Google recently removed several apps from the Google Play Store after discovering they violated the Play Store terms of service—and, more importantly, could be used as stalkerware. That doesn’t mean they’re deleted from your Android device, though, so now’s a great time to remove them.
If someone falls for the scam and does fill in the information requested on the fake webpages, the scammer would then have their name, Amazon password (and if that password was used for other websites, access to those accounts as well), birthday, address, credit card information, and Social Security number, Wired reported.
Google Chrome offers to save passwords for all your online accounts. It then stores and syncs them to your Google account as part of the Smart Lock feature. Chrome also has a built-in password generator that automatically creates strong passwords at the click of a button.
As you know, browsing with Google Chrome or any browser for that matter, your privacy is compromised to the degree that your browsing habits, etc… leave tracks as to where you have been. This is typically done via cookies (that identifies the user when you visit specific sites) and via your browsing history. This is all fine and dandy to a certain point, but there may be occasions where you do not want this information stored and want to protect your identity.
The solution to this problem, on those certain occasions, is to go “incognito”. If you look up in the dictionary, “incognito” is defined as “having one’s true identity concealed”. Nearly all browsers give you the ability to go into “incognito” mode, but for the sake of this article, I am going to tell you how to get into “incognito” mode using Google Chrome. It is very, very easy…
Simply click the vertical three-dot icon on the top-right of the browser and select “New incognito window.” On mobile, tap the three-dot icon on the bottom-right (iOS) or top-right (Android) and select “New incognito tab.” That is it, simple as that… In Google Chrome, when in incognito mode you will see a darkened browser background and you will obviously see “You’ve gone incognito”. You can also get into “incognito” mode by hitting “Ctrl+Shift+N” in combo, on your keyboard.
Now, something I do want to point out. This does give you some privacy protection to a certain point, but do not think this is keeping you from being seen at work. Incognito mode only is concealing your behavior. On work networks, the network administrator, if necessary can track unusual activity via a workstations or devices IP address.
Nothing is more distressing than losing your phone or thinking it has been stolen. For peace of mind, as soon as you set up your new phone, take a moment and lock it down by configuring the lock screen. Most phones during the initial set up prompt you through a process to lock down your phone, either via a PIN, pattern, password, fingerprint and/or facial recognition. My phone, I have set up to use a combination of these, with the fingerprint recognition I feel is the most powerful. My phone also allowed me to pick a 6-digit PIN, which I feel really makes it tougher to overcome.
If by chance you skipped over the process to secure your phone when you initially set it up or you desire to modify the current settings, you can do this by heading to the system settings. The system settings on most phones can be accessed via an app icon (labeled “system settings or settings”) or by pulling down from the top of the screen and tapping on a “cogged gear icon”. From the system settings, you are looking for the Security Menu. The menus and options may slightly vary from phone to phone but look for anything that is related to “security” and once there you should see various options to lock down your phone.
Just do it for peace of mind… These phones are computers in our pockets and contain a mother load of personal information.
Let’s be honest, you can’t kill robocalls completely. But you can block more of them than you might think.
Though robocalls will never disappear completely there are some things you can do to keep your phone from ringing off the hook all the time.
Google may be storing everything you say to your Google Home and keeping the recordings forever, just as Alexa does. Google recently changed the default behavior not to keep the recordings. But that change only affected new users—not existing ones.
There is nothing more distressful than losing your smartphone… If you own an Android device, such as a smartphone, tablet or Chromebook, you most likely performed the initial set up using a Google Account (i.e. Gmail account). As a result, you have a feature where you can remotely find, lock or erase the device in the event the phone is stolen or lost (Note: The phone must be turned “on” in order for this to work). You can even ring the phone and send information to the phone requesting that the phone be returned. You will need to go to a computer, log into your Google account, in order to make this work. Follow the steps below to put you on the road of recovery. You can go ahead and practice this…
- Open a browser, like Chrome . If you’re using someone else’s device, use private browsing mode.
- Open your Google Account.
- In the “Security” section, select Find a lost or stolen phone.
- Select the lost phone, tablet, or Chromebook.
- Follow the step-by-step suggestions to help find and secure the device.
