Spencer Public Library
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
Reach us by phone at 
​712-580-7290

Tech Corner

Locking Your Phone

4/17/2025

0 Comments

 
Picture
​Let’s talk about something most of us don’t think about until it’s too late: how you lock your phone. You’ve probably heard that using your fingerprint or face to unlock your device is fast and convenient—and it is. But when it comes to protecting your privacy using a password or PIN might actually be the safer bet.

Here’s the thing: the laws around phones and privacy are still catching up with the technology. The Fourth Amendment is supposed to protect you from unreasonable searches and seizures. That means the police can’t just go snooping through your stuff without a warrant. But phones are tricky. Courts have generally said that yes, your phone is protected and they usually need a warrant to search it. But what happens when they get that warrant, or think they don’t need one?

This is where the Fifth Amendment comes in—the one that says you can’t be forced to testify against yourself. Courts have decided that a password or PIN falls under that protection. It’s something you know, and you can’t be forced to give it up. But biometrics? Your fingerprint or face? That’s something you are. And legally, it’s more like handing over a key than giving up a secret. In many cases, police can make you use your face or finger to unlock your phone without it being considered "testifying."

So even though it’s easier to just glance at your phone to unlock it, that convenience could cost you if you ever end up in a legal situation. Whether you're a protester, journalist, or just someone who values your privacy, using a PIN or passcode adds a layer of protection that biometrics can’t. In the eyes of the law, knowing your code is very different from having a fingerprint.
​
Until the courts set clearer rules, the safest move is to stick with a good old-fashioned password. It might take a few extra seconds to type it in, but that small hassle could be what keeps your private life out of someone else's hands.
0 Comments

Passkeys - Leaving Passwords Behind

4/14/2025

0 Comments

 
Somebody is holding a phone to scan a computer screen
Let’s be real here—passwords are the worst. You’re supposed to make them long, complicated, and unique for every website, but who actually remembers all of that? So we reuse them, or write them down, or forget them entirely. That’s where passkeys come in, and they’re kind of a game-changer.

A passkey is a new, easier, and way more secure way to sign in to apps and websites. Instead of typing out a password, your phone or computer can log you in with something you already use—like your fingerprint, face, or device PIN (this one is best!). It’s still secure, but you don’t have to remember anything.

The cool part is that passkeys are way harder for hackers to steal. With passwords, someone can trick you into typing them on a fake site or grab them in a data breach. Passkeys don’t work like that. They’re tied to your device and your identity, and they never leave your phone or computer. So even if a company gets hacked, your passkey can’t be stolen.

Basically, tech companies are pushing passkeys because they’re safer, simpler, and a whole lot less annoying than passwords. And don’t worry—if you’ve ever used Face ID or a fingerprint to unlock your phone, you’ve already got the hang of it.
0 Comments

Passwords Aren't Always the Safest Option

3/20/2025

0 Comments

 
hackers in hoodies stand in front of the Chrome logo
​Hackers are now using AI to make cyberattacks even easier and more dangerous. In the past, cybercriminals had to do a lot of work to steal passwords or trick people into clicking harmful links. Now, they can use AI to do most of the work for them.

Recently, researchers showed how AI can be tricked into helping hackers. One test got AI on to create a fake email designed to steal someone’s personal information. Another test tricked AI into building malware on the Chrome browser—a type of software that can steal login details, credit card numbers, and other sensitive data.

The scary part is that AI isn’t always able to tell when it’s doing something bad. If someone frames the request in a certain way, AI might help them without realizing it. This means cybercriminals can now create scams and harmful software faster than ever before.

Because of this, traditional security measures like passwords and basic two-factor authentication (2FA) aren’t enough anymore. To protect yourself, switch to passkeys, use app-based authentication instead of text message codes, and be extra careful about where you store your passwords. AI-powered threats aren’t just a possibility—they’re already happening.

0 Comments

Spyzie Stalkerware Hack Exposes Users’ Private Data

3/7/2025

0 Comments

 
a stereotypical hollywood hacker holds a phone and stares ominously at the camera
​Spyzie, a shady stalkerware app used to secretly monitor people's phones, got hacked—big time. This breach exposed a ton of private data, putting both the spies and their targets at risk.

Stalkerware apps like Spyzie claim to be for “parental control,” but let’s be real—people often use them to spy on partners, employees, or others without consent. These apps collect everything from text messages and call logs to GPS locations and social media activity, all while staying hidden. But in a major security fail, Spyzie didn’t even bother to properly secure this data, making it easy for hackers to access and leak.

Reports say that the breach exposed usernames, passwords, phone details, and even surveillance logs. To make things worse, Spyzie didn’t use encryption, meaning hackers could just grab the data without much effort. This is a huge wake-up call about the dangers of spyware—not only is it creepy and invasive, but it’s also a massive security risk.

Experts are urging people to stay alert for stalkerware by checking for suspicious activity on their devices, keeping software updated, and using strong passwords. Meanwhile, privacy advocates are calling for tougher laws against these sketchy surveillance tools.

The bottom line? If a company’s entire business model is based on sneaky spying, chances are they don’t care much about security either. The Spyzie hack is just another reminder that privacy and cybersecurity should always come first.

0 Comments

    Aimee Clark

    Hi there! I’m the IT Librarian at the Spencer Public Library. Welcome to the Tech Corner, where I’ll be diving into all the excitement — and headaches — from the ever-changing world of tech!

    Need Tech Help?
    ​Click Here


    Quickstart Guides

    Archives

    April 2025
    March 2025
    February 2025
    January 2025
    November 2024

    Categories

    All
    2FA
    AI
    Android
    Biometrics
    Cell Phone
    ClickFix
    Cybersecurity
    Data Breach
    Device Security
    Discontinued Products
    Discontinued Services
    Face ID
    Fingerprint
    How To Deal With Scams
    IPhone
    Passkeys
    Passwords
    Phishing
    Ransomware
    Scams
    Security
    Signal
    Smartphone
    Stalkerware
    Two-Factor Authentication
    VPN

    RSS Feed

Location

    Question or Comment?
    ​Send us a message!

Submit

Check us out on social media!

Facebook Icon
Instagram Icon
TikTok Icon
Youtube Icon
Tumblr Icon
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules