A return is almost always out of the question. Plus, gift givers don’t often include a return receipt, and we all know we wouldn’t dare ask for one. I’d rather admit to a crime than confess I don’t like a gift - how insulting to the gifter’s sense of aesthetics.
And-hey, I have limited drawer space. Who can keep these unwanted gifts for six months when there isn’t any space for them? I hate clutter, and unwanted gifts are just that.
This year, I am making an effort to swiftly remove any unwanted gifts from my house without hurting anyone’s feelings…and potentially benefiting others. As the old saying goes, one man’s trash is another man’s treasure. And thank goodness for that.
From the The Guardian:
“According to research published this week by the consumer body, one in four people (24%) received an unwanted or unsuitable gift for the Christmas of 2021. Meanwhile, a separate study by the personal finance comparison site Finder said £1.2bn was wasted on unwanted Christmas gifts each year.”
Come to terms with the fact that you will never use that gift and follow these quick tips to offload those unwanted gifts:
Sarah Brown via Unsplash
The most obvious choice for those unwanted pairs of mud-green sweat socks and that same fluffy robe you get every year from your Aunt Judy is to donate them. Just round up everything you don’t want and Google the donation center closest to you.
This is also a fantastic excuse to purge your closet of that pile of stuff you’ve been meaning to get rid of. A few bags of give-away-clothes will get your spring cleaning out of the way early.
Artificial Photography via Unsplash
Resale websites are all the rage right now. If you got a pair of pants that don’t fit or a sweater that isn’t your style, resell them on a website dedicated to just that. Sites like Poshmark, Mercari, and DePop are known for selling those trendy pieces of clothing you barely used.
Thrifting has never been hotter. Hop on the trend while people are constantly perusing sites for the hottest deal. Then reward yourself for being so virtuous, by dropping the cash on some fabulous things you’ll actually wear!
Jackie S via Unsplash
If you got something that you think one of your friends or family can benefit from, why not give it to them? There’s no shame in revealing that it was a gift and you don’t want it anymore…as long as you aren’t re-gifting to the person who gave it to you!
Or, keep the gifts to re-gift at a later date. You never know when you’re going to need a last minute gift. You’ll thank yourself later.
Attempt a Return
Erik McLean via Unsplash
If your item still has a tag, you can make a valiant effort to return to the store. If you can make your case, many stores won’t want to fight you on it. They may be forgiving and grant you store credit at the very least.
You know the old saying — an ounce of prevention is worth a pound of cure. Doubly so on the internet.
Having one's digital life hacked is a little like death: We walk through daily life, blissfully unaware of its possibility, while all the while it dangles over our heads like the Sword of Damocles.
Rather than be caught unawares, surrendering bank account information and sexy selfies to nefarious, faceless internet criminals, follow these steps now to protect yourself. You know the old saying — an ounce of prevention is worth a pound of cure. Doubly so on the internet.
Use better passwords
That means no pet names, no birthdays, no kid names. Get creative with a complex string of upper and lowercase letters, numbers, and symbols. You might even think of this as an opportunity to give yourself a motivational phrase like, "Youarebrilliantin2019!" Set up passwords — and different ones! — on your voicemail, Wi-Fi, and individual apps for banking and email.
...and use a password manager
Password managers like 1Password and LastPass make logging into websites simple without leaving yourself vulnerable to problematic browser autofill. One master password gains access to all the others, so you want it to be long and complex with numbers and special characters so not even the most determined hacker can guess it. From there, the password manager takes care of all your other password.
Employ multi-factor authentication
Sheera Frenkel, who writes about cybersecurity for The New York Times, says that a password manager and multifactor authentication "are the bare minimum of what we should all be doing. And even with all that, I just assume I'm going to be hacked any day." Here's how to set up multi-factor authentication on Apple, Google, Instagram, and more.
Keep your operating systems up-to-date
Most successful hacks exploit vulnerabilities of out-of-date operating systems. When Apple or Android tells you an update is ready, download and install it. Ditto with apps. Keep them up-to-date to protect against data breaches, and be mindful which ones you download. No longer using Shazam or Tinder? Delete 'em.
Use "Find My Phone"
You can set your phone to automatically erase itself after a certain number of incorrect passcode attempts. You can also use Apple and Google's "find my device" services, which can locate your phone on a map, remotely lock it, make it ring or the nuclear option — delete it entirely.
Beware open wifi
The danger isn't in your local Intelligentsia — though you shouldn't log into your bank accounts on any open networks — but if you're ever unsure about a wireless network, stick with your phone's mobile internet connection or use a VPN, which routes your activity through a private encrypted connection. Here's a recent rating of VPN services by PC Mag to help you choose.
There's no such thing as 100% security but following these steps will keep your digital data as safe as a citadel.
Do the benefits of knowing a child’s location outweigh the risks of giving that information to hackers?
For busy, working parents, parents of children who take public transportation to school, parents of children with special needs and parents who simply want to know where their children are in case of emergencies, more and more GPS devices promise to track a child's location and broadcast it to the parents' phones. These watches, wristbands and phone-sized devices are immediately attractive to a worried parent. Many offer features beyond tracking, including communication, distress signals, augmented reality, water sensing and more. What parent doesn't want to better protect the children by keeping them away from dangerous places and situations?
But any electronic device is susceptible to hackers and a GPS-enabled communication device attached to a child is dangerous in the wrong hands. How can a parent weigh the benefits of knowing their child's location with the risks of exposing that location to hackers?