ADDED TIP: Also, did you know, if you have a Google Account, and you are logged in, you can perform a Google Search, type in “Find My Phone” and Google (with a map) will find your phone within about 50 feet.
I encourage you to visit the source link at the end of this article to learn more about ransomware and how you can protect yourself…
Ransomware locks up a victim’s files until money is paid. Here’s how to protect your data and avoid an attack on your computer network..
I encourage my readers to visit “Make Use Of” (source link below) to learn 10 tips to keep your online bank account secure. One of the tips that jumped out at me is that it is safer to log into your bank account using the bank’s app on your smartphone (through your cellular service), versus accessing your bank account from your desktop or laptop computer which is more susceptible to malicious attack.
Switching to online banking comes with some security risks. These tips explain how to keep your online bank account safe.
Recently, during the evening hours, I lost my internet service connection. Our internet is provided by the local cable company and has been exceptionally dependable. Initial reboots/resets of my modem and router failed to recover the service. My gut instinct told me this was not a typical loss of service. Many folks in my neighborhood also lost their digital phone service, which caused panic to set in. I later learned the attack affected over 40 percent of their customer base (including businesses). After several days, the service was eventually restored. The culprit was a “malicious and targeted attack from outside our network,” in a DDos attack (distributed denial of service) where the service was intentionally flooded with data sent simultaneously from many individual computers. I knew something to this effect was going on due that it got to a point I could reboot the equipment and regain service for a short period of time; then, it would drop out again.
All in all, when done, and the service was restored, I learned some things:
DON’T PANIC… We live in a digital world that we are dependent on, where the source of service if attacked, can bring down the whole house, affecting many people and many types of internet-connected devices. BE PREPARED… Learn how to reboot your equipment. Communicate with the neighbors or family to determine if they have service. A cell phone, in this case for many people, provided phone AND internet service. If you have a neighbor who has no cell phone, be the good neighbor. Follow the local news to see if it is widespread. Learn where (online) you can determine the status of the network you are connected to. In my case, I used my cell phone to get updates online from the cable company, instead of calling them on their overwhelmed customer service lines. I then passed this information on to my neighbors. When the service is restored, help each other to get the equipment back up and running. I ended up helping others reset their modems and testing to make sure they had their phone and internet service back; thus, saving them the expense of a service call (which may have taken days to get an onsite response).
In the end, I think what bothered me the most was seeing sneering comments online where people were complaining of the service going down. Having managed a computer network for a government agency, I had visions of IT people working (24/7) stressing out over this to bring back service; which, they eventually did. Also, this is concerning from the standpoint, and has to be questioned, “Is our country really prepared for these cyber attacks and is the proper funding being provided to provide the necessary defense measures?”.
If you’re looking for a password manager for your Android, below are five of the best. Source link to get more on these apps is reflected below. On this list, here at “What’s On My PC”, I use LastPass (on all of my computers and devices).
- Keeper Password Manager
1. The habit of trusting URL shortened websites
2. The habit of trusting form webpages, even if it is not encrypted
3. The habit of trusting public wifi networks
4. The habit of installing apps
5. Using a password as it if is the one ring to rule them all
The best way to protect yourself online and at home from fraud and scams is through knowledge. Posted below are links to the latest “Fraud, Scams and Alerts” at the Federal Communications Commission. Take a moment to read down this list; even if you do not open any of the links. Being knowledgeable is the best protection that you will ever have when it comes to the evil intent of others.
Fraud, Scams, and Alerts:
- After Storms, Watch Out for Scams
- Avoiding Bill Shock on your Mobile Phone
- Call Splashing: Long-Distance Calling from a Public Phone
- Caller ID Spoofing
- Careless Dialing Could Cost You Money
- Cell Phone Fraud
- Cramming – Unauthorized Charges on Your Phone Bill
- Don’t Fall for the 90# Telephone Scam
- International Modem Dialing Scams
- IP Relay Fraud
- FAQs about Junk Faxes
- Low Power FM Radio Scams
- Mexico Collect Call Scam
- ‘One Ring’ Wireless Phone Scam
- Slamming: Switching Your Authorized Telephone Company Without Permission
- Spam: Unwanted Text Messages and Email
- Unwanted Telephone Marketing Calls and the National Do-Not-Call List
- Voicemail System Hacking
- Watch Out for Auto Warranty Scams
There are various ways to back up your data. You can back up your data to an external device (see examples HERE) or you can back up your data to a cloud-based backup service, or back up your data to both an external device and a cloud backup service. You might even make more than one backup to external storage devices and keep the two copies in different places (providing protection and access to your data even if one of the backup devices is destroyed or inaccessible. Preserving your valuable documents and images for future access and use requires planning, as well as the use of automatic backup services.
