up copy of your data to your business’s infrastructure. In the event of a hardware failure or similar disaster, the BDR can act as your server, allowing you time to find a more permanent solution to the problem.

For more information about our BDR device, give us a call at 810.230.9455.

b2ap3_thumbnail_security_for_your_passwords_400.jpg

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

The method in question suggests that passwords chosen by your average PC user aren’t nearly as secure as they should be, but are very easy to remember. As explained in an essay from the university of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it’s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases.

Confused? Let us explain a little more in detail. This method is derived from a XKCD comic (which you can find here) that describes the difficulty of remembering passwords. Basically, what it entails is taking a string of numbers, like 10101101010100101101010101010101010110101101, and converting segments of this code into words to create an English phrase. The above string would wind up reading “correct horse battery staple,” which is complete and utter nonsense, but very easy to remember by associating it with a mental image or a story.

Rather than use a 44-bit string like the above example, Ghazvininejad and Knight suggest using a 60-bit string to increase security, and to create a poem-like string of words that makes sense and is easy to remember. Going too in-depth into this method would take a considerable amount of time to explain, but the basic idea is to create something that’s easy to remember while making it borderline impossible for a computer to guess. By today’s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. How’s that for secure?

While using segments from existing poems is a possibility, Knight and Ghazvininejad don’t suggest doing so. Considering how there are millions of poems online, the chances of getting hacked are much higher than if the string of characters were truly random. However, while using a line from your favorite poem isn’t as secure as a string of 60 characters, it’s certainly more secure than using a simple password like “MOM385” or “password.” On one hand, you’re using real words that can be used in a dictionary attack; but on the other, you’re using a long password (which is a best practice). So, it’s really up to you to decide how you want to approach password security.

Of course, you’ll need multiple passwords for all of your different accounts. This in itself can make memorizing passwords a huge pain. Therefore, the best way that you can remember all of your passwords and effectively use them to maximize your account security, is by taking advantage of a password manager. NuTech Services can help your business get set up with the best password manager on the market. To learn more, give us a call at 810.230.9455.

b2ap3_thumbnail_streaming_media_400.jpg

Netflix, Hulu, or Amazon, Which Video Service Makes the Best Gift?

b2ap3_thumbnail_streaming_media_400.jpgSometimes it’s a pain trying to figure out what you’ll be getting your loved ones during the holiday season. Thankfully, there are some relatively fail-safe options for those who love entertainment, like watching television or going to the movies. A subscription to the right video-streaming service might be able to help you save a trip to your local department store and all of the madness that comes with it.

While there are plenty of video-streaming services to choose from, there are three that stand head and shoulders above the rest. Considering how often some people find themselves binge-watching their favorite TV shows on these popular services, it’s a safe bet that your loved ones will appreciate every moment they use the application.

Here’s a quick rundown of what you can expect from the top three online video-streaming services.

netflixNetflix – Starts at $7.99 a Month
Netflix is an exceptionally sought-after service, with well over 65 million subscribers. Though it’s drawn the anger of broadcast television networks, it’s a great alternative, boasting several popular movies and TV shows, as well as some exclusive content. If you want to give Netflix as a gift to someone, you should first make sure that they aren’t already a subscriber. Try mentioning Netflix casually; perhaps ask something like, “Have you checked out that new Netflix original series, Marvel’s Jessica Jones?” Or, if they already have a subscription, you can suggest that you cover the cost of renewal for the existing subscription.

Netflix’s roster shifts periodically, offering new movies or TV shows, while occasionally removing less popular media. This offers a continuous stream of new content to watch; and, to make things better, subscribers have the opportunity to get DVDs mailed to them, if they so desire for an additional fee.

amazon plusAmazon Prime – $99 a Year
Just like Netflix, Amazon Prime is a very popular service, netting around 80 million users at the time of this writing. This means that you should also make sure that your intended recipient isn’t a current subscriber. Prime allows its users to stream entertainment services, like original shows and movies, with an additional benefit; Prime subscribers can rent the latest movies, just like pay-per-view.

