Tech News: Microsoft releases Windows Defender extensions for Chrome and Firefox

Microsoft has developed and started testing Windows Defender Application Guard extensions for both Chrome and Firefox to better protect enterprise PCs. The feature, which used to be an Edge exclusive, keeps PCs safe by opening web pages not included in administrators’ trusted sites in a virtual container. That way, it can prevent attackers from gaining entry into the company’s system if the website turns out to be malicious.

cropped-logo.png

Source: Microsoft releases Windows Defender extensions for Chrome and Firefox

How to Create an ISO Image of Your Windows System | MakeUseOf

Learn how to make an ISO image backup of your PC’s hard drive. When disaster strikes you can restore the computer from the image. I encourage you to visit MakeUseOf (see source link below) to learn about the options available on imaging a disk in Windows 7, 8.1 and 10.

windows-iso

Thanks to the ISO image format, it is possible to back up your entire PC. This essentially creates an exact copy of your entire drive or selected directories. You’ll be able to restore the image backup should disaster strike.

Source: How to Create an ISO Image of Your Windows System

Cybersecurity Tips For the Young and Old

It is important we hash out, over and over, the importance of how to stay safe online and what to look for. Jacqui over at “Ask A Tech Teacher” posted an article, “Teaching Basic Cybersecurity Measures To Everyday People (For Parents of Digital Natives)“, that are tips geared toward the strategy of teaching our kids the basics on how to be safe online.

After reading this article, I said, you know what(?); this article, everyone should read. We all have that kid in us and these tips are great tips that all of us big kids need to read and follow (“Harmful Links; Viruses & Malware; Suspicious Downloads; Utilizing a VPN; Best Email Practices, HTTPS > HTTP When Providing Information Online; Using Antivirus Programs; and Update Software”).

One thing I want to point out in addition to these cybersecurity protections is that three-quarters of the battle when using internet-connected devices; such as the computer, tablet or smartphone,  is learning the terminology and definitions. Get the terminology in your head and it will all start making sense and will make using these devices more of a joy, instead of a burden; PLUS, before you know it, you will want to be teaching others.

For many adults and parents, it can be a difficult task to teach the basic of staying safe online to those who are younger. However, the best strategy is starting conversations at an early age. This advice will be timeless as kids are starting to use the internet at younger and younger ages.

Source: Teaching Basic Cybersecurity Measures To Everyday People (For Parents of Digital Natives) | Ask a Tech Teacher

Is Windows Defender sufficient protection for my computer?

I had this very question in mind as I was setting up a new computer, “Is Windows Defender sufficient protection for my computer?”. In the past, Microsoft’s antivirus (Window’s Defender) was low on the totem pole; however, I am now finding it may be a good choice (see source link below). I will probably layer my protection with Malwarebytes, but right now I am going to give Windows Defender a shot since it is already baked into Windows 10.

TODO alt text

Microsoft has invested a great deal of time and effort in improving Defender in recent years, though, and it’s clearly paying off, with Defender climbing the test rankings and now outperforming some big security names.

Source: Windows Defender review : Is this free antivirus good enough on its own? | TechRadar

Here is what a Social Security scam sounds like…

 

It continues to be a growing scam: People pretend to be from the Social Security Administration (SSA) and try to get your Social Security number or your money. I encourage you to play the sound bite above to hear what this scam may sound like. On top of it all, the caller ID often shows the real SSA phone number (1-800-772-1213) when these scammers call – but they’re faking that number. It’s not the real SSA calling.

If you get calls like this, where threats and fear are in the mix, hang up. Best action to take when it comes to phone scams is simply do not answer the phone. If important enough the caller will leave a message; and even then, if after you review a message and you have doubt or suspicion, consult with someone about it. This is so bad that if you call the SSA to report the matter they have a pre-recorded message and warning and letting you know about these calls. If you get one of these calls, tell the FTC at ftc.gov/complaint.

