Articles in Category: Security

RAID array

How Do You Delete Things from the Internet?

Realistically, it’s impossible to delete things from the internet. Yet in an apparent contradiction in terms, if you happen to delete something in your control, you also can’t get it back.

Your password is . . .

Why Can’t Online Services Tell Me My Password?

It’s for your own protection, and the result of fascinating mathematical wizardry. And if they can tell you your password? They’re doing security wrong.

Locked Laptop

How to Protect Data on a Laptop

You REALLY need to protect your sensitive data if your laptop runs even the slightest risk of being stolen. It’s critical that you protect it (and yourself) with these four appropriate security steps.

Are You Ready for Your Computer to be Stolen?

Are You Ready for Your Computer to be Stolen?

You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.

Spyware

Can My Work Spy on My Home Computer?

Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.

Windows 10 Windows Security app

What’s the Difference Between Windows Defender, Windows Security, and Microsoft Security Essentials?

Windows Security is Windows Defender is Microsoft Security Essentials, by any other name. Windows Defender has also had different meanings over the years.

Password Field Entry

Who’s Trying to Change My Password?

If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.

Microsoft Account Recovery Code - What and Why with Instructions Included

Microsoft Account Recovery Code

Possession of a Microsoft account recovery code is proof you are the account owner and should be allowed in should you ever lose account access.

What's a "Zero-Day" Attack? A Diagram of the Vulnerability Timeline

What’s a “Zero-Day” Attack? A Diagram of the Vulnerability Timeline

A zero-day attack is an exploitation of a software vulnerability before there’s a fix for it. I’ll review the timeline.

Working From Home

Can My Workplace See What Else I Do When I Work from Home?

Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?

Working from home

Five Steps to Better Security Working from Home

Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.

Video Chat

Can Your Video Chat Be Intercepted and Recorded?

Video chat is probably not monitored, but there’s no way to prove that. If that’s too vague for you, then be careful what you do on your computer.

Keep Calm and Mark as Spam

How Do I Leave Services I Didn’t Request?

Unauthorized use of your email address is rarely anything more serious than annoyance.

Explosion

Can Malware Survive If I Reset My PC?

It’s possible for malware to be difficult or nearly impossible to remove. It’s also extremely rare.

Password

How Do I Choose a Good Password?

With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.

Downloading

Can the Owner of an Open WiFi Hotspot See What Files I’m Downloading?

Open WiFi hotspot downloads are available for the internet cafe owner to see. Whether or not they take the time to do it is another story!

Malware

Why Does Malware Exist?

Malware has come a long, long way since it began as a benign joke or proof-of-concept. Today, most malware boils down to someone, somewhere, making money.

Secure?

How Can an Https Website Still Not Be Secure?

Surprisingly, it’s possible for aspects of an https site to still not be secure, if the site is improperly designed. And it’s extremely difficult to tell.

Goodbye!

How Do I Remove Myself from a Machine?

Although there’s no way to remove all traces of yourself from a machine, there certainly are ways to remove as much as you can.

You've Been Hacked!

What Can We Learn from Mat Honan?

Mat Honan is a reporter for Wired magazine whose digital life was effectively destroyed due to account hacks and lax security policies. There are important lessons here.

How Do I Find Who Hacked My Email?

How Do I Find Who Hacked My Email Account?

It’s natural to want to find out who hacked your email and why. Begin by recovering and securing your account. I’ll review what steps you can take after that, and their chances of success.

Whole Disk Encryption

Does Whole-disk Encryption Impact Computer Performance?

Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.

Why Password Vault Bugs Make Me Cringe

In those rare cases where an issue is discovered with any mature password vault, I cringe — but not because of the issue.

Lastpass displaying an entry

How Do Password Vaults Enter Passwords?

Detecting and filling in sign-in forms is a password vault’s most basic feature. I’ll look at how that works, and what to do when it fails.

Best Choice!

What’s the Best Anti-Malware Tool to Keep Me Safe?

Over the years, your choices when it comes to anti-malware tools have become simpler, yet frustratingly imprecise.