Unlike Netflix, however, Amazon Prime comes with a ton of other services that can present more value to your gift’s recipient. Prime offers free, two-day shipping on products from Amazon’s huge web store, which can potentially let subscribers save so much money on shipping that it feels like Prime is paying for itself. Additionally, Prime offers several other membership benefits, including Prime Music, Prime Photos, Prime Pantry, Prime Early Access, Kindle Owner’s Lending Library, and more. Plus, if you actually use Prime to buy physical presents for people, they’ll gift wrap it for a small charge.

hulu plusHulu Plus – Starts at $7.99
Hulu Plus is streaming service that focuses on delivering current television shows shortly after they’re broadcasted, but they also have many TV shows and movies available to view. Just like Netflix, though, Hulu Plus is starting to offer its own original content. At the present moment, Hulu Plus has around 9 million subscribers, and now, users can remove ads for an additional cost. There’s a chance that this number will rise, especially with the holiday season on the horizon.

What are some of your favorite ideas for entertainment and holiday gifts? Let us know in the comments.

b2ap3_thumbnail_workplace_collaboration_400.jpg

Technology Has the Power to Bring the Office Together Like Never Before

b2ap3_thumbnail_workplace_collaboration_400.jpgThe technological landscape of the office has changed significantly over the years. Only a decade ago collaboration could only be accomplished through sitting down in a conference room and discussing issues face to face. Today, however, technology is changing the way that we as a society view collaboration, and thanks to various achievements in software development, it’s easier than ever to work together on team initiatives.

Don’t Be Afraid of New Solutions
We all now the convenience of being able to communicate with the click of a button. Email and conference calling have been great additions to the office collaboration environment, but in recent years there have been more comprehensive and streamlined solutions that are constantly improving the way we work together. For example, video conferencing allows workers to communicate in ways which were previously unheard of, and instant messaging sure beats sending an email for an urgent request.

The important thing to consider when improving the way your office communicates and collaborates is that you should embrace new solutions, but not without completely forgetting the basics. Email is still a vital communication medium that your organization needs, and so is the office telephone line. While certain features of these solutions are better performed by more recent technologies, they are still vital assets.

It Doesn’t Take a Genius
Contrary to popular belief, it doesn’t take a rocket scientist to operate collaboration technology in an easy, efficient manner. Most modern solutions like instant messaging, Voice over Internet Protocol, and more, are all similar to everyday products that are used by the average PC enthusiast. This means that your employees will be relatively familiar with working with your office’s technology solutions, because they use similar services outside the office. For example, your employees might use Facebook messaging or Skype video calls for their personal matters, and they’re used to the simplified interfaces that have come about from innovations in recent times.

Establish Proper Boundaries and Protocol
Granted, some solutions still require a little bit of training, like making sure your employees are using your enterprise-level solutions in ways which are beneficial to their workplace collaboration, and not distracting others or compromising your business’s data security. A big part of this is training your employees on what these solutions should (and shouldn’t) be used for; for example, there’s no reason to use the video conferencing solution when you have a perfectly fine conference room to use at your leisure. Furthermore, your collaboration solutions should only be used for in-house purposes. Your employees shouldn’t be using their work email for personal use. Not only is it unprofessional, but it complicates things significantly if they decide to leave the company.

Overall, your technology collaboration solutions should be designed to allow for maximum productivity and efficiency. For more information about how we can help your business better communicate and collaborate in the workplace, contact NuTech Services at 810.230.9455.

b2ap3_thumbnail_snap_to_mouse_400.jpg

Tip of the Week: Take Advantage of Your Mouse’s “Snap To” Feature

b2ap3_thumbnail_snap_to_mouse_400.jpgComputers are designed to save people significant time when it comes to getting work done, and with a few simple tweaks and adjustments, you can trim even more seconds off a project, which really adds up in terms of gaining productivity. Your PC’s Snap To mouse feature is a classic example of this.

When enabled, Snap To automatically moves your mouse pointer to the dialogue box that pops up. This is the box that typically appears after you delete a file, close a window, or perform any other similar task.

Although, when using Snap To, be careful about what you click on. For example, your pointer may automatically move to the “Ok button” for something that you don’t want to approve; something like, “Are you sure you want to permanently delete this file?” A blunder like this can be avoided if you simply take a moment to read what you click on, instead of rushing yourself and clicking the first thing that pops up.

To enable this feature, go to Control Panel > Mouse Properties. Next, click on the Pointer Options tab and then checkmark the Snap To box that says “Automatically move pointer to the default button in a dialog box.”

snap to

Click OK or Apply when you’re done.

