Tech Tip: How to Record Your iPhone Screen

Apple includes a Screen Recording tool with its iOS 11 system to record the action on your iPhone screen, but you may need to enable it first. To do that, go to your iPhone’s home screen and open the Settings app.

On the Settings screen, tap Control Center and then on Customize Controls. Scroll down past the Include list to More Controls and tap the green plus (+) button next to Screen Recording. Once you have added Screen Recording to the list, a circular “record” button will appear on your Control Center screen when you swipe up from the bottom of the screen.

iphone-record.jpg

When you are ready to record your screen, swipe up to open the Control Center and press the Screen Recording button. If you want to include sound with the screen video, press the button until a menu pops up with the Microphone Audio option.

Once you press the Screen Recording button, you will get a three-second countdown before the iPhone begins recording a video of the activity on its screen. The status bar at the top of the screen turns red while a recording is in progress.

To stop recording, tap the red status bar or swipe up to tap the Screen Recording button again. The resultant video will land in the Photos app. You can snip off the beginning or end of the selected clip by tapping the Edit button, moving the sliders on either end and tapping the Done button.

You can also find several third-party apps in the App Store to record your screen. Android users can find similar screen recorders in the Google Play store.

Chili’s Is the Latest Place to Be Hit With a Data Breach. Here’s What You Should Know

If you ate at a Chili’s Grill & Bar sometime between March and April of this year, your debit or credit information may have been compromised in a data breach.

Chili’s parent company, Brinker International, announced last week that “some Chili’s restaurants have been impacted by a data incident, which may have resulted in unauthorized access or acquisition of your payment card data,” according to a statement on the company’s website.

It is unclear which locations, or how many of the more than 1,600 Chili’s locations worldwide, were affected by the data breach, but Brinker said it “currently believes” the timeframe was limited to those two months. The number of customers affected by the security breach is also unclear. Chili’s said it was working with a third-party company to investigate the full scope of the breach.

“We believe that malware was used to gather payment card information including credit or debit card numbers as well as cardholder names from our payment-related systems for in-restaurant purchases at certain Chili’s restaurants,” Brinker said.

As more information is discovered about the breach, the company said it will update Chili’s customers on Brinker’s website.

Chili’s is just the latest in a wave of companies that have been affected by data breaches recently. Millions of people have had their personal information jeopardized by data breaches at companies like Saks Fifth Avenue and Lord & Taylor, Sears, Kmart, Delta and Best Buy.

Netflix Phish Claims Your Membership Is On Hold

phish.jpg

The days of ugly-looking phish pages hosted on something akin to a Geocities page are slowly receding into the distance. For quite some time now, phish attacks have made attempts to look fairly sophisticated and stand a decent chance of fooling anyone not keeping their guard up.

Today, we have a good example of this with a Netflix phish currently in circulation and (potentially) dropping into a mailbox near you. Netflix is a frequent target of all manner of scams, and is a popular go-to for phishers.

Here’s the email that kickstarts the process:

phish-email.JPG

Apart from the clunky typo in the small print, this is a fairly convincing email scam, combining someone who knows how to make an email not look terrible with the imminent threat of losing access. Having said that, you’ll notice the mail system above flagged it as suspicious anyway. This isn’t the case for all email clients, however, and one shouldn’t assume nothing slips through the cracks. The destination site, located at login(dot)netflix-activate(dot)com, appropriates a standard, no-frills Netflix login screen.

The phish itself consists of a grab for personal information including name, address, phone number, and date of birth. After that, they try and swipe payment information, asking for the name as written on the card, card number, expiry date, security code, and even a cheap grab at a security question answer for good measure.

billing.JPG

These emails follow a similar format as the Apple phishes in February, and indeed quite a few others going around at the moment (also Apple-centric, so constant service-related vigilance is the order of the day). Phishing emails won’t be going away anytime soon, and the people behind them keep striving to make their fake-outs ever more believable. It’s up to us to do what we can, and consign their sneaky missives to the recycle bin. Your bank account will thank you for it.

The Best Wireless Routers to Buy in 2018

If you’re shopping for a new wireless router, don’t be intimidated by all the technical jargon. For the average person, most of those specs won’t be all that relevant. Most likely, you just want to know which router is right for your particular set of wifi circumstances. Are you a gamer? Are you a streamer? Do you live in a big house or a cramped apartment? What’s your budget?

Best Overall, Best for Larger Homes: Linksys AC1900 Dual Band Router

ac1900.jpg

Price: $159.97

If you live in a large, multi-story home, you likely have several people – and even more devices – fighting over the WiFi connection. The Linksys AC1900 Dual Band Wireless Router is perfect for households with high WiFi traffic, letting you connect 12 or more devices, including smartphones, tablets, smart TVs, game consoles and virtual assistants (we're looking at you, Alexa!). And the router’s Beamforming technology means it focuses its signal towards those devices, rather than just sending out a blanket signal, resulting in a stronger connection for everyone.


