<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/technology/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #Technology</title><description>Zwiren Title Agency, Inc - ZTA Blog #Technology</description><link>https://www.zwirentitle.com/blogs/tag/technology</link><lastBuildDate>Fri, 03 Apr 2026 08:31:58 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Augmented Reality]]></title><link>https://www.zwirentitle.com/blogs/post/augmented-reality</link><description><![CDATA[Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yCsg76EjT5i-GqPu5UN2pQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-96rdWQURnKFd57UaqLvSg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_CbZKvHq8RBWgK-yfElhKDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9jrtIqFZT-G9oO6LroharA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9jrtIqFZT-G9oO6LroharA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Augmented Reality</span></b></p><span style="font-size:20pt;">Transforming Our World with Digital Magic</span></div></h2></div>
<div data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world. Unlike Virtual Reality (VR), which immerses users in a completely digital environment, AR enhances the physical world by adding digital elements. This overlay can be achieved through various devices, such as smartphones, tablets, smart glasses, and headsets. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">You may be familiar with AR if you have recently purchased or looked at furniture online. Many retail websites/mobile apps offer Augmented Reality to show how a piece of furniture will look in the user’s living spaces – and all users need is their smartphone camera! Alternatively, you may have utilized AR if you have ever used social media to overlay filters, effects and interactive elements onto your photos or videos!</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">How Does AR Work?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">AR relies on a combination of hardware and software to function. The hardware includes cameras, sensors, and displays on devices such as smartphones, tablets, headsets or AR glasses. These devices capture the real-world environment, process the data, and then display digital content on the user's screen in real-time. Software plays a crucial role in recognizing the environment, tracking objects, and aligning digital content with the physical world.&nbsp;AR applications and platforms enable the creation and deployment of augmented reality experiences. These applications use computer vision algorithms to recognize and track real-world objects, allowing digital content to interact seamlessly with the environment.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Impact on Industries</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality is reshaping industries by improving efficiency, enhancing user experiences, and creating new opportunities for innovation. The potential for AR's impact is vast, and it continues to evolve and expand its reach. The following are examples of how AR can be and is already being used in different industries:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Real Estate</span></b><span style="font-size:12pt;">: AR can potentially change the way that homes are previewed. Rather than using VR to tour a property on the computer from the comfort of your home, AR can create a new type of virtual experience for buyers when visiting a property. Potential buyers would be able to use their smart phone to scan a room in the house and with the help of AR, detect the objects and furniture in the room or obtain the room’s dimensions. Then, while standing in the room, they would be able to rearrange the furniture in the room, remove objects, or even replace objects with their own choice of furniture and décor. Such an experience can give potential buyers an idea of what the house could look like if they were to buy it. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Retail: </span></b><span style="font-size:12pt;">In the retail sector, AR is utilized for virtual try-on experiences or product visualizations, allowing customers to preview products before making a purchase. AR can also be used for interactive product demonstrations and in-store navigation. The Target App has a feature called “See it in Your Space” allows customers to digitally view how objects would appear in their home and the Walmart App lets you virtually try on certain clothing items to give users and idea of how the item will fit.&nbsp; Additionally, Treasury Wine Estates, the vineyard behind 19 Crimes wines have implemented AR into their Wine Labels. By downloading their app and scanning the wine bottle’s label, the face on the label comes to life, confessing their crime. The possibilities for AR in Retail are endless. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Healthcare</span></b><span style="font-size:12pt;">: AR has transformative applications in healthcare, from surgical training simulations to real-time augmented imaging during medical procedures. It enhances precision and improves patient outcomes, oftentimes with less invasive procedures. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Gaming and Entertainment</span></b><span style="font-size:12pt;">: AR gaming apps such as Pokémon GO have brought AR to the mainstream, allowing users to hunt virtual creatures in real world locations using their smartphones. Additionally, apps such as Snapchat and Instagram use AR to overlay filters, masks, or little dancing Bitmoji's over the user’s images. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Education</span></b><span style="font-size:12pt;">: AR is used in educational settings to enhance learning experiences. For example, students can use AR apps to explore anatomy in 3D, bring historical events to life through interactive AR simulations, or explore virtual reconstructions of ancient civilizations.