Lensa AI Selfie Art: Cybersecurity Threat?

Lensa AI, an all-in-one photo/video editor, has taken the social media world by storm. But at what cost?

What is Lensa?

Lensa AI currently tops at number one on Apple and Google Play stores with its new AI profile generator. Users create stunning and unique profile pictures by uploading 10-20 pictures of themselves.

These photos are then used to generate profile pictures in different artistic styles.

Yet, cybersecurity experts express concern about the potential risks that Lensa AI poses.

The Security Risk

According to Lensa’s terms of service:

“you grant us a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable, sub-licensable license to use, reproduce, modify, distribute, create derivative works of your User Content”

In plain English, this means that by agreeing you allow Lensa to use photos you upload in whatever way they like.

Lensa ensures users that “photos are deleted after the AI results are generated.” But can we trust them?

Also, consider that many smart devices now use face IDs to unlock. Hackers could use AI art to generate realistic photos of your face to unlock your devices.

Conclusion

While this technology is powerful and exciting, it is also new. With any new technology, it is critical we understand how it can impact our lives.

What do you think? Did I miss anything?

Leave your thoughts down below!

Data Protection: A Beginners Guide

According to this study, there are about 2,200 cyber attacks happening every day. That is an attack every 39 seconds!

We can almost begin to feel paralyzed about what we can do to protect ourselves online.

With this understanding, this guide was made to help those who want protection but don’t know where to start.

Each section or “level” is meant to be implemented from level 1 to Level 3. But, do not feel as though you need to put in place all 3 levels.

Important Note:

This guide focuses on data protection rather than anonymity/privacy. Applying the principles below can help with privacy, but will not be enough.

Level 1: Basic Security

Passwords:

For most users, passwords can often be a point of anxiety.

Always trying to remember a complex password is frustrating. Yet, it is crucial that you make each password as unique and complex as possible.

This is where a password manager can be a lifesaver.

Password managers store all your credential login information. These managers can also fill out sign-in portals for you.

When you reuse the same passwords, you give the hacker more information to use against you.

For those in the market for a password manager LastPass is a fantastic option. They have a free plan that would meet most users’ day-to-day needs.

Multi-Factor Authentication:

M.F.A. (Multi-Factor Authentication) is a critical step for protecting your data online.

For those who don’t already know, M.F.A. is a multi-step login process for the user to authenticate.

Don’t worry if this sounds complicated! It’s not!

A good example of M.F.A. is signing into Google. Users provide their username and password, as well as a one-time password sent to their phone number.

Always opt for M.F.A. when possible.

Antivirus Software:

Although this may seem somewhat obvious, many people don’t install antivirus software.

Antivirus software protects you from attacks like downloads that contain malicious software. Often this malware resides on your workstation undetected, logging all your information.

Antivirus prevents this by analyzing the files you download as soon as you download them.

Level 2: Mid-Level Protection

Social Media:

Social media is a research heaven for hackers.

When you post PII (identifiable information), hackers can gather this information and use it against you.

Try to avoid posting personal email addresses, phone numbers, home addresses, or pictures of your government/business I.D.s.

VPN?:

In recent years using a VPN has been seen as a “magic bullet” for all of your data protection needs.

Sadly, it’s not.

At a high level, VPNs function by changing the location where your device is located.

This hides your activity from anyone listening and your ISP (Internet service provider).

While this is great, VPNs will not protect you from hackers if you use the same passwords on sketchy sites.

But, I would still recommend getting a VPN.

Most VPN services offer add-on tools (e.g. Ad Blockers, Tracker Blockers, and Password Managers) with your subscription.

These tools can also help you stay secure online, by making it harder to gather information on your internet activity.

Social Engineering:

Social engineering is one of the most important points on this list.

At a high level, social engineering is by which hacking occurs at the human level.

The Uber hacker confirming his social engineering attack

This can happen in many different forms, one of which you would already know as spam calls. Spam calls are often easy to detect, but other forms of social engineering are more subtle.

Here is a list of the most common themes across most social engineering attacks.

Common Themes:

  • The message plays on your emotions to act out of fear, anger, excitement, etc.
  • The message disguises itself as an organization that you trust (exp. “Amazon” sending you a message to click on a code via WhatsApp)
  • Unusual links (exp. http://www.ubr.com)
  • There is incorrect spelling and grammar

Level 3 – Extreme precaution

Multiple Email Addresses:

By using multiple email addresses, you limit the amount of information that can be leaked at one time. Each email is for a different area of your life (e.g. work, promotions, entertainment). By doing so you force the hacker to work harder, giving you time to react.