Best for Streaming: Netgear AC1750 Smart Router

ac1750.jpg

Price: $94.99

Nothing ruins a binge watching marathon like a stream that won’t stop buffering. Well, the Netgear AC1750 Smart WiFi Router has come to your rescue. It features 450+1300 Mbps speeds and high-power external antennas for improved coverage. It has one USB 3.0 port and one USB 2.0 port and it has the best wireless security with WPA/WPA2. It even has separate and secure guest network access.


Best for Complete Home Coverage: Netgear Orbi

orbi.jpg

Price: $291.99

It’s a pain point homeowners across the world are all too familiar with: How do you fill up every inch of your home with a solid WiFi signal? Fortunately, the time has come to put this problem to rest thanks to the introduction of Netgear’s Orbi. It’s pricey, starting at $399, but the cost belies the satisfaction you’ll receive walking around your entire home with a strong signal. The price includes two devices, a router that’s plugged into your Internet modem and an identical satellite device setup elsewhere in the home to extend the signal throughout your house. If it sounds familiar, Netgear wasn’t the first to try mesh networking but they have a secret weapon: a tri-band system that not only extends the signal, but maintains its performance by optimizing the signal with your home ISP as well.


Best Under $50: TP-Link AC1200

Price: $39.99

TP-Link claims the 1200's Signal Sustain Technology (SST) can help provide a stronger WiFi signal while handling multiple high-bandwidth applications. And it can easily be found for less than $50. If you’re looking for a budget router, 867Mbps is more than enough for most needs—and more than you’ll ever find in the sub-$50 price range. And the system is future-proofed with 802.11ac WiFi technology.


Best for Small Apartments: ASUS RT-ACRH13 Dual-Band AC1300

Price: $61.12

When you live in a small apartment rather than a big house, there’s no need to splurge on a big router. The ASUS RT-ACRH13 fits the bill perfectly because it comes in under $65. It has four external 5dBi antennas that ensure you get good range throughout your apartment and can use multiple devices (smartphones, computers, etc.) at the same time. It can handle combined speeds of up to 1267 Mbps, so no matter what kind of downloads or uploads you throw at it, it can probably manage.

You Should Change Your Twitter Password Right Now

Twitter chief technology officer Parag Agrawal disclosed in a blog post that the company had inadvertently recorded user passwords, in plaintext, in an internal system. This is not how things are supposed to go! And while Twitter has fixed the bug, and doesn't think any of the exposed passwords were accessed in any way, you should still change your Twitter password right now to make sure your account is secure.

"It's a bad thing and Twitter should be held to the fire for it," says David Kennedy, CEO of the penetration testing firm TrustedSec. "But they are taking the right steps by requesting everyone change their password and making the bug public versus hiding it."

Twitter has begun notifying both mobile and desktop users to change their passwords, but several people have reported errors and lags, presumably because everyone is trying to make account changes at once (which is good!).

Companies generally protect user passwords by scrambling them in a cryptographic process known as hashing. As Agrawal explained, Twitter does this, too, using a well-regarded hash function called bcrypt. But a bug caused Twitter to accidentally store passwords unprotected in some type of internal log before its password management system finished hashing them. The system would then complete the hash, and everything would look fine, even though the passwords were readable in the log. While it's great that Twitter eventually realized the situation and is taking steps to ensure that it never happens again, it's disconcerting that such a fundamental flaw in a crucial user protection existed in the first place.

"I’m sorry that this happened," Agrawal wrote on Twitter after posting the announcement. "We are sharing this information to help people make an informed decision about their account security. We didn’t have to, but believe it’s the right thing to do." The disclosure came on World Password Day.

It's true that Twitter could have simply implemented remediations and hoped for the best, but its users deserve to know if and when their passwords have been exposed—especially because it's always possible that the data actually was improperly accessed. And the company could have gone even farther with its disclosure. "We ask that you consider changing your password on all services where you’ve used this password," Agrawal wrote in the statement. Instead of making it optional, Twitter could have forced all of its users to change their passwords to guarantee their security.

To do just that for your own account, navigate to Settings and privacy > Password. Enter your current password and then pick a new one. And if you used your old Twitter password for any other accounts, you should change those, too.

While you're at it, set up two-factor authentication for Twitter if you don't have it enabled already. Go to Settings and privacy > Account. In the Security subsection, click on Review your login verification methods. After entering your (newly revised) password to confirm that you want to make changes, you'll land on a Login verification screen. Here you can set things up so you receive second factor codes via SMS or, preferably, using a code-generating app like Google Authenticator or Authy. The problem Twitter announced today is exactly the type of situation where two-factor is helpful—even if your Twitter password was compromised while it was exposed in the internal log, two-factor would keep a bad actor from using that information alone to access your account.

Twitter declined to comment on how long the plaintext passwords were exposed, or why the company decided not to reset all user passwords, but it seems to have acted in good faith to resolve the issue. For a platform with 336 million users, though, it's a pretty major gaffe.