Source: World Backup Day 2019
Facebook confirmed Thursday that hundreds of millions of user passwords were being stored in a “readable format” within its servers, accessible to internal Facebook employees. Affected users will be notified, Facebook said, so they can change those passwords.
Microsoft has developed and started testing Windows Defender Application Guard extensions for both Chrome and Firefox to better protect enterprise PCs. The feature, which used to be an Edge exclusive, keeps PCs safe by opening web pages not included in administrators’ trusted sites in a virtual container. That way, it can prevent attackers from gaining entry into the company’s system if the website turns out to be malicious.
BetaNews providing good software option to remove data from a computer or hard drive; especially, if you are getting rid of it.
O&O SafeErase 14 is a commercial tool you can use to either wipe an entire drive or securely erase files which will result in no-one being able to recover data from your system.
It is important we hash out, over and over, the importance of how to stay safe online and what to look for. Jacqui over at “Ask A Tech Teacher” posted an article, “Teaching Basic Cybersecurity Measures To Everyday People (For Parents of Digital Natives)“, that are tips geared toward the strategy of teaching our kids the basics on how to be safe online.
After reading this article, I said, you know what(?); this article, everyone should read. We all have that kid in us and these tips are great tips that all of us big kids need to read and follow (“Harmful Links; Viruses & Malware; Suspicious Downloads; Utilizing a VPN; Best Email Practices, HTTPS > HTTP When Providing Information Online; Using Antivirus Programs; and Update Software”).
One thing I want to point out in addition to these cybersecurity protections is that three-quarters of the battle when using internet-connected devices; such as the computer, tablet or smartphone, is learning the terminology and definitions. Get the terminology in your head and it will all start making sense and will make using these devices more of a joy, instead of a burden; PLUS, before you know it, you will want to be teaching others.
For many adults and parents, it can be a difficult task to teach the basic of staying safe online to those who are younger. However, the best strategy is starting conversations at an early age. This advice will be timeless as kids are starting to use the internet at younger and younger ages.
Google rolls out Password Checkup and Cross Account Protection
Google introduced two new updates that will help keep your data secure, beyond just Google’s sites and apps: Password Checkup, a Chrome extension that helps protect your accounts from third party data breaches, and a new feature called Cross Account Protection.
This is IMPORTANT… If you are planning on getting rid of your old devices (smartphone, tablets, computers), PLEASE take at least (at minimum) the necessary steps to clear the device of your data. Always do a backup to ensure you have all of your files, before doing this.
Reflected below, are steps I extracted from the article (see source link below), that will help you wipe an Android device, a Windows Computer, and a Mac. I don’t know how many times I have assisted folks and they throw the old device in the closet somewhere and the device is still holding their entire life…
For Android devices, open up the Settings app then tap System > Advanced > Reset options, and then Erase all data (factory reset). Over on iOS, the equivalent option is in the Settings app under General > Reset > Erase All Content and Settings.
If you’re using a Windows computer, you need to load up the Settings app then click Update & Security, then Recovery, then Get started under the Reset this PC option. Choose to remove all personal files during the process. If you’re using a Chromebook or Chrome OS tablet, open up the Settings pane and pick Advanced, then Powerwash to get your computer into an as-new state.
It’s slightly more involved on a Mac: You need to restart macOS, then as soon as it begins to boot up again, hold Option+Command+R until you see a spinning globe. Release the keys, then choose Reinstall macOS, then choose Continue. Follow the on-screen instructions and select your main hard drive when prompted.
These tips are good educational points for, not only for Students, but for everyone. I have found over the years people do not take online and device security seriously and/or do not have a good understanding of it. I encourage you to follow the source link below to learn the basics and learn how to keep your online presence safe.
Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college students have mobile devices, laptops, and online educational requirements. It is more important than ever that students protect their digital lives as much as adults.
The routers affected are made by companies including Linksys, MikroTik, Netgear, and TP-Link. Reboot your router to prevent infiltration… Better yet, update the firmware.
I am posting this, for the second time, to stress the importance of this cyber attack, how it involves you at home, and what you can do to protect yourself. This particular article was posted in USAToday…
Researchers with Cisco’s Talos cyberintelligence unit say malware called ‘VPNFilter’ has infected about 500,000 consumer routers worldwide.
Click on the source link below to learn how to protect yourself
This is an interesting tidbit about Google Chrome’s ability to scan your Windows-based computer for malware. I tested this on a Google Chromebook and it would not launch; but, never the less, this is great. I encourage you to read and learn more about this by clicking on the source link below.
Google Chrome might be the most secure web browser around. What’s more, Chrome can actually make your whole computer more secure.
Open Chrome (or open a new tab if Chrome is already running) and type the following in to the address bar at the top: chrome://settings/cleanup.
Here’s what you should see when you do that:
I highly recommend that you use a password manager to manage and store all of the passwords that you use. Typically, most folks use the same password for many sites and accounts and are careless in maintaining their passwords; often storing them in and around the computer. KeePass will assist you in generating strong passwords and will assist you in securely storing your passwords. Also, check further on their website for ported versions of KeePass to other operating system platforms, such as Android. KeePass is available as a full install or portable app.
KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
Source: KeePass Password Safe
A glitch at Twitter has prompted the social media company to urge its more than 330 million users to consider changing their account passwords after some of them were exposed on its internal computer network. The company wrote a blog post informing users of the incident on Thursday.
Unknown number of passwords were “unmasked in an internal log”; no indication they were breached or misused, company says
RogueKiller is a powerful malware hunter which uses a wide range of technologies to detect threats. The lack of a “quick scan” is going to be a problem sometimes, but if you mostly just need an emergency “second opinion” scanner it should be a great choice.
I am seeing an increase of this scam lately with (see video below) Facebook users and is typically activated by clicking on a web link that is criminal in nature. I urge you read my brief description below on how the scam works; AND, encourage you to watch the video so that you can see in “real-time” how these scammers take over a computer.
HOW THE SCAM WORKS:
If you suddenly get a popup window on your computer (similar to what is pictured below in the video) informing you that it is a critical alert and your computer is infected; PLEASE, do not fall for the scam and call the phone number. If you have your speakers turned on you may hear a robotic voice repeatedly telling you to call the phone number and instructing you to not turn your computer “off” due that it is infected and will cause further damage. If you do call the phone number, you will be connected to a live person (the scammer) who will talk you into them taking over your computer, which they will do, and when done will want payment from you via credit card. At this point, your credit card is compromised and you will need to call your credit card provider to shut down the card. Failure to pay often results in the scammer actually causing mishap to your computer and they may become verbally threatening (and will even you call you back if you hang up on them). Bottomline, Microsoft or no tech support will ever call or popup on your computer.
WHAT TO DO:
To exit out of the popup, which you most likely will not be able to do, via normal means, simply hit “ctrl-alt-del” (simultaneously) on your keyboard, select “Task Manager”; then, select your browser on the task manager list, and click on “end process”. This typically will resolve the issue. If this too much to follow, take the nuclear option and unplug the computer from the wall, wait a few seconds, plug back in and restart the computer. As an added precaution, I would download and run “AdwCleaner” and “Malwarebytes Anti-Malware” to remove any browser hijackers and malware that may be associated with this scam. Also, the appearance and methods of these tech support scams change on a regular basis. I have even heard that this scam is so organized that there are call centers set up with numerous people trained to run the scam.
RememBear looks interesting and may be a good solution in managing your passwords and storing other private information… I intend on giving this app a try.
Secure and remember all your passwords with RememBear. A simple app that stores your passwords securely, and types them in right when you need them.
Here is a good Windows software option, called MailStore Home, that you can use to download and backup your Gmail. I can also see using this to archive a Gmail account that is getting full.
