Panda Security, Author at Panda Security Mediacenter https://www.pandasecurity.com/en/mediacenter/author/francesca/ All the info about your cybersecurity Tue, 12 Mar 2024 17:03:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.pandasecurity.com/en/mediacenter/src/uploads/2016/11/cropped-favicon-1-32x32.png Panda Security, Author at Panda Security Mediacenter https://www.pandasecurity.com/en/mediacenter/author/francesca/ 32 32 How Much Data Does Streaming Use? + 5 Tips to Manage Data https://www.pandasecurity.com/en/mediacenter/mobile-data-streaming-media/ https://www.pandasecurity.com/en/mediacenter/mobile-data-streaming-media/#comments Tue, 12 Mar 2024 07:00:49 +0000 https://www.pandasecurity.com/en/mediacenter/?p=23835 Woman sitting on a couch watching something on her tablet

Does your data allowance keep running out every month? It could be down to the way you stream songs and movies.

The post How Much Data Does Streaming Use? + 5 Tips to Manage Data appeared first on Panda Security Mediacenter.

]]>

In the age of digital abundance — where entertainment is just a click away — streaming has become the beating heart of our daily lives. In fact, according to Forbes, Americans spend an average of three hours and nine minutes a day streaming digital media.

Whether it’s binge-watching favorite shows on TV, battling opponents in mobile games, or vibing to the latest tunes, streaming helps us stay on top of it all.

But as we enjoy the instant gratification, it’s important to know how much data streaming uses to avoid data caps. Read on to understand streaming data usage and learn some tips to manage that usage.

Understanding Streaming Data Usage vs. Internet Speed

Data usage refers to the amount of data consumed during streaming (measured in gigabytes or gigabits), while internet speed is how fast that data is transferred.

Streaming refers to the seamless delivery of multimedia content over the internet. It encompasses video consumption (Netflix, YouTube), music (Spotify, Apple Music) and gaming (mobile gaming, cloud gaming platforms). 

Several factors influence data usage when streaming. Firstly, the resolution of the content plays a significant role. Higher resolutions (such as HD or 4K) require more data than lower resolutions (like standard definition). 

The bitrate — the amount of data processed per unit of time — also affects data usage. Content with higher bitrates generally results in increased data consumption. Another important factor that contributes to overall data usage is the duration of streaming sessions — the longer you stream, the more data you consume.

Popular Streaming Services + How Much Data They Consume

Let’s go over the data consumption rates of popular streaming services to help you make informed decisions about your entertainment habits. By knowing how much data different platforms consume at various video quality settings, you can optimize your experience to align with your data plans and preferences. 

Standard HD UHD (4K)
Amazon Prime Video 0.38 GB 1.4 GB 6.84 GB
Apple TV 0.3 GB 0.7 GB 2.3 GB
Disney+ 0.7 GB 2.0 GB 7.7 GB
ESPN 0.9 GB
FuboTV 1.2 GB 1.6 GB 7 GB
Hulu 0.65 GB 1.35 GB 7.2 GB
Max 2.25 GB 7.7 GB
Netflix 0.3 GB 1 GB 7 GB
Peacock 1.1 GB 7 GB
YouTube 480-660 MB 1.2-2.7 GB Up to 23 GB

How Much Data Does Streaming Music Use? 

Low-quality audio, best suited for talk radio services and podcasts, typically consumes 43.2 MB of data per hour. Average-quality audio streaming uses 115.2 MB per hour, which is suitable for listening to music, and audiobooks. High-quality audio consumes 144 MB, which is more suitable for a detailed listening experience, particularly noticeable for music genres with intricate instrumentation or nuanced vocals.

Graphic showing how much data different music streaming platforms use

Most services auto-adjust according to the quality of your network connection, so the actual usage will fluctuate slightly. For a mobile contract — which is a legally binding agreement between a mobile service provider (such as a telecommunications company) and a customer — that includes 2 GB of data, you can listen to 17 hours of high-quality music.

The amount of data used by each service like Spotify, Apple Music and Pandora varies based on the audio quality; the better the quality, the more data is used.

When streaming audio, conserve data by opting for lower-quality settings and downloading music for offline listening. Monitor your data usage regularly to avoid exceeding your plan limits.

How Much Data Does Streaming TV Use?

Streaming live TV can consume varying amounts of data depending on the video quality and duration of viewing. Here are some estimations of how much data streaming live TV typically uses at different definitions:

  • Standard definition (SD): approximately 0.7 GB to 1 GB per hour
  • High definition (HD): roughly 1.5 GB to 2.5 GB per hour
  • Ultra high definition (UHD/4K): around 7 GB to 10 GB per hour

When determining how much data you need to stream live TV, it’s essential to consider several factors that can impact data usage:

  • Number of devices: The number of devices streaming simultaneously can significantly impact data usage. Each device will consume data independently, so streaming on multiple devices will increase overall data usage. For example, if you have multiple family members watching live TV on different devices at the same time, the data consumption will be higher compared to streaming on a single device.
  • Quality of the stream: The quality of the stream, measured in terms of resolution (SD, HD, or UHD), directly affects data usage. Higher-resolution streams (HD or UHD) require more data than standard-definition (SD) streams. For instance, streaming a live TV show in HD will consume more data per hour than streaming the same content in SD.
  • Number of hours: The duration of streaming also plays a crucial role in determining data usage. The longer you stream live TV, the more data you will consume. It’s important to consider your daily viewing habits and estimate the total number of hours you spend streaming live TV to accurately assess your data needs.

