Placeholder Content Image

Frankenstein: how Mary Shelley’s sci-fi classic offers lessons for us today about the dangers of playing God

<p><a href="https://www.penguin.com.au/books/frankenstein-9780241425121" target="_blank" rel="noopener">Frankenstein, or, The Modern Prometheus</a>, is an 1818 novel by Mary Wollstonecraft Shelley. Set in the late 18th century, it follows scientist Victor Frankenstein’s creation of life and the terrible events that are precipitated by his abandonment of his creation. It is a <a href="https://en.wikipedia.org/wiki/Gothic_fiction" target="_blank" rel="noopener">Gothic novel</a> in that it combines supernatural elements with horror, death and an exploration of the darker aspects of the psyche.</p> <p>It also provides a complex critique of Christianity. But most significantly, as one of the first works of science-fiction, it explores the dangers of humans pursuing new technologies and becoming God-like.</p> <h2>The celebrity story</h2> <p>Shelley’s Frankenstein is at the heart of what might be the greatest celebrity story of all time. Shelley was born in 1797. Her mother, <a href="https://en.wikipedia.org/wiki/Mary_Wollstonecraft" target="_blank" rel="noopener">Mary Wollstonecraft</a>, author of the landmark A Vindication of the Rights of Women (1792), was, according to that book’s introduction, “the first major feminist”.</p> <p>Shelley’s father was <a href="https://plato.stanford.edu/entries/godwin/" target="_blank" rel="noopener">William Godwin</a>, political philosopher and founder of “philosophical anarchism” – he was anti-government in the moment that the great democracies of France and the United States were being born. When she was 16, Shelley eloped with radical poet <a href="https://en.wikipedia.org/wiki/Percy_Bysshe_Shelley" target="_blank" rel="noopener">Percy Shelley</a>, whose <a href="https://www.poetryfoundation.org/poems/46565/ozymandias" target="_blank" rel="noopener">Ozymandias</a> (1818) is still regularly quoted (“Look on my Works, ye Mighty, and despair!”).</p> <p>Their relationship seems to epitomise the Romantic era itself. It was crossed with outside love interests, illegitimate children, suicides, debt, wondering and wandering. And it ultimately came to an early end in 1822 when Percy Shelley drowned, his small boat lost in a storm off the Italian coast. The Shelleys also had a close association with the poet <a href="https://en.wikipedia.org/wiki/Lord_Byron" target="_blank" rel="noopener">Lord Byron</a>, and it is this association that brings us to Frankenstein.</p> <p>In 1816 the Shelleys visited Switzerland, staying on the shores of Lake Geneva, where they were Byron’s neighbours. As Mary Shelley tells it, they had all been reading ghost stories, including Coleridge’s <a href="https://www.poetryfoundation.org/poems/43971/christabel" target="_blank" rel="noopener">Christabel</a> (Coleridge had visited her father at the family house when Shelley was young), when Byron suggested that they each write a ghost story. Thus 18-year-old Shelley began to write Frankenstein.</p> <h2>The myth of the monster</h2> <p>The popular imagination has taken Frankenstein and run with it. The monster “Frankenstein”, originally “Frankenstein’s monster”, is as integral to Western culture as the characters and tropes from Lewis Carroll’s Alice’s Adventures in Wonderland.</p> <p>But while reasonable continuity remains between Carroll’s Alice and its subsequent reimaginings, much has been changed and lost in the translation from Shelley’s novel into the many versions that are rooted in the popular imagination.</p> <p>There have been many varied adaptations, from <a href="https://youtu.be/TBHIO60whNw" target="_blank" rel="noopener">Edward Scissorhands</a> to <a href="https://www.youtube.com/watch?v=LGzc0pIjHqw" target="_blank" rel="noopener">The Rocky Horror Picture Show</a> (see <a href="https://www.theguardian.com/film/2021/feb/11/the-20-best-frankenstein-films-ranked" target="_blank" rel="noopener">here</a> for a top 20 list of Frankenstein films). But despite the variety, it’s hard not to think of the “monster” as a zombie-like implacable menace, as we see in the <a href="https://youtu.be/BN8K-4osNb0" target="_blank" rel="noopener">trailer to the 1931 movie</a>, or a lumbering fool, as seen in <a href="https://youtu.be/nBV8Cw73zhk" target="_blank" rel="noopener">the Herman Munster incarnation</a>. Further, when we add the prefix “franken” it’s usually with disdain; consider “frankenfoods”, which refers to genetically modified foods, or “frankenhouses”, which describes contemporary architectural monstrosities or bad renovations.</p> <p>However, in Shelley’s novel, Frankenstein’s creation is far from being two-dimensional or contemptible. To use the motto of the Tyrell corporation, which, in the 1982 movie Bladerunner, creates synthetic life, the creature strikes us as being “more human than human”. Indeed, despite their dissimilarities, <a href="https://www.youtube.com/watch?v=NoAzpa1x7jU" target="_blank" rel="noopener">the replicant Roy Batty in Bladerunner reproduces Frankenstein’s creature’s intense humanity</a>.</p> <h2>Some key elements in the plot</h2> <p>The story of Victor Frankenstein is nested within the story of scientist-explorer Robert Walton. For both men, the quest for knowledge is mingled with fanatical ambition. The novel begins towards the end of the story, with Walton, who is trying to sail to the North Pole, rescuing Frankenstein from <a href="https://upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Caspar_David_Friedrich_-_Das_Eismeer_-_Hamburger_Kunsthalle_-_02.jpg/1280px-Caspar_David_Friedrich_-_Das_Eismeer_-_Hamburger_Kunsthalle_-_02.jpg" target="_blank" rel="noopener">sea ice</a>. Frankenstein is being led northwards by his creation towards a final confrontation.</p> <p>The central moment in the novel is when Frankenstein brings his creation to life, only to be immediately repulsed by it:</p> <blockquote> <p>I had worked hard for nearly two years, for the sole purpose of infusing life into an inanimate body. For this I had deprived myself of rest and health. I had desired it with an ardour that far exceeded moderation but now that I had finished, the beauty of the dream vanished, and breathless horror and disgust filled my heart.</p> </blockquote> <p>Victor Frankenstein, like others in the novel, is appalled by the appearance of his creation. He flees the creature and it vanishes. After a hiatus of two years, the creature begins to murder people close to Frankenstein. And when Frankenstein reneges on his promise to create a female partner for his creature, it murders his closest friend and then, on Frankenstein’s wedding night, his wife.