Spencer Public Library
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
Reach us by phone at 
​712-580-7290

Tech Corner

Being Polite to AI

3/11/2025

0 Comments

 
an older woman in a pink short looks at her phone
We say "please" and "thank you" to people all the time, but do we really need to extend the same courtesy to chatbots? Since they don’t have feelings, it might seem unnecessary. But some people argue there’s still value in keeping up polite habits, even when talking to AI. Others think it’s just a waste of time. So, does it actually matter?

On one hand, being polite to chatbots might help us maintain good manners in general. If we get used to barking commands at AI, there’s a chance that attitude could slip into how we talk to actual people. This is especially important for kids, who are still learning social norms. Plus, being nice—even to a chatbot—can put us in a better mood. Saying "please" and "thank you" is a small thing, but it can create a more positive tone in daily interactions.

There’s also the argument that how we talk to AI could influence how AI is designed in the future. If people consistently use polite language, developers might lean toward programming AI that promotes kindness and respectful communication. Maybe a world where people say "please" to their chatbots is one where we all get along a little better.

But then again, chatbots aren’t people. They don’t care how we talk to them, and being overly polite doesn’t actually change how they respond. For some, adding extra words like "please" just makes things slower and less efficient. If you’re just trying to get an answer or complete a task, cutting to the chase makes sense.
There’s also the concern that treating AI like it has feelings might blur the lines between machines and humans. Chatbots might seem friendly, but they don’t have emotions, and it’s important to remember they’re just tools. Being polite to AI is harmless, but getting too attached to the idea that they "deserve" kindness could lead to some weird social dynamics.
​
At the end of the day, it’s really up to you. If saying "please" and "thank you" feels natural, go for it. If you’d rather keep things short and direct, that’s fine too—your chatbot won’t hold a grudge. Just make sure you save your best manners for the real people in your life, because they’re the ones who actually care.
0 Comments

Spyzie Stalkerware Hack Exposes Users’ Private Data

3/7/2025

0 Comments

 
a stereotypical hollywood hacker holds a phone and stares ominously at the camera
​Spyzie, a shady stalkerware app used to secretly monitor people's phones, got hacked—big time. This breach exposed a ton of private data, putting both the spies and their targets at risk.

Stalkerware apps like Spyzie claim to be for “parental control,” but let’s be real—people often use them to spy on partners, employees, or others without consent. These apps collect everything from text messages and call logs to GPS locations and social media activity, all while staying hidden. But in a major security fail, Spyzie didn’t even bother to properly secure this data, making it easy for hackers to access and leak.

Reports say that the breach exposed usernames, passwords, phone details, and even surveillance logs. To make things worse, Spyzie didn’t use encryption, meaning hackers could just grab the data without much effort. This is a huge wake-up call about the dangers of spyware—not only is it creepy and invasive, but it’s also a massive security risk.

Experts are urging people to stay alert for stalkerware by checking for suspicious activity on their devices, keeping software updated, and using strong passwords. Meanwhile, privacy advocates are calling for tougher laws against these sketchy surveillance tools.

The bottom line? If a company’s entire business model is based on sneaky spying, chances are they don’t care much about security either. The Spyzie hack is just another reminder that privacy and cybersecurity should always come first.

0 Comments

Goodbye, Skype: The End of an Era

3/5/2025

0 Comments

 
Skype logo
Remember when Skype was the way to video call? Whether it was catching up with friends, awkward work meetings, or trying to explain tech issues to your parents, Skype was everywhere. But after years of decline, it's finally shutting down—and honestly, it’s not that surprising.

Skype used to be king, but it slowly lost its crown. It got slow and buggy, making it frustrating to use. At the same time, better options like Zoom, FaceTime, and WhatsApp came along, offering smoother, easier video calls. Microsoft, which bought Skype in 2011, focused more on pushing Teams for work calls, leaving Skype to fade into the background. People just moved on, and Skype never really caught up.

