Month: June 2022

Safeguarding your business: simple and effective steps to mitigate corporate identity theft

Here are the steps to protect your business from corporate identity theft.

Identity theft is often thought of as a crime that only affects individuals. However, businesses of all sizes, including sole traders and large corporations, are also at risk. Corporate identity theft is becoming increasingly common, with scammers conducting thorough research on their targets before striking at the right moment. The consequences of such crimes can be catastrophic and potentially result in significant job losses. So, what measures can be taken to combat corporate identity theft?

What is corporate identity theft?

Cybercriminals are becoming increasingly sophisticated in their tactics to infiltrate corporations and organizations. While hacking for industrial secrets and ransomware attacks are common methods, they are now using other techniques that target the weakest link in every computer network: people. By exploiting the human element, these cybercriminals are able to gain access to sensitive information and systems. 

One of the most common outcomes of this type of attack is corporate identity theft, also known as business identity theft. Cybercriminals can gain access to a few basic company details or spend time mining data from key individuals in order to impersonate the company. This can result in financial loss, damage to the company’s reputation, and even legal action. It’s important for corporations and organizations to be vigilant in protecting their sensitive information and educating their employees on how to identify and prevent these types of attacks.

Why are businesses often targeted?

One of the main reasons for identity theft in the business world is the amount of money involved. Businesses often have a significant amount of cash at their disposal, which criminals can easily repurpose. For example, criminals can pose as a legitimate company and purchase goods in bulk, such as computers or other hardware, which can easily be resold for profit. The criminal can do this without being detected until it is too late, leaving the legitimate company with a significant financial loss.

One of the reasons why large purchases made under a company account are more susceptible to fraud is that they are less likely to be treated with suspicion. Automated payment monitoring services can help individuals avoid credit fraud, but they are less effective for corporations with huge balances and regular purchasing. This makes it easier for criminals to make fraudulent purchases without being detected, as these transactions are less likely to be flagged as suspicious by payment monitoring systems.

Overall, businesses need to be vigilant and protect themselves from identity theft, such as implementing fraud detection mechanisms and regularly monitoring their financial transactions.

(Image credit: wk1003mike / Shutterstock )

How they do it

What approaches do identity thieves use when targeting corporations?

SIM card swapping: thieves can gain a foothold using this scam. All it requires is to call the mobile network provider to cancel a SIM card and transfer data to a new SIM. Any two-factor authentication protection on corporate accounts sent by SMS can be intercepted.

Whaling: this is a form of phishing targeted at businesses and organizations. We usually think of phishing as a scam targeted at domestic settings over the home phone or email. However, larger targets with a far more significant potential windfall are increasingly pursued. For example, fake emails, spoofing websites, and identity theft have been used to access business accounts.

Business Email Compromise: targeting executives and employees concerned with finance and wire transfers, this scam requires careful research by the cybercriminal. All it needs is to gain access to an email account and arrange the diversion of funds under the auspices of an “urgent” payment or transfer. Successful execution can involve phishing and impersonating CEOs, attorneys, high-level personnel, or keyloggers.

 Typical effects of identity theft on a business 

What happens when a business is struck by identity theft? While seen as a “victimless crime” by the perpetrators, this doesn’t tell the whole story. Businesses hit by the identity theft can struggle, resulting in:

Lost alary: loss of income can result in difficulty or inability to pay employees, contractors, stakeholders, and partners. The fallout from this can often be redundancies.Tax disputes: tax may be unaffordable. Alternatively, if a business identity is used to file a fraudulent return, the tax department will penalize it.Lost reputation: once hit by a business identity scam, it can be challenging to be taken seriously in the future. Further, any crimes or underhanded behavior carried out under the business’s name will be treated with disdain. As a result, the company could be destroyed.

Further, small business owners can be hit by personal liability. With typically smaller cybersecurity budgets, this can prove devastating.

How to reduce the impact of corporate identity theft

Dealing with corporate identity theft brings many challenges.

1. Increase awareness

Easily accessible information such as revenues, profit margins, company records, and tax IDs can be used to subvert a company’s identity. These details cannot be hidden or suppressed in usual circumstances, resulting in an attack vector that cannot be defended. The best solution here is to increase awareness at all levels, particularly those that handle financially sensitive emails and logins.

2. Initiate procedures and stick to them

Corporate identity theft typically involves an email or phone call requesting the transfer of funds. Anything can happen once the system is breached, which is why initiating agreed procedures and protocols for monetary transfer is vital. This way, you reduce the likelihood of a third-party diverting valuable company funds.

3. Enhance system access with biometrics 

Biometric information can step up system security and add an extra level of authentication. While this may not reduce faked emails demanding an urgent transfer, it can help reduce unauthorized access to a network system, e.g., from a third party illegally accessing a procurement system.

4. Reduce who has access to the purse strings

Corporate identity theft often affects businesses with vast budgets across countless directors and senior personnel. No one knows where the money is kept, but they all have access to it, with individual departmental budgets and free rein on spending. Cybercriminals love confusion, and this is the perfect opportunity. 

5. Double-check everything

This is as important for giant corporations as it is for small businesses. Ensure that every email, phone conversation, and bank and business transaction is made with a verified contact. Doing so can considerably reduce exposure to corporate identity theft. Make things too tricky, and cybercriminals will move on to a new target.

(Image credit: Pexels)

Protect your colleagues from corporate identity theft

Corporate identity theft is a serious risk that can have devastating consequences for any business. It involves the theft of a company’s identity, often through the use of fake emails or other fraudulent means, with the aim of stealing sensitive information such as financial data, customer records, and trade secrets. If this information falls into the wrong hands, it can cause significant harm to the company and its employees.

The consequences of corporate identity theft can be far-reaching. Entire departments may need to be shut down, operations may need to be paused, and in extreme cases, the company may even collapse. It can also result in loss of trust and reputation damage, which can be difficult to recover from.

It’s important to remember that protecting against corporate identity theft is not just the responsibility of the IT department. It requires a group effort from all employees, as one wrong click on an unsolicited email can unravel everything. This is why it’s essential for companies to provide regular training and education to their employees on how to identify and avoid potential threats, as well as implementing strong security measures to prevent any unauthorized access to sensitive information.A risk to everyone you work with, corporate identity theft could result in entire departments being closed, operations pausing, or even the complete collapse of a business. One wrong click on an unsolicited email can unravel everything.

Protection against corporate identity theft is a group effort, so be vigilant, attend regular network security training, and encourage your colleagues to protect themselves and each other from suspicious emails and other phishing techniques.