Be warned, this Snap To feature might take a little while to get used to (it’s always surprising to have your mouse pointer move when you’re not expecting it to). Also, in the event that you don’t want to go through these steps and enable Snap To, most dialogue boxes allow you to select the OK button by hitting the Enter key.

At the end of the day, it might seem like this is a rather silly tip because you’re just saving yourself few seconds of not having to move the pointer. However, any worker concerned about productivity understands the importance of saving a few seconds here and there, and how tips like this can save you significant time in the long run. Plus, when on a laptop with a squirrely touchpad, this can save you those few seconds of frustration.

For more productivity tips, subscribe to NuTech Services’s blog and check back every week.

b2ap3_thumbnail_distributed_denial_of_service_400.jpg

Pay a Hacker Ransom Money and Risk Getting Bamboozled Twice

b2ap3_thumbnail_distributed_denial_of_service_400.jpgRequesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking for the victim to pay up, or else. Should they?

The answer should be obvious; absolutely not. However, when a person’s valuable data becomes encrypted or they receive a legitimate threat to take down their servers, emotions often get in the way and they’ll end up “paying the piper.” Hackers know this, which is why their ransom methods employ fear tactics.

For example, ransomware like CryptoLocker will lock the user out of their computer while the screen displays a clock counting down to when their data will be deleted. And with DDoS attacks, a hacker may contact the victim mid-attack and promise to cease the attack for a fee. Both of these situations play straight into a person’s irrational fear, causing them to cough up cash.

Before reaching for your credit card to pay a hacker’s demands, stop, take a deep breath, and think objectively about the situation. What guarantee do you have that these hackers will actually make good on their promise to turn over your data or cease the attack? This guarantee is only as good as a hacker’s word, which is pretty worthless seeing that, you know, they’re criminals. Therefore, whatever you do, DON’T GIVE MONEY TO A HACKER!

By paying hackers money, you’ll only add fuel to the fire and help fund the spread of their devious acts. Plus, there are several reported cases where a victim pays the ransom, only to still have their data deleted or the attacks on their site continue. What’s it to them if they go ahead and follow through with the attack? They have your money, so who cares? It’s a classic case of adding insult to injury.

Need proof? There’s a recent example of this happening to ProtonMail, a Switzerland-based email encryption service. On November 3rd, ProtonMail was threatened with a DDoS attack by the hacking group Armada Collective. Like many companies would do, they ignored the threat, deeming it to not be credible. Soon afterward, their servers became overloaded to the point where they had to cease operations.

As reported by ZDNet:

The encryption service says the assault reached 100Gbps and not only attacked the ProtonMail datacenter but routers in Zurich, Frankfurt and other locations linked to the ISP — eventually bringing down the datacenter and ISP. This not only took down ProtonMail, but other companies were affected, too.

To get the attackers to stop, ProtonMail paid the hackers a $6,000 ransom. The hackers happily took their money and kept up the attack. In addition to losing a cool $6k, the company was out a vast sum for all the downtime they experienced.

How much would it cost your company if you lost revenue for a full day of work, and you still had to make payroll? For a medium-to-large sized company, losing a full day’s work would likely come to much more than a few thousand dollars. In fact, hackers understand how downtime can be so costly, which is why they feel justified asking for such an exorbitant fee.

What are you supposed to do if you were asked to pay a ransom by a hacker? The first thing you’ll want to do is contact the IT professionals at NuTech Services. We’re able to take an assessment of the attack to determine how bad it is, and restore your data to a backed up version that’s not infected with malware. When facing a hack attack, we can present you with all the options you can take, none of which will include paying a hacker money.

Call us today at 810.230.9455 to learn more, and don’t give the hackers have the upper hand.

b2ap3_thumbnail_voip_solutions_400.jpg

Office Workers Still Prefer Using a Traditional Phone Over Mobile

b2ap3_thumbnail_voip_solutions_400.jpgTake a moment to look at your desk telephone and contemplate its usefulness. When was the last time you used it for day-to-day operations? Do you even use it anymore, or do you rely on more recent communications solutions like Voice over Internet Protocol, and the smartphone? Some might argue that the telephone is an antiquated technology for the modern office, but recent studies show that despite its disadvantages, it still has an edge in the office environment.