How to Manage Streaming Data Usage

Whether you’re using mobile data on the move or enjoying Wi-Fi at home, understanding and controlling your data usage is essential to avoid unexpected charges and ensure a seamless streaming experience. In this section, we’ll explore practical tips to help you manage data usage on both Wi-Fi and mobile data.

Managing Streaming Data Usage on Wi-Fi

Let’s delve into some tips for managing streaming data that can also help you boost your Wi-Fi signal

  • Adjust router settings: Configure your router settings to prioritize certain devices or limit bandwidth for streaming devices to manage data usage effectively.
  • Use data-saving features: Some streaming services offer data-saving features or lower bitrate options specifically for Wi-Fi usage. Enable these features to reduce data consumption.
  • Turn off auto-play: Disable auto-play features in streaming apps or websites to prevent continuous streaming of content, which can consume excessive data.

Managing Streaming Data Usage on Mobile Data

Let’s explore practical tips to manage and save streaming data usage specifically when using mobile data.

  • Adjust video quality: Lower the video quality settings in streaming apps to reduce data consumption.
  • Download content: Download movies or episodes when connected to Wi-Fi to watch offline without using mobile data.
  • Limit background data: Restrict background data usage for streaming apps in your device settings to prevent automatic updates or downloads while on mobile data.
  • Monitor data usage: Keep track of your mobile data usage using your phone’s built-in data tracking feature or a third-party app.
  • Stream on Wi-Fi only: Set streaming apps to stream content only when connected to Wi-Fi to avoid using mobile data unintentionally.

If you find that your mobile data allowance is still disappearing more quickly than expected, this may be a sign that something else is wrong. Unexpected data usage often indicates the presence of malware installed on your smartphone or streaming device that is stealing data or being used in some kind of scam. 

You should download and install a trusted anti-malware tool like Panda’s free Antivirus for Android that can alert you to suspicious activity.

Graphic showing internet data used in 1 hour activity

Data Streaming FAQ

We’ve answered some of the most common data streaming questions below.

Does Streaming Use More Data Than Downloading?

Streaming typically uses more data than downloading because streaming involves continuous data transmission in real time. When you stream a movie or TV show, data is continuously transferred from the streaming service’s servers to your device as you watch, consuming data throughout the viewing session. In contrast, downloading involves transferring the entire file to your device upfront, after which no further data is consumed during playback.

How Many Gigs Do You Need to Stream a Movie?

To stream a two-hour-long movie, the approximate data consumption would be as follows:

  • In standard definition, you would need approximately 2 GB of data.
  • In high definition, you would need approximately 6 GB of data.
  • In 4K Ultra HD, you would need approximately 14 GB of data.

How Much Data Does 1 Hour of Video Streaming Consume?

On average, streaming video data usage for SD quality is around 0.7 to 1 GB of data per hour, while HD streaming can use approximately 1.5 to 2.5 GB of data per hour. 

UHD or 4K streaming typically consumes even more data, with estimates ranging from 7 to 10 GB per hour.

Elevate your streaming experience with the Panda Security VPN — ensure data privacy as you binge-watch your favorite shows.

The post How Much Data Does Streaming Use? + 5 Tips to Manage Data appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/mobile-data-streaming-media/feed/ 1
How to Clean Your Charging Port in 5 Easy Steps https://www.pandasecurity.com/en/mediacenter/how-clean-your-mobile-charging-port/ https://www.pandasecurity.com/en/mediacenter/how-clean-your-mobile-charging-port/#comments Thu, 01 Feb 2024 02:56:15 +0000 https://www.pandasecurity.com/en/mediacenter/?p=24259 How to properly clean your mobile charging port

If your mobile battery has stopped charging,this one simple trick could save you a fortune. See what you can do to keep your phone working properly.

The post How to Clean Your Charging Port in 5 Easy Steps appeared first on Panda Security Mediacenter.

]]>

Is your phone not charging? Worried it might be broken or needs a battery replacement? The solution may be simply cleaning your charging port. 

Throughout the day, your phone accumulates debris, creating a barrier in the port and hindering a secure connection with your charger. Addressing this common issue ensures a smooth power flow, thereby restoring your device’s charging functionality. 

According to a study by LG, 90% of people experience ”low battery anxiety.” Don’t let it happen to you — take a moment to clean your charging port and enjoy uninterrupted phone power. Read on to learn how to clean a charging port in five easy steps.

Why Is My Charger Port Not Working?

One of the most common causes of charging problems may be surprising: dust. Lint and other dirt collects in the charging port, obstructing the battery connectors. When you insert your charging cable, the dust prevents a good electrical connection from being made, so no power is directed into the battery.

Finding out if you have a dust problem is quite easy — simply shine a light into the port where the cable connects and take a look. If you cannot see the metal charging contacts, or lint and dust are visible, you need to clean the port.

Tools to Use When Cleaning Your Charging Port

Prepare for an effective cleaning process with the following tools. Here are some recommended tools to use when cleaning your charging port:

  • Compressed air: Use a can of compressed air to blow away loose particles and dust from the charging port without causing any damage.
  • Toothpick: Carefully use a wooden or plastic toothpick to dislodge debris in the charging port. Wrap one end of the toothpick with cotton to avoid scratching or damaging the interior components.
  • Microfiber cloth: Wipe the exterior of the charging port with a microfiber cloth to ensure it’s free from any dust particles and to maintain cleanliness.
  • Cotton swab: Use a cotton swab for gentle and precise cleaning, especially in smaller and hard-to-reach areas of the charging port.