</p> <h2>More human than human</h2> <p>The real interest of the novel lies not in the murders or the pursuit, but in the creature’s accounts of what drove him to murder. After the creature murders Frankenstein’s little brother, William, Frankenstein seeks solace in the Alps – in <a href="https://en.wikipedia.org/wiki/Wanderer_above_the_Sea_of_Fog#/media/File:Caspar_David_Friedrich_-_Wanderer_above_the_sea_of_fog.jpg" target="_blank" rel="noopener">sublime nature</a>. There, the creature comes upon Frankenstein and eloquently and poignantly relates his story.</p> <p>We learn that the creature spent a year secretly living in an outhouse attached to a hut occupied by the recently impoverished De Lacey family. As he became self-aware, the creature reflected that, “To be a great and virtuous man appeared the highest honour that can befall a sensitive being.” But when he eventually attempted to reveal himself to the family to gain their companionship, he was brutally driven from them. The creature was filled with rage. He says, “I could … have glutted myself with their shrieks and misery.” More human than human.</p> <p>After Victor Frankenstein dies aboard Walton’s ship, Walton has a final encounter with the creature, as it looms over Frankenstein’s body. To the corpse, the creature says:</p> <blockquote> <p>“Oh Frankenstein! Generous and self-devoted being! What does it avail that I now ask thee to pardon me? I, who irretrievably destroyed thee by destroying all thou lovedst.”</p> </blockquote> <p>The creature goes on to make several grand and tragic pronouncements to Walton. “My heart was fashioned to be susceptible of love and sympathy; and when wrenched by misery to vice and hatred, it did not endure the violence of the change, without torture such as you cannot even imagine.” And shortly after, about the murder of Frankenstein’s wife, the creature says: “I knew that I was preparing for myself a deadly torture; but I was the slave, not the master, of an impulse, which I detested, yet could not disobey.”</p> <p>These remarks encourage us to ponder some of the weightiest questions we can ask about the human condition:</p> <blockquote> <p>What is it that drives humans to commit horrible acts? Are human hearts, like the creature’s, fashioned for ‘love and sympathy’, and when such things are withheld or taken from us, do we attempt to salve the wound by hurting others? And if so, what is the psychological mechanism that makes this occur?</p> </blockquote> <p>And what is the relationship between free will and horrible acts? We cannot help but think that the creature remains innocent – that he is the slave, not the master. But then what about the rest of us?</p> <p>The rule of law generally blames individuals for their crimes – and perhaps this is necessary for a society to function. Yet I suspect the rule of law misses something vital. Epictetus, the stoic philosopher, considered such questions millennia ago. He asked:</p> <blockquote> <p>What grounds do we have for being angry with anyone? We use labels like ‘thief’ and ‘robber’… but what do these words mean? They merely signify that people are confused about what is good and what is bad.</p> </blockquote> <h2>Unintended consequences</h2> <p>Victor Frankenstein creates life only to abandon it. An unsympathetic interpretation of Christianity might see something similar in God’s relationship with humanity. Yet the novel itself does not easily support this reading; like much great art, its strength lies in its ambivalence and complexity. At one point, the creature says to Frankenstein: “Remember, that I am thy creature; I ought to be thy Adam, but I am rather the fallen angel, whom thou drivest from joy for no misdeed.” These and other remarks complicate any simplistic interpretation.</p> <p>In fact, the ambivalence of the novel’s religious critique supports its primary concern: the problem of technology allowing humans to become God-like. The subtitle of Frankenstein is “The Modern Prometheus”. In the Greek myth, <a href="https://en.wikipedia.org/wiki/Prometheus" target="_blank" rel="noopener">Prometheus</a> steals fire – a technology – from the gods and gives it to humanity, for which he is punished. In this myth and many other stories, technology and knowledge are double-edged. Adam and Eve eat the apple of knowledge in the Garden of Eden and are ejected from paradise. In 2001: A Space Odyssey, <a href="https://youtu.be/RWCvMwivrDk" target="_blank" rel="noopener">humanity is born when the first tool is used</a> – a tool that augments humanity’s ability to be violent.</p> <p>The novel’s subtitle is referring to Kant’s 1755 essay, “The Modern Prometheus”. In this, Kant observes that:</p> <blockquote> <p>There is such a thing as right taste in natural science, which knows how to distinguish the wild extravagances of unbridled curiosity from cautious judgements of reasonable credibility. From the Prometheus of recent times Mr. Franklin, who wanted to disarm the thunder, down to the man who wants to extinguish the fire in the workshop of Vulcanus, all these endeavors result in the humiliating reminder that Man never can be anything more than a man.</p> </blockquote> <p>Victor Frankenstein, who suffered from an unbridled curiosity, says something similar:</p> <blockquote> <p>A human being in perfection ought always to preserve a calm and peaceful mind … If the study to which you apply yourself has a tendency to weaken your affections, and to destroy your taste for those simple pleasures in which no alloy can possibly mix, then that study is certainly unlawful, that is to say, not befitting the human mind.</p> </blockquote> <p>And also: “Learn from me … how dangerous is the acquirement of knowledge and how much happier that man is who believes his native town to be the world, than he who aspires to become greater than his nature will allow.”</p> <p>In sum: be careful what knowledge you pursue, and how you pursue it. Beware playing God.</p> <p>Alas, history reveals the quixotic nature of Shelley and Kant’s warnings. There always seems to be a scientist somewhere whose dubious ambitions are given free rein. And beyond this, there is always the problem of the unintended consequences of our discoveries. Since Shelley’s time, we have created numerous things that we fear or loathe such as the atomic bomb, cigarettes and other drugs, chemicals such as DDT, and so on. And as our powers in the realms of genetics and artificial intelligence grow, we may yet create something that loathes us.</p> <p>It all reminds me of sociobiologist Edward O. Wilson’s relatively recent (2009) remark <a href="https://www.oxfordreference.com/view/10.1093/acref/9780191826719.001.0001/q-oro-ed4-00016553" target="_blank" rel="noopener">that</a>, “The real problem of humanity is the following: we have Paleolithic emotions, medieval institutions, and god-like technology.”</p> <p><strong><em>This article originally appeared on <a href="https://theconversation.com/frankenstein-how-mary-shelleys-sci-fi-classic-offers-lessons-for-us-today-about-the-dangers-of-playing-god-175520" target="_blank" rel="noopener">The Conversation</a>.</em></strong></p> <p><em>Image: Shutterstock</em></p>

