Articles in Category: Security

A concerned young man with large glasses holding a pink eraser beside a laptop. The laptop screen displays the Windows logo and icons of a folder, a document, and a trash can. The background is warm-toned, and there's a cup of pencils on the desk.

How Can I Securely Delete Everything Except the Operating System?

Before giving away a machine or returning a loaner, it’s important to remove your personal information from it. That may be both harder and easier than you think. I’ll show you where traditional suggestions fail, and what you need to do instead.

Landlord handing over the keys.

Is Internet Provided by My Landlord Safe?

Connectivity is becoming an added perk in some housing situations. Make sure you know the risks and alternatives when someone else provides your internet connection.

Hovering over a link.

How to Hover Over a Link to Check It’s Not a Scam

When it comes to links on webpages and HTML email, what you see is not always where you go. Hovering over a link is an important technique to look before you leap.

two individuals communicating using tin cans and strings, with a padlock and sheild on top of the string

How End-to-End Encryption Protects Your Messages and Where It Fails

You would think that for such an important concept as end-to-end encryption there’s be some agreement on exactly what it means. Sadly, not so. There’s the correct definition, and then there’s the marketing definition. One protects you, the other not so much.

A giant fishing hook labeled “Login Here” dangles in front of a surprised user character sitting at a desk, with warning icons and blinking red alerts on their screen. Behind the screen, a sneaky figure smirks.

Many Ways Your Account Can Be Hacked and What to Do About It

There are many ways accounts can be compromised. There are also many simple ways you can protect yourself.

A friendly-looking cartoon desktop computer beams confidently, but above it hovers a large, glowing, animated question mark. In the background, shadowy "virus" characters lurk just out of view — barely noticeable unless you look closer — representing the unseen uncertainty.

Can You Really Know Your PC Is Clean and Malware-Free?

It’s common to want confirmation your machine hasn’t been compromised in some way. We can get close, but we can’t prove it.

Passwords versus Passkeys

Passkeys Are Never the Only Way In

Losing a device with a passkey to one of your accounts will not lock you out.

Eyeball peeking into a bathroom.

How Does Security Software Protect Me After Windows 10 End of Support?

Security updates and security software have different jobs, and that difference matters.

Is it encrypted?

How Do I Know If My Hard Disk Is BitLocker-Encrypted?

Even running Windows Home edition, your hard drive might be BitLocker-encrypted without you realizing it. If you don’t have the recovery key, you could lose everything. Learn how to check, why it matters, and the simple steps to protect yourself before it’s too late.

A locked(?) drive.

Protecting Your Data: Why I Avoid Most Pre-Installed Security and Encryption Software

External hard drives often come with security and backup software. I’m not convinced it should be used.

Bitlocker Protected External Drive

BitLocker vs. Cryptomator: Why I Use Both (and When You Should, Too)

Use different tools for different purposes.

Microsoft Authenticator

What Happens If I Lose My Microsoft Authenticator App?

Microsoft Authenticator is not necessarily two-factor authentication, but the two do share one important characteristic: the need to prepare for loss.

A man with a shotgun labeled telemetry shooting a hole through a shield labelled VPN.

Does a VPN Protect Me From Telemetry and Other Data Gathering?

VPNs don’t impact data tracking or collection. We’ll look at why that is and what you might want to do about it.

Cryptomator versus VeraCrypt

Cryptomator vs VeraCrypt: Which Do You Want?

Cryptomator and VeraCrypt are both excellent encryption tools. We’ll look at how to choose the right one for your situation.

You backup your vault, right?

How to Back Up 1Password and Why You Should

Backing up is important, and that includes your password vault.

Sign Out

Should I Always Sign Out of My Online Account?

It is safe to stay signed in to your online account as long as you’re protected from a few specific scenarios.

1-800-SCAMMER

Do Not Search for Support Phone Numbers

You want a phone number to call. Scammers known this and try to insert themselves in the process.

A dimly lit prison cell. Inside the cell stands a hacker figure wearing a hoodie and holding a laptop, looking apprehensive. A bold sign reading 'Quarantine' hangs above the cell door.

What Does It Mean to Quarantine Malware? And Is It Safe?

A quarantine keeps you safe from malware.

A desktop PC on a clean desk with a visible inbox showing spam or threatening emails on the screen.

Think Before You Share: Protecting Yourself From Email Harassment

It’s so common to give away personal information, we don’t think twice about it. Let’s start thinking twice.

A traveler in an airport lounge with a worried expression, sitting at a table. The background includes bright airport signage, large windows with planes visible, and an empty laptop bag on the chair beside them. The traveler is dressed casually, suggesting they are stranded without digital devices.