There are a number of reasons why workplace phones haven’t been completely eliminated in favor of the smartphone and VoIP. For one, contrary to popular belief, people still want to separate the workplace from home, but the main reason that office phones are still around is because folks prefer using their office landline to conduct business. A survey from RingCentral, performed in May 2015, studied the ways in which 505 United States workers communicate within the office. The results were somewhat surprising: 65 percent of the workers would rather use their office phone to conduct business while only 30 percent preferred to use mobile devices for calls.

Now, consider the prevalence of the smartphone in today’s workplace environment. You’d be hard-pressed to find anyone who doesn’t use their device for work purposes, like answering phone calls or sending emails. Suddenly, that 30 percent seems kind of strange, especially with millennials and their newfangled technology now taking up a considerable portion of the workforce. Curtis Peterson, the senior vice president of RingCentral, suggests that the younger generation isn’t as comfortable working with telephones as seasoned professionals. In fact, according to another survey from TollFreeForwarding.com, only 6.5 percent of people between the ages of 25 and 34 are comfortable using a telephone, and would rather resort to other methods of communication, like messaging or email.

Still, it seems that the office telephone isn’t going anywhere anytime soon, for the sole purpose that it’s still somewhat preferred as a telephony solution. Therefore, it’s imperative that your business takes full advantage of your voice communications solution, whether it be with your office desk phone, or your Voice over Internet Protocol client. Your business might find that you can be so much more productive with a unified communications solution, including VoIP, instant messaging, and video chat.

Despite the clear popularity advantage that traditional communications have, VoIP has a clear-cut advantage in the fact that it’s much easier to make changes to your service plan. Thus, replacing your classic telephone solution with VoIP is a fantastic way to start cutting unnecessary costs, especially when you consider how cable companies tend to package multiple services together that aren’t necessarily needed. Additionally, it’s difficult to make changes to your traditional telephone infrastructure on a whim, which makes growth challenging at best.

Integrating a VoIP solution can alleviate many of the issues that plague modern businesses by offering scalable and predictable solutions that are effective for managing your business’s communications strategy. For more information, give us a call at 810.230.9455.

b2ap3_thumbnail_spoiler_alert_400.jpg

Tip of the Week: Use This Chrome Extension to Avoid Online Movie Spoilers

b2ap3_thumbnail_spoiler_alert_400.jpgThe Internet is a great and wondrous thing, giving us information about pretty much anything we could ever hope for. However, this is a dangerous thing for those who want to go about their entertainment “spoiler-free.” In other words, you want to be pleasantly surprised when you watch your favorite movies or TV shows. Sometimes the Internet isn’t so kind toward that goal. Well, here’s a somewhat viable solution: the Spoiler Alert extension for Google Chrome.

Especially with Star Wars, Episode VII: The Force Awakens just around the corner, there’s no time like the present to arm yourself against the savage assault of spoilerific Internet content. The extension for Spoiler Alert is capable of blocking certain web content in accordance with your specifications. While the extension asks you to sign up with your email and date of birth, it allows you to browse categories and block content related to specific TV shows and movies. CNet cites that the only movie currently available to block spoilers of is The Force Awakens, but hey, isn’t that all that matters?

Spoiler Alert also works for certain other events, like sports, new episodes of TV shows, and the like. This is particularly helpful for popular dramas that are huge hits in pop culture (think The Walking Dead), or for keeping you from viewing the score of the big game until you’ve watch it. You can even use it to avoid all of the political debates and debauchery, if you so desire.

However, Spoiler Alert is still far from ideal. As explained by Rick Broida at CNet:

One problem I discovered is that Spoiler Alert doesn’t seem to work past the initial page-load. So on Facebook, for example, if you scroll down far enough that the site loads more content, the extension doesn’t block anything in that additional load. That’s a problem. But this blocker is still in beta, so hopefully the developers can address that. In the meantime, I’m just happy to have at least some line of defense against our spoiler culture. Seriously, people, why would you want to know everything (or anything) about “The Force Awakens” before getting to the theater?

In some cases, Spoiler Alert only blocks headings, titles, and text, rather than images, but in other cases it’s capable of blocking the entire site, while offering the choice of entering at the risk of being spoiled. You can change these settings to suit your needs, though, like if you’ve already seen the latest episode of your weekly TV show. Another solution to this dilemma is to completely avoid Facebook, Twitter, and pretty much any online news aggregate, but that’s not really a viable choice. As a business owner, you probably spend a lot of time on the Internet doing research on new solutions and clientele. You shouldn’t have to have your fun ruined by Internet spoilers just because you’re doing your job.

