E-Cigarettes Take a Turn Hacking Into Your Computer

You want to move to a less harmful method of smoking, or attempt to quit, so you go out and purchase an e-cigarette (e-cig). The joy of making an investment to save you money, and be nicer to your body, you take your first puff. The joy, ease, and sensation of making a good choice….

ecigarettesYou want to move to a less harmful method of smoking, or attempt to quit, so you go out and purchase an e-cigarette (e-cig). The joy of making an investment to save you money, and be nicer to your body, you take your first puff. The joy, ease, and sensation of making a good choice. Using up all the battery, there is no power adapter in site, and your phone is already plugged into the wall. You think, why not plug it into your computer? The next day you find pop-ups raging on your machine and, all of the sudden, you have another health issue to worry about. This time, it’s your computer!

How

It makes sense, every electronic contains some sort of data; firmware, software and/or storage. E-cigs may be the last device you would think contains data, but it needs to in order to run. It can work in many different ways and has been around for many years. Back in 2008, Samsung had alerted their customers that malware came on their installation disc for photo frames. This concept is called “BadUSB” and it manipulates the device at the hardware level. So, what are you going to do?

Choose the Right Manufacturer

Everyone wants to save some money and nobody wants repercussions because of it. Research your manufacturer and find out where you are getting your e-cig from. Reputable retailers are always a good start because they tend to carry the name brand products, or reputable off-brands. If you do choose to go to someone, or look used, research the brand you are purchasing and make sure any serial numbers are still intact. Some of the high-profile manufacturers are:

  • V2 Cigs
  • Vapor Fi
  • Halo Cigs
  • Apollo E-Cigs
  • Aspire
  • KangerTech
  • Innokin

Protect Your Computers

Not only can malware infect and lock-up your entire computer, but it can move throughout your network, as well. It is protection you should already have, and doesn’t come loaded with many Internet security packages. Having good software for detecting your threats is key on any work or home computer. Malwarebytes is always a good choice.

Check for Authenticity

Just because some things are labeled a brand, doesn’t mean they are that brand. We all have come across a counterfeit product, at some point, and you need to make sure that you don’t get one of those. Check the box for labels that are peeling off or discolored and that all the right markings are on the product. If you are unsure of what you are looking for, research the brand you are looking for and ask the manufacturer for identifiers.

Is your computer running slow or having programs pop up? Maybe your home screen changed on your Internet browser? These could be signs of malware infection and your computer should be serviced. If you have this problem, or are worried about this happening, give us a call at (408) 849-4441 or email us at info@veltecnetworks.com. Don’t let this become a problem, contact Veltec Networks immediately.

 

Check Out Veltec’s Latest Videos On Technology & Cybersecurity

Cormac Conroy, CEO of TeraSpatial Shares Why Veltec Networks Is A Great IT Company In San Jose, CA

Does Your Silicon Valley Business Have An AI Policy For Employees?

Do You Love Your IT Company In San Jose, California

Cybersecurity Consulting In San Jose California

Pro Tips On Selecting The Brand New IT Company In 2024

Outsourced IT Director San Francisco Bay Area