More from TechRadar Pro

We’ve put together a list of the best business laptops available nowKeep your devices protected online with the best antivirus softwareSecure your files on the go with one of the best secure drivesWe’ve also highlighted the best identity theft protection

Read More 

Identity protection essentials: 5 trusted tools and services you need

These resources will assist you in being proactive about safeguarding your online identity.

You may have come across a lot of information on how important it is to safeguard your identity from scammers and identity thieves. It’s true that even the slightest bit of information about you can be used by cybercriminals to commit identity fraud. But how can you prevent your identity from being stolen? To begin with, you can utilize various tools and services that are available to help protect your identity.

1. Identity theft protection and monitoring

Let’s discuss the most obvious solution – identity theft protection. What exactly is it, where can you find it, and how much does it cost? 

Identity theft protection is usually included with bank accounts and credit cards. The service providers will monitor your account for any unusual or suspicious activities and will contact you immediately in case of any such event. 

You can also take the responsibility to keep track of your bank and credit card statements, whether on paper or online, to ensure that everything is safe and secure. Some companies also provide easy access to your credit agency, enabling you to check for any new credit applications in your name. 

SMS alerts are a great feature introduced by banks and credit card companies. You can configure these alerts to receive instant notifications if your account goes overdrawn or a maximum spend limit has been reached. 

It is advisable to avoid ID fraud insurance as it only helps with the expenses involved in sorting out the consequences of ID fraud. It doesn’t reimburse your bank account or credit card. However, if your identity theft was not caused by personal negligence, your bank will cover the cost of the fraud.

2. Secure authentication

It’s important to remember that your personal information can be stolen from any device you use, such as a laptop, desktop, tablet, smartphone, or smartwatch. To prevent this from happening, it’s essential to set up secure authentication. Depending on your device and capabilities, this can be in the form of a password, PIN, thumbprint, or fingerprint recognition. However, avoid unlocking shapes or gestures on your phone or tablet, as finger grease can leave a trail that makes it easier for hackers to guess your code.

In addition to securing how you access your devices, setting up two-factor authentication wherever possible is always a good idea. This extra layer of security requires more than just your password to gain access to your account. It could be a one-time passcode generated by a mobile app or a link sent to your email.

By securing your login authentication, you can help protect yourself from identity theft and keep your personal information safe from hackers.

(Image credit: Shutterstock)

3. A VPN

It is important to note that while VPNs are often considered a solution for all privacy and security concerns, they excel at one thing in particular: encrypting your data. This is especially important if you use public Wi-Fi, as it can prevent others from observing your activities and potentially stealing your login credentials or other sensitive information. By encrypting your data, password sniffers cannot collect any usable information.

To ensure your safety, it’s recommended to use a VPN on any device you may use on a vulnerable network. This includes your laptop, smartphone, and tablet.

If you’re not already using a VPN, it’s a good idea to start. Many VPNs offer support for multiple devices, and monthly subscriptions often cost less than £10.

Check out our complete list of the best VPN services

4. Antivirus and online security software

It is essential to have antivirus software installed on every computer and mobile device that you use. While Windows comes with onboard antivirus and malware software called Windows Defender, mobile devices are less secure. Online security software can detect malicious websites and phishing links and clean up malware from your PC or smartphone. However, identity theft is a critical risk. 

Scammers often send emails that appear to be from reputable banks, asking you to log in to a fake website. If you fall for this scam, your identity could be stolen. Another risk is malware installing keyloggers on your system, which record your keystrokes, including usernames and passwords. Hackers can use this information to access your accounts and steal your identity. So, staying vigilant and protecting yourself against these risks is important.

Keep your devices safe online with the best antivirus software

(Image credit: Scyther5 / Shutterstock)

5. A password manager

Remembering multiple passwords can be challenging, but using different passwords for every account is essential. Many account breaches occur because the same password is used for various accounts. This practice puts you at risk of identity theft. To improve your security considerably, you need to end this behavior. 

Using a password manager is the best way to remember all your passwords and keep them safe and secure. Even if you can’t think of a password, password managers feature secure password generators that create strong passwords. 

With a password manager, you only need to remember one master password to access the vault. Depending on your device, you may require a thumb or fingerprint to authenticate your access. 

Several password managers are available, such as LastPass, 1Password, and Keeper. LastPass is a reliable and free option (see our LastPass review). However, avoid the password manager built into the Chrome browser, as it’s not considered secure.

We’ve also highlighted the best password manager

Don’t forget education, awareness and vigilance

If you’re using specific tools and services, you have a good chance of avoiding identity theft. However, nothing can guarantee that your accounts won’t be stolen in case of a corporate data breach. Nevertheless, you can take some measures to secure your end. But have you done everything you can? In terms of software and services, maybe yes. But there’s always more that can be done. 

First, you need to be more aware of cybersecurity issues, just as you would stay informed about local crime. Since we’re all members of the digital neighborhood, it’s essential to be aware of new risks and always double-check what you’re doing-especially when considering following a link in an email or text message claiming to be from your bank. Cybercriminals can attack from any angle and use any media, so it’s essential to be prepared for them.

More from TechRadar

These are the best secure routers available nowKeep your credentials safe with one of the best security keysProtect your data on the go with the best secure drivesAlso check our our complete list of the best identity theft protection

Read More 

Know your adversary: exploring the 5 most widely employed tactics in identity theft crimes

It’s important for everyone to know how identity theft is accomplished as it continues to be a growing problem.

To steal your identity, cybercriminals rely on catching you off guard. Even a momentary lapse of attention could result in you giving away the necessary information without realizing it.

Identity theft is a scam that thrives on taking advantage of people when they least expect it. Cybercriminals employ various tactics to steal your identity and access to your bank account. Here are five of the most common identity theft techniques you should know.

1. Phishing

Phishing emails and text messages can trick you into revealing your personal information. Scammers create fake websites of banks, credit card companies, PayPal, and eBay by copying their logos and designs. They then send you an urgent and genuine-looking message asking you to fill in a form with your details. If you fall for it, you give away your data without realizing it.

To avoid phishing scams, be cautious of any message that asks for your personal information. Don’t click on any links in emails or messages that claim to be from your bank, PayPal, or any other financial institution. Instead, open a new browser window and log in to your account to verify the details of the message. Be on the lookout for grammatical, spelling, and formatting issues, which are tell-tale signs of a phishing attempt.

(Image credit: Pixabay)

2. Skimming

Cybercriminals don’t need to physically steal your credit card anymore. They use technology to clone its details. Once they get this information, they can use it to create a duplicate card or use it at the checkout of an online store.

