Articles in Category: Security

Safe?

Am I Safe?

There is no such thing as absolute safety. But there are definitely steps you can take to be as safe as possible.

A hacker typing?

Someone Is in My Computer, Controlling it. What Can I Do?

When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Many of those people are wrong.

Windows Sign-in

Is a Password-protected Windows Login Secure?

Your Windows log-in password gets you surprisingly little real security. I'll look at why that is, why you might still want one, and what I do instead.

Secure Your Account -- Please

Why Your “Unimportant” Accounts Matter

Regardless of your initial thoughts, every account is important, and we are all targets.

Scan

How Do I Run a Full Scan Using Windows Defender?

A full scan scans things a more common "quick scan" bypasses. Here's how to run one using Windows Security.

Computer Despair

My Machine’s Full of Malware; Should I Get a New Computer?

For some reason, many people's gut reaction to a malware infestation is to consider getting a new computer. That's unnecessary.

Malware for You

How Hackers Use Malicious Attachments to Give You Malware

Another day, another report of hackers exploiting vulnerabilities. Here's how you stay safe.

Looking at your keystrokes . . .

Will Using a Password Vault Thwart a Keylogger?

A password tool may bypass a few keyloggers, but not all. Think about your overall computer and account safety first.

Stalker

What Do I Do If I’m Being Harassed, Bullied, or Stalked Online?

Online harassment is common problem, and prevalent among children. I'll review some of the issues and steps to be taken.

No Password!

Is Passwordless Authentication Safe?

Passwordless authentication removes the need for a password and replaces it with something else. But can that be secure?

Virus Detected!

What’s the Best Anti-Virus?

There just isn't a best. Knowing that will (hopefully) lead you in a safer direction.

Three Random Words

Do Random Words Make Better Passwords?

As few as three random words make better passwords than strings of random characters -- but not, perhaps, for the reasons you think.

Password Vault

Responses to Your Three Common Password Manager Objections

Password vaults are a common recommendation by security professionals to improve your online security. Why do so many resist?

Massive Data Breach

A Data Breach Has My Data. What Do I Do?

Another day, another breach. What should you do if you're involved?

Hard Disks (HDD & SSD)

How Should I Wipe My Hard Drive in Windows Before Giving It Away?

Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.

A Server Farm / Data Center

How Do Websites Keep Passwords Secure?

A high-level overview of how websites and services should store passwords security, so next time there's a breach you'll know what to look for.

Encryption (Concept)

Find Your Lost Bitlocker Recovery Key in Your Microsoft Account

BitLocker might be turned on without your knowledge. That's fine, but make sure you have the recovery keys stored somewhere should you ever need them.

Computer Locked

How Do I Access the Computer of Someone Who’s Passed Away?

If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.

The LastPass message

No Email from LastPass? Dealing with Sign-In Problems

While travelling, I signed in to my LastPass account only to be told I needed to confirm an email message that never arrived -- or so I thought.

Worry

What if I Forget My Passwords If I Use Two-Factor Authentication?

Two-factor authentication is different than passwords, but they both share important recovery steps if there's a problem.

Infected

How Do I Safely Back Up an Infected Drive?

Once your machine is infected, system backups are likely to include the infection, but are still important. I'll look at what steps to take.

Off

Can My Computer Be Hacked If It’s Off?

Hacking a turned-off computer requires a few mistakes on your part. It's unlikely, but possible.

Kid for Hire

Should I Just Hire a Hacker to Recover My Account?

Desperation can lead you to consider hiring so-called "legit", "ethical", or "white-hat" hackers to regain control of a your account. Don't do it.

Sereotypical Hooded Hacker Image

Just What Is a Hack?

Hack or hacking can mean several different things -- both good and bad -- depending on the context. I'll review the most common definitions.

Google Search

It’s Important You Know: There Are Ads in Search Results

It's absolutely critical you learn to recognize the difference between advertisements and actual search results.

Sign in to Gmail

How Do I Access Gmail Without Phone Verification?

There are a number of ways to confirm your identity if you don't have your phone. The catch is that most have to be set up before you need them.