You can learn more at the source link below…

Source: This is what a Social Security scam sounds like | Consumer Information

The rules for creating passwords are simple…

Forgot password? Five reasons why you need a password manager | ZDNet

The rules for creating passwords are simple: Use a random combination of numbers, symbols, and mixed-case letters; never reuse passwords; turn on 2FA, and use a password manager. Here’s why you can’t afford not to. Plus: Five password managers worth considering (click on the source link below to visit ZDNet for the full story).

old bunch of keys, rustiness

Source: Forgot password? Five reasons why you need a password manager | ZDNet

US gov issues emergency directive after wave of domain hijacking attacks | Naked Security

Hmmm… Is the Government Shutdown affecting National Security? This directive may indicate that (see source link below to learn more about this).

What is domain hijacking?

Domain hijacking has been a persistent issue in the commercial world for years, a prime example of which would be the attack that disrupted parts of Craigslist in November 2014. In that incident, as in every successful every domain hijacking attack, the attackers took over the account used to manage the domains at the registrar, in this case, Network Solutions. The objective is to change the records so that instead of pointing to the IP address of the correct website it sends visitors to one controlled by the attackers. This change could have been made using impersonation to persuade the registrar to change the domain settings or by stealing the admin credentials used to manage these remotely. It’s a potent attack – web users think they’re visiting the correct website because they’ve typed the correct domain in their address bar and have no reason to doubt where they end up. For attackers, it’s the perfect crime that avoids the much harder job of having to take over the real website.

Source: US gov issues emergency directive after wave of domain hijacking attacks – Naked Security

Learn How “Windows Sandbox is a safer way to run programs you don’t trust”

Sandboxing applications are nothing new but is nice to see Microsoft bake an option into the OS… As a reader of the blog noted, after I posted the article, “The feature is available for users of Windows 10 Pro or Enterprise running Build 18301 or later, and requires AMD64 and virtualization capabilities enabled in BIOS.” So, this is not an option in the home version of Windows 10. 

Microsoft is introducing a new solution that brings it in line with a standard already found on other operating systems: Windows Sandbox.

The feature creates “an isolated, temporary desktop environment” (and lightweight, at 100MB) on which to run an app, and once you’ve finished with it, the entire sandbox is deleted — everything else on your PC is safe and separate.

Read More @ Engadget

Malwarebytes for Chromebook is an Android app engineered specifically to protect your Chromebook

Own a Chromebook? Here is a version of Malwarebytes that has been engineered to work on your Chromebook. In order to get this, your Chromebook must be able to run Android apps so that you can download and install from the Google Play Store. Malwarebytes for Chromebook is an Android app engineered specifically to protect your Chromebook. Google Play automatically detect your Chromebook and will install the appropriate Malwarebytes product. I am currently running this (and testing) on my Chromebook… I am a firm supporter of Malwarebytes on all platforms (Windows, Android, etc…).

Screenshot Image

Malwarebytes for Android or Malwarebytes for Chromebook free download comes for a limited time with an extended 90-day trial of the Premium version, if you sign up for a free Malwarebytes account. No commitment to buy required. When the 90-day trial is ended, Malwarebytes will only detect and clean, but not prevent, infections. It’s ad-free, forever.

Source: Malwarebytes Security: Virus Cleaner, Anti-Malware – Apps on Google Play

From Gizmodo: These 22 Malware-Riddled Android Apps Might Be Draining Your Phone’s Battery

Malware is finding its’ way on people’s Android devices through apps that are downloaded from the Google Play Store. Google does a pretty good job of tracking these apps down, but sometimes it is to late and the app has already made its mark. Many of these apps had strong reviews. The battery draw occurs due to the app being on a constant run time of reporting back with information and possible grabs of your data.

On Thursday, anti-virus provider Sophos published a report describing its discovery of 22 Android apps that contained a variety of malware the company has named “Andr/Clickr-ad.” The apps come from a variety of small developers, and Sophos said that Google removed them from its Play store at the end of November. One of the offending apps, Sparkle Flashlight, had been downloaded more than a million times and many of them had strong reviews, according to Sophos.

Read More @ Gizmodo

IMPORTANT: Posting your kid’s photo to Facebook? Maybe think twice.