Tools to Avoid When Cleaning Your Charging Port

Be mindful of potential risks by steering clear of certain tools when cleaning your charging port. Here are tools to avoid for a safer cleaning process:

  • Metal objects: Pins, paper clips and needles may fit in the hole, but because they are metal, you risk making an electrical short circuit that could destroy the phone. 
  • Toothbrush: A toothbrush with stiff bristles can be too abrasive and may cause damage. Opt for a small, soft brush specifically designed for cleaning electronics.
  • Excessive moisture: Avoid using household tools that are excessively wet or liquids that can seep into the device and damage internal components. If you use isopropyl alcohol, apply it sparingly with a cotton swab or a small brush to avoid overexposure to liquid.
  • Breath: Blowing into the charging port using your breath might introduce moisture and other, potentially causing more harm than good. It’s advisable to use more controlled methods like a can of compressed air.

How to Safely Clean Your Charging Port

Wondering how to clean a Lightning port in your device? Follow these easy steps to ensure your device charges seamlessly. 

Step 1: Turn off Your Phone

Power off your phone. This step is crucial to ensure your safety during the cleaning process and to prevent any potential electrical mishaps.

Step 2: Blow Compressed Air

Gently blow into the charging port using a can of compressed air to dislodge loose particles and dust. This helps create a clear pathway for your charger, optimizing its connection with the port.

Step 3: Clean With a Toothpick

Wrap a toothpick tip with cotton, then carefully insert it into the charging port to remove any compacted debris. The cotton wrapping helps prevent damage to the port’s internal components.

 Step 4: Use Isopropyl Alcohol

To get rid of stubborn grime or residue, use a small amount of isopropyl alcohol. Lightly spray it on a cotton swab and use it to clean the charging port, then blow compressed air to thoroughly remove loosened particles.

Step 5: Turn on Your Phone

After completing the cleaning process, turn your phone back on and check if it starts charging again. If the problem persists, it is best to contact a professional. 

A step-wise process of how to clean a charging port.

How to Remove Water From a Charging Port

Learn how to delicately remove water from your charging port, ensuring your device stays dry and functional.

  1. Power off your device: Immediately turn off your device to prevent potential short circuits.
  2. Shake and pat dry: Gently shake your device to remove excess water, and use a dry cloth or paper towel to pat the charging port dry.
  3. Use compressed air: Blow compressed air into the charging port to dry out any remaining water droplets. Hold the device with the port facing downward to allow gravity to assist in water removal.
  4. Let it air-dry: Leave your device in a dry, well-ventilated area for at least a few hours to ensure complete drying before attempting to charge again. Avoid using tools like hair dryers, as excessive heat may damage the device.

How to Remove Sand From a Charging Port

Gently blow compressed air into the charging port to dislodge sand particles. Make sure to hold the device with the port facing downward to ensure the sand falls out uninterrupted. After using the air compressor, inspect the port and attempt charging. If issues persist, consider professional assistance or consult your device’s manufacturer.

Tips to Keep Your Charging Port Clean

Explore these helpful tips to ensure your charging port stays clean, allowing for a seamless and uninterrupted charging experience for your device.

  • To keep your charging port clean, use a dust plug when your device is not charging and store it in a clean and dry environment.
  •  Keep your hands clean to minimize debris transfer.
  • Regularly inspect the port for visible dirt particles and clean it with a toothpick or compressed air if needed. 
  • Make sure to handle charging cables with care during connection and disconnection. 
  • Avoid exposing your device to liquids to prevent potential corrosion in the charging port. 

If you were wondering how to clean your iPhone charging port, we hope these steps help you achieve a smooth and hassle-free cleaning experience. Cleaning a Lightning port is quite easy — and it may solve your charging problems. Be careful, take your time and you could save yourself a serious headache next time your phone won’t charge. 

Download Panda Mobile Security

The post How to Clean Your Charging Port in 5 Easy Steps appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/how-clean-your-mobile-charging-port/feed/ 10
31 Alarming Identity Theft Statistics for 2024 https://www.pandasecurity.com/en/mediacenter/identity-theft-statistics/ https://www.pandasecurity.com/en/mediacenter/identity-theft-statistics/#comments Tue, 09 Jan 2024 10:23:26 +0000 https://www.pandasecurity.com/en/mediacenter/?p=21189 A person logging into a secure app on their phone

Identity theft is a large issue across the globe. Even if you personally haven’t been victimized, hearing the data and statistics on identity theft may make you think, am I next?

The post 31 Alarming Identity Theft Statistics for 2024 appeared first on Panda Security Mediacenter.

]]>

Identity theft is a prevalent issue that affects millions of people annually. You’ve certainly heard of it, but what does it entail? Identity theft is when someone steals your Social Security number, bank info and other personal details to commit criminal acts in your name.  

In 2022, the Federal Trade Commission (FTC) received over 5 million stolen identity complaints from U.S. citizens, and with attacks getting more advanced, the chances of becoming a victim increase daily.

Although the numbers are startling, we’ve selected the 31 most concerning identity theft statistics to help you understand how to secure your identity.

How Common Is Identity Theft?

  • In 2022, the FTC received 5.1 million financial theft reports for fraud, of which 1.1 million were identity theft claims.

  • In 2022, 61% of U.S. identity theft victims had their accounts hijacked or taken over, compared to 32% with new accounts opened in their names.

  • Almost 1 in 3 Americans experienced identity theft in 2022.

    3 people in bubbles and orange fish hook pulling up person in the middle
  • In 2022, out of 12,911 U.S. victims, 8% suffered two identity theft incidents.