In the meantime, Spoiler Alert might alleviate the problem to a degree, but the fact remains that the Internet is rife with spoilers that can potentially ruin the experiences of folks around the world. If you know of another way to keep spoilers away, feel free to share it in the comments; and please, no spoilers!

b2ap3_thumbnail_internet_under_the_sea_400.jpg

How Fishing Nets May Be the Greatest Security Threat to the Internet [Video]

b2ap3_thumbnail_internet_under_the_sea_400.jpgMany countries around the world have access to the Internet, but have you stopped to consider how this service is deployed and connected to countries on different continents? Well, this is only made possible by the countless miles of wire laid beneath the surface of the ocean, all around the world. In fact, it’s somewhat unnerving to think that international communications depend on the structural integrity of cables submerged at the bottom of the sea.

Like a mighty sea serpent, the Internet’s cables snake around the globe, connecting countries and online infrastructures to ensure global communication. The majority of transoceanic communications, including phone calls, emails, and just about any Internet transmission, is dependent on the well-being of these cables. As reported by WIRED, the first telegraph wire was initially laid across the Atlantic Ocean in 1866, and others soon followed, laid across common trade routes. In the 1950s, the standard for overseas cabling shifted to coaxial cables, which were capable of carrying telephone conversations. Today, the world uses fiber-optic cables that are used to transfer enormous amounts of data relatively quickly.

Here’s a video of how these cables are laid:

And a map of where they’re all located:

As you can expect, these Internet cables have become important staples for how society communicates on an international scale. Still, doesn’t it seem strange that such important pieces of technology are left at the mercy of the ocean? Most people don’t bother to remember that the cables exist until a problem happens and a connection goes down. More often than not, people only take interest in the cables when something goes wrong with them, but it’s a fairly common occurrence for submarines and international powers to take an interest in them.

As reported by WIRED, the following problems are fairly common threats for the Internet cables: seismic activity, various undersea creatures (namely sharks – you know, the scary ones with teeth), and international intervention. By far, though, the most common problem for the undersea cables comes in the form of ship anchors and fishing nets. Between the two, they make up about 60 percent of all cable destruction. This is the primary reason why most sea charts will mark the location of these wires; since, as you can imagine, cutting them has some pretty dire consequences.

Cutting undersea cables would probably make for a great sabotage trick for an international conflict, but such activities haven’t occurred since the previous World War. These days, the cables are typically left untouched and forgotten about, though occasionally the media will make a scene about submarines sniffing around near the cables. What are your thoughts on these undersea cables? Do you think there should be a more efficient manner of deploying information across the world? Let us know in the comments.

b2ap3_thumbnail_smartwatch_technology_400.jpg

Wearable Technology is Trending: Is This Good For the Workplace?

b2ap3_thumbnail_smartwatch_technology_400.jpgYou’ve probably seen the new fancy-schmancy watches that some people wear and wonder to yourself, “What’s so special about them?” Smartwatches like these are considered wearable technology and are typically meant to perform the various functions of a smartphone, minus the phone. Some devices are even used to monitor the body’s physical activity with health apps. They might seem useful now, but what’s the endgame for wearable technology?

What is Wearable Technology?
Technically, just about any device that’s worn on the body (like a headset) can be considered wearable technology. However, most wearable devices that you’ll encounter are designed to do one (or both) of two things: 1) Monitor the body’s physical well-being and track health progress, or 2) provide efficient access to apps that are designed to enhance productivity and efficiency for office employees. While they initially were meant for more of the former, the incredible success of wearable technology inspired developers to improve functionality in other areas.

As explained by CyberTrend:

A 2014 Parks Associates study projected that smart watch sales will reach 121 million units worldwide by 2018. Similar to a smartphone or smart TV, a smart watch can connect a user to the Internet for access to real-time data. Generally, smart watches will offer users some basic features (current weather, music, access to email and texts, etc.), which are also available on smartphones. Depending on the model, some folks can use their smart watches to control their smart TVs, capture pictures, video chat, and run scaled-down versions of common smartphone apps, in addition to using the device as an activity tracker.