Even though it’s disappearing, Skype still had a huge impact. It was a game-changer in its time, helping people stay connected across the world. It walked so Zoom and FaceTime could run. Now, it’s heading off into internet history, joining the ranks of MySpace and AIM.
​
RIP Skype, and thanks for the memories.

0 Comments

Changes for Kindle Owners

2/19/2025

0 Comments

 
Amazon is making a big change for Kindle users, and not everyone is happy about it. Starting February 26, 2025, they’re getting rid of the “Download & Transfer via USB” option. This means you won’t be able to download your purchased e-books to your computer for manual transfer anymore. Instead, you’ll have to send them straight to a Wi-Fi-connected Kindle or use Amazon’s apps.

For people who like to back up their books or read on older/non-Kindle devices, this is a pretty frustrating move. While Amazon says any books you’ve already downloaded will still work, new purchases will be locked into their system, making it harder to manage your own e-books.

It’s another step toward Amazon keeping full control over your Kindle library, which has sparked a lot of debate. If you like owning your books outright, this change might make you rethink sticking with Kindle. I suppose this is where I point out again that you can get eBooks through the library!

What do you think—bad move or no big deal?
0 Comments

Heads Up, Avery Customers!

1/22/2025

0 Comments

 
an example of an Avery product
Bad news for Avery Products Corporation customers: the company recently announced a data breach that compromised credit card details and personal info. If you’ve shopped on their website, here’s what you need to know.

Avery, known for its labels and printing services, discovered the breach on December 9, 2024, but the trouble started much earlier. Hackers planted a sneaky card-skimming tool on avery.com way back on July 18, 2024. That means any payment info entered on their site between July 18 and December 9 was stolen. Yikes.

​Here’s what the hackers got their hands on:
​
  • Full names
  • Billing and shipping addresses
  • Email addresses
  • Phone numbers
  • Payment card details (number, CVV, expiration)
  • Purchase amounts

​Thankfully, things like Social Security numbers and driver’s licenses weren’t involved, but what was exposed is still enough for hackers to rack up fraudulent charges.

Avery’s notification even mentions reports of suspicious charges and phishing emails from customers. So, while they can’t confirm a direct connection, it’s a good idea to keep an eye on your accounts.

To help out, Avery is offering 12 months of free credit monitoring through Cyberscout. You can also call them at (800) 462-8379 if you think you think you were affected, and be sure to report any fishy account activity to your bank ASAP.

Unfortunately, this breach affected a whopping 61,193 customers, according to the Maine Attorney General’s office. So, if you’ve shopped with Avery recently, it’s worth taking a few extra precautions.

Stay safe out there, and if you’re a victim, don’t wait—get in touch with Avery and your bank to lock things down.

0 Comments

FBI issues a warning to think before you "Act Now"

1/22/2025

0 Comments

 
FBI logo
Heads Up! Scammers Exploit Disasters for Fake Charity Schemes

The FBI wants you to stay sharp—scammers are cashing in on tragedies to trick people into donating to fake charities. Whether it's the New Year’s Day attack in New Orleans or wildfires in LA, fraudsters are out there, posing as relief agencies, victims, or even celebrities, to steal your money or personal info.

Here’s what’s happening:
  • Impersonation Tactics: Scammers might pretend to be disaster relief groups, victims, or influencers, using fake stories to tug at your heartstrings.
  • Tech Trickery: Some are even using AI to make their scams look legit.
  • Big Impact: In 2024, over 4,500 cases of charity fraud cost people around $96 million.

How to Protect Yourself
  1. Research Before Donating: Look for reviews, news articles, and official registrations of charities.
  2. Verify Crowdfunding: Double-check the campaign’s legitimacy—reverse search images and verify the stories.
  3. Watch for Pressure: If someone says "act now," it could be a scam.
  4. Avoid Unsolicited Requests: Don’t open links or messages from unknown sources.
  5. Pay Safely: Skip debit, gift, or prepaid cards for donations.