  • Credit card fraud was the number one form of identity theft in 2022, behind bank fraud and loan fraud.

  • The most common identity theft incidents of 2023 in order from most prevalent to least:

    1. Bank account, credit cards and check information
    2. Fraudulent income tax and unemployment claims
    3. Misuse of personal identifiable information in childhood
    4. Phone and utility accounts opened in the victim’s name (PII)
    5. Using identity to take out car, home and student loans
    6. Nonfinancial criminal offenses like impersonation
    hacked computer with broken lock and password field on screen next to yellow caution sign and money in coins and dollars
  • In the U.S. 80% of identity compromises in 2022 included the use of identification credentials, up from 77% from the previous year.

Cost of Identity Theft

The financial costs of identity theft are significant, ranging from stolen funds and unauthorized transactions to the expenses involved in reclaiming your identity. The statistics below uncover the financial burdens of identity theft.

  • Total damages from reported credit card theft in the U.S. reached $219 million in 2022.

    blue credit card with security chip behind an orange defense shield cracked in half
  • Out of 726,000 imposter scam reports in 2022, 22% of victims lost money in the U.S., with losses totaling $2.7 billion.

  • U.S. victims of identity theft had a collective loss of $189 million in 2022, less than the combined loss of $278 million in 2021.

    laptop with orange screen showing page with white caution sign

Stats on Personal Data Breaches

The more we rely on digital technology, the more vulnerable we are to data leaks. These leaks can lead to identity theft, as they expose personal information. Many of these leaks stem from phishing, which is a cybercrime intended to deceive people into disclosing their personal information, including credit card information and Social Security numbers. Here are identity theft statistics related to data leaks.

  • Over 10 billion personal records have been exposed globally due to data breaches since March 2020.

  • In 2022, the U.S. documented 1,802 cases of hacked data, a 300% rise from the 447 cases reported in 2012.

    hacker wearing mask in a blue hoodie with money icon on his left and skull death symbol on his right
  • Phishing affected over 300,000 Americans in 2022.

  • There were over 1.35 million phishing sites worldwide in 2022.

  • In 2022, nearly 60,000 personal data breaches occurred in the U.S., revealing emails, passwords, payment logs and IP addresses.

  • In 2022, over 422 million U.S. people were affected by data compromises, including data breaches, leakage and exposure.

    chain and lock wrapped around an orange confidential folder file with documents inside
bar chart with two sets of compromised data cases for 2012 and 2022

Global Identity Theft Statistics

Identity theft is a global problem and some regions lack the information or resources necessary to protect themselves or decide what to do after experiencing it. These figures demonstrate the global reach of identity theft.

  • In a 2023 global poll, 75% of Japanese adults claimed they wouldn't know how to react to identity theft, and 8 out of 10 adults in Japan and New Zealand were unsure how to check for it.

  • As of January 2023, 30% of adults globally encountered a phishing scam.

    fishing pole coming out of a computer screen with an identification card attached to the hook
  • From 2021 to 2022 the number of cyber identity theft complaints in the U.S. decreased from 51,000 to nearly 28,000.

  • In 2023, adults who were not aware of identity theft checks were most common in countries like Australia and France (74%) and Japan and New Zealand (81%)

  • Cyber identity theft crimes increased dramatically in Europe from 566,000 reported instances in 2019 to 682,000 incidents in 2020.

    Orange bar chart and hacker side by side in front of the European continent colored in blue
  • 8.6 million UK citizens (16%) have used false, fraudulent or stolen identities as of 2023.

Identity Theft Statistics By Age and Generation

This section explores identity theft trends by age and generation. Younger generations are more vulnerable due to online activity like social media fraud and potential security lapses, while criminals target senior citizens for their trust and assets (FTC). No matter your age, you can protect yourself against identity theft by being aware of typical warning signs.

  • In 2022, Gen Xers and Baby Boomers were the most likely to report incidents of identity theft (both at 81%), compared to Gen Zers and Millennials, who reported 59% and 69% of cases, respectively.

  • In 2022, Gen Z adults living in the U.S., U.K. and Canada topped the list for falling victim to phishing scams, with 34% admitting they've been tricked by hackers into revealing their information.

    gen z girl with orange hair and headphones holding phone in hand and watching money fly away
  • Compared to 16% (8.6 million) of the total population, 33% (2 million) of youths in the United Kingdom (16-24) used a false or stolen identity to get credit, products or services in 2023.

  • U.S., U.K. and Canada-based millennials experienced higher rates of identity theft (20%) than any other age group in 2022.

  • In 2022, the second most targeted age group in the U.S. for identity theft is 40- to 49-year-olds.

  • In 2022, Gen Zers (18%) had the second highest reported victimization rates for identity theft.

  • In 2022, the most targeted age group in the U.S. for identity theft is 30- to 39-year-olds.

    30 year old man wearing a blue shirt typing on his laptop
  • Data breaches affected 1.7 million children in the United States in 2022.

    child with curly hair wearing blue shirt and orange pants playing with blocks while sitting on the floor

States with the Highest Identity Theft Rates

Where you live in the United States affects how vulnerable you are to identity theft due to various factors like income, crime rates and more. Although it can happen anywhere in the world, living in these states increases your risk of identity theft.