While wearable technologies are versatile and can be used for multiple tasks, this doesn’t mean that these devices will be practical in the near future. For example, which would you rather use for your smart technology experience: a smartwatch or your smartphone? Many would probably say the smartphone because it’s vastly more powerful and efficient compared to the smartwatch. A larger screen makes it much more viable to get work done on a smartphone, rather than on a smartwatch.

Another type of wearable gadget consists of smart glasses, like Google’s failed Google Glass product. The main issue here is privacy; having a camera readily available on your glasses is somewhat sketchy and reminiscent of cyber espionage. Thanks to the portability afforded to smart glasses, they were thought to be a threat to both personal privacy and data security, so the idea never really took off.

How Wearables Affect Your Workplace
When workers are using wearable technology in the workplace, you should practice considerable caution. The trend known as Bring Your Own Device (BYOD) coupled with the Internet of Things (IoT) can spell trouble for businesses that aren’t prepared to deal with new devices connecting to their private networks. Any Internet-connected device can be considered a threat to your business if it’s not managed and maintained by your company. This is why it’s so important to keep an eye on devices that your employees are bringing to work with them. One way you can set these fears aside is by implementing a mobile device management solution, which gives you the ability to remotely wipe managed devices, restrict access to information on an app-by-app basis, and so much more.

Don’t let wearables and other Internet of Things devices hold your business back. To find out more information about how NuTech Services can protect your business from these new threats, give us a call at 810.230.9455.

b2ap3_thumbnail_more_PC_mistakes_400.jpg

Tip of the Week: Every PC User Should Know NOT to Do These 3 Things

b2ap3_thumbnail_more_PC_mistakes_400.jpgKnowing how to properly use your PC is key to its longevity. Therefore, you should never take for granted basic PC best practices. Here are three basic PC best practices that are easy to overlook.

Don’t Plug Your Computer Equipment Directly Into an Outlet
While it’s likely that you plug a variety of your electronics directly into your outlet, you shouldn’t do this with computer equipment. The problem here is that electricity coming directly from outlets can fluctuate. For example, this is why your building’s lights may randomly get dimmer and then brighter. While your light bulbs can handle these power fluctuations, your computer equipment cannot; and it may lead to irreversible damages.

Instead, be sure to plug your equipment directly into a surge protector. This is a simple power strip that can be found at most any store. Though even a cheap power strip is better than no power strip, a basic power strip will not protect your PC as well as a heavy-duty one. Therefore, it’s worth it to drop some extra cash on a power strip that’s rated to protect your equipment from surges, instead of one that’s designed only to provide you with extra outlets.

For the best solution to these power surges, consider an Uninterrupted Power Supply (UPS). This is a device that both restricts surges in electricity, as well as provides additional power during a surge’s low point.

Don’t Click Next or Ok Without First Reading
Granted, it’s unreasonable to expect someone to read every word of every software agreement, but at the very least, you should skim it over to have an idea of what you’re agreeing to. It may be the case that a shady third-party software company is trying to pull a fast one on you. ComputerHope.com explains:

It is not uncommon for new users to click Ok or Next without reading what they are agreeing to and not making sure there are no check boxes still checked. Make sure you read every prompt before agreeing, or you may be agreeing to install new browser toolbars, a program you didn’t intend to install, or other crapware.

Don’t Open Unknown Email Attachments
A quality spam filter will go a long way to prevent a PC from getting slammed with a virus or malware. However, even the most secure system can be compromised if the user makes the mistake of downloading something that they shouldn’t, like a corrupted email attachment. Viruses that spread through email attachments are among the most common ways that computers become infected. In order to trick you to download the dangerous attachment, hackers will disguise the message as originating from a trustworthy source, like your bank, your hospital, a parcel delivery service, a resume, and much more.

As a rule, never download an email attachment unless you’re absolutely sure of the source, and if something seems sketchy, it probably is. Remember, if the email appears to come from a legitimate source, then you can always call the sender using the phone number that you have on record in order to confirm the message. If your source admits to not sending you the message, then you know it’s a scam.

