Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
You can’t rely on yourself as a malware detector. Learn how to be a malware avoider.
Making sure your anti-virus program and its definition database are up-to-date is the best way to make sure it can recognize and remove viruses.
There are many different terms that relate to software with malicious intent. Ultimately, however, there’s only one you really need to know, and several things you need to do.
A zero-day attack is very simple: it’s the exploitation of a vulnerability before there’s a fix for it. I’ll review the timeline.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
Wherein we consider how much information we “give away” in our daily lives online.
Microsoft’s response to the recent Windows Defender zero-day vulnerability was an example of how the system is supposed to work.
SMS two-factor authentication may be flawed, but it’s still worth using if it’s the only practical alternative.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.
Do you need a VPN? And if so, which one should you get?
Here are the steps you need to take to prevent losing your account – forever – to a hacker.
VeraCrypt makes is easy to encrypt whole drives, making it safer to travel with your data. Here’s how to safely encrypt and then access your data.
In an apparent contradiction in terms, anything you post online is there forever… yet if you delete something, you also can’t get it back.
The biggest risk to your privacy is probably not what you think it is.
If you’re using an internet connection from a source you don’t trust, there are a few alternatives.
If your device is not physically secure, neither the machine nor your data is, either.
Sometimes, the best way to remove malware is to reboot your system and run a completely separate tool. I’ll list some of the most popular.
When malware prevents your anti-malware tools from working, the built-in Windows Defender Offline is your first line of defense.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far reaching topic. One of the most basic and often overlooked players: the operating system on your device.
Should you want to use BitLocker on a machine or virtual machine that doesn’t support TPM, there’s a single hoop to jump through.
Before giving away a machine or returning a loaner, it’s important to remove personal information from it. That’s both harder and easier than you think.
Remote access to allow someone to fix your machine is appealing. The risks are significant, especially since scammers have become involved.
Privacy and security: tracing the path from your fingertips through the services you use to your information’s final destination.
It’s important to consciously choose which software and online services to trust – whether they are directly related to security or not.
Should you trust your security software to make the right recommendations? Typically, yes, as long as you’re using reputable software.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
For many, it’s important to be able to encrypt a disk entirely. Particularly if a portable machine contains sensitive data, whole-disk encryption is key.
It’s not uncommon to want to encrypt a folder and all it contains. There are several techniques to encrypt a folder, each with pros and cons.
Since most encryption tools are designed to encrypt collections of files, the best approach to encrypt a file isn’t always obvious. I’ll look at a couple of alternatives.
You avoid ransomware the same way you avoid any malware. On top of that, a full backup can save you not only from ransomware, but from a host of other problems as well.
It may seem like privacy is a thing of the past. I believe we misunderstand privacy, and can control more than we think.
Laptops are portable, convenient, and easily lost. If lost, all the data could easily be available to the finder. Encryption is the answer.
Internet Safety is difficult, yet critical. Here are seven key steps to keep your computer safe on the internet.
I see people lose access to their important accounts all the time. Most frustrating is that it’s often their own fault that they can’t regain access.
Password protecting your Windows login does not protect your computer’s data, particularly if the computer is stolen.
Password management utilities are great tools to not only manage your passwords, but be more secure about how you use them.
Two-factor authentication is a great way to keep your accounts secure from hackers – even those who manage to get your password.
Many hotels offer both wired and wireless internet, but along with those hotel internet connections comes a security risk most folks don’t consider.
Some malware goes to great lengths to prevent you from downloading, running, or applying a fix. I’ll tell you what steps to take.
Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your … bathroom.
Casually installing one download may result in several other things being installed as well. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
I have recommendations for specific security software and techniques in various places on the site. Here’s a short summary.
Using different passwords on different sites is not only good practice – it’s actually necessary to keep your accounts safe. I’ll review why, and how best to handle a plethora of passwords.
If we could all be just a little more skeptical, we’d be safer, and the internet could be a more trustworthy place.
A full-image backup is still the best defense against ransomware. But what if your backup gets encrypted? I’ll look at the likelihood of that happening and make some recommendations.