  • In 2022, Georgia was the number one state for fraud and identity theft reports.

data visual showing top 5 states for fraud, identity theft, and total fraud losses highlighted in orange in 2022

Identity Theft Preventive Measures

You can prevent identity theft with the proper knowledge and safety measures. A 2022 cybersecurity survey found that 45% of people who were educated about identity theft prevention used stronger passwords, 40% updated security, using multi-factor authentication and 58% were better at spotting phishing messages

To protect yourself from identity theft, here’s what we recommend.

  • Create stronger passwords: Use a mix of letters, numbers and symbols to create a solid password. Use longer phrases instead of single words, like Mary3hadalittleL@mb! and avoid using your name or the same password for multiple accounts.
  • Check bank statements and credit reports: Regularly review your bank statements for unauthorized transactions and check your credit report for fraud. You can obtain a free report from Annualcreditreport.com.
  • Use MFA or 2FA: Implementing multi-factor or two-factor authentication adds a layer of security by requiring a second step, like an email or text code, to authorize your account. 
  • Utilize cybersecurity software: Secure your electronic devices with antivirus and security software. These updates make it harder for hackers to infiltrate your systems.
  • Protect your Social Security number: Hackers can damage your name and Social Security number, so limit giving it out unless necessary.
  • Limit sharing on social platforms: Limit social media sharing, especially if you use the data for passwords or security questions, as criminals can exploit this information.
  • Secure your network: Avoid accessing sensitive data on public Wi-Fi networks. Use private browsers, VPNs and privacy-focused search engines to help prevent identity theft.

What to Do If Your Identity Is Stolen

If your identity is stolen, report it to the FTC right away. Delayed reporting will only make matters worse for your finances. The proper institutions can freeze your accounts and possibly remove fraudulent accounts in your name. There are three ways to report identity theft: 

  1. Report to the FTC at Identitytheft.org.
  2. Alert the three credit bureaus (Experian, Equifax and Transunion).
  3. Call the fraud department at your banking institution.

Stay Protected With Panda Security 

As technology advances, so do malicious tactics like phishing, making our data more vulnerable to theft. As you can see from these statistics, it impacts millions of people each year, and anyone can be a victim.

The most important thing you can do to avoid becoming a victim is prioritize your online security. Implement safeguards like our Panda Security Virtual Private Network (VPN) to encrypt your internet connection, keep a close eye on your financial records and develop sound cybersecurity habits. Although identity theft is a real problem, you can stay safe if you take the proper steps. 

The post 31 Alarming Identity Theft Statistics for 2024 appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/identity-theft-statistics/feed/ 1
What is digital domestic abuse? https://www.pandasecurity.com/en/mediacenter/what-is-digital-domestic-abuse/ https://www.pandasecurity.com/en/mediacenter/what-is-digital-domestic-abuse/#comments Mon, 11 Sep 2023 06:19:52 +0000 https://www.pandasecurity.com/en/mediacenter/?p=30115

Understanding digital domestic abuse and what you can do if you’re a victim.

The post What is digital domestic abuse? appeared first on Panda Security Mediacenter.

]]>

Here on the Panda Security blog we often write about abuse and harassment on the internet. But technology can also be used to abuse and control people in the real world, something experts call ‘digital domestic abuse’.

What does digital domestic abuse look like?

Digital abuse uses technology like text, social media and built-in smartphone apps to ‘bully, harass, stalk or intimidate a partner’ – usually through control. This may manifest as one person limiting who their partner can connect and talk to online. They may also compulsively stalk their partner on social networks or using location sharing apps (like Apple’s Find My) so that they always know where that person is.

Extreme forms of digital domestic abuse may include installing spyware on their victim’s phone or stealing passwords to access online services to ‘check up’ on their activities. As such, digital abuse often accompanies other behaviors like physical or mental abuse.

ALSO READ: How to Handle and Prevent Online Harassment

What do the police say?

In the UK, the Metropolitan Police have drawn up a list of behaviors that could indicate if your partner is digitally abusing you. An abuser may:

  • Control access to your online accounts, including social media or banking.
  • Use technology to send you negative, insulting, or threatening messages.
  • Send you unwanted sexually explicit images (also known as cyberflashing).
  • Demand that you send them explicit images of yourself.
  • Posting explicit images of you online without permission (intimate image abuse).
  • Using your social media accounts to pose as you without your permission.
  • Criticizing and belittling you down for content you post online.
  • Taking away your devices and controlling your access to apps and websites.

ALSO READ: New laws to strengthen UK cybersecurity provisions

How common is digital domestic abuse?

No one is quite sure how common digital domestic abuse really is. However, one British survey found that 29% of women questions have had a partner who tried to control their social media interactions – and 11% said a partner did manage to control their online activity.

Reports also suggest that younger people between 16 and 24 are more likely to be abused in this way. 41% of survey respondents in that group claimed to have experienced problems with partners controlling their social media use. People over the age of 55 were 5x less likely to be abused in this way – possibly because they do not use technology in the same way as younger people.

ALSO READ: UK-based adult websites urged to do more to protect children

What can I do if I am a victim of digital domestic abuse?

If you find you are a victim, you should:

  • Set strong passwords on your social media accounts and apps.
  • Enable two factor authentication on your accounts.
  • Turn off location sharing if you are concerned about stalking.
  • Install a mobile antivirus app to detect and remove spyware and stalking apps.

And if you ever feel threatened, contact the police immediately.

The post What is digital domestic abuse? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/what-is-digital-domestic-abuse/feed/ 1
Are kids using ChatGPT for school projects? https://www.pandasecurity.com/en/mediacenter/kids-chatgpt-school-projects/ https://www.pandasecurity.com/en/mediacenter/kids-chatgpt-school-projects/#respond Wed, 06 Sep 2023 06:07:52 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29986

The short answer is yes; they are using ChatGPT at schools. AI tools are being used by children in the USA.

