Here's How to Download All the Data Apple Collects About You

Apple is making it easier for its users to download their data the company has collected about them so far.

On Wednesday, Apple just launched a new Data and Privacy website that allows you to download everything that the company knows about you, from Apple ID info, device info, App Store activity, AppleCare history, your online shopping habits to all of your data stored in its iCloud.

A similar feature was recently offered by Facebook, enabling its users to download all of their data, not only what they have posted, but also information like facial recognition and location data, following the Cambridge Analytica scandal.

Apple has currently made this feature only available for people having accounts in European Union (along with Iceland, Liechtenstein, Norway and Switzerland), to comply with the General Data Protection Regulation(GDPR) act, which goes into effect on May 25.

That's why big companies like Apple have decided to inform their European customers about the new privacy policies.

Here's How to Download Your Data:

  • Log in to privacy.apple.com on your Mac, PC, or iPad.
  • Select the Get started link under the "Obtain a copy of your data" heading in Manage your data.
  • You can press 'Select All' to download everything or tick the boxes of the data categories you want to download. iCloud data are provided into a separate list as this data may be large and can take a long time to download.
  • Apple splits up the data into chunks, which ranges from 1 GB up to a maximum of 25 GB, letting you select your preferred maximum file size. Select a size and hit 'Continue.'

Your download is now in progress, and Apple will send you an email when the files are available to download, which can take up to a week. Your downloaded data is then automatically deleted after 2 weeks.

Here's the List of Data that You can Download:

  • App Store, iTunes Store, iBooks Store and Apple Music activity
  • Apple ID account and device information
  • Apple Online Store and Retail Store activity
  • AppleCare support history, repair requests and more
  • Game Center activity
  • iCloud Bookmarks and Reading List
  • iCloud Calendars and Reminders
  • iCloud Contacts
  • iCloud Notes
  • Maps Report an Issue
  • Marketing subscriptions, downloads, and other activity
  • Other data
  • iCloud Drive files and documents
  • iCloud Mail
  • iCloud Photos

Besides data download feature, Apple is also providing an option of permanently deleting all of your data, which has been made available globally starting today. Once you initiate the data delete option, the company can take up to 7 days to approve the request.

But keep in mind: Once deleted, there is no way you can retrieve your data.

Comcast is Leaking the Names & Passwords of Customers’ Wireless Routers

5-xfinity-xfi-gateway.jpg

Comcast  has just been caught in a major security snafu: revealing the passwords of its customers’ Xfinity-provided wireless routers in plaintext on the web. Anyone with a subscriber’s account number and street address number will be served up the Wi-Fi name and password via the company’s Xfinity internet activation service.

Security researchers Karan Saini and Ryan Stevenson reported the issue to ZDnet.

The site is meant to help people setting up their internet for the first time: ideally, you put in your data, and Comcast sends back the router credentials while activating the service.

The problem is threefold:

  1. You can “activate” an account that’s already active
  2. The data required to do so is minimal and it is not verified via text or email
  3. The wireless name and password are sent on the web in plaintext

This means that anyone with your account number and street address number (e.g. the 1425 in “1425 Alder Ave,” no street name, city, or apartment number needed), both of which can be found on your paper bill or in an email, will instantly be given your router’s SSID and password, allowing them to log in and use it however they like or monitor its traffic. They could also rename the router’s network or change its password, locking out subscribers.

This only affects people who use a router provided by Xfinity/Comcast, which comes with its own name and password built in. Though it also returns custom SSIDs and passwords, since they’re synced with your account and can be changed via app and other methods.

What can you do? While this problem is at large, it’s no good changing your password — Comcast will just provide any malicious actor the new one. So until further notice all of Comcast’s Xfinity customers with routers provided by the company are at risk.

One thing you can do for now is treat your home network as if it is a public one — if you must use it, make sure encryption is enabled if you conduct any private business like buying things online. What will likely happen is Comcast will issue a notice and ask users to change their router passwords at large.

Another is to buy your own router — this is a good idea anyway, as it will pay for itself in a few months and you can do more stuff with it. Which to buy and how to install it, however, are beyond the scope of this article. But if you’re really worried, you could conceivably fix this security issue today by bringing your own hardware to the bargain.

5 Cyber Threats All Businesses Need to Protect Themselves Against

There’s never a good time to find that your business has been hit by a cyber attack. The scale, impact and how you cope with the attack is crucial for your company. Here are the five main cyber threats to look out for and how you can protect yourself and your organization from them.

1.   Scam Emails

Scam emails are one of the most popular forms of online phishing. In this kind of attack, hackers send out emails in order to trick you into giving them sensitive information or access to devices and/or systems.

Opening a hostile link in a phishing email can infect your computer with a virus or direct you to a phony website asking you to input details such as login credentials. Emails can also contain infected attachments that lure you into downloading them; once downloaded, they infect your machine and have the potential to gain access to your businesses’ information.

