Articles in Category: Security

Evolution of passwords.

Size Matters! (When It Comes to Passwords)

The results are in for last year’s most common passwords. The implications are depressing.

YubiKey example of a USB 2FA device.

Passkeys and Hardware Keys

Passkeys and hardware authentication keys are completely different but partially related. You can use some, but not all, hardware keys as passkeys. I’ll clear up the confusion, and tell you what to look for.

No more passwords?

What Is a Passkey?

Passkeys are a new form of signing in that promise to be easier and more secure. I’ll walk you through some of the high level concepts and how they work, and how they keep you safer than passwords.

A concerned young man with large glasses holding a pink eraser beside a laptop. The laptop screen displays the Windows logo and icons of a folder, a document, and a trash can. The background is warm-toned, and there's a cup of pencils on the desk.

How Can I Securely Delete Everything Except the Operating System?

Before giving away a machine or returning a loaner, it’s important to remove your personal information from it. That may be both harder and easier than you think. I’ll show you where traditional suggestions fail, and what you need to do instead.

Landlord handing over the keys.

Is Internet Provided by My Landlord Safe?

Connectivity is becoming an added perk in some housing situations. Make sure you know the risks and alternatives when someone else provides your internet connection.

Hovering over a link.

How to Hover Over a Link to Check It’s Not a Scam

When it comes to links on webpages and HTML email, what you see is not always where you go. Hovering over a link is an important technique to look before you leap.

two individuals communicating using tin cans and strings, with a padlock and sheild on top of the string

How End-to-End Encryption Protects Your Messages and Where It Fails

You would think that for such an important concept as end-to-end encryption there’s be some agreement on exactly what it means. Sadly, not so. There’s the correct definition, and then there’s the marketing definition. One protects you, the other not so much.

A giant fishing hook labeled “Login Here” dangles in front of a surprised user character sitting at a desk, with warning icons and blinking red alerts on their screen. Behind the screen, a sneaky figure smirks.

Many Ways Your Account Can Be Hacked and What to Do About It

There are many ways accounts can be compromised. There are also many simple ways you can protect yourself.

A friendly-looking cartoon desktop computer beams confidently, but above it hovers a large, glowing, animated question mark. In the background, shadowy "virus" characters lurk just out of view — barely noticeable unless you look closer — representing the unseen uncertainty.

Can You Really Know Your PC Is Clean and Malware-Free?

It’s common to want confirmation your machine hasn’t been compromised in some way. We can get close, but we can’t prove it.

Passwords versus Passkeys

Passkeys Are Never the Only Way In

Losing a device with a passkey to one of your accounts will not lock you out.

Eyeball peeking into a bathroom.

How Does Security Software Protect Me After Windows 10 End of Support?

Security updates and security software have different jobs, and that difference matters.

Is it encrypted?

How Do I Know If My Hard Disk Is BitLocker-Encrypted?

Your hard disk could be BitLocker encrypted without your knowledge.

A locked(?) drive.

Protecting Your Data: Why I Avoid Most Pre-Installed Security and Encryption Software

External hard drives often come with security and backup software. I’m not convinced it should be used.

Bitlocker Protected External Drive

BitLocker vs. Cryptomator: Why I Use Both (and When You Should, Too)

Use different tools for different purposes.

Microsoft Authenticator

What Happens If I Lose My Microsoft Authenticator App?

Microsoft Authenticator is not necessarily two-factor authentication, but the two do share one important characteristic: the need to prepare for loss.

A man with a shotgun labeled telemetry shooting a hole through a shield labelled VPN.

Does a VPN Protect Me From Telemetry and Other Data Gathering?

VPNs don’t impact data tracking or collection. We’ll look at why that is and what you might want to do about it.

Cryptomator versus VeraCrypt

Cryptomator vs VeraCrypt: Which Do You Want?

Cryptomator and VeraCrypt are both excellent encryption tools. We’ll look at how to choose the right one for your situation.

You backup your vault, right?

How to Back Up 1Password and Why You Should

Backing up is important, and that includes your password vault.

Sign Out

Should I Always Sign Out of My Online Account?

It is safe to stay signed in to your online account as long as you’re protected from a few specific scenarios.

1-800-SCAMMER

Do Not Search for Support Phone Numbers

You want a phone number to call. Scammers known this and try to insert themselves in the process.

A dimly lit prison cell. Inside the cell stands a hacker figure wearing a hoodie and holding a laptop, looking apprehensive. A bold sign reading 'Quarantine' hangs above the cell door.

What Does It Mean to Quarantine Malware? And Is It Safe?

A quarantine keeps you safe from malware.

A desktop PC on a clean desk with a visible inbox showing spam or threatening emails on the screen.

Think Before You Share: Protecting Yourself From Email Harassment

It’s so common to give away personal information, we don’t think twice about it. Let’s start thinking twice.

A traveler in an airport lounge with a worried expression, sitting at a table. The background includes bright airport signage, large windows with planes visible, and an empty laptop bag on the chair beside them. The traveler is dressed casually, suggesting they are stranded without digital devices.

How to Recover When You Lose Everything Traveling

Imagine you’re traveling overseas and all your digital “stuff” is lost. What do you do? How do you reconnect?

A desktop PC setup on a clean, modern desk with a YouTube video comment section displayed on the screen. A large red flag icon hovers subtly over one of the comments to symbolize a scam warning.

Why Am I Seeing These Odd Crypto-Currency “Help Me” Comments?

Just ignore seed-phrase scams.

A PC with a clean, minimal desk setup in a softly lit room illuminated by a warm desk lamp and the subtle glow of a NAT router with blinking lights. The background hints at a cozy nighttime setting with subtle shadows, creating a secure and calming atmosphere.

Does Turning a Computer Off at Night Keep It Safer From Hackers?

There are reasons to turn your computer off at night or leave it running. Getting hacked isn’t one of them.

A desktop Windows PC with a bold red warning message on the screen reading 'System Compromised.' The background suggests a cybersecurity breach, with dark tones and a subtle hint of digital chaos, such as faint binary codes or digital artifacts. The setting is an office desk setup with realistic details like a coffee mug, a notepad, and a dimly lit, tense atmosphere.

How Do I Make Sure Malware is Gone?

Of course we want to be certain malware has been removed. Unfortunately, certainty is difficult to come by.

A sleek AI-style humanoid robot holding a sign that says 'Trust Me' in bold letters.

More Tips to Protect Yourself from AI Scams

AI has entered the chat. And the email. And the voice call. And the video. And it’s making scams even harder to detect.

A laptop with a large red warning symbol on the screen and a smartphone nearby displaying an unknown caller notification.

Online and Phone Scams: What to Watch For and How to Stay Safe

Know the characteristics of online and phone scams, and don’t be afraid to take steps to protect yourself.

A woman looking at her mobile phone with suspicion.

Why Do Services Like Google and Microsoft Ask for a Phone Number?

Many online services request your phone number. I’ll look at how that’s typically used and why it’s a good thing.

A close-up of a laptop screen displaying a secure login interface, with a lock icon and fields for entering a password and two-factor authentication. A smartphone with a 2FA app is visible beside the laptop, symbolizing added security layers.

Secure Your Most Important Accounts

Experts always recommend securing your “most important accounts”. Great. Which accounts would those be?

Text: You've been hacked - or have you?

Why Your Computer Has Probably Not Been Hacked

I regularly hear from people who believe their computer has been hacked and is under someone else’s control. It’s very rarely the case.

Two Factor Authentication

Think 2FA Is Bulletproof? Here’s Why You’re Still Vulnerable

Two-factor authentication is one of the most important ways you can secure your online accounts. But that doesn’t mean you’re done.

A blurred screen with a video call window displaying a convincing deepfake video of a person, alongside a separate speaker icon indicating AI-generated voice mimicry. The background has a person in a dark room, looking confused or shocked while on their smartphone, symbolizing the unsettling reality of AI scams.

How AI is Revolutionizing Scams: Can We No Longer Trust Our Eyes or Ears?

Scams are bad enough. Throw AI into the mix, and things only get worse.

A detailed digital lock displayed on a screen split into two sections. One side shows a bright, traditional key symbol representing user access, with a secure and clean digital interface. The other side has a faint, shadowy master key symbol, appearing ominous and subtly blending into a darker background, representing potential government or third-party access.

Why Encryption Backdoors Are a Horrific Idea

A phrase we’ve heard more and more often in recent years is encryption backdoor. The concept is simple: government agencies want to be able to monitor otherwise encrypted communications. The concept is flawed.