Technology and Facebook can be wonderful things; however, as technology continues to advance (such as facial recognition), we cannot foresee how this technology can be used in a way that can ultimately compromise our being for financial gain, or ill intent. In all my years as a tech guru, I have seen the good that technology has benefited us; but, there will always be that element of evil that will take technology advancement and use it against us. I encourage you to read this article about posting our kids on Facebook or any social network for that matter and how this ultimately profiles them in a way (as they develop) and how this could be used in the future.

In other words, it’s possible that your precious child’s face is already being studied and analyzed by Facebook in its efforts to build better facial recognition algorithms. What those algorithms could be used for in the future is anyone’s guess, as even Facebook won’t confirm they will just stick to suggested photo tags.

Source: Posting your kid’s photo to Facebook? Maybe think twice.

Did you know that “500,000 Android users downloaded malware made by one developer”?

Malware on our Android devices is typically introduced by means such as portrayed in this article, with one goal in mind; and, that is to steal your data. Think about it, your smartphone contains a profile of YOU; where sensitive data could be used to compromise YOU on a personal and a financial basis. I tell people, treat your smartphone as if it is your wallet…

The malware was disguised as various games, and didn’t have any legitimate function; rather, they crashed every time they were launched. Now for the worst part: Stefanko said that before Google removed the apps, two of them were featured in the store’s trending section.

View image on Twitter

Source: 500,000 Android users downloaded malware made by one developer

Here are some tips on “How to Safely and Securely Dispose of Your Old Gadgets” | WIRED

This is IMPORTANT… If you are planning on getting rid of your old devices (smartphone, tablets, computers), PLEASE take at least (at minimum) the necessary steps to clear the device of your data. Always do a backup to ensure you have all of your files, before doing this.

Reflected below, are steps I extracted from the article (see source link below), that will help you wipe an Android device, a Windows Computer, and a Mac. I don’t know how many times I have assisted folks and they throw the old device in the closet somewhere and the device is still holding their entire life…

For Android devices, open up the Settings app then tap System > Advanced > Reset options, and then Erase all data (factory reset). Over on iOS, the equivalent option is in the Settings app under General > Reset > Erase All Content and Settings.

If you’re using a Windows computer, you need to load up the Settings app then click Update & Security, then Recovery, then Get started under the Reset this PC option. Choose to remove all personal files during the process. If you’re using a Chromebook or Chrome OS tablet, open up the Settings pane and pick Advanced, then Powerwash to get your computer into an as-new state.

It’s slightly more involved on a Mac: You need to restart macOS, then as soon as it begins to boot up again, hold Option+Command+R until you see a spinning globe. Release the keys, then choose Reinstall macOS, then choose Continue. Follow the on-screen instructions and select your main hard drive when prompted.

Source: How to Safely and Securely Dispose of Your Old Gadgets | WIRED

How to check if you have a Google+ account — and delete it | by INSIDER

Google is shutting down Google+. If you have a Google+ account, I highly recommend you delete it. Steps to delete the account can be found by clicking on the source link below…

After a Wall Street Journal report revealed that Google accidentally exposed personal information of hundreds of thousands of Google+ users, you might be thinking about deleting your account before the social network formally shuts down. We’ve got you covered.

Source: How to check if you have a Google+ account — and delete it – INSIDER

A Software Option To “Securely Wipe Your Drives, Save 20 Percent With BitRaser” | by PCMag.com

BitRaser

BitRaser is available in multiple editions that are designed for different use-cases. For typical home and professional users, the BitRaser For File package lets you securely erase an unlimited number of individual files and folders. Step up to the full BitRaser suite, and that will enable you to wipe entire drives securely with a sliding price depending on how many drives you need to wipe – perfect for IT specialists. And if you’re dealing with smartphones, BitRaser for Mobile has you covered on Android and iOS devices.

Source: Securely Wipe Your Drives, Save 20 Percent With BitRaser | PCMag.com

Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | by Putnam Daily Voice

Been receiving messages from my Facebook friends that they received another friend request from me and noticed others have been receiving this as well.  Did some research on this and found that this is all BOGUS. Just stop doing it and disregard those messages…  You can read more on this by clicking on the source link below or Google it (numerous sources out there on this matter).