But how is this possible? These days, criminals use lightweight machines that can fit in your palm to clone your card. They read the data from the black strip, which is then used to make a copy. This technique has even spread to ATMs and fuel station forecourts.

To prevent skimming, always keep your card in your hand and avoid handing it over to others. Whenever possible, use contactless payments. Finally, before using an ATM, make sure to check for false facias and skimmers.

3. Social media

Social media exposes you to cybercriminals as it leaks certain information about you. Facebook is a prime example of a platform where your hometown, family, job, and spending habits can be found.

Public profiles, posts, and tags leave you vulnerable to identity theft, as anyone can find out your personal information, including places you’ve been, your residence, your acquaintances, and your date of birth.

Facebook has recently taken measures to enhance user privacy, but, probably, you are not using these settings correctly. To check your privacy settings, review your last Facebook post. If there is a globe icon next to the date, it implies that your post is public.

To protect your social media accounts, secure your account settings, ensuring that all information, photos, and posts can be seen only by friends. Use the “Settings > Privacy” option for Facebook to make the necessary changes. Alternatively, you may consider reducing your friend list or deleting your account.

These are the best social media management tools

4. Shoulder surfing

Scammers can use traditional methods to steal your credit card details instead of relying on technology. One such method is “shoulder surfing,” where they observe what PINs people enter into ATMs and stores. To do this, they need to get very close to the target or “mark.” After all, they are looking over your shoulder!

The perpetrator must have keen eyesight to spot the digits used in your PIN. However, simply memorizing the PIN number is not enough for identity theft.

Understandably, shoulder surfing often leads to more advanced scams, such as skimming or even old-fashioned pickpocketing. Once criminals have both your card and PIN, they hold the advantage.

To prevent shoulder surfing, make sure you cover the keypad when entering your PIN at an ATM or cashier desk.

(Image credit: Shutterstock / metamorworks)

5. Unsecure networks

Despite the advancements in wireless security, unsecured networks still exist. For instance, if you are using an old router at home, it might not provide a secure WPA2 connection, and instead, you might be stuck with a vulnerable WEP connection. Similarly, your local coffee shop, library, shopping center, or even a football ground could be providing incorrectly configured Wi-Fi networks, thereby risking your online privacy. 

There are various risks associated with using unsecured Wi-Fi networks, such as unsecured routers with publicly accessible backdoors that allow your data to be intercepted and read. Additionally, scammers set up fake Wi-Fi networks to trick you into sending your data via their devices. 

To ensure your online privacy, it is essential to make networks secure. Upgrade your router to provide a secure connection if it’s your network. If you’re using a public Wi-Fi network, always use a VPN to protect your data from being intercepted.

Awareness is the key to combating identity theft 

It is possible that you have come across some of the methods used for identity theft. However, you might not have thought that you could be a victim of them. This is because you may believe that you do not have much money in your bank account. Unfortunately, the truth is that it is easier to steal from ordinary people than from celebrities, football players, or wealthy individuals. Therefore, it is essential to be aware of phishing, skimming, shoulder surfing, and the risks of using unsecured networks. Additionally, it is advisable to avoid sharing too much information on social media.

More from TechRadar Pro

Protect your privacy online with one of the best VPN servicesKeep your devices safe with the best antivirus softwareWe’ve also highlighted the best password managerAlso check out our complete list of the best identity theft protection

Read More 

Strengthening security: how digital ID tools are fighting identity theft

Identity theft has become a severe and prevalent issue in recent times.

In 2019, unauthorized financial fraud losses in the UK amounted to £824.8 million, according to UK Finance. Identity theft is a critical contributor to this problem and has become a significant issue in recent years. Anti-fraud measures designed to identify identity theft have forced fraudsters to come up with new and evolving fraud methods that are increasingly difficult to detect and prevent.

For example, in account takeover fraud, criminals utilize information stolen through phishing scams to gain access to an individual’s account and make unauthorized payments or apply for credit. The challenge in detecting this fraud is that it appears as if the customer is logging into their account. Thus, the alarm may only be raised when the customer notices unusual activity on their account.

Synthetic identity fraud, also known as Frankenstein fraud, is even more challenging to detect. Here, the criminal creates a new identity by combining factual information stolen from various sources to create a new persona. Over time, the fraudster builds legitimacy for this identity, becoming a model customer of bank accounts and short-term credit, always paying on time to build their score. Finally, they “cash out” by applying for as much credit as possible, with no intention of ever paying it back.

Recent research has shown that account takeover fraud represents 19% of all third-party fraud. This type of fraud occurs when someone gains unauthorized access to an account by stealing the account holder’s login credentials. Additionally, synthetic ID fraud represents 15% of all UK first-party fraud. This occurs when a criminal creates a fake identity using a combination of real and fake information. Both of these types of fraud are significant issues. Therefore, it is important to find ways to tackle them effectively.

Digital ID tools

Digital identity tools are a crucial weapon in the fight against identity theft. At a basic level, they use a limited set of attributes, such as name, date of birth, credit bureau data, and electoral roll data, to identify the individual in question and determine the probability of them being genuine. But as we’ve already heard, these can be easily stolen or faked.

This is where cutting-edge technology can help. The latest digital identity tools analyze broader attributes from when the ‘customer’ attempts to log in. These can include behavioral characteristics that check against established patterns of behavior unique to an individual – how they enter their details, how quickly they type, how they hold their devices, or physical traits, such as the device they’re using and their location in the world. Measuring these attributes helps companies make a risk judgment even before a successful login and dynamically add additional layers of authentication in milliseconds if there’s any suspicion it’s not the genuine customer.

Other layers of digital security use knowledge-based authentication (KBA), one-time passwords (OTP), and advanced biometrics such as liveness tests and facial recognition to add additional layers of security designed to thwart fraudsters using stolen details. These multifactor authentication methods allow businesses to authenticate people with a much higher probability of success and improve and speed up the experience for genuine customers.

Tackling fraudsters using manufactured identities is trickier, but technology can help. Using artificial intelligence machine learning tools, firms can analyze vast sets of customer data to detect patterns and linkages between common attributes like address and phone number to uncover potential fraud networks that would otherwise remain invisible. 

More from TechRadar Pro

Here’s our list of the best password managers right nowCheck out our list of the best secure password generators aroundHere’s our list of the best security keys on the marketHere’s our list of the best endpoint protection services available

Read More 

How to sleep in hot weather: expert advice on how to survive the heatwave

Learn how to sleep in hot weather with these expert tricks, hacks and techniques.