Books

Placeholder Content Image

Signs that someone is stealing your Wi-Fi

<p><em>Image: Getty </em></p> <p><strong>Slow Internet Speed </strong></p> <p>According to Alex Hamerstone, an expert in cyber security, there are some tell-tale signs you have a Wi-Fi thief, the most pedestrian of which is decreased Internet speed. Of course, there could be a whole host of reasons you’re experiencing slower Internet. But if you’re regularly noticing “slower Internet speeds, or more buffering,” you should consider that someone might be stealing your Wi-Fi.</p> <p><strong>Unusual Ads</strong></p> <p><span>One of the for-better-or-worse hallmarks of the Internet age is advertising – specifically, those weirdly accurate ads that pop up in pretty much all of your browsers, a subtle reminder that your activity is being monitored. But if you suddenly start noticing ads that seem distinctly not you, this is often a sign that your Wi-Fi has a squatter, Hamerstone says. “The Wi-Fi thief is likely sharing your IP address, and their browsing history could influence the ads that pop up in your browser while you’re surfing the web,” he explains. “In most cases, that will just be annoying, but it could also be harmful if the Wi-Fi thief is viewing adult or inappropriate content from your network, leading to similar adult-themed ads that pop-up in your Internet sessions.” If this happens, you’ll want to take action immediately.</span></p> <p><strong>Above Average Bills</strong></p> <p><span>If someone is stealing your Wi-Fi, the consequences could be financial as well as annoying and inconvenient. Hamerstone warns, “If you…pay based on how much data you use, or pay when you go over a certain amount of data in a month, then you may get unexpectedly high bills for exorbitant data usage.” If you’re suddenly charged far more than usual for your data bill, you might want to consider that your Wi-Fi network has an uninvited guest.</span></p> <p><strong>Unfamiliar Devices</strong><span></span></p> <p><span>If you start to suspect that your Wi-Fi is the target of a thief, you should check your router by logging in to see all of the devices connected to your network. If there’s a device that is definitely not something someone in your household owns, you should probably look into it further to identify it. Be advised, though, that just because a device’s name seems unusual doesn’t mean it’s an interloper. “Don’t be immediately alarmed if you see something that looks odd at first – devices may have unfamiliar names that don’t obviously correlate to what the device is,” Hamerstone says.</span></p> <p><strong>Spam Notifications </strong></p> <p><span>This is another consequence that’ll likely only happen if the Wi-Fi thief is engaging in sketchy or illegal online behaviour—and it’s not something you want. “A Wi-Fi thief could also cause your home IP address to get red-flagged by the various spam engines which are relied upon by the major email services and network security providers,” Hamerstone explains. And if this happens, you’ll experience the effects: “The emails you send from your home Wi-Fi network could be blocked altogether or filtered to spam folders because the thief has ruined your IP reputation.” Needless to say, this could become a major issue if you’re heavily reliant on your Internet, especially right now.</span></p> <p><strong>Issues with Your Personal Device or Data</strong></p> <p><span>Of course, Wi-Fi powers more than just computers nowadays. If you start encountering privacy issues with other “smart” or Internet-enabled devices, you could be experiencing the effects of a Wi-Fi thief. “If someone is using your Wi-Fi, then there is a good chance they also have access to any personal devices that share the same network,” says Hamerstone. “This could include laptops, phones, game consoles, printers – even Roku devices and security cameras.” They may not care – they could simply just be trying to snag some free Internet. But worst-case scenario, they could start accessing your personal information. And if your information isn’t properly secured, the Wi-Fi thief could gain access to your bank account or other sensitive content.</span></p> <p><strong>Legal Action </strong></p> <p><span>In very serious cases, a belligerent Wi-Fi thief could result in a visit from police. “If the Wi-Fi thief is using your Wi-Fi network to commit crimes, such as making threats to people or accessing illegal content, then it is your IP address that will be linked to the illegal activity and you who will be accused of the crime,” warns Hamerstone. Needless to say, this is when Wi-Fi theft turns into a massive problem: “It can lead to a long and expensive nightmare of trying to prove that you are not a criminal,” Hamerstone says. Even if the thief is committing subtler “crimes” like piracy, that’s still not something you want to be blamed for.</span></p> <p><strong>So, how do I prevent Wi-Fi theft?</strong></p> <p><span>There’s one primary way to keep unwanted Wi-Fi lurkers out: Choose a strong password. Pick a password that only your household will know, and be very careful about who, if anyone, you share it with. “Be especially careful about sharing your password with people who live close enough to use your Wi-Fi from their house or apartment!” Hamerstone advises. It’s not foolproof, as a talented hacker could crack your password, but “this simple step will prevent most instances of opportunistic Wi-Fi theft,” Hamerstone sums up. He also recommends setting up a separate “Guest” network and/or a 5G network, making sure they’ve all got strong passwords. Finally, you should consider using a VPN, which, in addition to keeping you safe on public Wi-Fi, can also protect your information on your own network.</span></p> <p><span>Preventing this theft is all well and good, but what if you think you’ve fallen victim to it? The first step, Hamerstone says, is to check your router.  “Follow the instructions provided with your router to login to your admin account, and from here you can check to see which devices are connecting to your network,” he says. There are also tools, like the free Fing app, that can identify all of the devices using your Wi-Fi. If you identify an unwelcome device, here’s what to do: “Immediately change both your Wi-Fi network password and the router admin login password, just in case the person had access to this as well,” Hamerstone advises. “You should also reboot your router and check for any software or firmware updates that will improve the device’s operation and security.”</span></p> <p><span>This article originally appeared on <a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/signs-that-someone-is-stealing-your-wi-fi">Readers Digest</a>. </span></p>