Conclusion:

By implementing these security practices, you prevent potential attacks from ever taking place.

Living in the digital world can be overwhelming, but it is possible to protect your data.

The Top 3 Best Effective Study Strategies

Whether you are an ambitious student looking to improve your grades or a simple hobbyist trying to refine your skills, understanding how to study effectively can greatly improve the quality of your time spent learning.

Below is a list of the three most effective studying strategies that you can implement today!


Strategy List Overview

  1. Feynman technique
  2. Leitner System
  3. The SQR3 Method

  1. Feynman Technique

The idea of the Feynman technique is to help learners become aware of the difference between knowing and understanding. This is done by the learner taking a concept/principle and explaining it to others.

By doing this, you are forced to use much simpler words and phrases than you would normally. This in turn helps you to have a deeper understanding of the subject and identify where the deficiencies in your understanding lie. Often, we can use complex words and phrases as a crutch not understanding their true meaning.

Below are the steps needed to implement the technique.

Steps

  1. List the concept you want to study
  2. Write a simple and clear explanation
  3. review explanation
  4. re-learn and re-read
  5. Repeat

2. Leitner System

The Leitner system is a technique that utilizes the principle of spaced repetition using flashcards and boxes. For each box, you assign a certain number of times you will review the cards inside (e.g. every day, every other day, and once a week).

https://en.wikipedia.org/wiki/File:Leitner_system_alternative.svg

The effectiveness of this technique is that cards you are able to memorize quickly will go to the end where they will be reviewed less often. While the cards you are not able to memorize as quickly stay toward the front requiring you to review them more often. But there is a catch, no matter at what point the card is if you are not able to remember the card it then gets sent to the front to start all over again.

3. SQR3 Method

The SQR3 method is a reading technique that can be used to help learners read more proactively. Being more proactive helps learners better recall the information that they read as well as have a deeper understanding of its importance.

Below is a step-by-step explanation of how to implement the SQR3 reading method.

  1. Skim
  2. Questions
  3. R1 = Read
  4. R2 = Recite
  5. R3 = Review

Steps

1. Skim

First, begin by skimming and noting all the headers and key themes in the passage.

2. Questions

After having skimmed the passage, begin the second step by making each of the headings into as many questions that you think will be answered in the passage.

3. R1 = Read

The third step is to read and look for answers to the questions asked in the previous step.

4. R2 = Recite

After reading, summarize in your own words what the section was about and the answers to the questions that you had asked.

5. R3 = Review

The last step is to review. In this step, go over any points or passages that you felt were unclear or questions that you had while reading. Answer these questions and review again.

Conclusion:

By now you should have the skills to be able to receive more value from studying. Please feel free to implement any of the techniques listed above best suited to your needs. Best of luck.

– Steven

Uber Hack 2022: Hard Lessons Learned


On September 15, 2022, Uber reported that they were responding to a cybersecurity incident. That incident, as we later found out, was a security breach of Uber’s entire IT infrastructure.

A hacker, an unknown 18-year-old, posted screenshots of the company’s financial and admin dashboards, proving he was successful.

He spoke with journalists about how he compromised Uber the following day.

Hacker Revealing His Attack Plan: Source

Below is each key moment of the hacker’s attack.

1 – Social Engineering

The hacker’s first move was to gain access to the company’s internal network.

He started his attack by sending authentication requests to his target for over an hour.

But the contractor wouldn’t tap on the notification.

Deciding to contact the user via WhatsApp. The hack Impersonated Uber IT and told the contractor to push the notification.

The contractor fell for the impersonation and granted the hacker access.

Hacker Confirming: From KnowBe4

Lesson:

Educating yourself about social engineering will mitigate attempts from hackers. Learn what applications and protocols your company uses to communicate. Doing so you will notice anything abnormal/strange and can respond.

2 – Privilege Access Management

Once the hacker gained access, he then was able to add his device to the company VPN. This allowed him to scan the company’s internal network for any information.

While scanning the network, the hacker discovered a network share.

This network share housed a PowerShell script containing admin credentials for Thycotic (PAM).

The hacker then had access to all of Uber’s services, DA, G Suite, and AWS.

Lesson:

According to the NIST, no user should be given enough privileges to misuse the system on their own.

Avoid giving one credential access to all of the solutions in your environment. By distributing the access, you force your attacker to work harder and waste time. Giving you more time to respond.

3 – Multi-Factor Authentication

When the hacker found the admin credentials, it was game over for Uber. He could now access anything in the company’s digital environment.