Managing to sleep in hot weather can be a challenge, as many of you are doubtless discovering right now. While the temperature comes down at night, your bedroom’s still retaining the day’s heat and there’s no air circulating, and as a result you feel far too hot to get to sleep.

Even having the best mattress may not help when the temperature’s through the roof, and once you get to sleep you’re still facing the prospect of a restless night throwing the covers off, as well as the unpleasant possibility of night sweats. Thankfully, though, there are things you can do to improve your sleep while temperatures are through the roof.

To help you get a more comfortable night tonight, we spoke to three sleep experts and a registered nutritionist to get their advice on how to sleep in hot weather. From common-sense tips like keeping curtains drawn during the day, through to more counter-intuitive advice such as taking a warm bath and even munching on chilis, these quick and easy techniques can make a real difference to how well you sleep in a heatwave. Read on to learn more.

Why is it hard to sleep in hot weather?

Your sleep tracker isn’t playing a prank on you: the hotter the weather, the harder it will be for you to fall asleep and stay asleep through the night. Sleep expert James Wilson, AKA The Sleep Geek, explains why: “A drop in core temperature is one of the most important changes our body goes through to prepare us for sleep.

“The hot weather makes the room we sleep in hotter, so this makes it harder for your body to [fall asleep].”

Theresa Schnorbach, psychologist and sleep scientist at Emma Sleep, adds: “Our body core temperature can fluctuate throughout the day… However, in order to wind down for bed and get a good night’s sleep, our bodies also need to do a bit of cooling off.” 

How to sleep in hot weather: quick tips

(Image credit: Getty Images)

Close bedroom curtains in the day to stop heat building up in the room
Open windows on both sides of your home to create airflow
Pop a bowl of cool water or ice in front of a fan to create DIY aircon
Eat foods that cool the body, such as cucumber slices
Sleep naked to help your body self-regulate temperature
Avoid heavy meals before bed as digesting food raises your temperature
Use an ice pack under your armpits or on the back of your neck
Lower your temperature with a lukewarm (not cold) shower before bed
Stay hydrated with water but don’t drink too much just before bed
Invest in a cooling mattress topper

Sleep in a cooler room if your bedroom is still too hot
Ditch the duvet in favour of a breathable flat sheet

1. Prep your bedroom earlier in the day

Sunshine streaming in through your windows first thing is brilliant for helping you to shake off morning grogginess, but don’t allow intense heat to build up all day in your bedroom.

“For the bedroom it’s a combination of creating airflow, whilst blocking direct sunlight that can make the room warmer.” Wilson says. “I would recommend opening the windows on both sides of the house, and when sunlight is directly on the bedroom, shut the curtains, blinds, or shutters. 

“Some people find fans useful, and the white noise can be soothing to some people, although some find the noise annoying [use some sleep earplugs if this is you].” Wilson’s top tip? “Putting some cool water in front of a desk fan can help blow cool air around the room.” 

A tray of ice cubes or an ice pack also works, and if it’s secure and safe to do so, you could position your fan near the window to blow in cooler air from outside once the temperature finally drops at night.

2. Eat cooling foods for cooler sleep

A heatwave is the perfect time to up your intake of cooling foods, and cream of the crop are cucumbers and, er, chilis.

Nutritionist Jenny Tschiesche, who’s currently working with vegan vitamin gummies brand nutriburst, explains: “Cucumber is around 95% water. They provide hydration but also have anti-inflammatory fisetin that can help reduce puffiness, redness and irritability.”

Like your food on the hotter side? Tschiesche says chilis can be surprisingly cooling for the body: “The active ingredient in chilli, capsaicin, triggers the hypothalamus, which is like the thermostat in your body causing you to sweat. This allows you to cool down.”

Try sipping on this cooling cucumber juice tonight…

3. Switch to breathable bamboo bedding

A heatwave is not the time for fleece sheets. For a cooler feel, Hannah Shore, a bedding expert at Silentnight, recommends breathable fibres. “Natural fibres are good at temperature regulating, however some people find these materials a little heavy. If that’s you, opt for polyester as these offer a breathable sleeping environment but won’t be as heavy.”

Wilson roots for bamboo bedding. “Bamboo is great for bedding as it absorbs and wicks moisture really well. Although cotton absorbs moisture well it doesn’t wick it away that great. The higher the thread count when it comes to cotton, the less breathable the fabric.”

4. Avoid heavy meals and caffeine before bed

Learning how to sleep in hot weather requires a touch of diet tweaking. “Lighter meals means easier digestion,” explains nutritionist Tschiesche. “Digestion uses energy and therefore generates heat.”

Caffeine close to bed is a big no-no for sleep anyway, but especially during hot weather. “Caffeine can stimulate the process of thermogenesis which will warm you up. Avoid coffee and caffeinated teas – including green tea near bedtime in hot weather.”

5. Use an ice pack to cool down before bed

Sleep scientist Theresa Schnorbach recommends icing your way to cooler sleep. “Take an ice pack wrapped in a cloth or a towel (never apply an ice pack directly to your skin) and hold it against places where your blood flows closest to the surface of your skin and will quickly cool you off. 

No ice pack? No problem. “You can also use a hot-water bottle filled with cold water or even a damp flannel.”

6. Take a warm shower or bath before bed

Hot weather might have you dialling the shower temperature right down, but a lukewarm to warm shower or bath is more effective at cooling you before sleep.

(Image credit: Getty)

“This might sound counterintuitive,” says Schnorbach, “but cuddling up with a warm blanket or taking a warm shower/bath before bed can help reduce your core temperature by encouraging your blood vessels to dilate, thus losing excessive body heat.”

No time for a bath or shower? Get splashing instead. “You can splash water on pulse points such as your wrists or the sides of your neck. Your body’s blood vessels will react to the cool sensation and instantly bring your core temperature down.”

7. Hot or not, only go to bed when you’re sleepy

Temperatures don’t really drop until later at night during a heatwave, so what happens if it’s still molten hot outside when your bedtime rolls around? Should you ditch the nightly routine to avoid suffering in a hot bedroom? Yes, but get up at your normal time.

“We shouldn’t go to bed if we aren’t sleepy,” Wilson reminds us. “This particularly applies in hot weather and I think people need to listen to their bodies and ensure they are trying to do things that drop their heart rate, be relaxed and drop their core temperature. 

“To ensure we stick to our sleep schedule and allow our sleep pressure to build properly during the day (sleep pressure drives us to feel sleepy at bedtime), even if you go to bed later keep your wake up time consistent.”

