Articles in Category: Security

A sleek AI-style humanoid robot holding a sign that says 'Trust Me' in bold letters.

More Tips to Protect Yourself from AI Scams

AI has entered the chat. And the email. And the voice call. And the video. And it’s making scams even harder to detect.

A laptop with a large red warning symbol on the screen and a smartphone nearby displaying an unknown caller notification.

Online and Phone Scams: What to Watch For and How to Stay Safe

Know the characteristics of online and phone scams, and don’t be afraid to take steps to protect yourself.

A woman looking at her mobile phone with suspicion.

Why Do Services Like Google and Microsoft Ask for a Phone Number?

Many online services request your phone number. I’ll look at how that’s typically used and why it’s a good thing.

A close-up of a laptop screen displaying a secure login interface, with a lock icon and fields for entering a password and two-factor authentication. A smartphone with a 2FA app is visible beside the laptop, symbolizing added security layers.

Secure Your Most Important Accounts

Experts always recommend securing your “most important accounts”. Great. Which accounts would those be?

Text: You've been hacked - or have you?

Why Your Computer Has Probably Not Been Hacked

I regularly hear from people who believe their computer has been hacked and is under someone else’s control. It’s very rarely the case.

Two Factor Authentication

Think 2FA Is Bulletproof? Here’s Why You’re Still Vulnerable

Two-factor authentication is one of the most important ways you can secure your online accounts. But that doesn’t mean you’re done.

A blurred screen with a video call window displaying a convincing deepfake video of a person, alongside a separate speaker icon indicating AI-generated voice mimicry. The background has a person in a dark room, looking confused or shocked while on their smartphone, symbolizing the unsettling reality of AI scams.

How AI is Revolutionizing Scams: Can We No Longer Trust Our Eyes or Ears?

Scams are bad enough. Throw AI into the mix, and things only get worse.

A detailed digital lock displayed on a screen split into two sections. One side shows a bright, traditional key symbol representing user access, with a secure and clean digital interface. The other side has a faint, shadowy master key symbol, appearing ominous and subtly blending into a darker background, representing potential government or third-party access.

Why Encryption Backdoors Are a Horrific Idea

A phrase we’ve heard more and more often in recent years is encryption backdoor. The concept is simple: government agencies want to be able to monitor otherwise encrypted communications. The concept is flawed.

Enter two-factor code.

How to Add Two-Factor Authentication to Your Google Account

Adding the most common and secure form of two-factor authentication to your account.

Stay signed in checkbox.

Is Automatic Sign-in Safe for My Email?

Having your email automatically or continually signed in to can be a security risk in some situations, but very convenient in others.

No passwords!

Going Passwordless Without Going Passwordless

Passwords are dying. On some services, you can start playing with the process by creating a secure password… and then forgetting it.

Windows Security

What Security Software Do You Recommend? (2024 Q4 update)

Here are my latest recommendations for specific security software and techniques.

A home office desk with a frustrated man sitting in front of a computer. The screen shows multiple reminders for password changes, with sticky notes scattered around displaying various passwords crossed out. The man's expression reflects annoyance, with his hand on his forehead.

Is a Periodic Password Change a Good Thing?

Conventional wisdom says to change your passwords periodically. I disagree.

Ultra AV home page.

What Is Ultra AV, and Why Did it Show Up On My Machine?

If you’ve suddenly found an unfamiliar antivirus program running on your computer, you’re not alone.

A modern living room with a smartphone on a coffee table and a smart speaker like an Amazon Echo nearby. The smartphone displays coffee maker ads, hinting at targeted advertising. In the background, two people are having a casual conversation, creating a subtle connection to the idea of being 'listened to' by smart devices.

Is My Smartphone or Smart Device Listening In on Me?

It’s not uncommon to think our smart devices are listening in when advertisements seem to follow our discussions.

The image shows a smartphone with a biometric fingerprint scanner in the center, representing device unlocking. In the background, there are abstract digital locks, key symbols, and security shields surrounding the phone to symbolize online security and protection.