The post Are kids using ChatGPT for school projects? appeared first on Panda Security Mediacenter.

]]>

Students and parents must know that ChatGPT and its variations come with a whole list of associated risks.

The short answer is yes; they are using ChatGPT at schools. Even though most AI tools strictly say that the minimum age to use ChatGPT is 18, many students bypass the rule and use ChatGPT to generate content later submitted as their own. OpenAI’s ChatGPT is one of many options; other tools are either based on ChatGPT or developed by OpenAI competitors, i.e., Microsoft’s Bing Chat and Google’s Bard AI. University students use it for assignments, too. It is an undisputed fact, that AI tools are being used by children in the USA.

ChatGPT’s risks

However, students and parents must know that ChatGPT and its variations come with a whole list of associated risks. Educational institutions are getting up to speed fast, and students could be accused of cheating if caught using AI tools such as ChatGPT. Even though there are no perfect plagiarism checkers yet, multiple tools out there could detect ingenuine content, and those tools are readily available to teachers. Such plagiarism checkers are often unnecessary as teachers familiar with their field of study can easily recognize made-up things and untruthful content. AI chatbots sometimes made-up dates, facts, and even articles, and students often learn this the hard way.

ALSO READ: Back-to-school cybersecurity tips for parents and children

Other associated risks with such tools come with the recently reported ‘dumbing down‘ of ChatGPT and other similar services. OpenAI has openly denied such claims, but many users noticed a significant decrease in the power/knowledge of ChatGPT over the last few months. Even though the ‘dumbing down’ is disputed by many, students must know that chatbots might not be a cure-all and would still need to research their topics thoroughly. Some people address chatbots as glorified typewriters unable to generate new content and ideas but only limited to using what’s already available. And the availability of AI bots is controlled by the companies’ owners.

Future-proofing must also be a concern for students using the new technology. Students must remember that if they’ve managed to pass an exam or submit an assignment at some point, this may fire back later. Universities and schools may one day return to reexamine the work and realize that the generated content was plagiarized, which could void a graduation diploma or a certificate. Students must know that ChatGPT is still highly unregulated.

ALSO READ: Back to school cyber security tips

Conversing with an AI-based chatbot may be exciting, but students need to know that the replies they receive might not be informative. Answers could be dangerously misleading. The bot might be pushing a political agenda and/or mispresenting facts. ChatGPT has shown political bias and has been biased on many sensitive topics. Often, chatbots notify users that they could potentially display inaccurate or offensive information… and this is the cold truth.

Students might feel tempted to take advantage of the tool and use it to write a book report to save time. However, actions have consequences, and it is possible that relying on the new, undeveloped technology comes with risks, and at least for now, reading the book and doing all the work the old-fashioned way is the safest method. Many lawyers and “journalists” have already learned this lesson the hard way.

The post Are kids using ChatGPT for school projects? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/kids-chatgpt-school-projects/feed/ 0
UK AI usage explodes https://www.pandasecurity.com/en/mediacenter/uk-ai-usage-explodes/ https://www.pandasecurity.com/en/mediacenter/uk-ai-usage-explodes/#respond Mon, 04 Sep 2023 13:05:44 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29983

10 Brits are now using AI tools at least once a day. UK users have embraced generative AI technology at a surprisingly rapid rate.

The post UK AI usage explodes appeared first on Panda Security Mediacenter.

]]>

A new survey suggests that British citizens are embracing generative AI technologies like ChatGPT at a phenomenal rate

Sometimes the hype surrounding new technologies far outweighs the reality. But a new survey suggests that British citizens are embracing generative AI technologies like ChatGPT at a phenomenal rate.

When questioned by accounting group, 26% of UK adults have used a generative AI service, such as intelligent chatbots. This is equivalent to 13 million British citizens. And one in 10 Brits are now using AI tools at least once a day.

ALSO READ: Is the UK about to steal a lead in the AI race?

Not just for fun

A lot of people have been ‘playing’ with ChatGPT to see what the platform is capable of. However, one in 10 (4 million people) are using generative AI for work.

The ability to produce convincing text and images has helped workers become more productive by allowing them to perform common tasks like writing emails, creating artwork or conduct research more quickly.

Surprisingly rapid adoption

Often new technologies take a long time to experience widespread adoption. Analysts note that it took five years for smart speakers like Amazon Alexa, Apple HomePod and Google Nest, to attract similar levels of uptake.

ChatGPT has experienced no such difficulties as people have embraced the platform from almost the moment it was released to the public. Undoubtedly some of this success is due to the fact that no special hardware is required to interact with generative AI – you can access most services from a PC or smartphone app. Smart speakers require users to purchase specialist hardware – which can be quite expensive in the case of Apple devices. By lowering the barrier to entry, generative AI has overcome many of the problems inherent with other new technologies.

A word of warning

There was one finding in the Deloitte survey that should cause some concern. 40% of those questioned said that they believe generative AI systems always produce factually correct answers. Sadly, this is not true.

AI systems are only as accurate as the data used to train them. If the algorithm has received factually incorrect data during training, it is likely that the results of any queries will also be incorrect.

It is also important to note that some AI systems are only able to refer to historical training data. In the case of ChatGPT, no new data has been introduced into the system since September 2021 – meaning that any ‘factual’ information it produces could be two years (or more) out of date.

Exciting times ahead

The fact that British users are embracing generative AI is positive for the industry as a whole. User demand will drive new innovations and improvements, ensuring that the technology becomes even more useful – and valuable.

