Articles in Category: Security

You backup your vault, right?

How to Back Up 1Password and Why You Should

Backing up is important, and that includes your password vault.

Sign Out

Should I Always Sign Out of My Online Account?

It is safe to stay signed in to your online account as long as you’re protected from a few specific scenarios.

1-800-SCAMMER

Do Not Search for Support Phone Numbers

You want a phone number to call. Scammers known this and try to insert themselves in the process.

A dimly lit prison cell. Inside the cell stands a hacker figure wearing a hoodie and holding a laptop, looking apprehensive. A bold sign reading 'Quarantine' hangs above the cell door.

What Does It Mean to Quarantine Malware? And Is It Safe?

A quarantine keeps you safe from malware.

A desktop PC on a clean desk with a visible inbox showing spam or threatening emails on the screen.

Think Before You Share: Protecting Yourself From Email Harassment

It’s so common to give away personal information, we don’t think twice about it. Let’s start thinking twice.

A traveler in an airport lounge with a worried expression, sitting at a table. The background includes bright airport signage, large windows with planes visible, and an empty laptop bag on the chair beside them. The traveler is dressed casually, suggesting they are stranded without digital devices.

How to Recover When You Lose Everything Traveling

Imagine you’re traveling overseas and all your digital “stuff” is lost. What do you do? How do you reconnect?

A desktop PC setup on a clean, modern desk with a YouTube video comment section displayed on the screen. A large red flag icon hovers subtly over one of the comments to symbolize a scam warning.

Why Am I Seeing These Odd Crypto-Currency “Help Me” Comments?

Just ignore seed-phrase scams.

A PC with a clean, minimal desk setup in a softly lit room illuminated by a warm desk lamp and the subtle glow of a NAT router with blinking lights. The background hints at a cozy nighttime setting with subtle shadows, creating a secure and calming atmosphere.

Does Turning a Computer Off at Night Keep It Safer From Hackers?

There are reasons to turn your computer off at night or leave it running. Getting hacked isn’t one of them.

A desktop Windows PC with a bold red warning message on the screen reading 'System Compromised.' The background suggests a cybersecurity breach, with dark tones and a subtle hint of digital chaos, such as faint binary codes or digital artifacts. The setting is an office desk setup with realistic details like a coffee mug, a notepad, and a dimly lit, tense atmosphere.

How Do I Make Sure Malware is Gone?

Of course we want to be certain malware has been removed. Unfortunately, certainty is difficult to come by.

A sleek AI-style humanoid robot holding a sign that says 'Trust Me' in bold letters.

More Tips to Protect Yourself from AI Scams

AI has entered the chat. And the email. And the voice call. And the video. And it’s making scams even harder to detect.

A laptop with a large red warning symbol on the screen and a smartphone nearby displaying an unknown caller notification.

Online and Phone Scams: What to Watch For and How to Stay Safe

Know the characteristics of online and phone scams, and don’t be afraid to take steps to protect yourself.

A woman looking at her mobile phone with suspicion.

Why Do Services Like Google and Microsoft Ask for a Phone Number?

Many online services request your phone number. I’ll look at how that’s typically used and why it’s a good thing.

A close-up of a laptop screen displaying a secure login interface, with a lock icon and fields for entering a password and two-factor authentication. A smartphone with a 2FA app is visible beside the laptop, symbolizing added security layers.

Secure Your Most Important Accounts

Experts always recommend securing your “most important accounts”. Great. Which accounts would those be?

Text: You've been hacked - or have you?

Why Your Computer Has Probably Not Been Hacked

I regularly hear from people who believe their computer has been hacked and is under someone else’s control. It’s very rarely the case.

Two Factor Authentication

Think 2FA Is Bulletproof? Here’s Why You’re Still Vulnerable

Two-factor authentication is one of the most important ways you can secure your online accounts. But that doesn’t mean you’re done.

A blurred screen with a video call window displaying a convincing deepfake video of a person, alongside a separate speaker icon indicating AI-generated voice mimicry. The background has a person in a dark room, looking confused or shocked while on their smartphone, symbolizing the unsettling reality of AI scams.

How AI is Revolutionizing Scams: Can We No Longer Trust Our Eyes or Ears?

Scams are bad enough. Throw AI into the mix, and things only get worse.

A detailed digital lock displayed on a screen split into two sections. One side shows a bright, traditional key symbol representing user access, with a secure and clean digital interface. The other side has a faint, shadowy master key symbol, appearing ominous and subtly blending into a darker background, representing potential government or third-party access.

Why Encryption Backdoors Are a Horrific Idea

A phrase we’ve heard more and more often in recent years is encryption backdoor. The concept is simple: government agencies want to be able to monitor otherwise encrypted communications. The concept is flawed.

Enter two-factor code.

How to Add Two-Factor Authentication to Your Google Account

Adding the most common and secure form of two-factor authentication to your account.

Stay signed in checkbox.

Is Automatic Sign-in Safe for My Email?

Having your email automatically or continually signed in to can be a security risk in some situations, but very convenient in others.

No passwords!

Going Passwordless Without Going Passwordless

Passwords are dying. On some services, you can start playing with the process by creating a secure password… and then forgetting it.

Windows Security

What Security Software Do You Recommend? (2024 Q4 update)

Here are my latest recommendations for specific security software and techniques.

A home office desk with a frustrated man sitting in front of a computer. The screen shows multiple reminders for password changes, with sticky notes scattered around displaying various passwords crossed out. The man's expression reflects annoyance, with his hand on his forehead.

Is a Periodic Password Change a Good Thing?

Conventional wisdom says to change your passwords periodically. I disagree.

Ultra AV home page.

What Is Ultra AV, and Why Did it Show Up On My Machine?

If you’ve suddenly found an unfamiliar antivirus program running on your computer, you’re not alone.

A modern living room with a smartphone on a coffee table and a smart speaker like an Amazon Echo nearby. The smartphone displays coffee maker ads, hinting at targeted advertising. In the background, two people are having a casual conversation, creating a subtle connection to the idea of being 'listened to' by smart devices.

Is My Smartphone or Smart Device Listening In on Me?

It’s not uncommon to think our smart devices are listening in when advertisements seem to follow our discussions.

The image shows a smartphone with a biometric fingerprint scanner in the center, representing device unlocking. In the background, there are abstract digital locks, key symbols, and security shields surrounding the phone to symbolize online security and protection.

Is a Passkey Two-Factor Authentication?

Passkeys are secure, but they’re not two-factor authentication in and of themselves. I’ll run the scenarios that explain why that is and when 2FA might be involved as well.

A lone traveler standing in an empty urban environment with no belongings except the clothes on their back, looking at a locked phone screen with a confused expression.

What If I Lose Everything When Traveling?

I hear from people who are concerned that they’ve put so much security in place they’ll keep themselves out in case of emergency.

An individual sitting in front of a PC computer screen displaying the message 'Recovery Failed.' In the background, a hacker is peeking around a door, creating a sense of tension and vulnerability.

How to Avoid an Account Recovery Scam

Don’t let your panic open the door to scammers.

An image representing the aftermath of a major data breach. The image should depict a desktop with a computer screen displaying a warning message about a security breach. Surrounding the computer, there are items like a credit card, bank statements, and a Social Security card, symbolizing personal data. The scene is tense and chaotic, with a newspaper headline about the breach visible in the background. The overall mood should be one of caution and urgency, emphasizing the need to protect personal information.

Social Security Number Compromised — What to Do?

Billions of records of personal information, including Social Security numbers, has been exposed. What to do?

An elderly man, looking concerned and focused, sitting at a computer. The screen shows a warning message or a phishing attempt. The setting is a home office, with the elderly man staring intently at the computer screen.

Protect Yourself From Online Scams

We’re all vulnerable to scammers. Learn the warning signs.

A photorealistic image showcasing two-factor authentication. The scene includes a smartphone displaying a 2FA app a laptop with a password manager open, and a social security website login page on a desktop screen. The background is a modern, well-lit office setup. The devices are positioned to emphasize cross-platform usability, with a focus on security.

What’s the Best Two-Factor App?

Two-factor authentication is one of the most important things you can do to secure your accounts. Here are the 2FA apps I can recommend.

A finger pressing onto a fingerprint reader. The fingerprint reader is a modern, sleek device with a glowing blue light indicating where the finger should be placed. The background is a clean, minimalist setting, emphasizing the interaction between the thumb and the fingerprint reader.

More Passkey Questions

Passkeys seem like magic, and confusing magic at that. I’ll address a set of questions I received recently.

Made In Russia

What to Do About Kaspersky Antivirus

Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?

A bright and simple photorealistic image showing a computer screen displaying a password change interface, with a large padlock icon. The background is minimal, with faint outlines of a smartphone and a tablet, emphasizing multiple access points. A person’s hand is seen typing on the keyboard, indicating action being taken to secure the account.

Changing Your Password After a Hack May Not Be Enough

Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.

Setting up or using a passkey.

What If There’s a Passkey on My Lost Phone?

Losing a device with a passkey isn’t a disaster at all. I’ll describe why that is.

A person receiving a scam call. The person looks confused while holding a phone. A large speech bubble from the phone says 'Give me the code!' Contrasting this, another speech bubble from a nearby computer screen says 'Never share this code.'

One-Time Code Contradiction: When to Share and When to Beware

You’re told not to share your two-factor or other authentication code. And then you’re asked for it.

Padlock in a chain.

Can Someone Install Something on My Computer When It’s Not Logged In?

If your computer is not physically secure, someone could install something even if you’re not logged in.

A home office with a modern aesthetic. In the foreground, a sleek desktop computer sits on a well-organized desk, surrounded by typical office supplies and decor. The room is warmly lit, creating a cozy work environment. Through the window, a slightly creepy figure is peeking in, adding a subtle element of suspense to the scene. The outside view shows a typical residential setting, enhancing the sense of a home office.

Surprising Reasons to Use a VPN at Home: More Than Just Privacy

Although a VPN service is probably not necessary at home, there are a few scenarios where you may want to consider it.

A photorealistic image of a modern smartphone displaying a notification for an unexpected two-factor authentication request.

What to Do With an Unexpected Two-factor Code

Getting an unexpected authorization code on your phone or via email can be concerning. Let’s see when it’s a sign of a problem and what to do about it.

A scene showing a concerned individual at their computer, receiving a scam phone call from someone claiming to be from Microsoft, aiming to assist with non-existent computer errors.

I Got a Call from Microsoft and Allowed Them Access to My Computer. What Do I Do Now?

A very common scam has people supposedly from Microsoft, your ISP, or other authorities calling to help you with computer problems. Don’t fall for it.

A vault or safe with a fogged glass front. Inside the vault, there are vague shapes of files and folders barely visible through the foggy glass.

How Do I Recover Encrypted Files From Cryptomator?

Recovering individual files from a Cryptomator encrypted vault can be tricky. I’ll discuss why and how to protect your access to those files.

A user in a modern, well-lit office environment. The user is viewing their computer screen, which displays an email with a phishing attempt; a large, transparent fish hook symbol overlays the email content, indicating danger. Beside the computer, on the desk, is a smartphone showing a notification for a two-factor authentication (2FA) request.

Beware the Middleman: How Your 2FA Could Be Compromised

Some forms of two factor authentication have vulnerabilities. Here’s how to avoid it.

An image that visually represents the theme of being cautious on Facebook Marketplace due to the rise of scams. The image features symbolic red flags to indicate warning signs, along with icons or illustrations related to Facebook Marketplace, such as the Facebook logo, a marketplace setting, and representations of the scams mentioned (moving conversations off Facebook, cryptocurrency, gift cards).

Facebook Marketplace Scams: 3 Warning Signs You Shouldn’t Ignore

Facebook Marketplace scams are on the rise. Here are three red flags that should tell you something’s not right.

A line of dominoes on a sleek, modern table. The first domino in the line is labeled "Your Password", and the subsequent dominoes are labeled with generic online service categories like "Email", "Social Media", "Banking", etc. Each domino represents a different aspect of one's digital life, illustrating the concept of how a single compromised password can lead to a chain reaction affecting various online accounts.

What Is Credential Stuffing?

Credential stuffing: less complicated than the fancy words imply and easy to prevent.

Scam Alert message

Don’t Be Ashamed or Smug

If you’re embarrassed at having fallen for a scam, it’s tempting to want hide and not tell anyone. But it’s important to learn from the experience and share it. There’s no need to feel shame.

An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.

How Can I Tell If a Web Address Is Safe?

URLs are simple in concept, yet can be constructed in ways that might fool you. I’ll look at some examples and discuss what’s important.

An illustration of a person sitting at a desk, overwhelmed by a flood of phone calls and text messages pouring out from their smartphone, like water. Each call and message is visibly marked as spam, forming a wave that threatens to engulf the workspace.

6 Steps to Dealing With Phone Spam

Phone spam, be it voice or text, is as annoying as it is persistent. Here’s what (little) you can do.

A close-up of hands using a smartphone or tablet, with the device's screen displaying a clear and bright passkey icon.

How Can Passkeys Possibly Be Safe?

Passkeys may feel confusing now, but they’re a doorway to a more secure, less frustrating, passwordless future.

Visualize a secure, encrypted server with a padlock symbolizing security, and a magnifying glass over a computer screen displaying an Outlook.com login page, to represent the attempt to find the existing password without changing it.

How Can I Recover an Outlook Password Without Resetting It?

Microsoft doesn’t know your Outlook.com password. Honest. That makes recovering it without changing it challenging.

A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.

Isn’t Putting Two Factor Codes in My Password Vault Less Secure?

Storing 2FA codes in 1Password alongside passwords might slightly reduce security, but the risk is minimal, especially compared to the convenience.

A Roman warrior in full armor, holding a large shield in a defensive stance, is standing protectively over a USB security key placed on the ground. The sky is darkened by a dense flurry of incoming arrows, emphasizing the warrior's role as the protector of this modern digital key.

How to Protect Yourself From a Two-Factor Hack

Two-factor authentication isn’t perfect, but it’s much better than not using it at all. Here are the various risks and what you can do to protect yourself.