Is a Passkey Two-Factor Authentication?

Passkeys are secure, but they’re not two-factor authentication in and of themselves. I’ll run the scenarios that explain why that is and when 2FA might be involved as well.

A lone traveler standing in an empty urban environment with no belongings except the clothes on their back, looking at a locked phone screen with a confused expression.

What If I Lose Everything When Traveling?

I hear from people who are concerned that they’ve put so much security in place they’ll keep themselves out in case of emergency.

An individual sitting in front of a PC computer screen displaying the message 'Recovery Failed.' In the background, a hacker is peeking around a door, creating a sense of tension and vulnerability.

How to Avoid an Account Recovery Scam

Don’t let your panic open the door to scammers.

An image representing the aftermath of a major data breach. The image should depict a desktop with a computer screen displaying a warning message about a security breach. Surrounding the computer, there are items like a credit card, bank statements, and a Social Security card, symbolizing personal data. The scene is tense and chaotic, with a newspaper headline about the breach visible in the background. The overall mood should be one of caution and urgency, emphasizing the need to protect personal information.

Social Security Number Compromised — What to Do?

Billions of records of personal information, including Social Security numbers, has been exposed. What to do?

An elderly man, looking concerned and focused, sitting at a computer. The screen shows a warning message or a phishing attempt. The setting is a home office, with the elderly man staring intently at the computer screen.

Protect Yourself From Online Scams

We’re all vulnerable to scammers. Learn the warning signs.

A photorealistic image showcasing two-factor authentication. The scene includes a smartphone displaying a 2FA app a laptop with a password manager open, and a social security website login page on a desktop screen. The background is a modern, well-lit office setup. The devices are positioned to emphasize cross-platform usability, with a focus on security.

What’s the Best Two-Factor App?

Two-factor authentication is one of the most important things you can do to secure your accounts. Here are the 2FA apps I can recommend.

A finger pressing onto a fingerprint reader. The fingerprint reader is a modern, sleek device with a glowing blue light indicating where the finger should be placed. The background is a clean, minimalist setting, emphasizing the interaction between the thumb and the fingerprint reader.

More Passkey Questions

Passkeys seem like magic, and confusing magic at that. I’ll address a set of questions I received recently.

Made In Russia

What to Do About Kaspersky Antivirus

Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?

A bright and simple photorealistic image showing a computer screen displaying a password change interface, with a large padlock icon. The background is minimal, with faint outlines of a smartphone and a tablet, emphasizing multiple access points. A person’s hand is seen typing on the keyboard, indicating action being taken to secure the account.

Changing Your Password After a Hack May Not Be Enough

Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.

Setting up or using a passkey.

What If There’s a Passkey on My Lost Phone?

Losing a device with a passkey isn’t a disaster at all. I’ll describe why that is.

A person receiving a scam call. The person looks confused while holding a phone. A large speech bubble from the phone says 'Give me the code!' Contrasting this, another speech bubble from a nearby computer screen says 'Never share this code.'

One-Time Code Contradiction: When to Share and When to Beware

You’re told not to share your two-factor or other authentication code. And then you’re asked for it.

Padlock in a chain.

Can Someone Install Something on My Computer When It’s Not Logged In?

If your computer is not physically secure, someone could install something even if you’re not logged in.

A home office with a modern aesthetic. In the foreground, a sleek desktop computer sits on a well-organized desk, surrounded by typical office supplies and decor. The room is warmly lit, creating a cozy work environment. Through the window, a slightly creepy figure is peeking in, adding a subtle element of suspense to the scene. The outside view shows a typical residential setting, enhancing the sense of a home office.

Surprising Reasons to Use a VPN at Home: More Than Just Privacy

Although a VPN service is probably not necessary at home, there are a few scenarios where you may want to consider it.

A photorealistic image of a modern smartphone displaying a notification for an unexpected two-factor authentication request.

What to Do With an Unexpected Two-factor Code

Getting an unexpected authorization code on your phone or via email can be concerning. Let’s see when it’s a sign of a problem and what to do about it.