MailStore Home is a free email archiving and email backup software for personal use.
With MailStore Home you can backup all emails in a central archive, even if they are distributed across different computers, programs or mailboxes. You can do this either on your PC or on a USB drive as a “portable” option.
AdwCleaner is one of those programs that I keep on my computer, that is engineered to target (and remove) adware, spyware, potentially unwanted programs (PUPs), and browser hijackers. If you download this program, you will have to manually run it in order for it to work its’ magic. There is no install involved (simply download and run). I typically download it and run it at least every couple of weeks. I have had great success with this program over the years and highly recommend it to help keep your computer in a healthy state.
Source: Malwarebytes – AdwCleaner
How can I tell if my info was shared with Cambridge Analytica?
Facebook has a page set up to help you determine if your Facebook data was compromised by Cambridge Analytica (which was used to influence people during the last Presidential Election). I encourage all Facebook users to do this… VERY IMPORTANT!
Click the source link below to go directly to the Facebook Help Center:
Facebook is like candy. You develop a sweet tooth for it and can’t put it down. Like the internet in its’ entirety, there is a good side and a bad side. Recently, Facebook has been subject to quite a few inquiries on what information it collects and what it does (and has done) with that information. If you are a Facebook user there is high probability your personal information (profile) has been compromised (data mined) and used for (maybe sold) for unscrupulous purposes. Below (click on the source link below), an article by Kim Komando, is some more information coming out on how the Messenger component of Facebook is being used to track you. In the end, including myself, if you use Facebook, you have been revealed; whether it is posting photos, jokes, your opinions, your cuddly animals; we all have been revealed and compromised… I am especially disturbed on how Facebook is and has been used as a propaganda tool to lead politically influenced lemmings off a cliff with misleading information that has fed people’s minds of mistruths that ultimately has changed the profile of our entire country. In a sense, as much as I love the idea behind Facebook, it has caused damage to our country, as a whole; and, what I find is people either people do not understand the magnitude of all of this or they just plain don’t care. Anyhow, click on the link below to learn more from Kim Komando…
Embattled, bruised and bloodied but the hits just keep on coming for Facebook, aren’t they? In the shadow of the Cambridge Analytica hubbub…
On March 25th (2018) MyFitnessPal discovered that a data breach had occurred. MyFitnessPal is a very popular online Free calorie counter and diet plan. If you have an account, you should have received an email about the breach and what steps to take. The most important step to take is to change your password. I learned about the breach (in the news); but, mostly through LastPass, the password manager that I use.
If you have other accounts where you use the same password or similar information, I highly recommend you change those passwords, as well; and, monitor those accounts for any suspicious information. Over the years I have seen folks use the same password for a multitude of their accounts.
According to MyFitnessPal, the affected information included usernames, email addresses, and hashed passwords. Reportedly the breach occurred sometime in February.
LastPass Tips For Maintaining Your Passwords:
Unique account, unique password: Creating strong and unique passwords for every account is the best first step to protecting yourself against a breach. Use a password generator to create passwords for you. Unique passwords ensure that a breach at one website doesn’t result in a stolen account at another.
Protect your email: If a hacker has access to your email account, they can use password resets at most sites to get into other accounts. Consider creating an alternate email address for online signups. And be sure to turn on multi-factor authentication for your email account. That way someone will need to get your email credentials and have access to your phone in order to truly get into your email account.
Give fake answers to security questions: You know those silly security questions companies ask you so you can “prove” who you are? Don’t give real answers. Use the password generator to create random answers that you can then store in LastPass. Just add it to the “notes” section for any website login stored in LastPass.
With all the privacy crap going on involving Facebook, you may want to take a look at this:
Facebook Container for Firefox allows you to fully control and quarantine your web activity from Facebook. This extension effectively isolates your identity into a separate container making it difficult for Facebook to track your activity on other websites via third-party cookies.
Keeping track of passwords is painful. Here are our 3 tips to keep track of passwords without sacrificing the safety of your accounts and your data.
If your getting rid of a computer or hard drive, here is an “must do” option to completely remove your personal data.
A disk wipe tool that can wipe hard drive data from any hard disk drive. Data Shredder is freeware to download! Protect your privacy and sensitive data.
