AI Predicts Your Lifespan Using Activity Tracking Apps

Researchers can estimate your expected lifespan based on physiological traits like your genes or your circulating blood factor, but that's not very practical on a grand scale. There may be a shortcut, however: the devices you already have on your body. Russian scientists have crafted an AI-based algorithm that uses the activity tracking from smartphones and smartwatches to estimate your lifespan with far greater precision than past models.

The team used a convolutional neural network to find the "biologically relevant" motion patterns in a large set of US health survey data and correlate that to both lifespans and overall health. It would look for not just step counts, but how often you switch between active and inactive periods -- many of the other factors in your life, such as your sleeping habits and gym visits, are reflected in those switches. After that, it was just a matter of applying the understanding to a week's worth of data from test subjects' phones. You can even try it yourself through Gero Lifespan, an iPhone app that uses data from Apple Health, Fitbit and Rescuetime (a PC productivity measurement app) to predict your longevity.

This doesn't provide a full picture of your health, as it doesn't include your diet, genetics and other crucial factors. Doctors would ideally use both mobile apps and clinical analysis to give you a proper estimate, and the scientists are quick to acknowledge that what you see here isn't completely ready for medical applications. The AI is still more effective than past approaches, though, and it could be useful for more accurate health risk models that help everything from insurance companies (which already use activity tracking as an incentive) to the development of anti-aging treatments.

Under Armour's MyFitnessPal Data Breach Affected 150 Million Users

Under Armour,  the fitness company that owns MyFitnessPal,  disclosed today a data breach that affected about 150 million users. MyFitnessPal, a food and nutrition application, earlier this week became aware of the breach, which took place late last month.

The breached data did not include any Social Security numbers, driver license numbers or any other government-issued identifiers, according to Under Armour. The company also said payment card information was not collected.

“The company quickly took steps to determine the nature and scope of the issue and to alert the MyFitnessPal community of the incident,” Under Armour wrote in a press release.

Four days after Under Armour became aware of the issue, the company said it started to notify members of the MyFitnessPal community via email and in-app messaging. Under Armour recommends MyFitnessPal users change their passwords.

“Under Armour is working with leading data security firms to assist in its investigation, and also coordinating with law enforcement authorities,” the press release stated. “The investigation indicates that the affected information included usernames, email addresses, and hashed passwords – the majority with the hashing function called bcrypt used to secure passwords.”

Apple releases iOS 11.3 with new Animojis

Apple  just released an iOS update for your iPhone and iPad. 11.3 introduces a ton of bug fixes but also a bunch of new features. If you forgot about Animjois, today is your lucky day as Apple is adding four new Animojis — a dragon, a bear, a lion and a skull.

But that’s not all. Apple already shared a preview of iOS 11.3 a couple of months ago. There’s a big ARKit update to ARKit 1.5. It can recognize more objects and surfaces.

And iOS 11.3 is also the battery update we’ve all been waiting for. There’s some new info in the settings about the status of your battery. It tells you the overall capacity and if it’s time to change your battery.

You can also choose to disable Apple’s controversial decision to throttle performance with old batteries. Apple says it’s a beta feature for now.

Apple is also introducing a new feature in the Health app. You can now centralize all your health records in the app. It’s only limited to a handful of clinics for now.

Apple is adding customer support conversations to Messages. You can initiate a conversation with a business to order something, book a table and more. Discover, Hilton, Lowe’s and Wells Fargo are already on board. Health Records and Business Chats are only available in the U.S. as a beta for now.

You’ll also see a new privacy icon across the operating system. A new website to export all your data is coming in May as well. Apple needs to add those features to comply with GDPR.

Finally, Apple Music is getting a new video clips section, the App Store Updates tab now shows you the size of each update and more tiny little things. And if you care about security, it’s always a good thing to update to the latest version of iOS. Unfortunately, iOS 11.3 still doesn’t include iMessage in iCloud.

Back up your iPhone or iPad to iCloud or your computer using iTunes before updating. You can then head over to the Settings app, then ‘General’, then ‘Software Update’. macOS, watchOS and tvOS updates are also available today.

7 Signs of Business Email Fraud

Depositphotos_146680381_s-2015.jpg

Companies rely on email for most communications — e.g., interacting with customers, running marketing campaigns, negotiating contracts with suppliers and managing a distributed workforce. While email offers various benefits, including speed and efficiency, its users can often fall victim to fraud due to the platform’s prevalence and success.

In fact, email is widely exploited by hackers for the execution of sophisticated phishing attacks, targeting commercially sensitive and personally identifiable information and costing hundreds of millions of dollars to businesses every year.

Fortunately, detecting and preventing email scams is possible even if you are not a cybersecurity expert. As a founder, manager or employee, you can significantly reduce the risk of data loss in your organization by being aware of the typical signs of business email fraud.

1. Web-Based Free Email Accounts

Anyone with an internet connection can create a free email account and use a generic address like companyabc@mail.com to send fraudulent messages. In contrast, only verified domain owners have the ability to set up and allocate custom email addresses, such as employee@companyabc.com or ceo@businessdec.com.

