Summary If you receive a notice from your device or password software indicating that your password has been found on the dark web, it may not mean that one of your own accounts specifically was hacked, but instead that generally speaking, you are using a password that is not sufficiently unique. It has been used… Continue reading Here’s why your password was found in a data leak on the dark web, and what to do about it.
In Episode #19, I discuss a variety of ways people manage their passwords and offer suggestions for easier and more effective password management. For additional information you can refer to the article “Password Management: Seven Different Methods and Why You Need One.” [View] Listen using the Anchor Player Listen Using Our Website Player You can… Continue reading Password Management (Podcast E19)
In Episode #18, I provide an introductory overview to computer security with a focus on Windows 10 computer security and a brief overview of mobile device security and Apple Mac computers. Listen using the Anchor Player Listen Using Our Website Player You can also download the show. Tap (or right click) the link and save.… Continue reading Basic Guide to Computer Security (Podcast E18)
Crowdsourced Threat Radar As a tech consultant supporting a large user community, I’m frequently contacted when people experience things that are out of the ordinary. So, I’m regularly made aware of phone scams, fake antivirus programs, imposter tech support pop-up ads, and malicious email campaigns. It’s like a crowdsourced human radar system for early detection… Continue reading Email Extortion Scam: A blackmailer has your password and claims to have a video of you.
As a tech support person, I frequently get calls from people who have an unexpected suspicious message showing up in their web browser. The message might state that their computer is infected or needs an update. Sometimes a phone number is displayed and the person is urged to call the number immediately. The video below… Continue reading How malicious ads on websites can harm your computer or device
As I’m helping people purchase and setup new computers, part of that process involves deciding what to do with the old computer. If the computer will be sold, given to someone else, or donated to Goodwill, it’s a good idea to securely wipe the computer beforehand. METHOD #1 – ERASE DRIVE To erase the entire… Continue reading How to Securely Erase Your Old Computer’s Hard Drive Before Selling or Donating It
You may receive Windows notifications about updates similar to the one shown below: “Restart and update to stay in support. Support for the Windows 10 April 2018 Update ends in November 2019. Restart to install a supported version of Windows.” Because Windows notifications are easy to replicate and mimic, people are understandably concerned about clicking… Continue reading Verifying Authenticity of Windows Update Notifications
The National Counterintelligence and Security Center (NCSC) is today disseminating videos, brochures, and other informative materials to help the private sector guard against growing threats from foreign intelligence entities and other adversaries.
Introduction Numerous ongoing phishing schemes, phone scams, account breaches, and hacking campaigns are resulting in substantial losses and disruption around the world. This barrage of attacks leaves most people feeling vulnerable and ill-equipped to protect themselves. Here’s a sampling of news headlines from yesterday and this morning: “Cyberattack Hits Ukraine Then Spreads Internationally,” The New… Continue reading Global Cyber Attacks are Growing in Scope, Impact, and Frequency – Here’s what you can do to stay safe.
Most computers contain many old deleted files even years after they’ve been deleted. This is because deleting a file and emptying the recycle bin doesn’t permanently remove the files from the computer’s hard drive. It only hides it from view. If there’s a file you mistakenly deleted, and you need to get it back, recovery… Continue reading Periodically scrubbing unused drive space may help with data recovery later.
Today I had an interview with Justin Andrews of KWWL. We discussed the Heartbleed security exploit and what consumers can do to protect themselves. Click here to view the interview and read the KWWL story. If you have questions about this and other computing security concerns, feel free to contact me. “Considering the long exposure, ease of exploitation and attacks leaving no trace… Continue reading Heartbleed Computer Vulnerability – What you need to know now and how to respond.
Security Breach. On 8 February 2013 the following report was released: Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms, has suffered a security breach. Some Bit9 customers discovered malware inside of their own Bit9-protected networks, malware that was digitally signed by Bit9′s… Continue reading Major Computer Security Breach Results in Executive Order by President of the United States