ALSO READ: Cybersecurity survey: 36% of Europeans don’t even have an IoT device

The post UK AI usage explodes appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/uk-ai-usage-explodes/feed/ 0
How to protect your personal data when using ChatGPT and generative AI https://www.pandasecurity.com/en/mediacenter/protect-personal-data-chatgpt/ https://www.pandasecurity.com/en/mediacenter/protect-personal-data-chatgpt/#respond Wed, 30 Aug 2023 05:18:15 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29973

Artificial intelligence systems work by using as much data as they can gather – so how can you protect your privacy?

The post How to protect your personal data when using ChatGPT and generative AI appeared first on Panda Security Mediacenter.

]]>

When it comes to free apps and websites, most of these services rely on collecting – and selling – personal data. Google and Facebook are well known for building detailed profiles of everyone who ever uses their services, using that information to sell targeted advertising.

Generative artificial intelligence systems like ChatGPT are very similar – they collect as much data as they can to help improve the accuracy and performance of their algorithms. So as generative artificial intelligence tools like ChatGPT become a part of our everyday lives, how can you maintain your privacy?

How can you maintain your privacy while using ChatGPT and generative AI?

Be aware of what you are giving away

Unfortunately, the terms and conditions of most online services tend to be extremely complex and hard to understand – often intentionally so. However, failing to read these documents means that you never really understand what you are giving away – or how the platform will use your data in future.

In the case of ChatGPT, any information you type into the chat prompt will be stored and analyzed to help further improve their service. You can probably assume that any generative AI platform will do the same. So you should be very careful about sharing sensitive personal information with these systems.

Everything is vulnerable online

As the recent data breach at the Police Service of Northern Ireland has shown, even the most secure, sensitive IT systems can be breached. Although the AI providers invest time and money into securing their systems, there will always be a risk that they too will be targeted by hackers. And if the criminals manage to break into the generative AI platform, they may also steal your sensitive personal information.

Again, you must be very conscious and careful about the information you share with generative AI systems – and what may happen if that information was leaked or stolen.

Adjust your privacy settings

Not every generative AI tool offers privacy settings, but you must use those that do. Both Google and Microsoft expect artificial intelligence to be an integral part of their services in future, so the privacy tools for their AI services are included with the controls for the rest of your account.

This means that you can choose to have data shared with Google Bard automatically deleted periodically for instance. Similarly, Microsoft allows you to review your search history and delete anything (or everything) you no longer want to share.

By using the trash can icon at the bottom of the ChatGPT window, you can immediately delete the contents of your chat when you have finished. You can also choose to prevent any of your inputs being saved in the Data controls setting. Obviously OpenAI suggest you don’t disable this setting – but it is the only way to maintain full control of your data.

As always, the best way to protect your personal data is to stay alert – what information am I sharing and how could the generative AI system use it in future. If you have any concerns at all, it’s probably best not to use the system until you are sure you are safe.

The post How to protect your personal data when using ChatGPT and generative AI appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/protect-personal-data-chatgpt/feed/ 0
Rise in UK IT degree applicants driven by AI advances https://www.pandasecurity.com/en/mediacenter/rise-uk-it-degree-applicants/ https://www.pandasecurity.com/en/mediacenter/rise-uk-it-degree-applicants/#respond Mon, 28 Aug 2023 10:13:34 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29970

Students are keen to join the AI revolution, driving up demand for IT degree places.

The post Rise in UK IT degree applicants driven by AI advances appeared first on Panda Security Mediacenter.

]]>

As August draws to a close, British students have been receiving the results of their A-level exams. Naturally their attention is now shifting towards the new semester and what they will be studying at university.

This year universities have recorded a rise in applications to study IT-related courses. UCAS, the University and Colleges Admission Service which oversees university place allocations in the UK, reports that IT applications have increased by almost 10% since 2022.

AI is driving an increased interest in undergraduate IT studies

Applications to study IT courses have increased steadily since 2019. UCAS chief executive Clare Marchant said she believes the 2023 increases are driven by “the rise of digital and AI”.

Marchant went on to say, “We know that changes in the world around us translate into increased demand for certain courses, as we saw for economics post-2008, and for medicine and nursing during the Covid-19 pandemic.” She credits the growing public conversation around technology and artificial intelligence for increased interest in computing courses.

Vanessa Wilson, of the UK University Alliance agrees, “The rise in the popularity of computing may well be a response to increasing awareness of the role of technologies such as AI, as well as a strong desire from students to develop what they see as future-proof skills.”

Are digital skills the future?

Software engineering has been the most popular computing course, with applications increasing by 16% since last year. Pure computer science degrees are up 11%, computer games and animation up 2% and artificial intelligence (AI) up 4%.

The chief executive of the British Computing Society, Rashik Parmar commented, “Teenagers in the UK know that AI will change the world forever; it shouldn’t surprise us to see this soaring demand for computing degrees”.

Increased interest in computing and AI disciplines is good news for the UK. The British government has recently announced plans to help the country become a world-leader in artificial intelligence technologies and disciplines. But to make these plans work, there will need to be an increase in the number of skilled workers – which is why the rise in IT degree applications is so important.

There was some slightly disappointing news however. Only 18% of applications were made by women. This means that although this figure has grown by 1% since 2023, computing and IT remains a male-dominated industry.

And although 95,000 people applied to study IT courses, this is still far below other subjects. In fact, computing is just the seventh most popular field of study. Business and Management related degrees remain the most popular in the UK, along with design, creative and performing arts courses, medicine, social sciences, biological and sports sciences, and engineering and technology.