Source: CBL Data Shredder
Malwarebytes AdwCleaner is a “must have” application to help keep on your computer from being infected. You will need to routinely run this software to help keep your computer in good shape.
Malwarebytes AdwCleaner is a free anti-malware app that deletes adware, PUP’s, toolbars, and browser hijackers. Video tutorial available. It specializes in removing adware, PUP/LPI (Potentially Undesirable Program), toolbars, and hijackers.
Saw the graphic below on the website, NakedSecurity, and felt compelled to remind the readers here on the blog that the scammers will not let up and will take advantage of any opportunity (such as Christmas) to trick and rob people. One very common scam is the phone call you answer from a person who claims they are tech support from Microsoft and want to fix a problem they detected with your computer. Please do not fall for this… Hang up on them and do not proceed with any conversation. Most of the time if they know they have a live number and person, they will relentlessly call back (often with a different scam).
To protect yourself, do the following: Most of us have voicemail or an answering machine. Let all your calls ring through. If you have caller ID, only answer the calls from numbers you are absolutely sure about. Even the phone numbers that may appear to be legit (i.e. from your area code) can be masked to look like a local number. I know this may sound extreme; but, this is how bad this problem is.
Also, there are poisoned websites out there that will prompt you to call a number to fix your computer. It is the same deal, they will scam you for money to fix a problem that does not exist. Bottomline is to avoid all solicitations by phone, computer, email, etc…
“Boiler rooms full scammers would make cold call after cold call, ploughing day and night through lists of phone numbers to scare victims into paying up for technical support they didn’t need for malware infections they didn’t have.”.
Over a period of time you most likely auto login to most sites due that your browser saves and auto inserts the username and password for you. The password is typically not revealed; instead you will see a row of dots or asterisks. The problem I have seen people do when they auto login; especially over long periods of time, is that they will forget the password or where they wrote the password down.
If you ever get into that situation, one solution is to download and run “Asterisk Password Spy”. Asterisk Password Spy works on wide range of platforms starting from Windows XP to new Windows 10 and can help you to easily find (and record) the passwords from any Windows based application.
Here is how to use Asterisk Password Spy:
- Launch AsteriskPasswordSpy on your system
- Now simply drag the ‘search icon’ to any password box to reveal the passwords.
- When you place it over the password box, it will automatically highlight it and password is added to list as shown in the screenshot below.
- Finally you can save all recovered password list to HTML/XML/CSVfile by clicking on ‘Export’ button and then select the type of file from the drop down box of ‘Save File Dialog’.
If so, take a look at BCArchive… This FREE program is specifically designed to compress a group of files/folders to a single encrypted file that is password protected. I like the idea that, after installing, you can activate BCArchive from the Explorer file menu, which comes in real handy when you need to protect and archive files on the fly. Always keep in mind that when you password protect the file archive, to remember the password.
BCArchive is compatible with Windows 2000/XP/Vista/7/8/10 (32-Bit/64-Bit)…
To give you an idea how good this program is, here is a list of the options:
- Create Compressed and Encrypted Archive File Protected by Password
- Create Compressed and Encrypted Archive File by Using the Public Key of Another User
- Add Several Passwords to an Existing Archive File
- Apply more than one Public Key to an Archive File Enabling a Number of Users to Decrypt the Archive
- Generate New or Use Existing Secret/Public Key Pairs in PKCS-12/X.509 Format
- Compress and Encrypt Data to a Self-extracted Executable Program
- Synchronize, Import, Export Functions
- Includes BCTextEncoder Utility
SOURCE: Jetico – BCArchive
I have been doing computers since the 1980’s. During that timespan of nearly 40 years I have never paid for antivirus software. As a matter of fact, when I purchase a new computer, one of the first things I do is remove the pre-installed security software (such as Norton or McAfee’s). I have found that these security software packages cause more headaches than they are worth; are a resource burden to the computer; require annual subscriptions, and are so embedded into the Windows registry and system that you have to use special uninstallers to remove them. One important point I do want to make is that if you ever decide to remove the current antivirus or antimalware software from your computer, make sure you visit the software developer’s site to determine if they have a special uninstaller you can download to remove the software. If you don’t do this, you are at risk of leaving remnants behind of the software that can impact the continued operation of the computer and may conflict with any other security software that you install. For your convenience, here is a resource at eset (click here) that will help you with uninstalling security software.