You can stop forwarding that latest warning from your Facebook friends about your account being cloned. You weren’t. It’s bogus. And you’re just making it worse. It starts out:

“Hi….I actually got another friend request from you yesterday…which I ignored so you may want to check your account…” Then it tells you to “hold your finger on the message until the forward button appears…then hit forward….” Your account isn’t sending duplicate friend requests. And you didn’t receive a request from the person you’re forwarding it to.

Source: Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | Putnam Daily Voice

Here is a descriptive list of “Back to School Cyber Security Tips” – The LastPass Blog

These tips are good educational points for, not only for Students, but for everyone. I have found over the years people do not take online and device security seriously and/or do not have a good understanding of it. I encourage you to follow the source link below to learn the basics and learn how to keep your online presence safe.

Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college students have mobile devices, laptops, and online educational requirements. It is more important than ever that students protect their digital lives as much as adults.

Source: Back to School Cyber Security Tips – The LastPass Blog

At Last, The Secret to Satellite Internet Security is Revealed

This is a Guest Post by Allen Jame, who is a follower of “What’s On My PC”. Thank you Allen for sharing your expertise on Satellite Internet Security with my readers…

Satellite communication is referred to as one of the most popular communication technology used for global communication.

Its applications are vast. Military intelligence, Broadband internet service, and weather forecasting are its some most popular applications.

The satellite dish network internet Wi-Fi is supposed to be the best solution for getting internet in the rural areas.

Although its advantages are vast still security in the satellite communication is a significant concern.

There are many limitations. For example, power control, high link delay, and link availability are some of the standard security issues on the satellite internet.

During the satellite communication, protections of the links and the satellites are not enough. Sound integrity and the confidentiality of the downlink earth stations is also a significant concern.

In this article, you will witness security issue with the satellite internet. Some of the main security issue covered in this article are:

  • Eavesdropping
  • Satellite security link protocol issues
  • Network infrastructure issues
  • TCP based security issues
  • Information-System based security issues
  • Long delays

Continue reading “At Last, The Secret to Satellite Internet Security is Revealed”

Learn What “LockApp.exe” is on Windows 10

“LockApp.exe” is one of those hidden tasks that you don’t initially see unless you run the Windows Task Manager. The Windows Club (follow the source link below) will educate you on “LockApp.exe” and will provide steps to disable it. When I see “exe’s” such as this running; especially with a name like “LockApp.exe” I become very skeptical as to what it is actuall for and whether or not it is not a malware payload.

Its an official application from Microsoft, and is part of the default lock screen app on Windows. It’s safe. It is usually located under Windows > SystemApps > Microsoft.LockApp_XXXXXX> LockApp.exe. It is possible that this could be doing a lot more than that including notifying you about an update when you unlock your PC.

Source: What is LockApp.exe on Windows 10

IMPORTANT: 500,000 routers infected with malware, security researchers warn

I am posting this, for the second time, to stress the importance of this cyber attack, how it involves you at home, and what you can do to protect yourself. This particular article was posted in USAToday…

Researchers with Cisco’s Talos cyberintelligence unit say malware called ‘VPNFilter’ has infected about 500,000 consumer routers worldwide.

Click on the source link below to learn how to protect yourself

Source: 500,000 routers infected with malware, security researchers warn

How To Scan Your Computer For Malware With Google Chrome

This is an interesting tidbit about Google Chrome’s ability to scan your Windows-based computer for malware. I tested this on a Google Chromebook and it would not launch; but, never the less, this is great. I encourage you to read and learn more about this by clicking on the source link below.

Google Chrome might be the most secure web browser around. What’s more, Chrome can actually make your whole computer more secure.

Open Chrome (or open a new tab if Chrome is already running) and type the following in to the address bar at the top: chrome://settings/cleanup.