The hacker decided to take a look around. He went from application to application taking screenshots of the company’s data.

After looking around, the hacker announces himself to the company through Slack.

The Hacker Announces Himself: Image by The Verge

According to the hacker in a later report on why he targeted Uber, he said that it was for “fun”.

Lesson:

Note that the hacker was able to access all of Uber’s services with only a username and password. This is a massive security mishap.

By not implementing multi-factor authentication you allow hackers easier access to your application. Whenever possible, always put in place multi-factor authentication.

Conclusion:

There are about 2,200 attempted attacks every day.

Implementing basic cyber security principles is non-negotiable.

We continue to give more and more sensitive information to companies like Uber. Giving plenty of motivation to hackers who aren’t doing it for “fun”.

But by continuing to analyze how these attacks happen, we can prepare.

Blurry Photos? 4 Tips To Get Sharp Photos Today and Forever!

Nothing is as seemingly painful for a photographer than getting back from a long shoot only to realize that all the photos that you took are blurry. Adding salt to the wound, the photos that you were especially excited about are the worst.

We’ve all been there learned those hard lessons. But I would argue that this is not the worst thing ever, actually I would say that it’s a great thing! You want your photos to be sharp and be able to replicate that every time. This indicates that you have a need to strengthen your skills and knowledge as a photographer. With this list, soon you’ll be taking razor sharp photos.

If you are in a rush, check below for an overview of all the points in the list. Please feel free to jump around to each of the points as they pertain to you.

Solution overview

  1. Slow Shutter Speed
  2. Auto Focus (Single Point)
  3. Caffeine / Too little Food
  4. Image stabilization 
  1. Shutter Speed 

One of the most common problems that new photographers run into while trying to take sharp photos is shutter speed. A slower shutter speed can cause shaking and image blur. While in certain cases image blur can be an extremely creative tool, however, if undesired it can be extremely unfortunate. A common rule of thumb is that if you are walking about and trying to freeze motion completely in your image 1/250 shutter speed is a great option.

If you are in a low-light scenario or need more light and can’t change your ISO and aperture then “really cutting it close” would be don’t go below the reciprocal of your focal length. An example is if you are using a 50mm lens try not to go below 1/50 shutter speed. That being said, keep in mind that even shooting at this shutter speed can be difficult.

Photo By Julien Dumas
  1. Auto Focus

Another common problem that many photographers run into when dealing with blurry photos is with focus. To save a lot of head ache and time, use auto focus (if available) rather than manual focus. Modern cameras are so good at focusing correctly that even the cameras themselves are able to see things that we can’t. Generally you can enable autofocus by switching the button from MF to AF on your camera lens.

Photo By Maxime Doré

Now, when you half press the shutter button your camera will automatically look for a point to focus on. As great as this is, if you do not indicate which specific point to focus, your camera might try to pull a different part of the image into focus. You can solve this by enabling single point auto focus. Single point auto focus will tell the camera exactly on which point you want to focus.

Photo By Digital Photography School

For the final step, you will need to choose what kind of autofocus you want the camera to use. As a quick overview, you will most likely use only two, One-shot and Continuous (also called AI Servo). Most of the time you will use one-shot. However, if you have a subject that is moving a lot and you want the camera to keep track of that subject then use continuous autofocus.

Photo By Canon.com

(Note) There are certain situations in which manual focus would be preferred like in astrophotography and atypical lighting. However for the majority of the time you can reliably use auto focus.

  1. Food / Caffeine

This point might seem abnormal at first, but limiting your caffeine intake and having something to eat before you shoot can be just as effective. Even if you feel as though you have a high caffeine resistance, your hands can still be shaky from the caffeine. Similarly if you haven’t eaten much, your photo could be affected by hunger shakes.

Photo By Nathan Dumlao

You might be tempted to think “I could just increase my shutter speed to account for the hand shake.” and for the majority of the time you can. But you might find yourself in a situation where there’s not enough light to account for the shaking.

General tips, try to not intake caffeine within 4 hours of a shoot. Similarly try to pack a snack in your bag that can act as quick and easy calories to help stave off hunger shakes. I personally like to keep a couple bananas and a granola bar since they’re not messy and don’t leave a lot of residue on the fingers.

  1. Image stabilization

For the last point I would like to touch briefly on in camera body and lens image stabilization. Most modern lenses and cameras have image stabilization that helps the photographer get sharp shots in less than ideal shooting situations. Uneven terrain, a strong gust of wind, and even a car horn honking can make you move just enough to make the image blurry.