Quick Tip: Legit charities don’t use free email services, and their official websites can be checked through tools like ICANN Lookup.

Think You’ve Been Scammed?
  • File a report with the FBI’s Internet Crime Complaint Center (IC3).
  • Include all the details—names, emails, payment info, and interactions with the scammer.

Stay safe, stay skeptical, and let’s outsmart the scammers!

See the official warning here.
0 Comments

QR Code Safety

11/27/2024

0 Comments

 
a safe sample of a QR code to try scanning
You can scan this one. It's safe.
QR codes are everywhere these days—on posters, business cards, and even restaurant tables where they replace physical menus. A few years ago, during a layover at LaGuardia, I stopped to grab a bite. The entire exchange felt impersonal: I scanned a QR code, placed my order, and eventually someone tossed the food my way without much interaction.

​​As reported in The Register, Switzerland's National Cyber Security Centre recently issued a warning about a malware campaign spreading through mailed flyers. These flyers urged recipients to download a "weather alert app" that appeared to be from the country’s Federal Office of Meteorology and Climatology. The flyers instructed users to scan a QR code, which led to a download page for an app called "Alertswiss"—a name deceptively similar to the official "AlertSwiss." However, this app wasn’t available on the Google Play Store but rather on a third-party site.
​​Instead of delivering weather alerts, the app contained a variation of the Coper Trojan malware. This malware can keylog, intercept two-factor authentication messages, capture login credentials, and more. It allows attackers to access bank accounts, steal funds, and launch phishing attacks, enabling further malicious activities.
a random lost dog poster with a QR code on it
This incident marked the first time such a scam was reported in Switzerland, but it’s likely a sign of things to come. As long as these scams prove lucrative, they will persist and evolve.
​
To protect yourself, avoid scanning QR codes unless you are confident in their source and authenticity. If in doubt, refrain from using devices connected to sensitive personal information for such scans. Stay cautious and protect your data!
0 Comments

Keep That Email Secure!!

11/5/2024

0 Comments

 
Let’s face it—email is a big part of our lives. It’s where we store a lot of our personal and professional details, chat with friends, get updates from our favorite brands, and unfortunately, sometimes become the target of phishing attempts or other security threats. Keeping your email secure is a must these days, especially with cyber threats getting sneakier every year. Here’s a simple breakdown of some easy ways to keep your email account safe from prying eyes.

1. Start with a Strong Password (and Make It Unique!)

I get it, everyone says this, but that's because it really matters. A strong password is your first line of defense. Try to avoid common passwords (password123, qwerty, pet/kid names, or addresses) and make yours long, random, and hard to guess. Mix up uppercase and lowercase letters, throw in numbers and symbols, and never reuse it for other accounts.

Pro tip: Use a passphrase instead of a single word. Something like “C@tCh3ck€d0n2019” is both complex and memorable (if you happen to love cats, for instance). Better yet, use a password manager to generate and store strong passwords for you. Most browsers have password managers built in. You can use a standalone password manager that goes between devices and across browsers, too. I'm a huge fan of Proton Pass.

And, remember those passwords! Use an easily accessible password manager or keep a book of them somewhere safe. I often have people come in for tech help but we are unable to get anywhere because we can't access their accounts or devices.


2. Enable Two-Factor Authentication (2FA)

Two-factor authentication (2FA) is like adding an extra lock on the door. Even if someone gets ahold of your password, they’ll still need that second “factor” (usually a code sent to your phone or an authenticator app) to get in. Almost every email provider supports 2FA, so there’s no reason not to enable it.

Tip: Try using an authenticator app (like Google Authenticator or Authy) rather than SMS for added security, as SMS can sometimes be intercepted, or your SIM card can be swapped/copied.

3. Beware of Phishing Emails

Phishing emails can be super convincing these days. Scammers will often try to mimic reputable companies or people you know to trick you into clicking on a link or sharing personal information. Always double-check the sender’s address—if you get an email from [email protected] saying your account has been compromised, it’s probably a scam.