A scene showing a concerned individual at their computer, receiving a scam phone call from someone claiming to be from Microsoft, aiming to assist with non-existent computer errors.

I Got a Call from Microsoft and Allowed Them Access to My Computer. What Do I Do Now?

A very common scam has people supposedly from Microsoft, your ISP, or other authorities calling to help you with computer problems. Don’t fall for it.

A vault or safe with a fogged glass front. Inside the vault, there are vague shapes of files and folders barely visible through the foggy glass.

How Do I Recover Encrypted Files From Cryptomator?

Recovering individual files from a Cryptomator encrypted vault can be tricky. I’ll discuss why and how to protect your access to those files.

A user in a modern, well-lit office environment. The user is viewing their computer screen, which displays an email with a phishing attempt; a large, transparent fish hook symbol overlays the email content, indicating danger. Beside the computer, on the desk, is a smartphone showing a notification for a two-factor authentication (2FA) request.

Beware the Middleman: How Your 2FA Could Be Compromised

Some forms of two factor authentication have vulnerabilities. Here’s how to avoid it.

An image that visually represents the theme of being cautious on Facebook Marketplace due to the rise of scams. The image features symbolic red flags to indicate warning signs, along with icons or illustrations related to Facebook Marketplace, such as the Facebook logo, a marketplace setting, and representations of the scams mentioned (moving conversations off Facebook, cryptocurrency, gift cards).

Facebook Marketplace Scams: 3 Warning Signs You Shouldn’t Ignore

Facebook Marketplace scams are on the rise. Here are three red flags that should tell you something’s not right.

A line of dominoes on a sleek, modern table. The first domino in the line is labeled "Your Password", and the subsequent dominoes are labeled with generic online service categories like "Email", "Social Media", "Banking", etc. Each domino represents a different aspect of one's digital life, illustrating the concept of how a single compromised password can lead to a chain reaction affecting various online accounts.

What Is Credential Stuffing?

Credential stuffing: less complicated than the fancy words imply and easy to prevent.

Scam Alert message

Don’t Be Ashamed or Smug

If you’re embarrassed at having fallen for a scam, it’s tempting to want hide and not tell anyone. But it’s important to learn from the experience and share it. There’s no need to feel shame.

An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.

How Can I Tell If a Web Address Is Safe?

URLs are simple in concept, yet can be constructed in ways that might fool you. I’ll look at some examples and discuss what’s important.

An illustration of a person sitting at a desk, overwhelmed by a flood of phone calls and text messages pouring out from their smartphone, like water. Each call and message is visibly marked as spam, forming a wave that threatens to engulf the workspace.

6 Steps to Dealing With Phone Spam

Phone spam, be it voice or text, is as annoying as it is persistent. Here’s what (little) you can do.

A close-up of hands using a smartphone or tablet, with the device's screen displaying a clear and bright passkey icon.

How Can Passkeys Possibly Be Safe?

Passkeys may feel confusing now, but they’re a doorway to a more secure, less frustrating, passwordless future.

Visualize a secure, encrypted server with a padlock symbolizing security, and a magnifying glass over a computer screen displaying an Outlook.com login page, to represent the attempt to find the existing password without changing it.

How Can I Recover an Outlook Password Without Resetting It?

Microsoft doesn’t know your Outlook.com password. Honest. That makes recovering it without changing it challenging.

A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.

Isn’t Putting Two Factor Codes in My Password Vault Less Secure?

Storing 2FA codes in 1Password alongside passwords might slightly reduce security, but the risk is minimal, especially compared to the convenience.

A Roman warrior in full armor, holding a large shield in a defensive stance, is standing protectively over a USB security key placed on the ground. The sky is darkened by a dense flurry of incoming arrows, emphasizing the warrior's role as the protector of this modern digital key.

How to Protect Yourself From a Two-Factor Hack

Two-factor authentication isn’t perfect, but it’s much better than not using it at all. Here are the various risks and what you can do to protect yourself.