Here’s what you should see when you do that:

Source: How To Scan Your Computer For Malware With Google Chrome

KeePass Password Safe

I highly recommend that you use a password manager to manage and store all of the passwords that you use. Typically, most folks use the same password for many sites and accounts and are careless in maintaining their passwords; often storing them in and around the computer. KeePass will assist you in generating strong passwords and will assist you in securely storing your passwords. Also, check further on their website for ported versions of KeePass to other operating system platforms, such as Android. KeePass is available as a full install or portable app.

KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.

Source: KeePass Password Safe

Twitter Users – You May Want To Change Your Password

A glitch at Twitter has prompted the social media company to urge its more than 330 million users to consider changing their account passwords after some of them were exposed on its internal computer network. The company wrote a blog post informing users of the incident on Thursday.

Unknown number of passwords were “unmasked in an internal log”; no indication they were breached or misused, company says

Source: Twitter says to change your password today after it found a bug – CBS News

Here are 5 Popular Security and Privacy Apps You Should Uninstall and Replace

This will surprise many seasoned computer users… If you are concerned about computer security and your privacy, then you may want to swap out the old and install the new.

You’ve been using these tools for years… but it turns out, they may not be as great as once thought. Perhaps the company isn’t supporting the app anymore. Perhaps better tools have come along.


https://www.makeuseof.com/tag/security-privacy-apps-uninstall/

IMPORTANT FACEBOOK USERS: Do Not Fall For The Online Popup Tech Support Scam

I am seeing an increase of this scam lately with (see video below) Facebook users and is typically activated by clicking on a web link that is criminal in nature. I urge you read my brief description below on how the scam works; AND, encourage you to watch the video so that you can see in “real-time” how these scammers take over a computer.

HOW THE SCAM WORKS:

If you suddenly get a popup window on your computer (similar to what is pictured below in the video) informing you that it is a critical alert and your computer is infected; PLEASE, do not fall for the scam and call the phone number. If you have your speakers turned on you may hear a robotic voice repeatedly telling you to call the phone number and instructing you to not turn your computer “off” due that it is infected and will cause further damage. If you do call the phone number, you will be connected to a live person (the scammer) who will talk you into them taking over your computer, which they will do, and when done will want payment from you via credit card. At this point, your credit card is compromised and you will need to call your credit card provider to shut down the card. Failure to pay often results in the scammer actually causing mishap to your computer and they may become verbally threatening (and will even you call you back if you hang up on them).  Bottomline, Microsoft or no tech support will ever call or popup on your computer.

WHAT TO DO:

To exit out of the popup, which you most likely will not be able to do, via normal means, simply hit “ctrl-alt-del” (simultaneously) on your keyboard, select “Task Manager”; then, select your browser on the task manager list, and click on “end process”. This typically will resolve the issue. If this too much to follow, take the nuclear option and unplug the computer from the wall, wait a few seconds, plug back in and restart the computer.  As an added precaution, I would download and run “AdwCleaner” and “Malwarebytes Anti-Malware” to remove any browser hijackers and malware that may be associated with this scam. Also, the appearance and methods of these tech support scams change on a regular basis. I have even heard that this scam is so organized that there are call centers set up with numerous people trained to run the scam.

DSynchronize – Recommended Software To Backup Files On Your Computer

This is the software utility that I use to backup the files on my computer to an external drive. Once you set up the source and destination, you are good to go. Many options available (in plain sight) that makes this a great backup utility in preserving your files. DSynchronize is FREE and requires no installation.

DSynchronize – Periodically synchronize two or more folders locally or remotely.

Source: D-Software by Dimio

Backup Your Gmail With MailStore Home

Here is a good Windows software option, called MailStore Home, that you can use to download and backup your Gmail. I can also see using this to archive a Gmail account that is getting full.

 

MailStore Home is a free email archiving and email backup software for personal use.

With MailStore Home you can backup all emails in a central archive, even if they are distributed across different computers, programs or mailboxes. You can do this either on your PC or on a USB drive as a “portable” option.

