Newsletter Subject

Bits: Preventing Hacking From Happening to You

From

nytimes.com

Email Address

nytdirect@nytimes.com

Sent On

Thu, Mar 9, 2017 07:33 PM

Email Preheader Text

View in | Add nytdirect@nytimes.com to your address book. Thursday, March 9, 2017 Attendees at the M

View in [Browser]( | Add nytdirect@nytimes.com to your address book. [The New York Times]( [The New York Times]( Thursday, March 9, 2017 [For the latest updates, go to nytimes.com/bits »]( [Attendees at the Mobile World Congress show in Barcelona last month. There are steps you can take to shield your device from hackers.]( Attendees at the Mobile World Congress show in Barcelona last month. There are steps you can take to shield your device from hackers. Credit Emilio Morenatti/Associated Press [Tech Roundup]( The [documents revealed by WikiLeaks]( that indicate the Central Intelligence Agency has been sitting on a collection of spy-friendly software vulnerabilities are certainly intriguing. More worrisome, perhaps, is the question of who else knows about these security weaknesses. Hackings are rarely discovered in a secure facility accessed only by spooks. They are more often than not found in the online bazaar of hackers and cyberweapons dealers trading security information for fun and profit. And the C.I.A. is hardly the only intelligence agency looking to acquire that information. It is safe to say that intelligence and law enforcement authorities from most countries — not to mention a wide array of hackers — are on the lookout for ways to break into smartphones and other security devices. So what should you do about it? [The Times’s Brian X. Chen offers a few tips]( First, update your software if you are using an iPhone or an Android phone. Most of the breaches described in the documents appeared to target older software. On your personal computers, also make sure you have the latest operating system and antivirus software. You should also update the firmware in your router. The bad news? If hackers can really turn Samsung TVs into monitoring devices, there is no easy solution. Samsung says it is looking into the issue. — Jim Kerstetter Read More Tech Fix [With Claims of C.I.A. Hacking, How to Protect Your Devices]( By BRIAN X. CHEN Want to protect against surveillance through your iPhones, Android devices, Wi-Fi routers and Samsung televisions? Update, update, update. [WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says]( By SCOTT SHANE The WikiLeaks founder said the group would work with Apple and Google to give them “exclusive access” on the technical details that have allowed the C.I.A. to hack their devices. ADVERTISEMENT HOW ARE WE DOING? We’d love your feedback on this newsletter. Please email thoughts and suggestions to [newsletters@nytimes.com](mailto:newsletters@nytimes.com?subject=Bits%20Newsletter%20Feedback%20223). More From The Times [Uber Seeks to Prevent Use of Greyball to Thwart Regulators]( By DAISUKE WAKABAYASHI In the wake of a New York Times article about the tool, which appeared to allow drivers to avoid officers in Oregon, the company said it was conducting a review of how it is used. Wheels [Cars Will Talk to One Another. Exactly How Is Less Certain.]( By JOHN R. QUAIN A federal agency’s plan to require communication hardware in future cars is spurring efforts to have vehicles not only see, but talk, to reduce collisions. Ask The Wirecutter [Thinking of Rigging Your Home With Smart Devices? Start Here]( By DAMON DARLIN There’s an abundance of electronics designed to simplify home life. The Wirecutter’s smart home editor explains how to decide which devices are for you. [Jay Y. Lee, Samsung Leader Facing ‘Trial of the Century,’ Denies Charges]( By JONATHAN SOBLE In a preliminary hearing, the de facto chief of South Korea’s largest conglomerate, and four others, disputed accusations of corruption and other abuses of power. Street Scene [Valuation Shell Game: Silicon Valley’s Dirty Secret]( By WILLIAM D. COHAN Private companies must hire outside firms to value shares issued to employees, but it is a costly and complex process that yields curiously precise numbers. Adventures in Capitalism [White House Echoes Tech: ‘Move Fast and Break Things’]( By CHARLES DUHIGG Defying political norms, President Trump has embraced the philosophy of disruption and management styles that have powered successful start-ups. Tech Tip [Tweaking Alerts From Google Calendar]( By J. D. BIERSDORFER You can adjust settings to give yourself more notice about meetings recorded in your calendar. ADVERTISEMENT LIKE THIS EMAIL? Forward it to your friends, and let them know they can sign up [here](. FOLLOW BITS [Twitter] [@nytimesbits]( Get more [NYTimes.com newsletters »]( | Get unlimited access to NYTimes.com and our NYTimes apps. [Subscribe »]( ABOUT THIS EMAIL You received this message because you signed up for NYTimes.com's Bits newsletter. [Unsubscribe]( | [Manage Subscriptions]( | [Change Your Email]( | [Privacy Policy]( | [Contact]( | [Advertise]( Copyright 2017 The New York Times Company 620 Eighth Avenue New York, NY 10018

Marketing emails from nytimes.com

View More
Sent On

08/12/2024

Sent On

08/12/2024

Sent On

07/12/2024

Sent On

07/12/2024

Sent On

07/12/2024

Sent On

07/12/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.