How to Recover When You Lose Everything Traveling

Imagine you’re traveling overseas and all your digital “stuff” is lost. What do you do? How do you reconnect?

A desktop PC setup on a clean, modern desk with a YouTube video comment section displayed on the screen. A large red flag icon hovers subtly over one of the comments to symbolize a scam warning.

Why Am I Seeing These Odd Crypto-Currency “Help Me” Comments?

Just ignore seed-phrase scams.

A PC with a clean, minimal desk setup in a softly lit room illuminated by a warm desk lamp and the subtle glow of a NAT router with blinking lights. The background hints at a cozy nighttime setting with subtle shadows, creating a secure and calming atmosphere.

Does Turning a Computer Off at Night Keep It Safer From Hackers?

There are reasons to turn your computer off at night or leave it running. Getting hacked isn’t one of them.

A desktop Windows PC with a bold red warning message on the screen reading 'System Compromised.' The background suggests a cybersecurity breach, with dark tones and a subtle hint of digital chaos, such as faint binary codes or digital artifacts. The setting is an office desk setup with realistic details like a coffee mug, a notepad, and a dimly lit, tense atmosphere.

How Do I Make Sure Malware is Gone?

Of course we want to be certain malware has been removed. Unfortunately, certainty is difficult to come by.

An elderly man, looking concerned and focused, sitting at a computer. The screen shows a warning message or a phishing attempt. The setting is a home office, with the elderly man staring intently at the computer screen.

How Scammers Steal Your Money

We’re all vulnerable to scammers. Learn the warning signs.

A sleek AI-style humanoid robot holding a sign that says 'Trust Me' in bold letters.

More Tips to Protect Yourself from AI Scams

AI has entered the chat. And the email. And the voice call. And the video. And it’s making scams even harder to detect.

A laptop with a large red warning symbol on the screen and a smartphone nearby displaying an unknown caller notification.

Online and Phone Scams: What to Watch For and How to Stay Safe

Know the characteristics of online and phone scams, and don’t be afraid to take steps to protect yourself.

A woman looking at her mobile phone with suspicion.

Why Do Services Like Google and Microsoft Ask for a Phone Number?

Many online services request your phone number. I’ll look at how that’s typically used and why it’s a good thing.

A close-up of a laptop screen displaying a secure login interface, with a lock icon and fields for entering a password and two-factor authentication. A smartphone with a 2FA app is visible beside the laptop, symbolizing added security layers.

Secure Your Most Important Accounts

Experts always recommend securing your “most important accounts”. Great. Which accounts would those be?

Text: You've been hacked - or have you?

Why Your Computer Has Probably Not Been Hacked

I regularly hear from people who believe their computer has been hacked and is under someone else’s control. It’s very rarely the case.

Two Factor Authentication

Think 2FA Is Bulletproof? Here’s Why You’re Still Vulnerable

Two-factor authentication is one of the most important ways you can secure your online accounts. But that doesn’t mean you’re done.

A blurred screen with a video call window displaying a convincing deepfake video of a person, alongside a separate speaker icon indicating AI-generated voice mimicry. The background has a person in a dark room, looking confused or shocked while on their smartphone, symbolizing the unsettling reality of AI scams.

How AI is Revolutionizing Scams: Can We No Longer Trust Our Eyes or Ears?

Scams are bad enough. Throw AI into the mix, and things only get worse.

A detailed digital lock displayed on a screen split into two sections. One side shows a bright, traditional key symbol representing user access, with a secure and clean digital interface. The other side has a faint, shadowy master key symbol, appearing ominous and subtly blending into a darker background, representing potential government or third-party access.

Why Encryption Backdoors Are a Horrific Idea

A phrase we’ve heard more and more often in recent years is encryption backdoor. The concept is simple: government agencies want to be able to monitor otherwise encrypted communications. The concept is flawed.

Enter two-factor code.

How to Add Two-Factor Authentication to Your Google Account

Adding the most common and secure form of two-factor authentication to your account.

Stay signed in checkbox.

Is Automatic Sign-in Safe for My Email?

Having your email automatically or continually signed in to can be a security risk in some situations, but very convenient in others.

No passwords!

Going Passwordless Without Going Passwordless

Passwords are dying. On some services, you can start playing with the process by creating a secure password… and then forgetting it.

A home office desk with a frustrated man sitting in front of a computer. The screen shows multiple reminders for password changes, with sticky notes scattered around displaying various passwords crossed out. The man's expression reflects annoyance, with his hand on his forehead.