Legal

Placeholder Content Image

How do Wi-Fi and hotspots work?

<div class="copy"> <p>If you’re reading this article on your smartphone or laptop, it’s more than likely you’re connected to a wireless router. <span style="font-family: inherit;">No need for bulky cables – just pick the wireless signal you want and the World Wide Web is at your fingertips. </span></p> <p>This is all thanks to the power of Wi-Fi. So how does it actually work?</p> <p><span style="font-family: inherit;">If you wanted to connect to the internet before Wi-Fi (which, by the way, doesn’t stand for wireless fidelity – it doesn’t actually stand for anything) you needed a cable known as an ethernet cable. </span></p> <p>This cable converts 1s and 0s of binary, the language of computers, into electrical signals which are sent down a wire and converted back into binary by the computer. </p> <p>But in the case of Wi-Fi, those electrical signals are converted by a router to radio waves that carry the electrical signal to the computer, where they’re converted to binary again.</p> <p>Information is sent as lots of small packets that are then stitched together. </p> <p>The process also works in reverse. If you need to send an email, your computer or smartphone shoots radio waves to the router. </p> <p>The radio waves are very similar to those used in mobile phones, walkie-talkies and other devices.</p> <p>So how can radio waves carry the amount of information needed to watch a high-resolution cat video?</p> <p>It’s true: the amount of information transmitted to make a phone call (audio) is far less than to watch an online video (audio and visual). </p> <p>This boils down to the radio wave frequency. Wi-Fi uses either 2.4 gigahertz or 5 gigahertz – far higher than those used by mobile phones at less than 1 gigahertz. </p> <p>A higher frequency means more radio waves – and more data – can be packed into a given space. </p> <p>The trade-off is that the waves can’t travel as far and are heavily influenced by nearby objects, including other Wi-Fi signals. </p> <p>That’s why your Wi-Fi signal gets weaker the more walls you put between your computer and router.</p> <p>You can get around this by linking lots of routers together to boost the signal. This is how the internet hotspots found in places such as cafes, universities and office buildings manage to reach out across multiple levels and large distances. </p> <p>For instance, the University of Twente in the Netherlands has a hotspot covering 1.4 square kilometres. It combines more than 600 individual routers from one massive signal that all students and staff can access at the same time.</p> <em>Image credits: Shutterstock            <!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --> <img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=12344&amp;title=How+do+Wi-Fi+and+hotspots+work%3F" alt="" width="1" height="1" /> <!-- End of tracking content syndication -->          </em></div> <div id="contributors"> <p><em>This article was originally published on cosmosmagazine.com and was written by Jake Port. </em></p> </div>

Technology

Placeholder Content Image

Free, independent advice for your retirement

<p>The Financial Information Service (FIS) is a great government service which was set up as the ‘Financial Information Service for Pensioners’ 29 years ago.</p> <p>It’s been helping older Australians make better decisions about their finances for all of those years, giving them free, independent and confidential advice about retirement, aged care and any taxation implications.</p> <p>Because the FIS was so popular, in 1991, the Department of Human Services expanded it so now people of all ages and all walks of life are able to increase their financial knowledge by accessing the FIS, regardless of their age or income.</p> <p><strong>Anyone can access this free service</strong></p> <p>To access the FIS you simply call up the Department of Human Services on its FIS booking phone line – 132 300 – and ask to speak to an FIS Officer. They will be able to give you advice over the phone or if they are busy, they’ll be able to schedule a call back at a later time.</p> <p>If you’d rather talk with someone face-to-face you can make an appointment to see an FIS Officer and talk with them, asking your questions about your finances. You can also check out what FIS seminars are being held near you and attend one of these. FIS seminar topics include ‘Understanding your pension and your options’ and they also cover what government payments and services you’re eligible for if your financial situation changes.</p> <p><strong>The FIS informs people about matters such as:</strong></p> <ul> <li>Investing principles</li> <li>Superannuation</li> <li>Retirement planning</li> <li>Aged care costs and taxation implications</li> </ul> <p><strong>Once you have access to all of this information, you’ll be better able to:</strong></p> <ul> <li>Understand your own financial affairs and options</li> <li>Understand financial planners and how to use their advice</li> <li>Save and plan for the future through investing</li> <li>Plan for your retirement and increase your overall retirement income</li> <li>Understand what are the costs involved when you move into aged care</li> </ul> <p>It’s important to keep in mind that FIS Officers are not financial planners or counsellors and so they won’t sell you financial advice nor will they tell you how to invest your money. But they will teach you how to understand financial advisors and how to use their advice for your circumstances.</p> <p><strong>A free, impartial service</strong></p> <p>As Financial Information Service officer, Justin Bott explains: “The Financial Information Service is a free, impartial service to help people understand their financial situation and helps them make educated decisions about their finances.”</p> <p>“We listen to what seniors want to hear about and answer their questions on these accounts and in podcasts,” he adds.</p> <p>As well he adds: “The Seniors Update Facebook and Twitter accounts are a great way for us to stay in touch with seniors.”</p> <p><strong>To find out more about the FIS</strong></p> <p>To find out when an FIS seminar is being held in your local area, just head to the Department of Human Services’ website and you’ll find all the information you need <a href="https://www.humanservices.gov.au/individuals/services/financial-information-service">here.</a></p> <p>The website will show all the upcoming FIS seminars by state on its website <a href="http://www.humanservices.gov.au/fis">humanservices.gov.au/fis </a></p> <p>Bookings are essential and people can book by emailing the department at <a href="mailto:fis.seminar.bookings@humanservices.gov.au">fis.seminar.bookings@humanservices.gov.au</a> or calling the FIS seminar booking phone line on 136 357.</p> <p>You can also phone 132 300 and ask to speak to a Financial Information Service Officer over the phone.</p> <p><strong> </strong></p>