8. Don’t drink too much water before bed

“Optimal hydration can certainly help towards better sleep, but being over-hydrated will result in trips to the loo in the night which will disrupt your sleep,” says nutritionist Tschiesche.

Unsure whether you’re drinking enough water for your body weight and height? Try using an app with a hydration-tracking function, such as MyFitnessPal (learn how to use MyFitness Pal here). 

9. Reconsider your mattress

Even the best mattresses can be prone to retaining heat during hot weather, so if you overheat during sleep anyway, or you’re dealing with hot flashes (flushes) or night sweats, look for the best cooling mattress

“Mattresses that include foam, even if it is claimed the foam keeps you cool, are not as good in hot weather as sprung mattresses with natural fillings like wool, alpaca fleece, bamboo or silk,” Wilson says. “You can also get toppers that allow you to set the temperature of your sleep environment for both sides of the bed.”

How to sleep in hot weather: things to remember

As our experts have shared, you’ll stand a better chance of sleeping during heatwaves and hot weather if you prepare for it. That means ensuring your bedroom is protected from intense heat and sunlight during the day, and hydrating your body enough to see you through the night. 

(Image credit: Getty)

Hacking your own aircon with an ice tray or bowl of cool water in front of a fan will blow cooler air around the room, and placing an ice pack under your arms or at the back of your neck can help if you’re having a hot flash. 

Most of all, try to relax and remember that this heat will pass and you’ll be sleeping comfortably again in no time. While good sleep is important, most of us can cope with the odd night of broken sleep. 

Read More 

Your phone, your identity: safeguarding your device from the threat of identity theft

We store a lot of sensitive information on our smartphones, so it’s important to safeguard them from unauthorized access.

Every day, you add more and more information to your phone. Each day, it becomes a more complete digital representation of you. Bank accounts, the PayPal app, even password managers – they’re all there, along with social media accounts, photos … the list goes on.

The implication is clear. Your phone represents a massive risk to your privacy and your identity. Once stolen, a phone can be mined for data that can be used to steal your identity, making you a victim of ID fraud.

A Techradar Choice for Best Identity Theft Protection Aura is an excellent choice thanks to its user friendly interface, antivirus service and detailed reporting dashboard. Save up to 50% with a special Techradar discount. View Deal

Protect your smartphone from theft

The first step in minimizing identity theft via your smartphone is to make it difficult to steal.

To begin with, don’t leave a phone on view in your car. Instead, use a glove compartment or slip it under a seat. Then, if the phone is out of sight, it isn’t a target. The same goes for any device storing personal, identifiable data.

On the street, keep your phone out of view. Don’t wave it around; secure it in the inside pocket of your coat. Otherwise, save it in a secure pouch in your bag, worn securely. Use hands-free Bluetooth earphones to avoid removing the phone to make or receive calls.

You should also be aware of the tactics of street criminals when it comes to stealing phones. They have various tactics to ingratiate themselves into your personal space and help themselves to your belongings. Key examples:

They ask you for the time. While your initial reaction would be to pull out your phone to check, this puts it at risk. So, instead, identify a clock you see from your location or keep moving without responding.

You’re accosted in a crowded place. This can happen without even realizing it. A key example is a moment on a tube train when people enter and exit, dozens pushing past you all at once. It’s a prime opportunity, so keep your phone out of view.

While many of these practices are completely obvious, it is crucial to keep them in mind.

(Image credit: KAUST)

Protect your smartphone secrets

Next, you must ensure that if your phone is stolen, it doesn’t reveal anything an identity thief can use. Various tools and apps can ensure your phone doesn’t spill your secrets.

1. Encrypt your phone

Use your phone’s full disk encryption option to ensure that data cannot be accessed without the correct authentication. All mobile platforms have an encryption option, so take the time to find out how to activate this. If you forget the phone’s password, the data cannot be retrieved once encrypted.

2. Secure authentication

Most phones offer facial recognition, a thumbprint scanner, or the option to enter a secure password. Avoid four-digit PINs and shapes, as these leave a grease mark on the screen, which can be used to crack the code. For convenience and reliability, fingerprint or thumbprint security has proved to be the most effective.

3. Use an app-locking tool

If your phone is stolen and access gained, some apps (such as contacts, email, cloud drives, and social networks) will spill your secrets as soon as they’re launched. You can set individual passwords for sensitive apps with an app lock installed. You’ve probably realized this might prove inconvenient in some scenarios, but overall, it is a good security option.

4. Install an anti-theft app

Tools that detect a change in circumstance can initiate an anti-theft alarm. For example, if a phone is taken off charge, moved, or the SIM card changed without authorization, it can trigger an alarm. Such apps typically feature the option to disarm the alarm or even send it silently, advising a nominated contact (or all of them) that the phone has been stolen.

5. Find and wipe a stolen phone

Find My Device on Android and Find My for iPhone can be used to wipe a stolen phone remotely. Apps like Cerberus and Prey can also do this and photograph the perpetrator using the phone’s camera. If your phone is stolen, you can destroy the data remotely via a web app.

All these tools can be used to protect your phone from unauthorized access. If you’re reluctant to utilize any of them, use disk encryption and your platform’s phone discovery service.

Be aware of phone account identity theft

A whole other type of identity theft surrounds mobile phone use. Phone account identity theft occurs when a cell phone is bought in your name without your knowledge. You might have been a victim of this, or your address might have been used with another person’s name. This is a common tactic to use a superior credit rating and acquire finance to buy a phone.

Phone account fraud happens by stealing a victim’s identity in one of two ways:

Dark Web sites with databases full of stolen account details are visited, details bought, then used to buy a phone, with the bills all charged to the victim.Phishing can be employed to trick the victim into divulging personal details required to open an account. These are then taken to a smartphone retailer, accompanied by a fake ID and a phone bought.

This type of identity theft you should be able to spot quickly. When the account statement arrives, get in touch with the mobile phone network and report the contract as fraudulent.

(Image credit: Pexels)

Shield your identity from theft – secure your phone

With so much of your personal information in your pocket, it makes sense to understand the risks and take precautions to secure your phone.

By now, it should be obvious that protecting your phone is a crucial step in the fight against identity theft. So follow these steps to ensure it never leaves your sight, remains utterly secure from unauthorized access, and doesn’t leak your data to identity thieves.

More from TechRadar Pro

Protect your devices online with the best antivirus softwareThese are the best mobile VPN apps aroundWe’ve put together a list of the best password managersWe’ve also highlighted the best identity theft protection

Read More 

Samsung Galaxy Fit 3: the latest rumors and what we want to see

The Samsung Galaxy Fit 3 could be on the way as an upgrade to the Fit 2.