The best way to protect your business from this kind of attack is keep your systems and software up to date. Regularly backing up your data ensures that if you do get attacked, the impact can likely be minimized. Be extra careful when opening emails and browsing the web. When in doubt, throw it out: If you have the slightest suspicion about an attachment or a link, even if you know the source, it’s best to delete.

2.   Ransomware

Ransomware attacks have become increasingly popular in recent years. In this kind of attack, hackers encrypt your data and then demand a cash “ransom” for it to be returned to you – though there’s no guarantee that you’ll get it back.

Ransomware attacks occur in a number of different ways, ranging from phishing emails to taking advantage of weaknesses in outdated computer systems.

The 2017 WannaCry outbreak infected networks at 16 NHS organisations across Britain due its heavy reliance on an outdated operating system. The outbreak cost the NHS £180,000 in emergency fees. Doctors were reduced to using pen and paper when diagnosing patients, and ambulances were redirected after various accident and emergency departments were forced to close.

This ransomware attack brought the NHS to its knees and, if it was to happen to a smaller organisation, could put it out of business. One of the best ways to prevent these attacks from happening is to keep your systems updated.

3.   Banking Virus

Banking viruses are specifically designed to steal your login information and security codes for your business’ online banking account, giving the hackers free reign of your finances.

These viruses can be spread via emails and will often take you to an illegitimate site that prompts you input your details.

The best way to protect your business from this type of attack is to limit access to sensitive accounts to a small group of trustworthy team members.

4.   Stalking and Surveillance

You often hear about celebrities and politicians being stalked and having their devices hacked into, but businesses can also fall victim to this.

Criminal groups and business rivals will go to great lengths to find out information about your business operations. Cyberstalking methods can include use of email, instant messenger, chat rooms, websites, interactive portals and social networking sites.

The best way to protect yourself from cyberstalking and surveillance is to not release too much information. These hackers will often try and build a relationship with you to get the information they want. Remember to keep your cards close to your chest and don’t release anything business sensitive to anybody.

5.   Oversharing Personal Information

As a business, you are likely to use many different software packages to help with daily operations. You may use an online cloud-based storage system or an accounting suite that helps you tidy your books up.

The point is, you need to be sure that you can trust these providers before committing to their services. You’re giving them control of vital business information so, choose wisely and do your research. You don’t want your most vital business assets falling into the wrong hands.

Before downloading new apps or using new websites, make sure you know what information they have access to. As technology has advanced, these services can track location, listen to our conversations and even access the files on our devices, so it’s important to review permission before using.

As one cyber threat is resolved, hackers are already planning and looking for new ways to infiltrate. It’s imperative to the survival of your business that you take the relevant steps to protect it. Remember, it’s easier to prevent than find a cure, so don’t wait until it’s too late.

Tech Tip: How to Record Your iPhone Screen

Apple includes a Screen Recording tool with its iOS 11 system to record the action on your iPhone screen, but you may need to enable it first. To do that, go to your iPhone’s home screen and open the Settings app.

On the Settings screen, tap Control Center and then on Customize Controls. Scroll down past the Include list to More Controls and tap the green plus (+) button next to Screen Recording. Once you have added Screen Recording to the list, a circular “record” button will appear on your Control Center screen when you swipe up from the bottom of the screen.

iphone-record.jpg

When you are ready to record your screen, swipe up to open the Control Center and press the Screen Recording button. If you want to include sound with the screen video, press the button until a menu pops up with the Microphone Audio option.

Once you press the Screen Recording button, you will get a three-second countdown before the iPhone begins recording a video of the activity on its screen. The status bar at the top of the screen turns red while a recording is in progress.

To stop recording, tap the red status bar or swipe up to tap the Screen Recording button again. The resultant video will land in the Photos app. You can snip off the beginning or end of the selected clip by tapping the Edit button, moving the sliders on either end and tapping the Done button.

You can also find several third-party apps in the App Store to record your screen. Android users can find similar screen recorders in the Google Play store.

Chili’s Is the Latest Place to Be Hit With a Data Breach. Here’s What You Should Know

If you ate at a Chili’s Grill & Bar sometime between March and April of this year, your debit or credit information may have been compromised in a data breach.

Chili’s parent company, Brinker International, announced last week that “some Chili’s restaurants have been impacted by a data incident, which may have resulted in unauthorized access or acquisition of your payment card data,” according to a statement on the company’s website.

It is unclear which locations, or how many of the more than 1,600 Chili’s locations worldwide, were affected by the data breach, but Brinker said it “currently believes” the timeframe was limited to those two months. The number of customers affected by the security breach is also unclear. Chili’s said it was working with a third-party company to investigate the full scope of the breach.

“We believe that malware was used to gather payment card information including credit or debit card numbers as well as cardholder names from our payment-related systems for in-restaurant purchases at certain Chili’s restaurants,” Brinker said.

As more information is discovered about the breach, the company said it will update Chili’s customers on Brinker’s website.

Chili’s is just the latest in a wave of companies that have been affected by data breaches recently. Millions of people have had their personal information jeopardized by data breaches at companies like Saks Fifth Avenue and Lord & Taylor, Sears, Kmart, Delta and Best Buy.