Retirement Income

Placeholder Content Image

Police issue warning over JB Hi-Fi text message scam

<p>Police have issued a warning about a new text message scam that is claiming to give Aussies the opportunity to be product “testers” for JB Hi-Fi.</p> <p>NSW Police confirmed they were aware of the SMS scam and urged Aussies to ignore the messages.</p> <p>“We advise not clicking the link or responding to the message,” JB Hi-Fi said in a statement.</p> <p style="text-align: center;"><img style="width: 500px; height:375.96302003081666px;" src="https://oversixtydev.blob.core.windows.net/media/7820505/image_.jpg" alt="" data-udi="umb://media/315eb71b2a364afd933cf4b8df1efe5f" /></p> <p>“Scammers are clever and can make their content and messages look like us, but we would never ask for your personal information via SMS.</p> <p>“JB will only use SMS to deliver notifications, services or if you have asked our counter staff to send you a copy of a digital receipt for your in-store purchase.</p> <p>“The best thing to do is to delete these fake text messages.”</p> <p>Earlier this month, Aussies were also warned of a <a href="https://www.oversixty.com.au/finance/legal/don-t-answer-these-random-calls/"><strong><u>phone scam</u></strong></a> involving overseas calls.</p> <p>The overseas callers would prank a number with the hope that they will call back, charging the unsuspecting caller a hefty bill for the call.</p> <p>The scammers often use premium lines, similar to those that are used by psychic or sex hotlines, that end up costing the caller a small fortune.</p> <p>The Australia Competition and Consumer Commission’s deputy chair, Delia Rickard, warned Aussies to ignore calls from country codes that are unfamiliar.</p> <p>“What typically happens is the scammer calls for just one ring then cuts the line leaving a missed call on the victim’s phone,” Ms Rickard told the <a href="http://www.abc.net.au/news/"><strong><u>ABC</u></strong></a>.</p> <p>“Then the victim calls the number back and they could be put on hold, have music playing or they could try and chat."</p> <p>This scam has seen many people receive missed calls from countries like Cuba, Africa and Latvia in recent months.</p> <p>Have you received this text message scam? Let us know in the comments below. </p>

Legal

Placeholder Content Image

The rise of fake Wi-Fi: How hackers are stealing your personal data

<p><span>A new report has revealed how hackers are able to easily access personal data using fake Wi-Fi accounts.</span></p> <p><span>The investigation by the US <em>Today</em> show found that cyber scammers can quickly access your credit card information, flight details and purchase history, once a victim is logged onto their fake Wi-Fi.</span></p> <p><span>Investigative journalist Jeff Rossen used a security expert to set up fake Wi-Fi hotspots at the Grand Fiesta Americana hotel in Cancun, Mexico, reported <em>The Sun.</em></span></p> <p><span>Tourists were tricked into clicking on the fake Wi-Fi hotpots because the duo gave them names similar to the hotel's secure Wi-Fi.</span></p> <p><span>After various tourists had clicked on the fake W-Fi, Rossen went around the resort tracking people by their phones to warn them of what they had done.</span></p> <p><span>The tourists were shocked at how easily they had been fooled.</span></p> <p><span>Rossen shared tips to the tourists about how they could stay safe online while on holiday.</span></p> <p><span>One key piece of advice Rossen shared was to log off public Wi-Fi when making online purchases on your phone.</span></p> <p><span>He recommends using your mobile phone network, even if it is more expensive, as it will ensure you are safe from fake Wi-Fi.</span></p> <p><span>He also advised phone users to click “forget this network” after using public Wi-Fi, to avoid auto-logging on to hotspots.</span></p> <p><span>You can also turn off your Wi-Fi’s “auto-join” feature for safer use.</span></p> <p><span>One last trick Rossen shared was, the best way to test the authenticity of the Wi-Fi claiming to be your hotel is to enter the wrong room number when prompted.</span></p> <p><span>If you still receive access, you will know it is a scam network that is letting anyone in. If it is actually your hotel network, you will be denied access.</span></p> <p><span>Over the summer holidays, Australian families were warned to be careful when logging into free Wi-Fi networks.</span></p> <p><span>One man had $155,000 worth of digital currency Bitcoin stolen after logging into a restaurant’s unsecured public Wi-Fi network. </span></p> <p><span>Have you ever had a dodgy Wi-Fi experience? Tell us in the comments below. </span></p>

Accommodation

Placeholder Content Image

Why are hotels still charging for Wi-Fi?