This being said, there is no reason for a sound organization to allow employees to make contact with customers, suppliers or any stakeholder using free or personal email accounts, especially not if confidential data is involved.

2. Urgency

It is in scammers’ best interest to carry out phishing attacks quickly. As time goes by, targets are more likely to notice that something is off and take measures to warn their colleagues, organization and third parties against suspicious emails. That is why cybercriminals come up with all sorts of pressing reasons (see examples below) to justify speedy money transfers or the disclosure of private and financial details:

  • Time-sensitive deal with a new customer
  • Breach of contract and lawsuit
  • Overdue invoice and penalty for late payments
  • Account suspension and service disruption

3. Unpolished Communications

Brands know that their reputations are on the line in every communication sent externally and spend a lot of effort perfecting messages, personalizing campaigns and checking drafts for errors. Generic greetings, grammar mistakes and bad formatting are all signals of “phishy” email messages.

4. Follow-Ups via Email Only

Fraudsters are wary of revealing too much about themselves to avoid compromising their fake identities. You can leverage that fact to spot email scams. For instance, when someone makes an unusual or urgent request, ask to follow up on the phone or face to face. Any legitimate sender will see no objection, whereas an impersonator is probably going to give excuses not to talk or meet and insist on communicating exclusively via email.

5. Odd URLs and Domains

Many email scams use external links to redirect potential victims to a fake homepage or formwhere personal and financial data is then collected. These phishing messages can look very convincing at first glance but usually exhibit one or more red flags. For example:

  • Inconsistent embedded links, where the display and destination URLs do not match
  • A domain and email address different than the one used in past brand communications
  • Shortened URLs, masking the actual destination
  • A URL name that is missing a character, e.g., http:// instead of https:// or website.com rather than website.com/

6. No Multichannel Support

Scammers find it advantageous to impersonate known entities that inspire trust and credibility in order to boost the success rates of their attacks. However, while it’s one thing to forge an email address, it’s another to mimic an entire customer support department and social media accounts.

Large organizations – and, increasingly, small and medium-sized businesses – invest heavily in customer experience and offer various options for recipients to talk to a representative to resolve doubts and answer questions. Cybercriminals, on the contrary, do not want their targets to reach out for support. If you are unsure about the source of a message, try contacting the company using official customer support channels to clarify what is happening and check whether a request for information is legitimate.

7. Doubtful Attachments

Another common phishing technique consists of including one or more malicious attachments to deceitful emails and prompting recipients to download and open them to complete a task. These files may contain viruses or other forms of malware designed to damage, alter or retrieve data, infect servers and networks or lock systems until a ransom is paid in exchange for a decryption key.

To avoid the above, beware of attachments in general, particularly from unknown senders or the following types of attachments:

  • .7z, .rar, .zip and other compressed files
  • .bat, .cmd, .exe, .hta, .jar, .js, .msi and extensions used to run code
  • .docm, .pptm and .xlsm macro-enabled documents

Three Things Your Company Needs to Ensure CyberSecurity in 2018

In 2017, ransomware became so powerful that it managed to finally make a name for itself as a business model. Ransomware as a service (RaaS) allows hackers to simply buy or sell their own ransomware for the purpose of damaging individuals or businesses.

Considering that, and the fact that all the other businesses affected by hackers, cybersecurity has become extremely important for every business today. It doesn’t matter what industry you pertain to – the reality is that hackers can access your data and sell it for a profit or perform other maleficent actions.

This is why investing in business IT solutions can help protect your company from this type of attack. Creating the right protection plan is essential to your business. Even if you believe that your business is not important enough to attack, the reality is that every organization could become a victim. Our dedicated team created a quick list of three things you need to do to keep your files safe.

Data Backup and Protection

One of the main benefits of business IT support and data protection solution is that they can keep your data safe from prying eyes. Hackers won’t have easy access to your sensitive data. Also, having a professional data backup and protection plan will make you less prone to malware and viruses. You get to save money this way, and in the end, hackers will find it more difficult to take advantage of any human errors. Plus, protecting your data will help you stay in compliance with the current laws. Use this type of service, and there will be less need to worry about the safety of your data.

Cloud Solutions

Most companies that use cloud services may be targeted by hackers. With help from a great IT support team and other dedicated services, you can help negate that issue. A dependable business technology solutions team password protects all your content, filters it and heavily monitors company information to ensure that only the authorized parties will be able to access designated files. This way everyone will get to see only what they need to.

24/7 Business IT Support

A dependable IT support team knows that cybersecurity issues can appear at any time, regardless of the hour. Services like these can bring you the best business computer services and reliable solutions in no time.

If you opt for round–the-clock IT support, you won’t have to worry about any data security issue, and the team can also help you deal with any other type of IT issues, not only security related stuff. This also ensures you that the company files are safe. A well managed IT services firm would also have heavily monitored data centers. Only authorized personnel goes into this building, which means that all your sensitive data will be stored by a professional and reliable business.

As long as there’s data online, there will always be hackers that try to steal it. Don’t let hackers take advantage of your company’s information. Invest in the best business IT solutions right now.