By following these three best practices, you’re sure to save yourself the headache (and expense) of dealing with PC performance issues. Knowing how to properly use a PC is the best way to prevent issues and breakdowns. To learn more PC tips and best practices, subscribe to NuTech Services’s blog and give us a call at 810.230.9455.

e_waste_management_400.jpg

Why You Shouldn’t Chuck Your E-Waste In the Garbage

e_waste_management_400.jpgToday’s society practices a policy of upgrading to brand-new devices whenever the next big thing drops. We see this all the time when businesses want to keep up with the latest trends by upgrading to new workstations that utilize recent operating systems, or because their old hardware feels slow. However, this can have a negative effect on the environment in the form of e-waste.

E-waste is defined by ewasteguide.info as:

e-Waste for short – or Waste Electrical and Electronic Equipment (WEEE) – is the term used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, fridges etc which have been disposed of by their original users. On this website – the e-Waste Guide – “e-waste” is used as a generic term embracing all types of waste containing electrically powered components. e-Waste contains both valuable materials as well as hazardous materials which require special handling and recycling methods.

In other words, your computers, servers, network components, and other hardware, all contain valuable metals and other materials that can be potentially hazardous to the environment if left unchecked. This wouldn’t normally be a problem if these materials were properly recycled, but the fact remains that e-waste is an exceptionally prevalent problem in many third-world countries that don’t have a specific workflow for getting rid of these gadgets.

Due to it being vastly cheaper to ship discarded devices overseas (rather than properly recycling them), many countries suffer from exorbitant e-waste, just like Guiyu, China. According to Slate, Guiyu has a population of around 150,000, and is known as the e-waste capital of the world. It houses many businesses that are dedicated to dismantling discarded devices for their valuable components, but their processes are often dangerous to both the inhabitants of Guiyu, and its environment.

For example, Slate explains that “to extract metals from a circuit board, the workers burn each part over an open fire; this process releases large amounts of toxic gas into the air and the town’s water supply.” This practice is naturally a cause for concern, especially considering the fact that the pollution winds up in the bloodstream of the inhabitants in the form of metals like lead, copper, zinc, etc.

The first step toward preventing this pollution from worsening is to take the proper steps when recycling your old technology. First, you should take steps to ensure that all private or sensitive data is removed from the device. NuTech Services can help you through this process. The last thing you want is for some stranger to get ahold of your device and tamper with it for information that’s stored on it. Once you’re sure sure that no information is left on the device, we’ll handle the recycling of the device in an environmentally-friendly manner.

To ensure that you always follow the best practices of replacing and recycling your old technology, contact NuTech Services at 810.230.9455.

b2ap3_thumbnail_cell_phone_hack_400.jpg

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

This exploit can use Siri and Google Now to perform any number of actions using your mobile device. The hacker can silently issue commands to devices that have headphones plugged in, acting as a receiving antenna. For example, the headsets that business owners love to use to communicate while out and about could work for this exploit. The headphones antenna acts like an FM radio chip that can communicate with mobile devices.

ZDNet explains further how this particular exploit works:

With the open source GNU Radio software on a laptop, electromagnetic signals can be sent to those devices. Depending on the sent command, Siri or Google Now can be told to open up a website, send a text, place a call or do any other number of things.

In order to pull this hack off, the attacker only needs to use a laptop with some sort of antenna apparatus to broadcast the signal. All of this could easily be concealed in a backpack and taken on the move. Granted, this exploit is also dependant on whether or not users will leave headphones plugged into the device when not in use, which is relatively unlikely.

Researchers further explained that this hack can work from around six feet from the phone, meaning that the hacker still has to get somewhat near the victim. Furthermore, the signal could potentially extend up to 16 feet from the victim, if the hacker has a powerful enough battery and antenna. Of course, this kind of powerful equipment isn’t nearly as portable as a laptop, making it somewhat inefficient to use, despite the further range.

Finally, it’s very likely that users will notice that their devices are being tampered with before the hacker manages to do anything fishy. The hack doesn’t disable the display of the device, so anyone who is currently using their device will notice what’s happening and react to it, hopefully. These types of hacks are one reason that you should always practice proper smartphone security and use a lock screen. It’s not known if this trick can bypass the lock screen, but either way, it’s a best practice to always be using one. You never know who could get into your device if you’re not using it, especially if you lose it or it gets stolen in a public place. This is why you need some sort of login credential for your device, just like you would for your laptop or desktop PC.

What are your thoughts on this new exploit? Do you think there’s a chance that this kind of vulnerability could be a threat to the business world, or do you think there’s little chance of it having any practical use? Let us know in the comments.