<p>"Hi, how are you going? Beautiful day here isn't it? What's the wifi password here?" is an accurate, if sad, greeting that has become second-nature to the traveller.</p> <p>I'll have barely dumped my bags bedside at the Airbnb apartment before I'm scoping out the kitchen for the hosts list of house rules always signed off with the accommodation's username and password for the internet.</p> <p>Nothing sees an Airbnb host's review rating sink like a shoddy connection of a wifi blackspot. And yes, I'm guilty of upping and leaving a cafe if the wifi password isn't forthcoming.</p> <p>But please, save your tut-tutting about "living in the moment" (I do, I just want it to be the best moment, with the most 5 star reviews on Time Out and Tripadvisor).</p> <p>If I were to go "off the grid" and ditch the devices, I'm but a drop in the ocean of migrating travellers traversing the globe with one eye on their smartphones.</p> <p>Instead, and rightly so, the travel market and businesses have skewed their offerings toward the connected travel experience. All backpackers know they must have a top-notch wi-fi coverage to match their top notch bar crawls. Any airport worth its salt offers you some megabytes to sort out how to trek into town or brag about your visit to the airline lounge. So it more than a bit grating that certain hotel chains still think they can get away with charging for wi-fi.</p> <p>At a daily rate. For pitiful data allowances. The Super-King beds with 1000 thread count sheets, poolside bars and posh pampering products build an image of a grandeur that can't help but be cheapened by a charge for what's become a modern day necessity.</p> <p>The Hilton trying to charge £13 per day (per day!) was ridiculous. What will I be pinged for next: Television access and hot water?</p> <p>I know that the internet was the death-knell for the long-time money-spinner for motels and hotels – the pay-per-view movie.</p> <p>As audiences switch from Sky Movies to Netflix, the hotel chains wish to keep clipping the ticket, by placing internet access into the revenue-generating column as pay-per-view films once were. They were a real money spinner – just ask Shane Jones.</p> <p>The point is now, two decades on from the internet's arrival it should be a given that these charges won't be sorted out with a quick swipe of the company credit card. You're now more likely to find guests jumping on the wi-fi to post a poolside pic to Snapchat or find a secret nightspot on Tripadvisor than to upload documents to a company website or make a conference call.</p> <p>So it makes smart business sense to have young, plugged-in guests able to document their stay in your property and the majority of smart hotel managers have relegated high internet access charges to history. The rest now need to follow.</p> <p>And I get it, it's never going to be "free wi-fi", it's simply another cost to be incorporated into your standard room rate along with other necessities like electricity, running water and fluffy white robes.</p> <p>But to ping us for each Facebook post or Google Map navigation is no way to court loyalty in the Instagram generation and converts us to Airbnb at a rate that could rival even the fastest hotel internet speeds.</p> <p><em>Written by Josh Martin. First appeared on <a href="http://www.stuff.co.nz/" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Technology

Placeholder Content Image

Outrageous Wi-Fi network name forces plane’s emergency landing

<p><span>A plane with 100 passengers on board was forced to make an emergency landing after a passenger gave a Wi-Fi network a very inappropriate name.</span></p> <p><span>The Turkish Airlines flight from Nairobi, Kenya to Istanbul, Turkey was diverted after the Wi-Fi name “bomb on board” caused concern among passengers.</span></p> <p><span>The airline said the plane landed at the Khartoum airport in Sudan and the flight was resumed after a security check of all passengers and the aircraft was carried out.</span></p> <p><span>“Experts said the Wi-Fi network in question was created on board. No irregularities were seen after security procedures were carried out, and passengers were brought back on the plane once boarding restarted,” Turkish Airlines said in a statement.</span></p> <p><span>The airline did not say whether authorities identified the passenger who had named the Wi-Fi network, however, all 100 passengers were brought back on the flight.</span></p> <p><span>Unfortunately, inappropriate Wi-Fi names are becoming an occurrence on flights.</span></p> <p><span>In May, a flight from Mexico to London was cancelled after a Wi-Fi network named “Jihadist Cell London 1” was spotted on board.</span></p> <p><span>The passenger who noticed the name immediately told the crew and an investigation was launched.</span></p> <p><span>Last year, a Qantas flight that was about to take off from Melbourne to Perth was delayed for two hours after a passenger noticed a Wi-Fi network named “Mobile Detonation Device”.</span></p> <p><span>In 2014, a passenger on an American Airlines flight at Los Angeles airport noticed a Wi-Fi network called “Al-Quida Free Terror Network”.</span></p> <p><span>The flight was delayed as authorities investigated the incident and then it was further delayed for even longer because the crew needed to be replaced as their hours were up. </span></p>

International Travel

Placeholder Content Image

The surprising things in your home that could be wrecking your Wi-Fi connection

<p>We’ve all become so addicted to Wi-Fi these days, it’s gotten to the point where a slow internet connection is almost completely unbearable. And while you can fork over a mint to get your hands on the “best” plan, there are many things you’re doing around the house day-to-day that could be dramatically slowing your connection.</p> <p>And it all comes down to the placement of your router.</p> <p>Something as simple as placing your router near an electronic device like a TV, fish tank or event Christmas tree lights can result in a dramatic drop in speeds.</p> <p>The reason this is the case is that every day electrical objects all emit signals that can interfere with that of your Wi-Fi connection, restricting your potential speed.</p> <p>“We are increasingly reliant on the internet for so many aspects of our lives and it's therefore so important that we can trust in the reliability of our service,” said Meredith Sharples, director at Post Office Telecoms.</p> <p>“However, the public told us they suffer from a slow internet connection, have had their connection drop at random times and experience a poor Wi-Fi connection in certain rooms.</p> <p>“We also learned that many are not aware of the simple steps they can take to ensure their home is optimised to receive the best broadband connections possible.”</p> <p><strong>Ways to increase your Wi-Fi speed:</strong></p> <ul> <li>Place router away from other electronic devices</li> <li>Ensure the Wi-Fi router is plugged into your master socket</li> <li>Protect your router with a password</li> <li>Use the latest version of your internet browser</li> </ul> <p>Are you happy with your Wi-Fi connection?</p>

