Chinese researchers broke encryption

Look at these two headlines:

  • “China’s Quantum Computer Scientists Crack Military-Grade Encryption” (Newsweek, Oct. 18, 2024)
  • “Debunking Hype: China Hasn’t Broken Military Encryption With Quantum” (Forbes, Oct. 16, 2024)

So, who’s right?

To figure that out, let’s talk about quantum computers. Now, before your eyes glaze over and you think, “Come on, Kim, I can barely find the duplicate photos on my phone” (here’s my walkthrough!), you’re going to start hearing a lot more about these futuristic, ultra-powerful machines, and I want you to be in the know.

You see, quantum computers were just used to decipher part of the encryption we all rely on for protecting our banking info, private messages and more. I know it sounds scary — and it kinda is — but I don’t want you to panic because of the misinformation some bloggers and sites are spreading online.

What the heck is a quantum computer, anyway?

Think of your everyday laptop or desktop as a runner who takes one step at a time, even if it’s really, really fast. It’s all about processing those ones and zeros in a sequence — one calculation, then another. Today’s computers can juggle lots of tasks at once, but they’re still doing one thing after another, just at lightning speed.

Quantum computers, on the other hand, are like having a whole marathon of runners all sprinting in different directions at the same time. Instead of ones and zeros, they use quantum bits, aka qubits, which can be a one, a zero or both simultaneously (thanks, weird quantum physics). This allows them to process massive amounts of data at once.

How about another analogy? In a chess game, a regular computer thinks about each move one at a time. A quantum computer can consider all possible moves and multiple games at once. It’s like someone playing 10 chess matches simultaneously and still winning every single one.

Why aren’t we all using these yet?

Quantum computers are huge, complex machines that operate in labs at super-cold temperatures. Even in these ideal settings, keeping those qubits stable is tricky. So, for now, only researchers have access to this kind of tech — not everyday cybercriminals.

‘Should I be worried?’

Continue reading

How to stay safe on public Wi-Fi

You don’t leave your front door unlocked. So why would you use public Wi-Fi networks without protection? Defend your private data from cybercriminals in public places with these five tips.

If you listen to The Kim Komando Show and Kim’s podcasts, you know about digital dangers. Accessing the internet via public Wi-Fi networks can heighten these risks even more.

Continue reading

Months after a report outing Eken video doorbells as hackable, a fix is here. Bad guys can access video doorbells that work with the Aiwit app and take control of the device. And with no encryption, your Wi-Fi and IP address could be exposed. Double-check your Aiwit app to make sure you’re up to date. Go to Devices and tap your doorbell name. Look for a firmware number of 2.4.1 or higher.

Text-raordinary mistake: RCS messaging makes texting between an iPhone and Android device better, but there’s a catch: These messages aren’t encrypted. Google Messages is encrypted for Android-to-Android, and Apple Messages does the same for iPhone-to-iPhone texts. Between Android and iPhone? No encryption, meaning it’s super easy for a hacker to see your texts.

Trivia

This week in 1997, a group of hackers cracked code written in Data Encryption Standard, which was designed to be impenetrable. Oops. How long did it take the hackers to crack? Was it … A.) Five days, B.) Five weeks, C.) Five months or D.) Five years?

Find the answer here!

How the government spies on you

When I shared my tip on opting out of the Transportation Security Administration’s new facial recognition tech at airports the other week, I got a ton of questions. First and foremost, though, a lot of you said, “I didn’t know I could do that.”

Continue reading

6 safe smart gadgets for a high-tech nursery

Putting smart speakers in your living room is one thing, but if you’re going to have a connected device in your nursery, you need to know it’s secure.

Case in point: A popular baby monitor that allowed hackers to spy on live video of parents and their babies. Yeah. Scary. This isn’t the place to be cheap, folks. I found these top-rated, ultra-safe smart devices to make those early days a lot less stressful.

Continue reading

Boost your company’s productivity with this AI-powered documents solution 

Accountants, real estate agents, construction companies and marketing agencies — pretty much everybody is using Tungsten document automation to streamline workflows.