An image that illustrates the concept of maintaining continuity and avoiding complications by keeping the same phone number when changing phones or providers. The image depicts a person holding a new smartphone,. The background features a series of faded icons representing different online services (like email, banking, and social media), emphasizing the importance of updating recovery information.

When You Change Your Phone Number, Change Your Phone Number

The ability to keep your old phone number when getting a new phone can avoid several headaches. If you get a new number, there are steps you must take.

The scene includes a metaphorical depiction of the scam process, showing a digital landscape with a piggy bank standing on one side, looking full and healthy, connected by a series of digital pathways and strings to a shadowy figure on the other side, who holds a butcher knife made of binary code, symbolizing the scammer preparing to 'butcher' the victim's savings. The background is a mix of digital and real elements, such as a cityscape blending into a circuit board, representing the intersection of technology and everyday life where these scams take place. Include symbols like chat bubbles, hearts, and dollar signs floating between the piggy bank and the shadowy figure to represent the building of trust, emotional manipulation, and financial transactions involved in the scam. The overall atmosphere should be ominous yet subtle, highlighting the deceptive and hidden dangers of online scams.

What Is a Pig-Butchering Scam?

Pig-butchering is a nasty term for a particularly painful type of scam. Here’s how to protect yourself.

An average computer user sitting at a desk, working on their computer. Above the computer, a puppeteer's hand with strings attached to the computer, symbolizing control and manipulation.

Could Malware Record My Chats and Video Calls?

If you’re curious what might happen if a hacker was in control of your computer, the question really is “What can’t they do?”

Whither Authy?

Dealing With the Demise of Authy Desktop

Authy’s desktop version is going away (darn it!). Here’s how I will replace it.

A cartoon-style image of a race track featuring runners racing, with the runner dressed as a black hat hacker clearly winning. The black hat hacker, in a cartoonish dark outfit with a stylized black hat, should be significantly ahead of the runner dressed as a white hat hacker, who is in a cartoonish light-colored outfit with a whimsical white hat. The background should show a colorful race track, emphasizing a playful and fun approach to the concept of cybersecurity.

Are the Bad Guys Winning?

Media hype makes it seem like the bad guys are winning. They’re always in the lead – but don’t believe the hype.

An image in an ancient Egyptian drawing style that depicts a giant, expressive eye with various internet cables and connections in the background. The artwork should mimic the aesthetic of ancient Egyptian art, characterized by profile views, flat figures, and bold outlines. The design should blend the theme of Internet Service Providers' potential to monitor internet activity with the distinctive art style of ancient Egypt, incorporating elements like hieroglyphics and traditional Egyptian color schemes.

Can My ISP Monitor My Internet Connection?

Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?

A photorealistic image showing a modern smartphone on the left side of the frame, displaying a QR code on its screen. On the right side, a scrap of paper also showing the same QR code, implying it's a written backup of the code. The background is simple and unobtrusive, focusing attention on the smartphone and the paper. This scene represents the concept of securing a backup for two-factor authentication codes.

Another Way to Protect Yourself From 2FA Loss

A little bit of preparation when you set it up can make losing your Google Authenticator 2FA device a minor inconvenience.

A realistic hand holding a smartphone displaying a map, with recognizable landmarks in the background..

The Surprising Ways Your Videos Can Expose Your Location

Something many people do every day may expose their location in ways they don’t know.

A "Missing" poster. The poster is detailed and looks like it's pinned on a wooden board or wall. The top of the poster has bold, black text saying "Missing". Below the text, there's a high-quality, realistic photo of a mobile phone, depicting it as the missing item. The phone should look distinct and easily recognizable. The poster has a slightly weathered look, as if it has been up for a while, adding to the realism. The overall image captures the essence of a traditional missing item poster, with the unique twist of featuring a mobile phone as the missing object.

I Lost My Two-Factor Authentication (2FA) Device. How Do I Sign In?

Fear of second-factor loss prevents some people from using two-factor authentication. There’s no need to fear that scenario.