How to Choose Good Security Questions

How to Choose Good Security Questions

Security questions are a cornerstone of much internet security. I’ll look at what they are, how they fail, why you should avoid them, and what to do if you can’t.

Computers at a library

How to Keep Information on a Shared Computer Private

When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.

Remote Access -- to your wallet

What Can a Technician with Remote Access Do?

Several current scams center around gaining remote access to your computer, often in the guise of fixing problems. There’s no way to know what was done, but we do know one thing: it’s a trap!

Is Online Banking Safe?

Is Online Banking Safe?

You can bank online safely, as long as you know what to look for and what steps to take.

Telephone Corgi

Why Do People Think a Phone is More Secure than Email?

Even though digital communications are generally safer than their old analog counterparts, many people still mistrust them.

An onion

Can My School Tell I’m Using Tor?

Your school (or whoever provides your internet connection) can see what you’re connecting to. Do they? There’s no way to know.

What Happened to TrueCrypt and What Do I Use Instead?

What Happened to TrueCrypt and What Do I Use Instead?

The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.

Which Files Were Affected by a Hack or Malware?

Which Files Were Affected by a Hack or Malware?

After a hack or malware infection, you’ll want to know you’ve cleaned up the resulting mess. The news is not good.

Can My Mobile Provider Track What I Do Online?

Can My Mobile Provider Track What I Do Online?

Your mobile provider is indeed your ISP when you use their data services, and that means they can see a lot of your activity.

What was that password?

How Can I Recover My Current Account Password

Trying to recover the existing password for an online account is usually an exercise in frustration. There’s one possible straw to grasp at.

Security!

Is an Up-to-Date Browser Secure on an Out-of-Date OS?

An up-to-date web browser is important, but it’s not the whole picture, by far.

Malware

How Can I Tell If a Download is Safe?

Checking whether a download is safe before you download it is nearly impossible. Your best defense is your own skepticism, plus anti-malware tools to scan what you choose to download.

Password

The State of Passwords in 2019

Password are here to stay, at least for a while longer. Until they die, here’s quick review of how to make sure yours are as secure as possible.

ask.com today

How Do I Get Rid of Ask.com?

You should be able to remove any toolbars or browser settings that have been added to your computer.

Your password appeared in a breach.

Password Checkup: A Recommended Chrome Browser Extension

Password Checkup is a browser extension that tells you if the password you’re using has been discovered by hackers.

Two factor code being displayed on a mobile device.

Two-Factor Might Be Hackable. USE IT ANYWAY!

Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.

CCleaner Install with Avast as a PUP

How Do I Get Rid Of “overseer.exe”?

Overseer.exe can be left behind after an uninstall of Avast Free Anti-virus. Deleting it is a two-step process.

A Child on the Internet

How Do I Keep My Kids Safe from Internet Garbage?

There’s a lot of garbage on the internet, and it’s difficult to prevent your children from seeing it. There are tools to help and steps to take.

Decrypting a Bitlocker drive.

Use BitLocker to Bypass Potential Self-Encrypting Drive Vulnerabilities

Headlines to the contrary, it’s BitLocker to the rescue to protect yourself from some vulnerabilities discovered in drives providing hardware-based encryption.

Secure Note

How Can I Use a Password Manager for My Security Questions?

Password vaults are good at keeping track of passwords, but not answers to security questions. There is a technique you can use to help.

Pickpocket

Don’t Lose Your Phone: Here’s What Can Happen (and How to Prepare)

Given how much we’ve come to rely on them, are you prepared to lose your mobile device?

BoxCryptor Storage Model

BoxCryptor: Secure Your Data in the Cloud

Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.

Encrypted

How Can I Send a Document to Someone Securely?

Email is a fairly insecure media. There are many things that can go wrong when email gets delivered, and protecting yourself can be difficult.

Peek a boo!

What Can a Website I Visit Tell About Me?

Websites can collect a fair amount of information about you. Let’s look at what every website sees.

Leo's Desktop

Can My ISP See What I’m Doing If I Use a Virtual Machine (VM)?

A VM doesn’t get you any additional privacy from your ISP… although it might be a convenience as part of a more complete solution.