Technology

Placeholder Content Image

Security flaw in Wi-Fi leaves millions at risk

<p>The US government and security researchers worldwide have issued warnings of a newly discovered flaw in a widely used Wi-Fi encryption protocol.</p> <p>The US government’s Computer Emergency Response Team (CERT) issued a warning saying the security flaw can open the door to hackers seeking to eavesdrop or hijack devices using wireless networks.</p> <p>“Exploitation of these vulnerabilities could allow an attacker to take control of an affected system," said CERT.</p> <p>The agency’s warning follows research by computer scientists at the Belgian university KU Leuven, who named the security flaw KRACK, for Key Reinstallation Attack.</p> <p>Ars Technica has reported that the discovery was a closely guarded secret for weeks in order to allow Wi-Fi systems to develop security measures.</p> <p>The Wi-Fi encryption protocol with the security flaw, WPA2, allows hackers “to read information that was previously assumed to be safely encrypted," said a blog post by KU Leuven researcher Mathy Vanhoef.</p> <p>“This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.”</p> <p>Mathy also said the flaw may allow an attacker “to inject ransomware or other malware into websites.”</p> <p>The Belgian researchers said in a research paper that devices on all operating systems may be vulnerable to KRACK, including 41 per cent of Android devices.</p> <p><strong>The risk</strong></p> <p>According to researchers, the flaw is dangerous due to the difficulty in patching millions of wireless systems.</p> <p>“Wow. Everyone needs to be afraid," said Rob Graham of Errata Security in a blog post.</p> <p>“It means in practice, attackers can decrypt a lot of Wi-Fi traffic, with varying levels of difficulty, depending on your precise network setup.”</p> <p>Researchers at Finland-based security firm F-Secure said the discovery of the flaw confirms longstanding concerns about Wi-Fi systems’ vulnerability.</p> <p>“The worst part of it is that it’s an issue with Wi-Fi protocols, which means it affects practically every single person in the world that uses Wi-Fi networks," F-Secure said in a statement.</p> <p>F-Secure researchers said Wi-Fi users can minimise the risks by using virtual private networks and by updating devices including routers.</p> <p>The Wi-Fi Alliance, an industry group who sets standards for wireless connections, said computer users should not panic.</p> <p>“There is no evidence that the vulnerability has been exploited maliciously, and Wi-Fi Alliance has taken immediate steps to ensure users can continue to count on Wi-Fi to deliver strong security protections,” the group said in a statement.</p> <p>“Wi-Fi Alliance now requires testing for this vulnerability within our global certification lab network and has provided a vulnerability detection tool for use by any Wi-Fi Alliance member."</p> <p>On October 10, Microsoft released a patch to protect users of Windows devices.</p> <p>“Customers who have Windows Update enabled and applied the security updates, are protected automatically," Microsoft said.</p> <p>A Google spokesman said, “We’re aware of the issue, and we will be patching any affected devices in the coming weeks.”</p>

Technology

Placeholder Content Image

How to find Wi-Fi using Facebook

<p><em><strong>Lisa Du is director of <span style="text-decoration: underline;"><a href="https://readytechgo.com.au/" target="_blank">ReadyTechGo</a></span>, a service that helps people gain the confidence and skills to embrace modern technology.</strong></em></p> <p>Wi-Fi is a necessity when travelling because it allows you to communicate at little or no cost. When you're away from home, and in need of Wi-Fi, Facebook can now help you find it! <br /> <br /><strong> How does it work?</strong><br /> <br /> The Facebook app on your device can help you locate available hotspots at nearby businesses. <br /> <br /> The feature works by using information that businesses have added to their Facebook pages. It's handy, but won't show you all available Wi-Fi hotspots (there’s other apps for that).</p> <p><strong>How do I use the feature?</strong></p> <p>1. On your device, Tap on the <strong>Facebook</strong> App to open it (If you don't have the Facebook app, you will need to download the app from Apple App Store or Google Play Store)<br /> <br /> 2. Click on the <strong>More</strong> tab (looks like three lines in top right-hand corner)<br /> <br /> 3. Under the <strong>Apps</strong> section, tap See All</p> <p><img width="281" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/759c8fc2-fcb0-4aa1-a887-6a71b4ad72e9.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 500px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>4. Scroll down, and tap on Find Wi-Fi</p> <p><img width="278" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/a14ad3c9-b38c-46ef-aec1-18e82913ced9.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 493px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>5. Tap on <strong>Enable Find Wi-Fi </strong></p> <p><img width="240" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/f06157b6-3a45-4933-aa4a-42d932618258.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 426px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>6. A list of businesses will appear </p> <p>OR you can tap on <strong>Map</strong> to see a map of Wi-Fi hotspots</p> <p style="text-align: center;"><img width="225" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/392f5b0d-6951-48bd-ab97-b6c7a9fe0e98.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 399px;"/></p> <p>You can tap on a business name, and Facebook will provide information about the business (via their Facebook page), or give you directions to this Wi-Fi location.<br /> <br /> Please note that you do need an internet connection to use this feature, then you can use Wi-Fi when you get to the location! </p>

Technology

Placeholder Content Image

Company demonstrates the shocking danger of public Wi-Fi networks

<p>There’s nothing we love more than finding a free, open Wi-Fi hotspot when we’re waiting around at the airport or shopping centre, but one company has proven just how dangerous these public networks can be.</p> <p>Purple, a Manchester-based Wi-Fi hotspot company, ran a little experiment this week, including a “Community Service Clause” in its terms of service agreement, binding 22,000 people into a signed contract agreeing to complete 1,000 of menial labour simply to gain access to the “free” network.</p> <p>The chores unwittingly agreed to by the Wi-Fi users included:</p> <ul> <li>Removing animal waste from local parks</li> <li>Giving hugs to stray cats and dogs</li> <li>Manually clearing sewer blockages</li> <li>Cleaning portable toilets at local events</li> <li>Removing chewing gum from the streets</li> <li>Painting snail shells – just to make them a little prettier!</li> </ul> <p>It’s not entirely clear if the company would be legally allowed to enforce the clause, but Purple explained it wouldn’t try – their aim was only to encourage people to read the terms of service before logging in to open Wi-Fi networks. After all, you never know what you might have just signed up to.</p> <p>There was even a prize on offer for anyone who spotted the sneaky added clause – but only one person (0.000045 per cent of the total number of users) managed to do it.</p> <p>“Wi-Fi users need to read terms when they sign up to access a network,” Purple CEO Gavin Wheeldon <a rel="noopener" href="https://purple.ai/purple-community-service/" target="_blank"><strong><span style="text-decoration: underline;">said in a statement</span></strong></a>. “What are they agreeing to, how much data are they sharing, and what license are they giving to providers? Our experiment shows it’s all too easy to tick a box and consent to something unfair.”</p>