What I have found that is that you can protect yourself with applying common sense and using good free security and optimization software. There are numerous options out there (for FREE), but the list below is the software programs that I use to protect my computers:
CCleaner – the number-one tool for cleaning your PC. It protects your privacy and makes your computer faster and more secure! Make sure you download the FREE version.
BitDefender FREE – featuring virus scanning (and removal), advanced threat detection, anti-phlishing, and anti-fraud. After uninstalling your other antivirus software and you install Bitdefender FREE, you will be asked to set up an account. Once done that task, you are good to go. You do not have to do anything after that and as a matter of fact, you will forget it is even there.
Malwarebytes FREE – is a next-generation antivirus replacement. The first of its kind for home users, Malwarebytes for Windows employs four independent technology modules—anti-malware, anti-ransomware, anti-exploit, and malicious website protection—to block and remove both known and unknown threats. The FREE version does not auto monitor your computer. What I do is routinely scan my computer using Malwarebytes sort of as a second opinion and to complement BitDefender FREE. If I were to buy software to protect my PC, then I would buy the Malwarebytes Premium edition.
AdwCleaner – is another product from Malwarebytes that is FREE. AdwCleaner does not monitor your computer in the background. Simply download, run, and scan on a routine basis to search for and remove adware, unwanted toolbars, potentially unwanted programs (PUPs), and browser hijackers.
Avira Safe Shopping – is a FREE browser add-on for Google Chrome that will alert you to sites that are criminal in nature by highlighting infected sites directly in your search results to ensure you know which sites are harmful before you click. Avira Safe Shopping is your browser extension, which ensures your safety and privacy while shopping online, and provides you with better deals from secure websites.
The list above is my personal preference and has served me very well in protecting my computers. Please feel free to comment below and reflect any other security software (for FREE) that you would recommend.
Support What’s On My PC by clicking here and visiting Amazon.com
(an affiliate associate)
How many of you are using an unlock pattern to secure your device? In a nutshell: it is far easier for an attacker to shoulder surf a pattern than a PIN.
A new report (PDF) from security researchers at the US Naval Academy and the University of Maryland Baltimore County has quantified just how absurdly easy it is to do an over-the-shoulder glance that accurately susses out an Android unlock pattern…. READ MORE
SOURCE: Naked Security
These days, compared to yesteryear, there is a multitude of good options to perform a Windows Operating System, selected partitions, and even the whole disk backup (often referred to as disk imaging).
One of the newer options that I recently was made aware of is “MiniTool Shadow Maker FREE”. I like the software that MiniTool develops and will be keeping an eye on (and testing) their rendition of this disk shadowing software. The purpose of this software is to provide you with an exact copy of your Windows OS that will allow you to restore your computer once a disaster occurs (and it eventually will). Disasters like a system crash, hard drive failure, and more.
MiniTool ShadowMaker offers straightforward solutions to deal with all kinds of backup tasks, including system backup and disk backup. These backups contain exactly the same copy of all the data stored on the original disk or partition. Such backups allow you to recover your computer to the normal state when Windows works incorrectly or partition data get lost.
Main Features of MiniTool ShadowMaker
- System and Disk Backup
- Schedule and Event Trigger Backup
- Differential and Incremental Images
- Bare Metal Recovery and Universal Restore
- WinPE Bootable media builder and PXE server
- Password Protection and AES Encryption
SOURCE: MiniTool ShadowMaker Free 1.0
This morning I am catching up on the tech news and the one thing that is jumping out at me is the news that CCleaner was hacked and used to deliver malware to unsuspecting computers and Android devices. I drilled down on this more and based on information from Piriform (the developers of CCleaner), a suspicious activity was identified on September 12th, 2017, where Piriform saw an unknown IP address receiving data from software found in version 5.33.6162 of CCleaner, and CCleaner Cloud version 1.07.3191, on 32-bit Windows systems. Based on further analysis, they found that the 5.33.6162 version of CCleaner and the 1.07.3191 version of CCleaner Cloud was illegally modified before it was released to the public.