</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Challenges and Future Outlook</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Despite its promising potential, AR faces challenges such as privacy concerns, technological limitations, and the need for widespread adoption. However, ongoing advancements in hardware, software, and increased investment suggest a bright future for augmented reality in various fields. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">In summary, augmented reality represents a groundbreaking technology that blurs the lines between the digital and physical realms. Its applications span various fields, and its impact on industries is profound. As AR continues to evolve, its applications across diverse industries are poised to transform the way we learn, work, and interact with the world around us.</span></p></div></div>
</div><div data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:10px;">References:&nbsp;</span></p><span style="font-size:10px;"><span></span><p><span style="color:inherit;">Gillis, Alexander S. (2022, Nov). Augmented Reality.&nbsp;</span><i style="color:inherit;">TechTarget: WhatIs.com.&nbsp;</i><span style="color:inherit;">Retrieved from https://www.techtarget.com/whatis/definition/</span><span style="color:inherit;">augmented-reality-AR. Nov 2023</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>High, Spencer (2022, Nov 12). Augmented Reality and Generative AI Could Transform Future of Real Estate Marketing. <i>National Association of Realtors:&nbsp;</i></span><i style="color:inherit;"><span>Newsroom.</span></i><span style="color:inherit;"> Retrieved from https://www.nar.realtor/newsroom/augmented-reality-and-generative-ai-could-transform-future-of-real-estate-marketing. Nov 2023.</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>The Fu Foundation School of Engineering and Applied Science (n.d.). Augmented Reality Examples: Use Augmented Reality Marketing in Your Business.&nbsp;</span><i style="color:inherit;"><span>Columbia Engineering; The Fu Foundation School of Engineering and Applied Science. </span></i><span style="color:inherit;">Retrieved from https://bootcamp.cvn.columbia.</span><span style="color:inherit;">ed u/blog/augmented-reality-examples/. Nov 2023.</span></p></span></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 29 Dec 2023 12:07:00 -0500</pubDate></item><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[The Dark Side of Generative A.I.]]></title><link>https://www.zwirentitle.com/blogs/post/The-Dark-Side-of-Generative-A.I.</link><description><![CDATA[Generative AI is a powerful tool capable of creating remarkably authentic text, images and even videos. While this technology holds immense potential for positive applications, if used by malicious actors, can pose an additional threat to both businesses and individuals.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_GJ2cfrOkROeDLCplJriqLA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xROVL2RKTzmtbT5dnFF8RA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HQu99iiyRaWouYJODTZ5JA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">The Dark Side of Generative A.I.</span></b></span></h2></div>
<div data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Generative AI, also known as generative adversarial networks (GANs), is a powerful tool that uses artificial intelligence technology and machine learning to create text, images and even videos that appear remarkably authentic. For example, the platform ChatGPT is an AI powered Chatbot that responds to text input and generates responses accordingly. The platform Dall-E is a platform that generates images in multiple styles based on a text description.&nbsp;While this technology holds immense potential for positive applications, there is a growing concern about its potential misuse in the wrong hands. When it comes to cybersecurity for businesses and individuals alike, it is important to be aware of the potential threats. Generative AI, if used by malicious actors, can pose an additional threat to both businesses and individuals. In this article, we explore the dark side of generative AI and the ways it could potentially be used maliciously.</span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1. Phishing Attacks: </span></b><span style="font-size:12pt;">Generative AI can be employed to generate highly convincing phishing emails or messages. These messages could mimic the writing style and tone of trusted colleagues, clients, or even executives, making it challenging to detect them as fraudulent. For example, the AI could be used to generate convincing fake emails or websites that appear to be from a legitimate and trusted parties, but are actually designed to spread malware, steal personal information, or steal login credentials.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Deepfake Threat: </span></b><span style="font-size:12pt;">One of the most alarming misuses of generative AI is the creation of deepfake content. Deepfakes are highly realistic manipulated videos or audios that can deceive viewers into believing false information or witnessing events that never occurred. Malicious actors could create deepfake audio clips or videos of politicians, business leaders, public figures, or any random person to damage reputations, spread false narratives, or manipulate public opinion. This poses a significant threat to individuals, organizations, and society at large. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3. Content Generation and Plagiarism: </span></b><span style="font-size:12pt;">Generative AI models can produce human-like text, making it easier for malicious actors to create large volumes of content quickly. This can lead to an influx of plagiarized articles, blog posts, or social media content, negatively impacting original content creators and diluting the quality of information available online. Business professionals who rely on such content may unknowingly promote stolen intellectual property or expose themselves to legal liabilities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4. Fake Reviews and Testimonials: </span></b><span style="font-size:12pt;">Online reviews and testimonials play a crucial role in shaping consumers' perceptions and influencing their purchasing decisions. Generative AI can be used to generate large volumes of fake positive reviews or testimonials, artificially boosting the reputation of a product or service. Those who rely on such reviews may make ill-informed decisions, leading to wasted resources or partnerships with untrustworthy entities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">5. Social Engineering and Identity Theft: </span></b><span style="font-size:12pt;">Generative AI can assist in creating highly believable fake identities, social media profiles, or online personas. Malicious actors may use these fabricated identities for social engineering attacks, tricking unsuspecting business professionals into sharing sensitive information or granting unauthorized access. Any individual could find it challenging to distinguish between genuine and fake identities, putting their businesses at risk.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Since real estate transactions are a high-value target for scammers, it is crucial to be aware of phishing emails. Many people, when examining an email to determine its legitimacy, look for incorrect grammar or misspelled words; However, if&nbsp; scammers use Generative A.I. to write their phishing emails, it is possible there will be fewer obvious grammatical errors within the emails. While this can make identifying a phishing email more difficult, it is important to remember what to look for to signify a phishing email. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1.&nbsp;Lack of personalization:</span></b><span style="font-size:12pt;"> While Generative AI can be trained to create personalized content, such as using a recipient’s name or other personal/transaction details, it may not always do so. If an email appears to be a generic message that could have been sent to anyone, it could be a sign that is a phishing email. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Inconsistent Language or Unusual Sentence Structure</span></b><span style="font-size:12pt;">: Because Generative AI models are trained on large datasets of text, they may generate text that is inconsistent or incoherent. If an email appears to switch between different tones or uses language that is grammatically incorrect, or otherwise inconsistent, it could be a sign that it is a phishing email. Generative AI Models may also produce sentences with unusual structures or patterns that are typically not used in email correspondence. For example, an AI generated phishing email might use overly complex sentence structures or include multiple clauses that are not logically related. Since many scammers don’t have a good grasp on the English language, they may not realize the inconsistencies, complexities or grammatical errors within the text that the AI generated.&nbsp; </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3.&nbsp;Suspicious attachments or links:</span></b><span style="font-size:12pt;"> As with regular phishing emails, AI Generated emails may include suspicious links or attachments that can be used to spread malware or steal personal information or login credentials. If an email includes an attachment or link that you were not expecting or seems suspicious, it is important to exercise caution and verify its authenticity before opening or clicking.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4.&nbsp;Unknown or Unclear Sender</span></b><span style="font-size:12pt;">: As with regular phishing emails, it remains crucial to check who is sending the email. When the sender is unknown, not part of the transaction they are discussing, or if it is unclear who the sender actually is, it is likely that the email is a phishing email. </span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">There is no foolproof way to determine whether an email is legitimate or not; however, being aware of the indicators can help individuals become more vigilant and protect against potential threats. Overall, when evaluating the legitimacy of an email, it is important to exercise critical thinking skills and consider all of the above factors to determine its authenticity. Furthermore, when in doubt of the legitimacy of an email, it never hurts to get the sender on the phone, using a trusted phone number, to confirm whether they sent the email in question. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Generative AI is still in such an early stage of development and there has been rumors of Generative AI companies implementing regulations for their platforms to monitor and prevent malicious use of the AI. While Generative AI presents both an immense potential for positive transformation, it can also be exploited by those with ill intentions. By staying informed, implementing robust security measures, and promoting cyber awareness within your organization, you can mitigate the risks associated with AI generated phishing emails and keep the real estate transactions secure.&nbsp;</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Jul 2023 16:59:00 -0400</pubDate></item><item><title><![CDATA[Generative A.I.]]></title><link>https://www.zwirentitle.com/blogs/post/Generative-AI-What-is-it</link><description><![CDATA[Generative AI, also known as generative adversarial networks (GANs), is a type of artificial intelligence technology that uses machine learning to create new and unique content. This can include everything from text and images to videos to music. For example, the platform ChatGPT]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9YLMDVnvTzeCtcfo5z2_fA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_99U8oaNlQO-W0kuMShDpDg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dwoW9SK-Rg2Uc7MgNHjhHg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_nOoEmBAQSQ2Naxwp7uG-xw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_nOoEmBAQSQ2Naxwp7uG-xw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:16pt;">What is It, How does it Work, and How Can You Use It?</span></b></span></h2></div>
