Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.
You should be able to remove any toolbars or browser settings that have been added to your computer.
I have recommendations for specific security software and techniques in various places on the site. Here’s a short summary.
If you discover that your email address is part of a breach, you probably do not need to change it. But there are steps to take to protect yourself.
Password Checkup is a browser extension that tells you if the password you’re using has been discovered by hackers.
Headlines are proclaiming that two-factor authentication has been hacked. That in no way means you shouldn’t use it. Your account is still much safer with two-factor enabled.
It’s extremely difficult for an average user to tell if a hack is in progress. I’ll touch on a few approaches, and discuss why prevention is best.
Another scare about two-factor authentication perhaps being hackable? DO NOT let that stop you from using it.
Overseer.exe can be left behind after an uninstall of Avast Free Anti-virus. Deleting it is a two-step process.
Another week, another breach. What steps should you take in the wake of the latest large-scale data breach?
Here are the steps you need to take to prevent losing your account — forever — to a hacker.
I see people lose access to their important accounts all the time. Most frustrating is that it’s often their own fault that they can’t regain access.
The results are in for last year’s most common passwords. The implications are depressing, but important.
If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.
There’s a lot of garbage on the internet, and it’s difficult to prevent your children from seeing it. There are tools to help and steps to take.
As much as you might wish it otherwise, it’s just not practical to try and hide your computer activity from your employer.
Headlines to the contrary, it’s BitLocker to the rescue to protect yourself from some vulnerabilities discovered in drives providing hardware-based encryption.
If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?
Password vaults are good at keeping track of passwords, but not answers to security questions. There is a technique you can use to help.
Given how much we’ve come to rely on them, are you prepared to lose your mobile device?
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Email is a fairly insecure media. There are many things that can go wrong when email gets delivered, and protecting yourself can be difficult.
Websites can collect a fair amount of information about you. Let’s look at what every website sees.
A VM doesn’t get you any additional privacy from your ISP… although it might be a convenience as part of a more complete solution.
It’s impossible to know your machine has no malware. What does that mean for your safety?
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
VeraCrypt provides a solution for encrypting sensitive data — everything from portable, mountable volumes to entire hard disks.
Unless a password’s been changed, it’s difficult for a typical user to tell if their computer or account is being hacked.
Even with seemingly appropriate security in place, things can happen. I’ll review what things, and the additional steps you can take to protect yourself.
Password security has never been more important. With occasional security breaches at service providers and rampant email account theft, make sure you’re choosing and using secure passwords.
It’s a worthwhile exercise to download the data made available by Google and Facebook, if only to realize exactly what information is being kept.
Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
Protecting data on your computer is key. I’ll look at three common encryption methods.
Is it possible to bank online securely? Yes, if you’re careful.
Effective website security is difficult, and often an afterthought. Not all sites or services store passwords securely.
Sophisticated targeted ads can sometimes seem creepy. Here I explore how a few techniques work, and one I can’t explain at all.
Video chat is probably not monitored, but there’s no way to prove that. If that’s a little too vague for you, then be careful what you do on your computer.
Privilege is a fundamental concept in modern operating system design. We’ll explore what privilege means as used by the CPU when software runs.
Spectre and Meltdown sound scary. Here’s what you need to do, which is hopefully what you’re doing anyway, along with an attempt at an analogy.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
Keeping data secure is important. Being able to password protect a folder seems an obvious approach. Unfortunately, it’s not that simple.
It’s important to back up LastPass, because unexpected things happen. What you do with that backup, however, is critical.
Your LastPass password vault is full of exceptionally important data. Add additional security with two-factor authentication.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.