If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?
Password vaults are good at keeping track of passwords, but not answers to security questions. There is a technique you can use to help.
Given how much we’ve come to rely on them, are you prepared to lose your mobile device?
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Email is a fairly insecure media. There are many things that can go wrong when email gets delivered, and protecting yourself can be difficult.
Websites can collect a fair amount of information about you. Let’s look at what every website sees.
A VM doesn’t get you any additional privacy from your ISP… although it might be a convenience as part of a more complete solution.
It’s impossible to know your machine has no malware. What does that mean for your safety?
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
VeraCrypt provides a solution for encrypting sensitive data — everything from portable, mountable volumes to entire hard disks.
Unless a password’s been changed, it’s difficult for a typical user to tell if their computer or account is being hacked.
Even with seemingly appropriate security in place, things can happen. I’ll review what things, and the additional steps you can take to protect yourself.
Password security has never been more important. With occasional security breaches at service providers and rampant email account theft, make sure you’re choosing and using secure passwords.
It’s a worthwhile exercise to download the data made available by Google and Facebook, if only to realize exactly what information is being kept.
If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.
Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
Protecting data on your computer is key. I’ll look at three common encryption methods.
Is it possible to bank online securely? Yes, if you’re careful.
Effective website security is difficult, and often an afterthought. Not all sites or services store passwords securely.
Sophisticated targeted ads can sometimes seem creepy. Here I explore how a few techniques work, and one I can’t explain at all.
Video chat is probably not monitored, but there’s no way to prove that. If that’s a little too vague for you, then be careful what you do on your computer.
Privilege is a fundamental concept in modern operating system design. We’ll explore what privilege means as used by the CPU when software runs.
Spectre and Meltdown sound scary. Here’s what you need to do, which is hopefully what you’re doing anyway, along with an attempt at an analogy.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
Keeping data secure is important. Being able to password protect a folder seems an obvious approach. Unfortunately, it’s not that simple.
It’s important to back up LastPass, because unexpected things happen. What you do with that backup, however, is critical.
Your LastPass password vault is full of exceptionally important data. Add additional security with two-factor authentication.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
So many sites require a password, it’s very tempting to use only a single password everywhere. That’s dangerous, and there are alternatives.
Letting your anti-malware subscription lapse is never a good idea. I’ll look at why that is, and available alternatives.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
You can’t rely on yourself as a malware detector. Learn how to be a malware avoider.
Making sure your anti-virus program and its definition database are up-to-date is the best way to make sure it can recognize and remove viruses.
There are many different terms that relate to software with malicious intent. Ultimately, however, there’s only one you really need to know, and several things you need to do.
A zero-day attack is very simple: it’s the exploitation of a vulnerability before there’s a fix for it. I’ll review the timeline.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
Wherein we consider how much information we “give away” in our daily lives online.
Microsoft’s response to the recent Windows Defender zero-day vulnerability was an example of how the system is supposed to work.
SMS two-factor authentication may be flawed, but it’s still worth using if it’s the only practical alternative.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.