Guaranteed?

How Do I Make Sure I Don’t Have Malware?

It's impossible to know your machine has no malware. What does that mean for your safety?

Questoning Flash

Should I Take the Flash Update I’ve Been Offered?

Adobe Flash player is dying dead and should be avoided. I'll explain why you should be cautious if you think you still want it.

Extensions page in Microsoft Edge.

Can Browser Extensions See My Bank Account?

Browser extensions are often installed with little thought to the immense security risk they present.

Virus Detected!

How Do I Remove Malware that Blocks Downloads?

Some malware goes to great lengths to prevent you from downloading, running, or applying a fix. I'll tell you what steps to take.

System Login Dialog

Should Your Username be More Like a Password?

Occasionally people suggest that usernames should be treated like passwords. While there's some merit to the idea, it's ultimately impractical.

A two-factor key fob.

The Easy-to-Avoid Two-Factor Loss Risk

Two-factor authentication is an important tool to keep accounts secure, but prepare for losing the second factor so you don't lose your account.

Ransomware

How to Protect Your Cloud Storage and Backups from Ransomware

There are additional protections for your data if your machine becomes infected with a form of malware known as ransomware.

All the eggs - One basket.

Isn’t Storing Your Passwords In One Place a Security Risk?

Yes, password managers put all your information in one place. It better be a very good place.

Password

Are Longer Passwords Better, Even If They’re Simpler?

A longer password of repeating characters is more secure than a short complicated password -- but there's more to security than cracking.

SMS Eavesdropping

Yes, SMS Two-Factor Authentication is Broken; Use it Anyway

SMS messaging has some serious security vulnerabilities, but does that mean you should always avoid it? No.

Password

9 Ways Your Account Can Be Compromised, Even with a Super-strong Password

Strong passwords are important, but they don't protect you from everything. I'll look at other ways your account can be compromised.

Sign Out

Should I Always Sign Out of My Online Account?

It is perfectly safe to stay signed in to your online account as long as you're protected from a few specific scenarios.

Locked Laptop

How Do I Protect My Laptop Data from Theft?

Laptops are portable, convenient, and easily lost. If lost, all your data could easily be available to the finder. Encryption is the answer.

Making sure it's you

What’s the Best Two-Factor Authentication Option?

The best two-factor authentication approach varies based on your needs, and what's offered by the service you're trying to use it with.

What Now, Lastpass?

What Should I Do About the Changes to LastPass Free?

LastPass is changing the terms of their free service. Find out if you're affected, and what to do if you are.

Laptop in a Hotel Conference Room

Can Hotel Internet Traffic Be Sniffed?

Many hotels offer both wired and wireless internet, but with those hotel internet connections comes a security risk most folks don't consider.

Locked Computer

What Can a Computer Thief See If I Password Protect My Windows Sign-in?

Password-protecting your Windows login does not protect your computer's data, particularly if the computer is stolen.

Personal Privacy

The Biggest Risk to Your Privacy Revealed

We worry a lot about privacy, but our concerns are often misplaced. Fortunately, the biggest risk to our personal privacy is right under our nose.

Google & YouTube

Can I Have Different Passwords for YouTube and Gmail?

A Google account includes Gmail, YouTube, and much more. If you want to keep those services separate, you'll need separate Google accounts.

Vault

Why Password Managers Are [Still] Safer than the Alternatives

If you're not using a password manager, you're likely compromising your security more than necessary. Here's why using one is safer.

Sign in with email message

Is Passwordless Sign-in Safe?

Signing in without a password seems almost nonsensical, yet it can be more secure than traditional sign-ins. More convenient? That depends.

Privacy?

You’re Just Not That Interesting (Except When You Are)

Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.

Two Factor Authentication

How Two-Factor Authentication Works

Two-factor authentication is a great way to keep your accounts secure from hackers -- even those who manage to get your password.

Ransomware!

Will Ransomware Encrypt Backups?

A full-image backup is still the best defense against ransomware. But what if your backup gets encrypted? I'll look at the likelihood of that happening and make some recommendations.