All CCleaner users are encouraged to update their CCleaner software to version 5.34 or higher. The latest version is available for download from here.
CCleaner has been around for years and years and is a “go to” utility that is used by millions to clean and optimize their PC’s in order to protect their privacy and make things faster. I personally have used it for many years.
Getting rid of an old computer? Before handing that old computer over to someone else, you may want to consider using “MiniTool Drive Wipe Free” to remove all data from the computer. Deleting your personal files is not enough. There are third party software utilities, readily available on the internet, that will let anyone recover deleted files. By using “MiniTool Drive Wipe Free” to wipe the drive, there is no method of recovery.
Wiping is the process of continuously writing some specific data to a hard disk or partition so as to overwrite original data stored on the disk or partition. Once wiping is completed, original data can not be recovered by any data recovery method.
To effectively carry out this operation I would remove the drive from the old computer and put it in a drive docking station such as the Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station. This docking station is inexpensive and will work with 2.5 or 3.5in HDD or SSD drives. Once the drive is in the docking station, connect it to a workable Windows computer and use the “MiniTool Drive Wipe Free” software to “wipe the disk” that is in the external docking station. After performing this operation, you can safely reinstall the hard drive back into the old computer and do with it what you want (i.e. donate it, recycle it, give to a friend, sell, etc…)
SOURCE: MiniTool Drive Wipe Free
Crystal Security, a cloud-based system that detects and removes malicious programs (malware), is new to me. I am currently testing the portable version and so far the interface part looks great (user friendly). The detection engine, from I am can tell, is based on data gathered from millions of participating users systems around the world to help defend against the very latest viruses and malware attacks.
Due to not being familiar with Crystal Security, at this point, I will continue to test and use it solely as a troubleshooting application to inform when the possibility of malware exists. If you are familiar with Crystal Security, I would like to hear your experience with this. I do like the idea that there is a portable (no install) option.
I do recommend that you know what you are doing when using applications, such as this; so as not to cause accidental havoc to your PC.
SOURCE: Crystal Security
In light of hurricane Harvey, I pulled the information below in this blog post directly from the US-Cert website and the FTC website warning people to be cautious when responding to emails that may contain links or attachments that direct user to phishing or malware-infected websites.
From my experience, when life events occur of great magnitude, there is an element of our global society that will try to take advantage of people. This element of people will try to scare, intimidate, scam and rob you via electronic means; whether it be by phone, email, SMS messaging and even Facebook. My motto in our electronic world is “Believe Nothing, Verify Everything”. Just because it looks legit or a friend posted it, make sure you verify it.
I encourage you to read the article below by Colleen Tressler, Consumer Education Specialist, FTC to educate yourself about scammer’s exploiting people when tragedy occurs.
Wise giving in the wake of Hurricane Harvey
August 28, 2017
by Colleen Tressler
Consumer Education Specialist, FTC
It’s heartbreaking to see people lose their lives, homes, and businesses to the ongoing flooding in Texas. But it’s despicable when scammers exploit such tragedies to appeal to your sense of generosity.
If you’re looking for a way to give, the FTC urges you to be cautious of potential charity scams. Do some research to ensure that your donation will go to a reputable organization that will use the money as promised.
Consider these tips when asked to give:
- Donate to charities you know and trust with a proven track record with dealing with disasters.
- Be alert for charities that seem to have sprung up overnight in connection with current events. Check out the charity with the Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar.
- Designate the disaster so you can ensure your funds are going to disaster relief, rather than a general fund.
- Never click on links or open attachments in e-mails unless you know who sent it. You could unknowingly install malware on your computer.
- Don’t assume that charity messages posted on social media are legitimate. Research the organization yourself.
- When texting to donate, confirm the number with the source before you donate. The charge will show up on your mobile phone bill, but donations are not immediate.
- Find out if the charity or fundraiser must be registered in your state by contacting the National Association of State Charity Officials. If they should be registered, but they’re not, consider donating through another charity.
To learn more, go to Charity Scams. For tips to help you prepare for, deal with, and recover from a severe weather event, visit Dealing with Weather Emergencies.