<div data-element-id="elm_yY_7Mn_mSLe2T51wQrJ2Zw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yY_7Mn_mSLe2T51wQrJ2Zw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div style="line-height:1.2;"><p style="text-align:left;"><span style="font-size:12pt;">Generative AI, also known as generative adversarial networks (GANs), is a type of artificial intelligence technology that uses machine learning to create new and unique content. This can include everything from text and images to videos to music. For example, the platform ChatGPT is an AI powered Chatbot that responds to text input and generates responses accordingly. The platform Dall-E is a platform that generates images in multiple styles based on a text description. But how does Generative AI work, and why is it important?</span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">How Generative AI Works</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">At its most basic level, generative AI involves two separate neural networks that work together to create new content. One of the neural networks, known as the generator, creates content based on a set of inputs or parameters. The other network, known as the discriminator, evaluates the content created by the generator and provides feedback on its quality. Over time, the Generative AI platform learns from the feedback provided by the discriminator and becomes better at creating high-quality content. This process is known as training, and it can take a lot of time and computing power to get right.</span></p><h2 style="text-align:left;"><span style="font-size:12pt;font-weight:bold;color:rgb(89, 129, 169);">What is a Neural Network?</span></h2><p style="text-align:left;"><span style="font-size:12pt;">A neural network is a type of computer system that is designed to mimic how the human brain works.&nbsp; The human braincells, called neurons, form a complex, highly interconnected network and send electrical signals to each other to help humans process information. Similarly, a neural network is made up of interconnected nodes, also known as artificial neurons, that work together to perform complex computations and make predictions based on input data. In the development of neural networks, they go through a process called training&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">Neural networks can be used for a variety of tasks, such as image recognition, natural language processing, and predictive modeling. For example, a neural network could be trained to recognize images of cats by uploading thousands of images labeled&nbsp;cats and non-cats. Once the neural network processes the images, it learns how to accurately classify new images as either cat or non-cat.&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">&nbsp;</span></b></p><p style="text-align:left;"><b><span style="font-size:12pt;">The Creator Neural Network</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">The training given to the generator neural network for creating content depend on the specific task or domain that the generative AI is being used for. Here are some examples of the types of models used for different generative tasks:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Text generation:</span></b><span style="font-size:12pt;"> The generator neural network is often trained on a body of text, such as books, articles, or other written material &nbsp;to train a language model, l, which can then generate new text by predicting the most likely next word or sequence of words based on the input it has received. For example, Microsoft Outlook or Gmail use Natural Language&nbsp;Processing to predict user's sentences when replying to an email. It uses machine learning algorithms to suggest responses to emails based on the email content&nbsp;and the user's history of email interactions.&nbsp;</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Image generation:</span></b><span style="font-size:12pt;"> The generator neural network is often trained on a dataset of images. These models learn to encode and decode images, and can generate new images by sampling from the latent space of the model.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Music generation:</span></b><span style="font-size:12pt;"> The generator neural network can be trained on a dataset of MIDI files or other musical notation, which aren’t actually music files, but files that indicate which notes are played during a song, when and how long they are played and how loud they should be played. The neural network learns how to predict the next note or sequence of notes in a musical piece. Using that data, it then can be used to generate new compositions based on the input they receive.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Video generation: </span></b><span style="font-size:12pt;">The generator neural network can be trained on a dataset of videos, and learn to generate new video frames or entire videos based on the input they receive.</span></li></ol></ol><p></p><div style="text-align:left;"><b><span style="font-size:12pt;"><br></span></b></div><div style="text-align:left;"><b><span style="font-size:12pt;">The Discriminator Neural Network</span></b></div><span style="font-size:12pt;"><div style="text-align:left;"><span style="font-size:12pt;">In a Generative Adversarial Network (GAN), the discriminator neural network is trained to distinguish between real and fake data. The goal of the discriminator is to accurately classify the data as real or fake, while the generator's goal is to generate fake data that is convincing enough to fool the discriminator.