Considering that the Samsung Galaxy Fit 2 launched all the way back in September 2020, we thought Samsung had forgotten all about this line of fitness trackers – but recent leaks and rumors suggest that a Galaxy Fit 3 is indeed on the way.

We don’t have a whole lot of information about what to expect, but we do have some interesting predictions and tips to sift through. If you’re going to be after an sophisticated fitness tracker sometime in 2024, this could be an option.

Besides collecting what details we have heard so far, we’ve also put together a wishlist for what we want to see from the Galaxy Fit 3, just in case Samsung is reading and can make a few adjustments to the finished product.

Cut to the chase

What is it? Samsung’s next compact fitness trackerWhen is it out? 2024 looks likelyHow much will it cost? Maybe around $120 / £80 / AU$270

Samsung Galaxy Fit 3 release date and price

While earlier rumors had pointed towards a launch for the Galaxy Fit 3 in the first half of 2023, that clearly didn’t happen. In fact, it doesn’t seem as though a the wearable is going to show up in 2023 at all.

Considering that the device is now showing up at regulators suggests that a launch isn’t too far off now, but at this stage we’re probably looking at 2024. Indeed, it might even appear alongside the Samsung Galaxy S24 in January. The tracker has now also shown up in a Bluetooth database too.

As for pricing, we had initially expected the Fit 3 to match the starting price of the Fit 2: specifically, $59 / £39 / AU$135. However, the most recent leak in this area suggests the new fitness tracker might cost twice the amount of its predecessor.

The Galaxy Fit 3 might cost double the Fit 2 (Image credit: Michael Sawh)

Samsung Galaxy Fit 3 news and leaks

While there aren’t a huge number of leaks around the Samsung Galaxy Fit 3, there are some. We’ve seen leaked renders from two sources, both of which show off a larger screen than the 1.1-inch display on the Galaxy Fit 2. It looks as though the fitness tracker is veering into smartwatch territory.

On the right of the device we can see a physical button and a hole for the microphone, and the rumored colors are grey, gold and black – nothing to get too excited about there, but sensible choices. Of course these are all unofficial renders, so don’t take anything as confirmed right now.

Samsung Galaxy Fit 3 Renders#SamsungGalaxyFit3#Samsung pic.twitter.com/RN90KG1Y5fNovember 9, 2023

See more

Almost everything is getting generative AI added to it at the moment, and the thinking is that the larger screen could enable some kind of AI assistant on the fitness tracker. AI upgrades are also being talked about for the Galaxy S24, and Samsung is clearly keen on the technology.

One other leak concerns the battery, which is apparently going to be significantly bigger in terms of capacity than the Samsung Galaxy Fit 2. However, that might not be as beneficial as you think in terms of battery life – if the new tracker does indeed come with a bigger screen, that will need more power to run.

What we want to see

The Samsung Galaxy Fit 2 is a decent wearable, achieving 3.5 stars in our review, but that also means there’s plenty of room for improvement, which the following features could help with.

1. More accurate heart rate monitoring

A reliable heart rate monitor is a near essential feature for any fitness tracker, and yet it’s something the Samsung Galaxy Fit 2 lacks.

Sure, it has a heart rate monitor, but in our tests we found its readings for both resting heart rate and exercise were way out compared to other devices. So it’s vital that Samsung improves this for the Samsung Galaxy Fit 3.

2. GPS

The Samsung Galaxy Fit 2 doesn’t offer GPS (Image credit: Michael Sawh)

The Samsung Galaxy Fit 2 doesn’t include GPS, and while that’s perhaps understandable given the low price, it’s a really useful feature to have.

So we’d like Samsung to add it to the Galaxy Fit 3, or at the very least add connected GPS, so the tracker can piggyback off your phone’s GPS connection.

3. Better battery life

The Samsung Galaxy Fit 2 actually has quite solid battery life, but going by our tests it’s a long way short of the company’s claims. Samsung claims it can last for over two weeks, but we found a daily drop of around 10% with typical use and up to 20% on days when we exercised for longer periods. That means the actual battery life is likely to be more in the region of 5-10 days.

So for the Samsung Galaxy Fit 3 we want a wearable that genuinely does last for at least two weeks, without having to seriously limit your use of it.

4. An always-on display

There’s no always-on display option for the Galaxy Fit 2 (Image credit: Michael Sawh)

An always-on display isn’t really an essential feature for a fitness tracker, but it is nice to have, as it means you can always see the time and other key information like notifications.

Of course, this can also harm the battery life, but a well implemented always-on display doesn’t have to be a major drain, and we’d want it to be a feature that you can turn off, so you can choose whether you want to take that battery life hit or not.

5. An altimeter

An altimeter is another thing that’s not really essential, but it is a useful perk on any sort of fitness tracker, as it allows you to track elevation.

It’s another thing that’s not offered on the Samsung Galaxy Fit 2, but we hope that it will be offered on the Samsung Galaxy Fit 3.

These are the best cheap fitness trackers

Read More 

Fortress of protection: how organizations and individuals can safeguard against identity thieves

Protecting yourself from identity theft in a world after the pandemic.

In today’s world, it’s easier than ever for criminals to steal personal information because of the COVID-19 pandemic. Many employees are working from home, which makes them more vulnerable to social engineering attacks. Moreover, sensitive information that was once protected by secure corporate networks is now accessible from unsecured home networks.

In addition to this, many companies are moving their operations online, and regulators are not yet enforcing remote security procedures. This means that valuable data can be accessed through devices on a primary home network, making it easier for cybercriminals to launch attacks.

Therefore, IT teams must educate and prepare their remote workforce to deal with these increasingly sophisticated attempts at identity theft.

Before we discuss how to protect against it, it’s essential to understand the two main ways that cybercriminals steal identities.

A Techradar Choice for Best Identity Theft Protection Aura is an excellent choice thanks to its user friendly interface, antivirus service and detailed reporting dashboard. Save up to 50% with a special Techradar discount. View Deal

Social engineering

Intruders who seek to perform identity theft usually start by using social engineering. This involves stealing minor information that is specific to the user they are targeting. They then use this information, along with intimidation tactics, to create a narrative with the user, such as requests from a bank or a trusted brand asking for verification or answers to security questions. Once the victim shares this information, the attacker can use it to take total control of the user’s online identity and cause chaos throughout the enterprise network.