Source: MailStore Home – Free Email Archiving and Backup for Home Users

Destroy Adware (and its’ friends) With AdwCleaner

AdwCleaner is one of those programs that I keep on my computer, that is engineered to target (and remove) adware, spyware, potentially unwanted programs (PUPs), and browser hijackers. If you download this program, you will have to manually run it in order for it to work its’ magic. There is no install involved (simply download and run). I typically download it and run it at least every couple of weeks. I have had great success with this program over the years and highly recommend it to help keep your computer in a healthy state.

Source: Malwarebytes – AdwCleaner

How can I tell if my Facebook information was shared with Cambridge Analytica?

How can I tell if my info was shared with Cambridge Analytica?

Facebook has a page set up to help you determine if your Facebook data was compromised by Cambridge Analytica (which was used to influence people during the last Presidential Election). I encourage all Facebook users to do this… VERY IMPORTANT!

Click the source link below to go directly to the Facebook Help Center: 

Source: How can I tell if my information was shared with Cambridge Analytica? | Facebook Help Center

Download Your Facebook Data (you will be shocked and surprised)

In light of the Cambridge Analytica scandal, where an app developer was able to sell your personal Facebook data to a research firm that helped Donald Trump win the election, Facebook has (and still is) taking some major league heat on this; and, rightfully so. As a result of this scandal, Facebook has vowed to become more transparent on how they use our personal information. Following the news on this, Facebook users became very concerned and wanted to know how to download their Facebook data.

With that out of the way, how do I download my data from Facebook?

The easiest way is to click the link below or enter the following web address in your browser:

https://www.facebook.com/settings

Note: You can also get to the settings by clicking on the small “downward facing triangle or arrow”, at the top right corner, on any of your facebook pages (after you log in).

Then, simply click on “Download a copy of your Facebook data”… After which, the following will appear where you then click on “Start My Archive”.

After you click on “Start My Archive” you will be prompted to enter your Facebook password.

Once the password is accepted, you will receive a notice on the screen advising that an email will be sent to the email address you registered with Facebook with instructions to complete the download.

When you receive the email, you can click on a link (in the email) that will take you back to the “Download Archive” page, where you will once again click on the “Download Archive” button, enter your Facebook Password, at which point you will be prompted to save the download.

The downloaded data will be contained within a “zip” file. A zip file is one file that contains many files and you should be able to open the “zip file” by double clicking on it, to see the contents. If you fail to download the data within a few day, you will have to repeat this process. The file size for the data will be large and may take time, so be patient.

Once the data is downloaded, open the file and click on the file named “index” to navigate the downloaded data. You will be shocked and surprised at everything that has been collected.

Maybe, “Big Brother” is watching…

 

 

Use Facebook Messenger? You won’t believe how they track you | Komando.com

Facebook is like candy. You develop a sweet tooth for it and can’t put it down. Like the internet in its’ entirety, there is a good side and a bad side. Recently, Facebook has been subject to quite a few inquiries on what information it collects and what it does (and has done) with that information. If you are a Facebook user there is high probability your personal information (profile) has been compromised (data mined) and used for (maybe sold) for unscrupulous purposes. Below (click on the source link below), an article by Kim Komando, is some more information coming out on how the Messenger component of Facebook is being used to track you. In the end, including myself, if you use Facebook, you have been revealed; whether it is posting photos, jokes, your opinions, your cuddly animals; we all have been revealed and compromised… I am especially disturbed on how Facebook is and has been used as a propaganda tool to lead politically influenced lemmings off a cliff with misleading information that has fed people’s minds of mistruths that ultimately has changed the profile of our entire country. In a sense, as much as I love the idea behind Facebook, it has caused damage to our country, as a whole; and, what I find is people either people do not understand the magnitude of all of this or they just plain don’t care. Anyhow, click on the link below to learn more from Kim Komando…

 

Embattled, bruised and bloodied but the hits just keep on coming for Facebook, aren’t they? In the shadow of the Cambridge Analytica hubbub…

Source: Use Facebook Messenger? You won’t believe how they track you | Komando.com

If You Have A “MyFitnessPal” Account, Change Your Password. Here’s Why…

On March 25th (2018) MyFitnessPal discovered that a data breach had occurred. MyFitnessPal is a very popular online Free calorie counter and diet plan. If you have an account, you should have received an email about the breach and what steps to take. The most important step to take is to change your password. I learned about the breach (in the news); but, mostly through LastPass, the password manager that I use.