Enter two-factor code.

How to Add Two-Factor Authentication to Your Google Account

Adding the most common and secure form of two-factor authentication to your account.

Stay signed in checkbox.

Is Automatic Sign-in Safe for My Email?

Having your email automatically or continually signed in to can be a security risk in some situations, but very convenient in others.

No passwords!

Going Passwordless Without Going Passwordless

Passwords are dying. On some services, you can start playing with the process by creating a secure password… and then forgetting it.

Windows Security

What Security Software Do You Recommend? (2024 Q4 update)

Here are my latest recommendations for specific security software and techniques.

A home office desk with a frustrated man sitting in front of a computer. The screen shows multiple reminders for password changes, with sticky notes scattered around displaying various passwords crossed out. The man's expression reflects annoyance, with his hand on his forehead.

Is a Periodic Password Change a Good Thing?

Conventional wisdom says to change your passwords periodically. I disagree.

Ultra AV home page.

What Is Ultra AV, and Why Did it Show Up On My Machine?

If you’ve suddenly found an unfamiliar antivirus program running on your computer, you’re not alone.

A modern living room with a smartphone on a coffee table and a smart speaker like an Amazon Echo nearby. The smartphone displays coffee maker ads, hinting at targeted advertising. In the background, two people are having a casual conversation, creating a subtle connection to the idea of being 'listened to' by smart devices.

Is My Smartphone or Smart Device Listening In on Me?

It’s not uncommon to think our smart devices are listening in when advertisements seem to follow our discussions.

The image shows a smartphone with a biometric fingerprint scanner in the center, representing device unlocking. In the background, there are abstract digital locks, key symbols, and security shields surrounding the phone to symbolize online security and protection.

Is a Passkey Two-Factor Authentication?

Passkeys are secure, but they’re not two-factor authentication in and of themselves. I’ll run the scenarios that explain why that is and when 2FA might be involved as well.

A lone traveler standing in an empty urban environment with no belongings except the clothes on their back, looking at a locked phone screen with a confused expression.

What If I Lose Everything When Traveling?

I hear from people who are concerned that they’ve put so much security in place they’ll keep themselves out in case of emergency.

An individual sitting in front of a PC computer screen displaying the message 'Recovery Failed.' In the background, a hacker is peeking around a door, creating a sense of tension and vulnerability.

How to Avoid an Account Recovery Scam

Don’t let your panic open the door to scammers.

An image representing the aftermath of a major data breach. The image should depict a desktop with a computer screen displaying a warning message about a security breach. Surrounding the computer, there are items like a credit card, bank statements, and a Social Security card, symbolizing personal data. The scene is tense and chaotic, with a newspaper headline about the breach visible in the background. The overall mood should be one of caution and urgency, emphasizing the need to protect personal information.

Social Security Number Compromised — What to Do?

Billions of records of personal information, including Social Security numbers, has been exposed. What to do?

An elderly man, looking concerned and focused, sitting at a computer. The screen shows a warning message or a phishing attempt. The setting is a home office, with the elderly man staring intently at the computer screen.

Protect Yourself From Online Scams

We’re all vulnerable to scammers. Learn the warning signs.

A photorealistic image showcasing two-factor authentication. The scene includes a smartphone displaying a 2FA app a laptop with a password manager open, and a social security website login page on a desktop screen. The background is a modern, well-lit office setup. The devices are positioned to emphasize cross-platform usability, with a focus on security.

What’s the Best Two-Factor App?

Two-factor authentication is one of the most important things you can do to secure your accounts. Here are the 2FA apps I can recommend.

A finger pressing onto a fingerprint reader. The fingerprint reader is a modern, sleek device with a glowing blue light indicating where the finger should be placed. The background is a clean, minimalist setting, emphasizing the interaction between the thumb and the fingerprint reader.

More Passkey Questions

Passkeys seem like magic, and confusing magic at that. I’ll address a set of questions I received recently.

Made In Russia

What to Do About Kaspersky Antivirus

Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?

A bright and simple photorealistic image showing a computer screen displaying a password change interface, with a large padlock icon. The background is minimal, with faint outlines of a smartphone and a tablet, emphasizing multiple access points. A person’s hand is seen typing on the keyboard, indicating action being taken to secure the account.

Changing Your Password After a Hack May Not Be Enough

Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.