Home network devices

With most, if not all, of the average workforce now being based at home, cybercriminals can bypass the more robust security of the physical office perimeter and find a way in through a less secure device sitting on the same home network as a company laptop or tablet. This is particularly concerning for banks and other financial organizations housing lucrative data. Once an attacker breaks into the network, they can move laterally throughout the network and do what they do best.

With these routes to identity theft acknowledged it’s up to IT teams to create strict procedures that enforce the best possible defense and ensure users accessing the network are equipped to correctly identify and mitigate threat attacks in the case that these defenses don’t work.

As always, the first and most effective thing IT leaders can do is create an atmosphere of caution amongst their colleagues. This means adopting a ‘zero trust’ approach to business communications – digital or otherwise. If users aren’t expecting an email asking for specific information, they should phone the sender to verify the request. That goes for any communication – if there is a second way of authenticating the person at the other end of the email or phone, it must become second nature. It is a straightforward method, but it’s also the most effective. It’s awareness like this, almost common sense, that is often lost as businesses scramble to digitize themselves. Despite all of the security solutions available, humans still play a pivotal role in defending or failing an organization. Attackers will remember this, but organizations often forget.

Another vital tool in any defense is multi-factor authentication. By requiring more than one set of data from a user looking to access sensitive files or networks, the chance of a successful breach due to identity theft is immediately reduced. So, if your online identity is stolen, multi-factor authentication acts as a final safety net. If you can’t identify somebody, you can’t authenticate them. If you can’t authenticate them, you can’t provide the correct actor privilege level – which is how these compromises typically occur.

Network segregation is a reliable way to prevent criminals from accessing and laterally moving through an enterprise network, having accessed it through a weak security point at a user’s home. By providing remote workers with a separate network dedicated entirely to their workloads, IT leaders can remove these new security blind spots – in the form of the connected home – and close one of the prime avenues used by those attempting identity theft.

Stay vigilant

Identity theft attempts and remote working practices are here to stay, though the idea of total protection is gone. Nobody can fully protect, and so we must instead focus on defending for the inevitable. Beyond the above actionable tips for combating identity theft, IT teams and their organizations must embrace a larger sense of vigilance, awareness, and consistency when composing themselves and interacting with others online.

More from TechRadar Pro

Here’s our list of the best secure router on the marketCheck out our list of the best VPN services on the marketWe’ve built a list of the best encrypted messaging services aroundWe’ve also highlighted the best password manager

Read More 

The truth about identity theft protection and credit monitoring: do they really work?

We’ve analyzed the advantages and disadvantages of signing up for identity theft protection and credit monitoring.

Identity theft is a growing concern for everyone, as it can cause serious financial and emotional damage. Companies that offer identity theft protection and credit monitoring services claim to safeguard your identity and credit score by constantly monitoring your personal information and alerting you to any suspicious activity. These services can be expensive, and it’s important to understand whether they’re worth the investment. 

While they can certainly provide an added layer of protection, it’s important to note that no service can guarantee 100% protection against identity theft. Additionally, there are many steps you can take on your own to protect your identity, such as monitoring your credit reports regularly, being cautious of phishing scams, and creating strong passwords for all of your accounts. Ultimately, it’s up to each individual to decide whether the cost of identity theft protection is worth the peace of mind it provides.

A TechRadar Choice for Best Identity Theft Protection Aura is an excellent choice thanks to its user friendly interface, antivirus service and detailed reporting dashboard. Save up to 50% with a special Techradar discount. View Deal

What is identity theft protection?

Identity theft protection is a service from financial companies that is designed to protect your ID from theft, thereby avoiding the inevitable fraud that follows.

They typically offer three things:

Monitoring: your credit files are monitored for changes.Alerts: you receive notification of new accounts opened in your name or unusual spending.Recovery: identity theft protection comes with an insurance element covering the recovery of lost bank and card balances and the impact of other fraudulent activity in your name.

You may receive regular emails about identity theft and other privacy-related news if you sign up for a protection service.

Who offers credit monitoring?

If you have decided to pay for credit monitoring, you have several options. As identity theft has increased in recent years, the number of protection solutions has grown.

Where you’re based determines what credit monitoring solutions are available to you. 

For example, if you’re in the US, Norton LifeLock, ID Watchdog, and Identity Force offer comprehensive paid services with various coverage options, with monthly and annual subscriptions to match.

Need something less extensive? Credit Karma is a free service that checks for changes to Equifax and TransUnion reports. This service will send alerts and recommend financial products based on your credit details. As such, it’s an all-in-one credit care tool.

Credit monitoring from Credit Karma is also available in the UK.

(Image credit: Pixabay)

Downsides of identity theft protection

The identity theft protection service you choose primarily depends on your expectations and budget.

Sadly, while all the big names promise much, they have too many differences. ID Watchdog’s premium protection offers fewer services than IdentityForce, so it pays to research which product is most suitable for you. For example, IdentityForce UltraSecure+Credit and LifeLock Ultimate Plus offer family plans, whereas ID Watchdog doesn’t. 

Then there’s the issue of trust, reliability, and transparency. 

For example, while Lifelock Ultimate Plus insurance is designed to reduce public exposure of your details, monitor the Dark Web for your data, and protect stolen funds, it is not without issue. Recent data breaches at LifeLock and Equifax might leave you wondering if they can be trusted.

Finally, these services offer their products at different price points. 

How does credit monitoring work?

Credit monitoring is an essential part of ID theft protection services. It involves monitoring your credit record for any changes and informing you via alerts if there are any unexpected activities. The basic idea of credit monitoring is to keep track of your credit file using data from all available credit agencies. Some companies also offer additional features such as checking if medical care is being received in your name and various insurance protection levels. Notifications can be sent via email or SMS. However, it’s important to note that credit monitoring is essentially a paid service that allows you to have your credit record checked. You can still monitor your credit record, so you may want to consider whether or not you need to pay for credit monitoring.

You can protect your identity for free

While paid solutions seem increasingly common, you may prefer to protect your identity for free. Several free-to-use tools and services let you monitor your credit and protect your ID for no more than the cost of your internet connection. 

Track changes to your credit score: card issuers and some personal finance websites (e.g., Credit Karma) can help you keep an eye on your credit report for free.Report identity theft: government and financial institutions already provide free reporting tools, so there is no need to pay for this service.Freeze your credit file: perhaps the most valuable tool against identity fraud; you should keep your credit file frozen when you’re not applying for credit. 

Does credit monitoring work?