Dealing with documents in the digital age can feel like a throwback to an earlier, less efficient era. You’re buried in paperwork, navigating tons of files, and manually inputting data. It’s time-consuming, error-prone, and let’s be honest, a bit outdated. 

Continue reading

3 reasons you shouldn't go another day without antivirus software

If you don’t have antivirus software, you’re putting every internet-connected gadget you own at risk. Something as simple as an unchanged router password can be an entry point for an invader to shut down your phone or even taunt your children through a security camera or smart speaker.

Continue reading

👻 Juicy deets: A class-action lawsuit against Meta reveals the company used secret tech to get a leg up on Snapchat back in 2016. The scheme, dubbed “Project Ghostbusters,” sidestepped Snap’s encryption to track everything people did on the app. Who ya gonna call? The Feds.

5 steps to keep your router from being hacked

Most of us don’t give a second thought to the router that manages our home internet. We assume it’s working fine, just like the day we installed it, which is why hackers can break into your network and wreak havoc without you even realizing it.

Continue reading

Out of this world: Data backups are headed to the moon

Where’s the safest place to store data? If you said “the cloud,” go a little higher. Nope, higher than that.

The ultimate backup is literally out of this world. I recently chatted with Chris Stott, CEO of a Florida-based startup called Lonestar. Alongside NASA, Lonestar is about to send backup servers to the moon. This is so fascinating to me, and I thought you’d like to hear more about it, too.

Continue reading

Quick privacy upgrade: Turn your phone to safe mode

All I want for Christmas is to help keep your data safe. The bad news is there are a ton of cybercriminals out there doing their best to stop me.

Apple recently shared the results of a study from MIT on the growing threat of cyberattacks around the globe. A mindblowing 2.6 billion personal records were breached in 2021 and 2022. I’d say it’s time to act if you haven’t already.

Continue reading

Ask a tech expert: What is the best way to keep private photos hidden?

You’re on the right track! I don’t recommend relying on Google Drive or iCloud alone. For one, they’re obvious targets for hackers. If someone gets their hands on your Google login or Apple ID, they get access to all your photos, including those meant for your eyes only.

Continue reading

Privacy tip: 5 ways you’re being tracked you must stop right now

Online privacy is an oxymoron. For example, an advertiser ID on your phone is supposed to keep your location anonymous. Are you surprised it doesn’t? Me neither. Tap or click here for steps to see and remove your advertiser ID.

Continue reading

Meduza: Scary name, scarier malware

Use Chrome, Edge, Brave, Sidekick, Opera or Firefox to browse the web? What about Discord, Steam, a password manager or a crypto wallet? 

You’re a prime target for the Meduza Stealer — a type of malware that poses a serious personal and digital security risk. Its primary purpose is to steal valuable data from your computer. We’re talking login credentials, credit card details and cryptocurrency wallet data.

Continue reading

Use this home security camera buying guide to be safer at home

Here’s a conundrum: Your security camera could expose you to data breaches. Last year, a security researcher found that Eufy cameras uploaded private images to the cloud.

Anker recently admitted to storing images and video feeds in the cloud without users’ knowledge. This popular security cam manufacturer recently didn’t even encrypt the private content. That means anyone could have seen your personal images through your Anker devices.

Continue reading

I ticked off the creepy people-search sites, and you can, too

My son asked me where I lived for a few months in Los Angeles over 25 years ago. It was a gig working for Unisys that was far from memorable. He found that address at a free people search site, along with my other addresses and cell phone numbers. Nice.

Continue reading

Best ways to save your phone’s photos before it’s too late

Have you ever lost your phone? There’s that sinking feeling when you realize it’s nowhere to be found.

There are better ways to find a lost phone than getting someone to call it for you. Tap or click for methods to find your misplaced smartphone, even if it’s powered down.

Continue reading

3 common mistakes when installing security cameras

Security cameras give us peace of mind that our homes and valuables are safe when we’re away. A doorbell camera can be a significant deterrent for sneaky thieves.

They aren’t failsafe, though. Crooks can jam Wi-Fi-connected video doorbells and rob you before you realize what happened. It’s rare but possible. Tap or click for smart ways to stop them in their tracks.

Continue reading