Safety tip: If you’re unsure, don’t click any links. Go directly to the website of the company and check for any updates from there.

4. Keep Your Devices and Software Updated

Hackers often exploit security holes in outdated software, so keeping your devices and email apps updated can make a big difference. This includes updating your operating system, browser, and any security software you use.

Pro tip: Enable automatic updates on your devices if possible. It’s one less thing to think about, and you’ll always have the latest security patches.

5. Use a Secure Email Provider

If you’re serious about email security, consider switching to a more secure email provider. Providers like ProtonMail (Aimee loves Proton) and Tutanota offer end-to-end encryption, meaning even they can’t see the contents of your emails. Gmail and Outlook have decent security too, but the added privacy of encrypted email can give you extra peace of mind.

6. Avoid Public Wi-Fi for Sensitive Emails

Public Wi-Fi can be a hacker’s playground. If you’re checking email in a coffee shop, airport, or anywhere with an open network, be cautious. Avoid logging into sensitive accounts, and if you must, consider using a VPN (Virtual Private Network) to encrypt your connection.

7. Be Cautious with Attachments

Malware often hides in email attachments, so think twice before downloading anything from an unknown sender. If an email with an attachment looks suspicious or unexpected, delete it or contact the person who “sent” it to confirm.

8. Regularly Check Your Account Activity

Most email providers let you view recent account activity, showing you details like when and where your account was accessed. Checking this every so often is a great way to make sure no one else is snooping in your inbox. If you spot any unusual activity, change your password immediately and check for other signs of hacking.

9. Don’t Overshare Online

Believe it or not, some hackers can guess or reset your email password using information you post online. Avoid sharing details like your birthday, pet names, or other personal info that might be answers to security questions. Be ever so mindful about what you’re sharing, especially on social media.

10. Create a Fake Family

Better yet, use fake information when filling out those security forms. You know how your bank password reset always wants to know what school you went to, your mother's maiden name, etc? Even without you sharing, these are able to be found in public records. So what do you do? Make a fake family! Who was your favorite sitcom family? They are yours, now! Well, as long as you didn't make it your whole personality online. Just make sure you remember who your new family is when you need to unlock your account.


11. Keep a Backup Email Address

Lastly, having a backup email address that’s only used for recovery purposes can be a lifesaver if something does go wrong. Make sure it’s secure and linked to your primary account. This way, you can regain access quickly if you’re ever locked out of your main email. I cannot stress how important it is to have this second email and not depend on just one. So many people get locked out of the first without a way to unlock it. 

Keeping your email secure is mostly about being cautious and adding extra layers of protection. With strong passwords, two-factor authentication, and a healthy dose of skepticism towards emails that look too good (or bad) to be true, you’re well on your way to keeping your inbox safe.

It only takes a few small changes to make a big difference, and trust me, your future self will thank you!
0 Comments
Forward>>

    Aimee Clark

    Hi there! I’m the IT Librarian at the Spencer Public Library. Welcome to the Tech Corner, where I’ll be diving into all the excitement — and headaches — from the ever-changing world of tech!

    Need Tech Help?
    ​Click Here


    Quickstart Guides

    Archives

    June 2025
    April 2025
    March 2025
    February 2025
    January 2025
    November 2024

    Categories

    All
    2FA
    AI
    Android
    Biometrics
    Cell Phone
    ClickFix
    Cybersecurity
    Data Breach
    Device Security
    Discontinued Products
    Discontinued Services
    Face ID
    Fingerprint
    How To Deal With Scams
    IPhone
    Passkeys
    Passwords
    Phishing
    Ransomware
    Scams
    Security
    Signal
    Smartphone
    Stalkerware
    Two-Factor Authentication
    VPN

    RSS Feed

Location

    Question or Comment?
    ​Send us a message!

Submit

Check us out on social media!

Facebook Icon
Instagram Icon
TikTok Icon
Youtube Icon
Tumblr Icon
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules