Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
Protecting data on your computer is key. I’ll look at three common encryption methods.
Is it possible to bank online securely? Yes, if you’re careful.
Effective website security is difficult, and often an afterthought. Not all sites or services store passwords securely.
Sophisticated targeted ads can sometimes seem creepy. Here I explore how a few techniques work, and one I can’t explain at all.
Video chat is probably not monitored, but there’s no way to prove that. If that’s a little too vague for you, then be careful what you do on your computer.
Privilege is a fundamental concept in modern operating system design. We’ll explore what privilege means as used by the CPU when software runs.
Spectre and Meltdown sound scary. Here’s what you need to do, which is hopefully what you’re doing anyway, along with an attempt at an analogy.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
Keeping data secure is important. Being able to password protect a folder seems an obvious approach. Unfortunately, it’s not that simple.
It’s important to back up LastPass, because unexpected things happen. What you do with that backup, however, is critical.
Your LastPass password vault is full of exceptionally important data. Add additional security with two-factor authentication.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
So many sites require a password, it’s very tempting to use only a single password everywhere. That’s dangerous, and there are alternatives.
Letting your anti-malware subscription lapse is never a good idea. I’ll look at why that is, and available alternatives.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
You can’t rely on yourself as a malware detector. Learn how to be a malware avoider.
Making sure your anti-virus program and its definition database are up-to-date is the best way to make sure it can recognize and remove viruses.
There are many different terms that relate to software with malicious intent. Ultimately, however, there’s only one you really need to know, and several things you need to do.
A zero-day attack is very simple: it’s the exploitation of a vulnerability before there’s a fix for it. I’ll review the timeline.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
Wherein we consider how much information we “give away” in our daily lives online.
Microsoft’s response to the recent Windows Defender zero-day vulnerability was an example of how the system is supposed to work.
SMS two-factor authentication may be flawed, but it’s still worth using if it’s the only practical alternative.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.
Do you need a VPN? And if so, which one should you get?
Here are the steps you need to take to prevent losing your account – forever – to a hacker.
VeraCrypt makes is easy to encrypt whole drives, making it safer to travel with your data. Here’s how to safely encrypt and then access your data.
In an apparent contradiction in terms, anything you post online is there forever… yet if you delete something, you also can’t get it back.
The biggest risk to your privacy is probably not what you think it is.
If you’re using an internet connection from a source you don’t trust, there are a few alternatives.
If your device is not physically secure, neither the machine nor your data is, either.
Sometimes, the best way to remove malware is to reboot your system and run a completely separate tool. I’ll list some of the most popular.
When malware prevents your anti-malware tools from working, the built-in Windows Defender Offline is your first line of defense.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far reaching topic. One of the most basic and often overlooked players: the operating system on your device.
Should you want to use BitLocker on a machine or virtual machine that doesn’t support TPM, there’s a single hoop to jump through.
Before giving away a machine or returning a loaner, it’s important to remove personal information from it. That’s both harder and easier than you think.
Remote access to allow someone to fix your machine is appealing. The risks are significant, especially since scammers have become involved.
Privacy and security: tracing the path from your fingertips through the services you use to your information’s final destination.