But the increase in IT interest is welcome – and seems likely to continue in the years to come.

The post Rise in UK IT degree applicants driven by AI advances appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/rise-uk-it-degree-applicants/feed/ 0
Google’s Enhanced Safe Browsing Explained https://www.pandasecurity.com/en/mediacenter/googles-enhanced-safe-browsing/ https://www.pandasecurity.com/en/mediacenter/googles-enhanced-safe-browsing/#respond Thu, 24 Aug 2023 05:28:58 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29930

Google has been aggressively pushing its users to enable Enhanced Safe Browsing. What is Enhanced Safe Browsing, and how does it work?

The post Google’s Enhanced Safe Browsing Explained appeared first on Panda Security Mediacenter.

]]>

Google has been aggressively pushing its users to enable Enhanced Safe Browsing. Bleeping Computer reported that the message to enable the security feature appears even after users reject the invitation. Google insists that this will help users stay safe, and users with the feature enabled are 35% less likely to become victims of online scams. However, turning it on comes with a few drawbacks, including giving Alphabet more detailed access to user browsing habits, associated accounts, and overall online behavior.

READ ALSO: What Is HTTPS? A Guide to Secure Browsing and Sharing

What is Enhanced Safe Browsing, and how does it work?

The feature is not new. A version of it has been around for more than fifteen years. The tool had a facelift a few years ago, and Google had another push. Google stated that when users enable Enhanced Safe Browsing, Chrome activates a cyber security feature that allows live accurate threat assessment. In real-time, Google knows which sites users visit and checks whether the site is blacklisted or flagged for malicious activities. The feature also sends parts of downloaded files for investigation if Google thinks those files could be malicious. If the analysis determines possible threats, it starts preventing other users from being able to download them and warns others when entering the questionable websites hosting such files.

Why the concerns?

The fact that Alphabet’s Google is actively pushing its users to enable the feature raises some privacy concerns. The tech giant already collects vast amounts of data on its users, and many believe that by enabling this feature on Chrome, users might start sharing even more than before with the tech conglomerate. Google admits that the stored data is temporarily linked to an associated account, used for some time, and then anonymized. Hence, it is no longer connected to the profile that gathered it. However, cyber security experts confirm that the collected data could easily be connected to real persons only using information publicly available online.

Should you trust it?

Google, and its partners, already know a lot about you, so if privacy is of little importance to you, enabling the feature might be helpful. By allowing the tool to operate, you get some protection and help Google protect other users. Keeping the feature off might be your best option if you prefer not to share as much with big tech. Some people choose to enable the feature to stop receiving constant reminders to turn it on.

READ ALSO: Top 10 tips for safer, more secure web browsing

Is it enough? No, not really. Even though the feature could be helpful, having proper antivirus software installed on all connected devices is necessary. Antivirus software prevents users from being in the wrong place and time and often comes with features such as VPN that allow safe browsing without compromising privacy.

The post Google’s Enhanced Safe Browsing Explained appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/googles-enhanced-safe-browsing/feed/ 0
What is WormGPT? https://www.pandasecurity.com/en/mediacenter/what-is-wormgpt/ https://www.pandasecurity.com/en/mediacenter/what-is-wormgpt/#respond Mon, 21 Aug 2023 09:00:21 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29927

What is WormGPT and what does it do? Like all technologies, hackers have found a way to use AI to commit online crime.

The post What is WormGPT? appeared first on Panda Security Mediacenter.

]]>

Artificial intelligence (AI) tools are set to revolutionize the way work, automating common tasks to help us all be more productive. Unfortunately, AI can also be used for illegal activities – as the new WormGPT system shows.

What is WormGPT and what does it do?

By now you have probably heard of ChatGPT, the generative AI engine which provides highly accurate answers to questions. The genius of ChatGPT is how accurate and human-sounding those responses are, particularly when the AI engine is asked to ‘write’ something quite long and complex, like a blog article or a poem.

Now hackers have got into the game with WormGPT, a generative AI platform designed to assist with criminal activities. According to researchers, WormGPT is being promoted on darknet forums as “biggest enemy of the well-known ChatGPT that lets you do all sorts of illegal stuff.”

Specifically, WormGPT automates the creation of highly convincing fake emails that are personalized to the recipient. Because of this high degree of personalization, they are far more likely to trick people into disclosing passwords or installing malware.

Is there anything else I need to know?

At present, WormGPT is primarily concerned with writing effective phishing emails. But like ChatGPT, WormGPT can be used to write code automatically – including malware and cybersecurity exploits. It is likely that these AI tools will help hackers develop malware faster – which means we may see an increase in new attacks in the near future.

At the same time, criminals are also investing resources into ‘breaking’ other generative AI platforms. Some bad actors are now promoting “jailbreaks” for ChatGPT, hacks designed to extract sensitive information. Others are using the built-in API to manipulate to manipulate ChatGPT itself. They are generating output that could involve disclosing sensitive information, producing inappropriate content, and executing harmful code.

Should I be worried?

Although new techniques are emerging all the time, there has not been a significant spike in AI-influenced cybersecurity incidents. As always, you are strongly advised to stay alert – the malware may change, but the methods used to infect your devices remain the same.

And no matter how cybersecurity threats change, antimalware will remain an important – and extremely effective – defense. Don’t leave yourself unprotected – download a free trial of Panda Dome today.

The post What is WormGPT? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/what-is-wormgpt/feed/ 0