If you have other accounts where you use the same password or similar information, I highly recommend you change those passwords, as well; and, monitor those accounts for any suspicious information. Over the years I have seen folks use the same password for a multitude of their accounts.

According to MyFitnessPal, the affected information included usernames, email addresses, and hashed passwords. Reportedly the breach occurred sometime in February.

LastPass Tips For Maintaining Your Passwords:

Unique account, unique password: Creating strong and unique passwords for every account is the best first step to protecting yourself against a breach. Use a password generator to create passwords for you. Unique passwords ensure that a breach at one website doesn’t result in a stolen account at another.

Protect your email: If a hacker has access to your email account, they can use password resets at most sites to get into other accounts. Consider creating an alternate email address for online signups. And be sure to turn on multi-factor authentication for your email account. That way someone will need to get your email credentials and have access to your phone in order to truly get into your email account.

Give fake answers to security questions: You know those silly security questions companies ask you so you can “prove” who you are? Don’t give real answers. Use the password generator to create random answers that you can then store in LastPass. Just add it to the “notes” section for any website login stored in LastPass.

SOURCE: LastPass and MyFitnessPal

Boxcryptor – Chrome Web Store (for your Chromebook)

Boxcryptor for Chrome is currently in beta; however, if you are looking for a way to encrypt files on your Chromebook and store them on the cloud (such as Google Drive and others), this a great option to consider. By encrypting your files, you are in essence making the impossible to be opened or seen. The Chrome version of Boxcrypt, as featured in this article, is currently in Beta Testing…

Boxcryptor is the encryption solution optimized for the cloud which allows you to use all popular cloud storage providers such as Dropbox, Google Drive, Microsoft SkyDrive and Box without sacrificing safety, privacy, or comfort.  With Boxcryptor you can easily encrypt files locally in your browser before uploading them to your cloud. Your cloud provider only receives encrypted files and you keep complete control of your data!

Source: Boxcryptor – Chrome Web Store

“ClickandClean” Chrome Browser Utility | Privacy and Security News, Updates and Releases

New update to Click&Clean. If you are using this application, which is a browser extension for the Google Chrome web browser, it will auto update on its’ own. I have been using his cleaning utility on my desktop computers, as well as my Chromebook. Click the source link below to learn more or click here for the quick start guide to get a good feel about how Click&Clean works.

Privacy and security news, important security vulnerabilities and how to fix them. Latest Click&Clean and another software releases and updates.

Source: Click&Clean | Privacy and Security News, Updates and Releases

Download Malwarebytes AdwCleaner – MajorGeeks

Malwarebytes AdwCleaner is a “must have” application to help keep on your computer from being infected.  You will need to routinely run this software to help keep your computer in good shape.

Malwarebytes AdwCleaner is a free anti-malware app that deletes adware, PUP’s, toolbars, and browser hijackers. Video tutorial available. It specializes in removing adware, PUP/LPI (Potentially Undesirable Program), toolbars, and hijackers.

Source: Download Malwarebytes AdwCleaner – MajorGeeks

Browse on your Android devices like no one is watching…

Here is an Android app, called Firefox Focus, that I highly recommend for your Android-based smartphone, tablet, and Chromebook. Firefox Focus, built by the same maker (Mozilla) as the Firefox browser, has been engineered for our Android mobile devices with privacy, safety, and security in mind. When you browse with Firefox Focus it automatically will block a wide range of online trackers; AND, will automatically erase your history, passwords, and cookies (which, by the way, is the method used to bombard you with unwanted ads). I use this browser a lot, to supplement my regular browser when I am shopping on the internet to prevent the cookies from haunting me with ads. The install on this is small (less than 3 MB) and works great on all Android devices, including the Chromebooks that support Android app installations.


SOURCE: Google Play Store – Firefox Focus: The Privacy Browser

Powered by WordPress.com.

Up ↑