It starts with considering the situation: is a GPS tracker really the solution to a concerned parent's worries? Of course, there are unquestionably situations that call for better surveillance of a child's location, like parents who work and children who travel to school by themselves. Communication and awareness are essential to a child's safety. If used responsibly, this monitoring-from-a-distance could even give a child of a certain age more freedom without sacrificing protection.
It is already becoming common for pre-teens to have their own smartphones. A parent can use the phone's built-in features to track the child's location. Cell carriers also offer tracking features, such as AT&T's FamilyMap and Verizon's Family Locator.
But for a younger child without a GPS-enabled phone, a GPS tracker designed for kids might be a quick way to better peace of mind. A parent who's shopping for these trackers (or who's already using one) needs to understand the risks, where they come from and how to defend against them.
Norwegian researches tested four kids' smartwatches last year and were surprised at the lack of security of the devices. They were able to hack into them relatively easily, collect private information, view the user's location and even send false location info to the parent's phone. One watch's SOS function didn't work. Some of the watches' data was transmitted without encryption.
A serious point of danger in some watches is their communication ability. Watches that allow the parent and child to communicate via voice or text can also allow hackers to communicate with the child, pretending to be someone they know.
Last year, the European Consumer Organization's (BEUC) published a warning against smartwatches designed for children. The German telecom agency, Bundesnetzagentur, banned the watches and asked parents to destroy any they'd already purchased. And the FBI issued a general warning against internet-connected devices and the privacy risks that come with them.
It is important to choose a device from a reliable or expert-endorsed company that focuses on security and privacy.
Verizon sells its GizmoGadget for $150. It displays up to ten contacts for one-touch voice calling or sending short text messages. It's waterproof, comes in different colors and even features mini games and fitness challenges, all while tracking a child's GPS location. AngelSense is a GPS and voice monitoring device designed specifically for children with special needs. It is packed with features beyond GPS tracking, including noise monitoring, voice calling, a timeline view of the child's day, "runner mode" for a wandering child, an alarm, indoor location and more.
The truth is, smartwatches are internet devices that are vulnerable to skilled hackers and that store GPS data that could lead a dangerous person to a child. There are obvious benefits to using a device to track and locate a child at any time. But, at this early point in the devices' development, parents should research carefully and choose security and reliability over features or price.
With high tech security measures becoming the norm, you'd think we'd be a lot safer.
From smartphones to smart cars to smart hotels, the market for interconnectivity has never been higher. The ability to control the majority of one's home from an app– everything from the thermostat to the alarm system– is ubiquitous. There are definitely benefits to this tech; speed, comfort etc.- but are our attempts to make everything smart leaving us vulnerable?
When it comes to smart homes, the technologies involved can vary, but more often than not they're centered on security. Some using motion-sensing technology to automatically turn on cameras. Others contain sensors for all types of issues including flood water, burglary, smoke, and carbon monoxide. The requisite paranoia required to purchase one of these systems aside, there is a growing concern that these security programs can be hacked and easily monitored by would-be burglars. While self-driving cars are still a work in progress (Uber just killed a woman with one of theirs), hackers were able to shut down security features on a Jeep and prove how connected utilities are just as easy to hack as anything else connected to the Internet. The same principle can applied smart homes.
Alexa and her hackable friends
On one end of the hacking spectrum, you have a previous home's owner. There are currently no standards in place to prevent a seller from having access to their old home's smart features. This means the flickering of your lights and the constant opening and closing of your home's garage door could be part of a prank by the last person living in your house. This can also leave home owners vulnerable to burglary, though the police would probably have an easy time cracking that case. Burglary is more likely to occur from an outside force, one that you haven't met and agreed to purchase a house from. That said, tech savvy burglars could have just as easy a time robbing you while you're at work or on a vacation.
Direct denial of service (DDoS) attacks have been used to disrupt the Internet connection for entire corporations, and can now, via the Internet of Things (IoT), be accomplished with ordinary devices such as TVs and washing machines. When these devices were designed, many of the companies hectically released them without putting much thought into their (the devices) security. There are now over six billion everyday items connected to the Internet, with IoT spending to hit around 1.7 trillion by 2020. But how and why would burglars perform cyber attacks on smart homes, when it'd be just as easy to break a window wearing facemasks and steal as much as they can carry before the police arrive? While burglars could perform DDoS attacks on homes and shutdown security systems, this could raise suspicions, as homeowners might notice that their cameras and motion sensors aren't working. Burglars can however, hack into less obvious devices and use them as a means of surveillance, casing their target at a safe distance. Recently, it was discovered that the MyQ garage door system could be hacked and used to spy on homeowners, alerting hackers when the door opens and closes, and giving them the ability to reopen the door after residents leave. This sort of thing is much more useful to burglars performing smash and grab robberies and makes it far too easy for robbers to keep track of a homeowner's schedule.
New security systems are at risk.
So, what can you do?The fact of the matter is, smart homes are no more or less secure than regular homes. If someone is dedicated to robbing your house, they're going to find a way to get the job done. That said, smart homes do provide a baseline of coverage against standard, non-tech savvy burglars and having visible cameras on the outside of your house can be a serious deterrent. If none of the devices in your house are smart though, it might be worth it to wait until cyber-security measures become standard before buying that new app-controlled washer. As for alarm systems, at this point the old school systems that alert the police department via a landline rather than the Internet are far safer and effective. Like anything though, it's important to do your research before buying.