</span></div></span><span style="font-size:12pt;"><div style="text-align:left;"><span style="text-align:center;font-size:15px;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">Overall, the discriminator plays a key role in the GAN architecture, as it provides the feedback signal that drives the generator to generate more realistic data. By optimizing the interplay between the generator and discriminator, GANs have been able to achieve impressive results in a wide range of generative tasks.</span></div></span><p></p><h2 style="text-align:left;"><span style="font-size:16px;font-weight:bold;color:rgb(89, 129, 169);">How is it being Used?</span></h2><p style="text-align:left;"><span style="font-size:12pt;">Generative AI is being used in a variety of industries, ranging from creative arts to engineering and finance. Here are a few examples of industries that have already implemented generative AI:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Fashion:</span></b><span style="font-size:12pt;"> Generative AI is being used to create new fashion designs and to generate personalized recommendations for customers. For example, H&amp;M, Zara and Old Navy use generative AI predict the next trends of fashion to stay ahead of the curve using social media platforms like Instagram to identify what influencers are posting as their Outfits of the Day to develop their fashion lines.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Healthcare:</span></b><span style="font-size:12pt;"> Generative AI is being used to create 3D models of organs and to simulate the effects of different drugs on the body. For example, the company Insilico Medicine uses generative AI platform, called Chemistry 42, to design new drugs which has cut the time and money involved in drug development process as much as 90%.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Finance: </span></b><span style="font-size:12pt;">Generative AI is being used to generate financial forecasts and to optimize trading strategies. For example, the company Kensho uses generative AI to analyze financial markets data and predict how different events might impact them. For example, if a hurricane hit a particular region, the platform can analyze the data to predict how it will impact insurance stocks or the housing markets. Using the predictive models, they are able to provide investment advice to their clients.</span></li></ol></ol><h2 style="text-align:left;"><span style="font-size:12pt;font-weight:bold;color:rgb(89, 129, 169);">Generative AI and the Legal Industry</span></h2><p style="text-align:left;"><span style="font-size:12pt;">The legal industry has implemented generative AI in a number of ways to improve efficiency, reduce costs, and increase accuracy in various legal processes. Here are some examples:</span></p><ol start="1"><ol><li style="text-align:left;"><b><span style="font-size:12pt;">Contract Review: </span></b><span style="font-size:12pt;">Generative AI is being used to review and analyze contracts, to help lawyers to identify key clauses, risks, and obligations in a fraction of the time it would take to review them manually. For example, the company LawGeex uses generative AI to review contracts with low-to-medium complexity such as non-disclosure agreements, service-level agreements, statement of Work contracts, and others to provide an assessment of the legal risks and obligations.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Document Analysis:</span></b><span style="font-size:12pt;"> Generative AI is being used to analyze legal documents and to extract relevant information, such as case citations and legal arguments. This helps lawyers to conduct legal research more efficiently and to identify relevant case law more quickly. For example, the company Ross Intelligence uses generative AI to analyze legal documents and to provide legal research to its clients.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">E-Discovery:</span></b><span style="font-size:12pt;"> Generative AI is being used to assist with e-discovery, which is the process of identifying and collecting electronic documents for use in legal proceedings. Generative AI can be used to review large volumes of data and to identify relevant documents more quickly and accurately than manual review. For example, the company Relativity uses generative AI to assist with e-discovery in litigation and investigations by uploading all the discovery materials into one place, organizing communications to see who someone talked to, what they said and when, and streamlining the redaction process to protect client PII.</span></li><li style="text-align:left;"><b><span style="font-size:12pt;">Case Prediction:</span></b><span style="font-size:12pt;"> Generative AI is being used to predict the outcome of legal cases based on historical case data and other relevant factors. This can help lawyers to make more informed decisions about whether to take on a case and how to approach it. For example, the company Premonition uses generative AI to analyze historical case data and to provide predictions about the likely outcome of a case. It can also provide in-depth analytics on an attorney’s performance and litigation experience which can be used to gather information on opposing counsel or identify prospective attorneys to recruit.</span></li></ol></ol><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">These are just a few examples of how the legal industry has implemented generative AI to improve efficiency and accuracy in various legal processes. As generative AI continues to develop, it is likely that its use in the legal industry will become even more widespread.