Is a Periodic Password Change a Good Thing?

Conventional wisdom says to change your passwords periodically. I disagree.

Ultra AV home page.

What Is Ultra AV, and Why Did it Show Up On My Machine?

If you’ve suddenly found an unfamiliar antivirus program running on your computer, you’re not alone.

A modern living room with a smartphone on a coffee table and a smart speaker like an Amazon Echo nearby. The smartphone displays coffee maker ads, hinting at targeted advertising. In the background, two people are having a casual conversation, creating a subtle connection to the idea of being 'listened to' by smart devices.

Is My Smartphone or Smart Device Listening In on Me?

It’s not uncommon to think our smart devices are listening in when advertisements seem to follow our discussions.

The image shows a smartphone with a biometric fingerprint scanner in the center, representing device unlocking. In the background, there are abstract digital locks, key symbols, and security shields surrounding the phone to symbolize online security and protection.

Is a Passkey Two-Factor Authentication?

Passkeys are secure, but they’re not two-factor authentication in and of themselves. I’ll run the scenarios that explain why that is and when 2FA might be involved as well.

A lone traveler standing in an empty urban environment with no belongings except the clothes on their back, looking at a locked phone screen with a confused expression.

What If I Lose Everything When Traveling?

I hear from people who are concerned that they’ve put so much security in place they’ll keep themselves out in case of emergency.

An image representing the aftermath of a major data breach. The image should depict a desktop with a computer screen displaying a warning message about a security breach. Surrounding the computer, there are items like a credit card, bank statements, and a Social Security card, symbolizing personal data. The scene is tense and chaotic, with a newspaper headline about the breach visible in the background. The overall mood should be one of caution and urgency, emphasizing the need to protect personal information.

Social Security Number Compromised — What to Do?

Billions of records of personal information, including Social Security numbers, has been exposed. What to do?

A photorealistic image showcasing two-factor authentication. The scene includes a smartphone displaying a 2FA app a laptop with a password manager open, and a social security website login page on a desktop screen. The background is a modern, well-lit office setup. The devices are positioned to emphasize cross-platform usability, with a focus on security.

What’s the Best Two-Factor App?

Two-factor authentication adds a vital layer of security to your accounts, but which app should you trust? From Google Authenticator to password managers and cross-platform options, I’ll break down the best choices so you can pick the one that fits your devices, your needs, and gives you peace of mind.

A finger pressing onto a fingerprint reader. The fingerprint reader is a modern, sleek device with a glowing blue light indicating where the finger should be placed. The background is a clean, minimalist setting, emphasizing the interaction between the thumb and the fingerprint reader.

More Passkey Questions

Passkeys seem like magic, and confusing magic at that. I’ll address a set of questions I received recently.

Made In Russia

What to Do About Kaspersky Antivirus

Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?

A bright and simple photorealistic image showing a computer screen displaying a password change interface, with a large padlock icon. The background is minimal, with faint outlines of a smartphone and a tablet, emphasizing multiple access points. A person’s hand is seen typing on the keyboard, indicating action being taken to secure the account.

Changing Your Password After a Hack May Not Be Enough

Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.

Setting up or using a passkey.

What If There’s a Passkey on My Lost Phone?

Losing a device with a passkey isn’t a disaster at all. I’ll describe why that is.

A person receiving a scam call. The person looks confused while holding a phone. A large speech bubble from the phone says 'Give me the code!' Contrasting this, another speech bubble from a nearby computer screen says 'Never share this code.'

One-Time Code Contradiction: When to Share and When to Beware

You’re told not to share your two-factor or other authentication code. And then you’re asked for it.

Padlock in a chain.

Can Someone Install Something on My Computer When It’s Not Logged In?

If your computer is not physically secure, someone could install something even if you’re not logged in.

A home office with a modern aesthetic. In the foreground, a sleek desktop computer sits on a well-organized desk, surrounded by typical office supplies and decor. The room is warmly lit, creating a cozy work environment. Through the window, a slightly creepy figure is peeking in, adding a subtle element of suspense to the scene. The outside view shows a typical residential setting, enhancing the sense of a home office.

Surprising Reasons to Use a VPN at Home: More Than Just Privacy

Although a VPN service is probably not necessary at home, there are a few scenarios where you may want to consider it.

A photorealistic image of a modern smartphone displaying a notification for an unexpected two-factor authentication request.

What to Do With an Unexpected Two-factor Code

Getting an unexpected authorization code on your phone or via email can be concerning. Let’s see when it’s a sign of a problem and what to do about it.