Travel Tips

Placeholder Content Image

Clever map shows Wi-Fi passwords from airports around the world

<p>A travel blogger has come up with a solution to one of the most common travel problems – hundreds of Wi-Fi hotspots and no password. Computer security engineer Anil Polat has devised an interactive map to put an end to outrageous airport Wi-Fi fees once and for all.</p> <p>Polat regularly updates the map, which currently has passwords from dozens of airports around the world and offers users full instructions on how to log in to the network and where to get the best connection.</p> <p><iframe src="https://www.google.com/maps/d/embed?mid=1Z1dI8hoBZSJNWFx2xr_MMxSxSxY&amp;hl=en_US" width="640" height="480"></iframe></p> <p>So forget those pricey roaming charges, just use this map the next time you take off and you’ll have full internet access during those pesky stopovers.</p> <p><strong>Related links:</strong></p> <p><a href="/travel/international/2016/10/best-or-worst-time-to-visit-europe/"><span style="text-decoration: underline;"><em><strong>How safe it is to travel to Europe</strong></em></span></a></p> <p><a href="/travel/international/2016/10/why-i-will-never-use-a-money-belt-again/"><span style="text-decoration: underline;"><em><strong>Why I’ll never use a money belt again</strong></em></span></a></p> <p><a href="/travel/international/2016/10/10-foods-every-traveller-has-to-try/"><em><span style="text-decoration: underline;"><strong>10 foods every traveller has to try (at least once)</strong></span></em></a></p>

International Travel

Placeholder Content Image

How to secure your Wi-Fi network from hackers

<p>An insecure Wi-Fi network can result in more than just slower internet and a burnt-through data cap. You could lose access yourself or even let private information get into the wrong hands. As more devices in our home become Wi-Fi connected - from your home security to your lightbulbs - making sure your Wi-Fi is secure is more necessary than ever. Here's how.</p> <p><strong>Change passwords</strong></p> <p>This seems obvious, but stick with me. While you might have set a pretty good password for your Wi-Fi network when you set it up – what with capital letters and numbers and everything - the password to log in to your actual router might still be the default.  This means anyone already on your network can easily change the actual Wi-Fi password themselves.</p> <p>(There's also the possibility that your Wi-Fi password is still the one written on the back of your router. You should definitely change that.)</p> <p>To change either of these passwords, you'll want to log in to your router. (Your router is that box with flicking lights that gives you internet. It probably has some antennas.)</p> <p>Open a web browser (Chrome, Safari, Internet Explorer - whatever you use) on a device that's connected to your Wi-Fi and type "192.168.0.1". This should open a login page. (If it doesn't try "192.168.1.1".)</p> <p>Logging in here, disturbingly, should be pretty easy. Check your router's make and model here or on Google. It's likely "admin" and "admin" or "admin" and "password".</p> <p>Once you've logged in you should see your router's settings page. Each one of these is different, but changing the password for both the router and the Wi-Fi network itself should be relatively easy. If not, Google is your friend. Remember to go long and to add numbers. If you're worried about forgetting it, try a long sentence of song lyrics along with a few numbers - easy to remember, extremely hard for a computer to crack.</p> <p><strong>Change the name of your network</strong></p> <p>If your Wi-Fi network already has some dumb joke name, skip this section. If it's called NETGEAR 5345 or something like that, time to get one of those dumb joke names. You can do this, again, by logging into your router. Look for an option to change the "SSID".</p> <p>Why? Because for potential hackers, knowing the type of router or connection you have makes the job a lot easier. Getting rid of the default name makes this a bit harder for them.</p> <p><strong>Encrypt your network</strong></p> <p>Your router is likely already encrypted with WAP encryption, which is fairly standard, but is also quite easy to crack. Luckily, most newer routers should offer "WPA2" encryption - don't worry about what it means - which is much stronger. However, it also will lock out any device from prior to 2006, so if you've got some ancient laptop somewhere, be wary.</p> <p>To do this, you're going to want to - once again - log in to your router. (See why it's so important to make sure your router is password protected too?) Encryption options should be under security settings.</p> <p><strong>Restrict your Wi-Fi to certain devices</strong></p> <p>This is something of a nuclear option, and can be extremely inconvenient. Basically, instead of allowing any device with the right password onto your network, it will restrict the network to only allow access for devices on a list. To do this, assemble a list of all the MAC addresses of every device you own, then input them into their router. MAC addresses are basically unique IDs for every device that has Wi-Fi - Google how to find them on each of your smartphones, laptops, tablets, and consoles.</p> <p>Once you've got that list, log back in to your router and into the security settings again.</p> <p>Have you ever taken measures to secure your Wi-Fi? Do you think you’re going to take them now? Share your thoughts in the comments.</p> <p><em>First appeared on <a href="http://Stuff.co.nz" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p> <p><strong>Related links:</strong></p> <p><a href="/entertainment/technology/2016/06/14-tricks-that-will-change-how-you-use-your-ipad/"><strong><em><span style="text-decoration: underline;">14 tricks that will change how you use your iPad</span></em></strong></a></p> <p><a href="/entertainment/technology/2016/06/how-to-keep-your-facebook-messages-private/"><em><span style="text-decoration: underline;"><strong>How to keep your Facebook messages private</strong></span></em></a></p> <p><a href="/entertainment/technology/2016/05/hints-for-using-gmail/"><em><strong><span style="text-decoration: underline;">5 hints for using Gmail</span></strong></em></a></p>

Technology

Our Partners