</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:bold;text-align:justify;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:bold;text-align:justify;">Will Generative AI Replace Jobs?</span><br></p><div><p style="text-align:justify;"><span style="font-size:12pt;">Generative AI has the potential to automate certain tasks that were previously performed by humans, which could lead to job displacement in some industries. For example, generative AI can be used to create art, music, and writing, which could potentially reduce the demand for human artists and writers. However, it's important to note that generative AI is not a substitute for human creativity, and it is unlikely to completely replace the need for human workers in many fields. In fact, in many cases, generative AI is designed to work alongside humans, augmenting their abilities and improving their productivity.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Therefore, the deployment of generative AI is likely to create new jobs in fields such as data science, machine learning engineering, and AI ethics. Additionally, as generative AI reduces the cost of certain goods and services, it could increase demand and create new jobs in related areas. Generative AI it is likely to transform the nature of work and create new opportunities for human workers to collaborate with and benefit from this technology.&nbsp; &nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;">Why Generative AI important?</span></p><p style="text-align:left;"><span style="font-size:12pt;">Generative AI has the potential to revolutionize the way we create and consume content. With generative AI, it's possible to create new and unique content that would be impossible for humans to produce on their own. This can lead to new forms of art, music, and literature that push the boundaries of what we thought was possible.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;">But generative AI isn't just limited to the creative arts. It also has practical applications in fields like medicine, finance, and engineering. For example, generative AI can be used to simulate complex systems and predict how they will behave under different conditions. This can help researchers develop new drugs, optimize financial investments, and design more efficient buildings and vehicles.</span></p><p style="text-align:left;line-height:1.2;"><span style="font-size:12pt;"><br></span></p><p style="text-align:left;line-height:1.2;"><span style="font-size:12pt;">While the idea of Generative AI may seem like a science fiction movie that could end terribly, there are many benefits to AI that we will continue to see as the technology advances.&nbsp;</span></p></div></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 28 Apr 2023 11:10:00 -0400</pubDate></item><item><title><![CDATA[Bluetooth Technology]]></title><link>https://www.zwirentitle.com/blogs/post/Bluetooth-Technology</link><description><![CDATA[Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5hKn-LHFRpe8YsYXToqjNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BN8x8sn1QTm4FeD1kxeYRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fdF4FV5iQWqAM8NDzxqiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Bluetooth Technology</span></b></p><div style="font-size:30pt;color:inherit;"><span style="color:inherit;"><b><span style="font-size:16pt;">Is there a Privacy or Security Concern to be aware of?</span></b></span><br></div></div></h2></div>
<div data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance (for most devices, the range is about 30 feet when there are no walls or other obstacles present). Devices that contain Bluetooth technology include smart phones, laptops and desktop computers, vehicles, wireless headphones or speakers, smart watches, and even internet connected devices. Therefore, a user can connect their smartphone to their wireless headphones or speakers to play music or connect their phone to their vehicle to talk on the phone “hands free” while driving. Users can even use Bluetooth technology to share images with another Bluetooth-connected device (on Apple devices, this is commonly referred to as “Air Dropping” and on Samsung phones it is called “Quick Share”). While there are many benefits to utilizing Bluetooth technology, there have been a lot of articles noting security and privacy concerns to be aware of when Bluetooth is left on (or enabled) after a user has ended the connection between devices.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUETOOTH HACKING – IS YOUR SOFTWARE UP TO DATE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Security researchers are constantly finding new threats to device security. &nbsp;For example, in 2017 Armis, a security research firm, discovered a Bluetooth vulnerability known as “BlueBorne”. When hackers used the “BlueBorne” to attack a device, they were able to control Bluetooth-enabled devices remotely, which gave them the opportunity to steal data from the device. Additionally, the “BlueBorne” could spread from one phone to another phone, like a virus. This gave hackers the ability to infect more phones without having to physically be within the 30-foot range of each device. &nbsp;Fortunately, the security research firm was able to create a security patch for devices to prevent the “BlueBorne” attack. A security patch is code for the operating system that fills in the vulnerability to prevent hackers from exploiting the vulnerability. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;As cybersecurity firms identify new vulnerabilities in the Bluetooth software, they create new security patches which are rolled out in updates to the software or devices; however, they are only helpful when users update their software. Therefore, updating the software on Bluetooth enabled devices is crucial to eliminate any known vulnerabilities from being exploited and keep your devices secure. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUEJACKING – ARE YOU RECEIVING UNSOLICITED OR PHISHING MESSAGES VIA BLUETOOTH?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;On smart phones and laptops, the Bluetooth setting has the option of being enabled or disabled. When an individual leaves their Bluetooth enabled on their smart phone, they open themselves up to “Bluejacking”. “Bluejacking” is when someone uses a device’s enabled Bluetooth connection to send unsolicited messages. Messages may be a harmless prank from a teenager but could also be a phishing attack. Many people are aware of Phishing emails; however, Phishing messages can be sent via Bluetooth connection. A malicious actor may use “Bluejacking” to send a phishing message to a smart phone or laptop, pretending to be a trusted source, such as a bank, phone company or social media application. The message typically entices the user to click a link that leads either to a website that automatically downloads malware to a device or a fake website designed to look similar to well-known companies and requests the user provide login credentials or other sensitive information. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;To avoid any “Bluejacking” pranks or Phishing messages shared through Bluetooth connection, it is advised that users disable the Bluetooth setting when they have finished using the connection. However, if a user is connecting to Bluetooth devices multiple times per day, it may be tedious to enable and disable the Bluetooth setting before and after using. Alternatively, a user can adjust their device settings to prevent unknown contacts from sharing messages via Bluetooth connection. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">IS YOUR DEVICE PAIRED TO A VEHICLE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;If you connect your smartphone to a vehicle, your phone’s data may be shared with the car. If it is your personal car, it may not be an issue; however, if you connect to a rental car, you want to be aware of the data your phone is sharing with the rental car. Major car-rental companies have no policies to delete sensitive information collected during the trip after you return the car. Your name and navigation history are considered valuable personal information. Using such data, combined with information publicly available on the internet and social media platforms, a malicious actor could track down an individual. Data that could be collected by a vehicle includes your email address, GPS history, phone book, call log and text messages (if hands-free calling and messaging is used), music streaming login, and more. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Interestingly, thus far, data collected on vehicles has been used to fight crime. One man was able to track down teenagers that took his car for a joy ride, using the phone usernames that were stored in the car’s device list. Alternatively, people with malicious intentions can also use data to track people down. To protect yourself, before returning a rented car AND before selling or trading in your personal car, take the time to delete your personal data from the vehicle. This can be done by going into the system settings or Bluetooth settings and deleting your device from the “paired phones” list; or by restoring the vehicle to the factory settings. If you are having difficulty, the car manual can guide users through unpairing a phone and deleting information. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">SHOULD YOU BE CONCERNED ABOUT BLUETOOTH HACKING?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Generally, most people should not be concerned about Bluetooth hacking. Cybercriminals typically target people with high level security clearance. However, it does not hurt to be extra cautious. IT professionals recommend the following:&nbsp;</span></p><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;">Turn off “discoverable mode”, except when pairing new devices.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">If you’re always using the same peripheral devices, such as Bluetooth headphones, Bluetooth keyboard or mouse, or even Bluetooth connection in the car, “discoverable mode” does not need to be turned on because your device will remember the Bluetooth device’s unique identifier. </span></li></ul></ul><ul><li style="text-align:justify;"><span style="font-size:12pt;">Disable the Bluetooth setting when it is not in use.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">For those who connect to Bluetooth devices multiple times per day, instead of&nbsp; disabling and re-enabling Bluetooth on the device, update the device’s settings to prevent unknown contacts from sharing messages through Bluetooth connection will prevent unsolicited messages or images from being “Air Dropped” or “Quick Shared” to your phone. </span></li><li style="text-align:justify;"><span style="font-size:12pt;">For those who do not want to disable or update their device’s Bluetooth settings, &nbsp;only accept paring and messages requests that are shared via Bluetooth connection from known contacts. </span></li></ul><li style="text-align:justify;"><span style="font-size:12pt;">Deleting personal and device information from rented vehicles that remains saved in the car’s settings after using the Bluetooth connection.&nbsp;&nbsp;</span></li></ul><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Furthermore, as with all technology today, it is recommended that Bluetooth devices are updated regularly. This ensures the devices are running the latest software which includes security patches for newly identified vulnerabilities.</span></p><p style="text-align:right;"><span style="color:inherit;"><span style="font-size:8pt;">-Emily Comora</span></span><span style="font-size:12pt;"><br></span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 12:18:00 -0400</pubDate></item></channel></rss>