Photo By Zack Sutton at LensRental.com/Blog

Some camera bodies and lenses can even work together to provide even better stabilization. Check with your users manual and online to see if you can utilize this feature. If not, try enabling the in camera body stabilization. For lenses, typically there is a switch on the side to toggle the stabilizer on and off. Once both are turned on, you will have stabilization from 2 different points.

Conclusion

If you apply all or even some of the points listed above your photos will not only dramatically increase in sharpness, but you will have greater control over the result of the image taken. While this list is not exhaustive, these are some of the things that have helped me with taking sharper images. Let me know in the comments what are some of things that has helped you take sharp photos!

-Steven

Prime Lens – What You Need To Know

You did it! You have finally decided to buy a DSLR/mirrorless camera. Everything is going great, you are taking amazing photos and you start to wonder where has this interest been your whole life.

Then you start to notice your photos, although amazing, don’t have the rich creamy bokeh that you see in other photos. On top of this, you start to feel a little disconnected from photo taking process. It doesn’t feel as exciting as when you started.

This feeling is normal and in fact, is a great thing! It means you have outgrown your kit lens and it’s time to invest in a prime lens.

Congratulations!

But what is a prime Lens?

Unlike a zoom lens, which has a variety of focal lengthens, a prime lens only has one. Yep, just one! This means that in order to get closer to the subject you would need to “zoom” with your feet. This can be quite jarring to photographers who are used to standing in one place and moving the focus ring to get closer. While at first, this might seem to limit, it can actually be quite beneficial.

Pros for Buying a Prime Lens

  1. Budget Friendly

When deciding between choosing prime or zoom, your budget can be a huge factor. Quality zoom lenses are often a lot more expensive than buying a quality prime lenses.

An important question to ask yourself when deciding to buy a prime lens is, do I want/need multiple focal lengths that are good or one that is amazing? Answering this can help a lot with knowing what kind of lens you would need and potentially save you a lot of money.

  1. Faster Aperture – Better in low light

Another pro, when buying a prime lens, is the ability to have a wider aperture. This means more light can enter the camera. Why does this matter? Being able to shoot in low-light settings without having to crank up the ISO can be for a lot of photographers a huge selling point. Less ISO generally means less noise in the photo, which often can be distracting for the viewer.

Because the camera can take in more light, a higher shutter speed can add more options to the photographer’s tool belt for creative expression.

  1. Improves Your Creative Eye

My last point, if not the biggest reason to buy a prime lens, is that you will greatly improve your ability to take more engaging and powerful photos. Being reduced to a single focal length can be a bit of a challenge. But by being forced to one length you will have to move physically, which in turn will expand your ability to capture subjects in unique compositions that you wouldn’t have thought of initially. This is an incredibly important skill to have not only for beginners but also for advanced photographers who feel that they are stagnating in their creative development.

What Now?

By now you should be asking yourself, what kind of prime lens should I get? There are so many to choose from. There are however two focal lengthens that are fantastic go-to options. Primes are not only extremely versatile but affordable as well. These are the 50mm and the 35mm.

(Important Note)

When referring to focal lengths I am referring to these lengthens for a full-frame sensor. If you were to buy a 50mm camera that has an APS-C sensor you would instead have a length of ~75mm. When you are buying a prime lens make sure to take into account the sensor size of your camera. In this guide, we are using the full frame equivalent.

Which one should you buy?

For your convenience, I have compiled a list detailing some of the pros and cons of the 2 lenses.

35mm

Pros:

  • Closest length at which we naturally see
  • Provides a classic look that many photographers use
  • Easier to use in tight spaces

Cons:

  • Some distortion for close-up portraits
  • Not as much depth of field as the 50mm
  • Generally can be more expensive than a 50mm

Photo By Tobias Tullius

50mm

Pros:

  • Can achieve amazing bokeh.
  • Cheaper than most other prime lenses.
  • An amazing go-to for portraits.

Cons:

  • Not able to capture as much of a scene as a 35mm.
  • Harder to use in tight environments.

Photo By Digital Rev TV

Closing Thoughts

Whichever lens you should buy really comes down to what kind of photography you shoot the most. Do you like shooting portraits and need amazing bokeh for food photography, A 50mm would be a great option. Or, do you find yourself wanting to capture more of the scene and are able to shoot in less-than-ideal environments, A 35mm might work better for you.

But it all really comes down to you, yes you. You could have all the best gear in the world but still take less-than-average photos. The greatest photos that you think you’ve ever taken are probably memorable not because of what gear they used, but rather the story and felt it communicated to you.

All the best!

-Steven Hopkins