Articles in Category: Security

Five Reasons Ransomware Will Be Around for a Long Time

Five Reasons Ransomware Will Be Around for a Long Time

There are several reasons ransomware will be a scourge for some time to come. Most boil down to, well, us.

Avoid Ransomware!

How to Avoid Ransomware

Avoid ransomware the same way you avoid any malware. A full backup will save you not only from ransomware, but from a host of other problems as well.

How Do I Bypass Keyloggers? The Guaranteed Way to Avoid Having Your Keystrokes Maliciously Recorded

How Do I Bypass Keyloggers? The Guaranteed Way to Avoid Having Your Keystrokes Maliciously Recorded

I hear about techniques to bypass keyloggers often. The problem is, keyloggers can log much more than keystrokes. There’s really only one solution: avoid them in the first place.

Has My Computer Been Hacked? A List of Clues and Steps to Take

Has My Computer Been Hacked? A List of Clues and Steps to Take

When you see the list of possible hacking signs, it’s easy to jump to the conclusion your computer has been hacked. It’s usually not the case. Regardless, prevention is always easier than recovery from an actual hack.

What if I Lose My Second Factor?

What If I Lose My Second Factor?

When you lose your second factor, there are two things to be concerned about: getting into your own account — for which you should be prepared — and someone else having access to your second factor — which isn’t as scary as it sounds.

RAID array

How Do You Delete Things from the Internet?

Realistically, it’s impossible to delete things from the internet. Yet in an apparent contradiction in terms, if you happen to delete something in your control, you also can’t get it back.

Your password is . . .

Why Can’t Online Services Tell Me My Password?

It’s for your own protection, and the result of fascinating mathematical wizardry. And if they can tell you your password? They’re doing security wrong.

Locked Laptop

How to Protect Data on a Laptop

You REALLY need to protect your sensitive data if your laptop runs even the slightest risk of being stolen. It’s critical that you protect it (and yourself) with these four appropriate security steps.

Are You Ready for Your Computer to be Stolen?

Are You Ready for Your Computer to be Stolen?

You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.

Spyware

Can My Work Spy on My Home Computer?

Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.

Windows 10 Windows Security app

What’s the Difference Between Windows Defender, Windows Security, and Microsoft Security Essentials?

Windows Security is Windows Defender is Microsoft Security Essentials, by any other name. Windows Defender has also had different meanings over the years.

Password Field Entry

Who’s Trying to Change My Password?

If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.

Microsoft Account Recovery Code - What and Why with Instructions Included

Microsoft Account Recovery Code

Possession of a Microsoft account recovery code is proof you are the account owner and should be allowed in should you ever lose account access.

What's a "Zero-Day" Attack? A Diagram of the Vulnerability Timeline

What’s a “Zero-Day” Attack? A Diagram of the Vulnerability Timeline

A zero-day attack is an exploitation of a software vulnerability before there’s a fix for it. I’ll review the timeline.

Working From Home

Can My Workplace See What Else I Do When I Work from Home?

Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?

Working from home

Five Steps to Better Security Working from Home

Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.

A video chat in progress.

Can Your Video Chat Be Intercepted and Recorded?

Your video chats are usually private and encrypted, but nothing is foolproof. The real risk isn’t hackers; it’s the person on the other end, who can record everything. Learn why interception is rare, where the real danger lies, and the one rule to follow if you’re unsure.

Keep Calm and Mark as Spam

How Do I Leave Services I Didn’t Request?

Unauthorized use of your email address is rarely anything more serious than annoyance.

A cockroach surviving an explosion.

Can Malware Survive If I Reset My PC?

Worried a reset won’t wipe out malware? While it’s technically possible for some infections to survive, it’s extremely rare. Learn where malware can hide, which reset options are safest, and the extra steps you can take to ensure a truly clean and secure Windows reinstall.

Password

How Do I Choose a Good Password?

With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.

Downloading

Can the Owner of an Open WiFi Hotspot See What Files I’m Downloading?

Open WiFi hotspot downloads are available for the internet cafe owner to see. Whether or not they take the time to do it is another story!

Malware

Why Does Malware Exist?

Malware has come a long, long way since it began as a benign joke or proof-of-concept. Today, most malware boils down to someone, somewhere, making money.

Secure?

How Can an Https Website Still Not Be Secure?

Surprisingly, it’s possible for aspects of an https site to still not be secure, if the site is improperly designed. And it’s extremely difficult to tell.

Goodbye!

How Do I Remove Myself From a Computer?