Identity theft is a common problem these days, and credit monitoring is one way to keep an eye on your credit status and reduce the risk of identity fraud. However, it’s important to note that credit monitoring works only if you actively pay attention to your financial situation and regularly check your credit file. It’s crucial to read the alerts sent by credit monitoring services and take the necessary actions to prevent identity theft.

When it comes to choosing an identity theft protection company, it’s essential to do your research thoroughly to ensure that the company provides reliable and effective services. It’s recommended to check reviews of the service to see if it meets your requirements in practice. Ultimately, the effectiveness of identity theft protection depends on the quality of the service provider.

(Image credit: Pixabay)

Should you pay for identity theft protection and credit monitoring?

Can you afford the monthly outlay for credit monitoring? Protection seems a good idea if you’re concerned about identity theft, but is the risk real? Is it worth paying to avoid it? And can paying to stop identity theft stop it from happening?

Identity theft protection services are primarily affordable and can give you good results. But there isn’t a solid reason to pay for a service replicating most things you can do for free. 

Ultimately, if you’re happy to pay and can afford it, then it won’t hurt. However, it’s fair to say that subscription identity theft protection and credit monitoring are little more than digital placebos. You can get better results for free with SMS alerts, improved awareness and vigilance, and better security practices.

More from TechRadar Pro

We’ve rounded up the best secure drives aroundProtect your online privacy with one of the best VPN servicesThese are the best shredders availableWe’ve also highlighted the best identity theft protection

Read More 

Father’s Day sales 2023: the best deals to shop right now

We’re rounding up all the best 2023 Father’s Day sales with deals on tech, appliances, clothing, tools, and more.

It’s officially June, which means Father’s Day sales are starting to arrive from all your favorite online retailers with deals on tech items, tools, appliances, clothing, and more. To help you find all the top offers in one place, we’re rounding up this year’s best Father’s Day sales and stand-out deals on AirPods, coffee makers, tablets, and more.

Below, we’ve listed the best Father’s Day sales that are live from retailers like Amazon, Best Buy, Home Depot, and Nordstrom, followed by our pick of today’s deals, which include record-low prices on Apple devices, air fryers, smartwatches and more. So whether you’re looking for a special gift for dad, browsing to treat yourself, or just looking for a good bargain, our Father’s Day sale roundup has you covered.

Father’s Day is on Sunday, June 18 this year, which means we should start to see more offers drop in the coming weeks. We’ll be updating this page with new sales and deals leading up to Dad’s big day, so make sure to bookmark this guide for all the best Father’s Day sales.

The best Father’s Day sales 2023:

Amazon: 40% off appliances, AirPods, TVs & tools

Adidas: save on sneakers, pants, shorts & more

Best Buy: 40% off iPads, headphones & tablets

Cheap TVs: smart TVs starting at $99.99

Fitbit: up to $70 off, plus free two-day shipping

Gift card: Father’s Day gift cards from Amazon

Home Depot: up to $400 on lawnmowers, tools & grills

Lowe’s: Gifts for dad – tools, lawnmowers, grills & appliances

Macy’s: deals on cologne, shoes, watches & activewear

Nike: 40% off sneakers, activewear, and hats

Nordstrom: cologne, Ray-Ban, Peter Millar & more

Tools: 35% off tools and accessories at Lowe’s

Walmart: gifts for dad starting at $19.99

Father’s Day sales: today’s best deals

Apple Watch 8 (GPS, 41mm), 2022: was $399 now $329 at Amazon
The Apple Watch 8 is one of the best smartwatches you can buy, thanks to its impressive display and new safety and health features, such as fall detection and Emergency SOS. Amazon has the best-selling smartwatch on sale for $329, which is the best deal you can find right now and just $8 more than the record-low price.View Deal

Mr. Coffee Iced Coffee Maker: was $39.99 now $29.96 at Amazon
If Dad’s an iced coffee fan, you can get this nifty Mr. Coffee Iced coffee maker on sale for just $29.99 at Amazon. The compact coffee maker brews in under four minutes and includes a 22-ounce tumbler so you can take your coffee on the go.View Deal

Apple AirPods Pro 2: was $249 now $199.99 at Amazon
Treat Dad to Apple’s best-selling AirPods Pro 2, which are on sale for $199.99 – the lowest price we’ve ever seen. Compared to the AirPods 2 and 3, the AirPods Pro 2 feature active noise cancellation, improved audio quality, and a wireless charging case that provides more than 24 hours of battery life.View Deal

Instant Vortex Plus 6Qt air fryer: was $169.99 now $99.99 at Amazon
We’ve just spotted a record-low price at Amazon on the Instant Vortex Plus – a model we currently have as number one on our best air fryers buyer’s guide. This model yielded awesome results during our Instant Vortex Plus 6-in-1 Air Fryer review, and we were impressed enough to reward it with four and a half stars out of five. Usually, it’s a little on the pricey end, but today’s record-breaking price at Amazon makes it an easy recommendation.View Deal

Bose QuietComfort 45 Headphones: was $329.99 now $279 at Amazon
Bose is no stranger to great comfort and impressive sound quality, and the Bose QC45 doesn’t fall far from the tree, and the headphones are on sale for $279 at Amazon this week. These wireless headphones feature active noise cancellation, a 2-microphone system, and provide 22 hours of battery lifeView Deal

Ring Video Doorbell Wired: was $64.99 now $38.99 at Amazon
Amazon’s Father’s Day sale has the Ring Video Doorbell Wired on sale for a record-low price of $38.99. The Ring Wired allows you to monitor your front door from anywhere and features two-way talk and advanced motion detection and is hard-wired using your existing doorbell for constant power.View Deal

Apple iPad mini (2021): was $499 now $399 at Amazon
Amazon has the 2021 iPad mini back down to a record-low price of $399. You’re getting a powerful A15 Bionic chip, 64GB of storage, and an 8.3-inch Liquid Retina display, making this iPad mini a great choice if you’re looking for a smaller tablet with premium features. This Father’s Day deal is a fantastic buy if you’re looking for a smaller tablet that still packs a fully premium specs sheet.View Deal

Nespresso Vertuo Plus coffee machine: was $159 now $126.75 at Amazon
If you’re looking for a premium coffee maker for Father’s Day, we highly recommend the Vertuo Plus from Nespresso, currently on sale for $126.75 at Amazon. It’s one of the best coffee makers in its budget range, and during our Nespresso Vertuo Plus review, we thought it created some great-tasting coffee without being too difficult to use.View Deal

See more bargains with our roundup of the best cheap TV deals and the best Apple Watch deals.

You can also see upcoming offers at the Amazon Prime Day sale.

Read More 

Scroll to top
Generated by Feedzy