Leaving a job and worried about what’s on your work computer? From browser history to email accounts, traces of you remain. Learn what you can (and can’t) erase, and the smartest way to protect your privacy before you walk out the door.

You've Been Hacked!

What Can We Learn from Mat Honan?

Mat Honan is a reporter for Wired magazine whose digital life was effectively destroyed due to account hacks and lax security policies. There are important lessons here.

How Do I Find Who Hacked My Email?

How Do I Find Who Hacked My Email Account?

It’s natural to want to find out who hacked your email and why. Begin by recovering and securing your account. I’ll review what steps you can take after that, and their chances of success.

Whole Disk Encryption

Does Whole-disk Encryption Impact Computer Performance?

Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.

Why Password Vault Bugs Make Me Cringe

In those rare cases where an issue is discovered with any mature password vault, I cringe — but not because of the issue.

Lastpass displaying an entry

How Do Password Vaults Enter Passwords?

Detecting and filling in sign-in forms is a password vault’s most basic feature. I’ll look at how that works, and what to do when it fails.

Best Choice!

What’s the Best Anti-Malware Tool to Keep Me Safe?

Over the years, your choices when it comes to anti-malware tools have become simpler, yet frustratingly imprecise.

How to Choose Good Security Questions

How to Choose Good Security Questions

Security questions are a cornerstone of much internet security. I’ll look at what they are, how they fail, why you should avoid them, and what to do if you can’t.

Computers at a library

How to Keep Information on a Shared Computer Private

When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.

Remote Access -- to your wallet

What Can a Technician with Remote Access Do?

Several current scams center around gaining remote access to your computer, often in the guise of fixing problems. There’s no way to know what was done, but we do know one thing: it’s a trap!

Is Online Banking Safe?

Is Online Banking Safe?

You can bank online safely, as long as you know what to look for and what steps to take.

Telephone Corgi

Why Do People Think a Phone is More Secure than Email?

Even though digital communications are generally safer than their old analog counterparts, many people still mistrust them.

An onion

Can My School Tell I’m Using Tor?

Your school (or whoever provides your internet connection) can see what you’re connecting to. Do they? There’s no way to know.

What Happened to TrueCrypt and What Do I Use Instead?

What Happened to TrueCrypt and What Do I Use Instead?

The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.

Which Files Were Affected by a Hack or Malware?

Which Files Were Affected by a Hack or Malware?

After a hack or malware infection, you’ll want to know you’ve cleaned up the resulting mess. The news is not good.

Can My Mobile Provider Track What I Do Online?

Can My Mobile Provider Track What I Do Online?

Your mobile provider is indeed your ISP when you use their data services, and that means they can see a lot of your activity.

What was that password?

How Can I Recover My Current Account Password

Trying to recover the existing password for an online account is usually an exercise in frustration. There’s one possible straw to grasp at.

Security!

Is an Up-to-Date Browser Secure on an Out-of-Date OS?

An up-to-date web browser is important, but it’s not the whole picture, by far.

Malware

How Can I Tell If a Download is Safe?

Checking whether a download is safe before you download it is nearly impossible. Your best defense is your own skepticism, plus anti-malware tools to scan what you choose to download.

Password

The State of Passwords in 2019

Password are here to stay, at least for a while longer. Until they die, here’s quick review of how to make sure yours are as secure as possible.

ask.com today

How Do I Get Rid of Ask.com?

You should be able to remove any toolbars or browser settings that have been added to your computer.

Your password appeared in a breach.

Password Checkup: A Recommended Chrome Browser Extension

Password Checkup is a browser extension that tells you if the password you’re using has been discovered by hackers.

CCleaner Install with Avast as a PUP

How Do I Get Rid Of “overseer.exe”?

Overseer.exe can be left behind after an uninstall of Avast Free Anti-virus. Deleting it is a two-step process.

A Child on the Internet

How Do I Keep My Kids Safe from Internet Garbage?

There’s a lot of garbage on the internet, and it’s difficult to prevent your children from seeing it. There are tools to help and steps to take.

Decrypting a Bitlocker drive.

Use BitLocker to Bypass Potential Self-Encrypting Drive Vulnerabilities

Headlines to the contrary, it’s BitLocker to the rescue to protect yourself from some vulnerabilities discovered in drives providing hardware-based encryption.

Secure Note

How Can I Use a Password Manager for My Security Questions?

Password vaults are good at keeping track of passwords, but not answers to security questions. There is a technique you can use to help.

Pickpocket

Don’t Lose Your Phone: Here’s What Can Happen (and How to Prepare)

Given how much we’ve come to rely on them, are you prepared to lose your mobile device?