iPhone system updates – 2021 iOS flurry

Are you getting annoyed at the constant nags to update your iPhone? Is it worth all the time it takes to process – to download-check-install and reboot your device? If you’re getting notices the last month or so that yet another iOS update is available for your iPhone, then you’re not alone. I was getting… Continue reading iPhone system updates – 2021 iOS flurry

Is Windows 10’s built-in security all the free you need?

Here’s an update to a topic discussed in my January 31, 2019, post “Best PC anti-virus — free or not” and whether Microsoft Windows 10’s built-in Windows Defender is adequate for many PC users. PC World > “Windows Security review: There are better options, but not for the ‘price’” – Windows Security (nee Windows Defender)… Continue reading Is Windows 10’s built-in security all the free you need?

Best PC anti-virus program?

An annual review by PC World: “Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more” (updated August 27, 2018): Antivirus software is nearly as crucial as a PC’s operating system. Even if you’re well aware of potential threats and practice extreme caution, some threats just can’t be prevented without the extra… Continue reading Best PC anti-virus program?

Spectre and Meltdown — phones, tablets, and computers, oh my!

Much in the media this week about an industry-wide problem with all devices using Intel processors — CPU chips, and perhaps those from other manufacturers as well. A security vulnerability: Meltdown and Spectre. It’s like Dorothy, the Tin Man and the Scarecrow walking through the dark forest in the 1939 classic The Wizard of OZ and… Continue reading Spectre and Meltdown — phones, tablets, and computers, oh my!

Yahoo breach — things to do

Well, Yahoo’s much in the news again. Once again, as noted by the New York Times, “Yahoo Says 1 Billion User Accounts Were Hacked.” The newly disclosed 2013 attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions that could be used to reset a password. Yahoo… Continue reading Yahoo breach — things to do

National Cyber Security Awareness Month

As noted by the Department of Homeland Security: October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber… Continue reading National Cyber Security Awareness Month

Biggest data breach ever — Yahoo + some AT&T accounts

Big news this week regarding data breaches. Yahoo revealed that account information for at least 500 million users was stolen by state-sponsored hackers two years ago. PC World’s article “Here’s what you should know, and do, about the Yahoo breach” discusses the breach and reviews best security practices. An email compromise is one of the… Continue reading Biggest data breach ever — Yahoo + some AT&T accounts

Prevent malware infection — best practices review

The Malwarebytes Blog recently discussed “10 easy ways to prevent malware infection” — for your PC, Mac, or mobile device. Read the article for the complete text. Here’s the summary below. Protect vulnerabilities: Update your operating system, browsers, and plugins; Enable click-to-play plugins; Remove software you don’t use (especially legacy programs). Watch out for social… Continue reading Prevent malware infection — best practices review

Trading away personal info — twilight of privacy?

Imagine you’re visiting a mall and occasionally someone stops you and asks for some personal information: Your favorite places to shop? Things you like to purchase? Brands you like? … You’re told that as a reward for providing that information you’ll get a gift certificate. What if that happens to you on the street, just… Continue reading Trading away personal info — twilight of privacy?

Apple’s updated privacy policy — plainly different than others’ policies?

As noted in previous posts, the privacy policies of major tech companies, especially those with products and services that we interact with on a daily basis using our mobile devices, are getting a lot of media attention. And rightfully so. What’s moot? What’s not? Just because “it can be collected” begs the question of whether… Continue reading Apple’s updated privacy policy — plainly different than others’ policies?

Security vs. convenience — who wins?

I’ve discussed this topic with many of my clients, especially those who complain about remembering or keeping track of passwords — the trade-off between security and convenience for consumer products and services. We recognize this trade-off everyday with different keys for physical locks and passwords for different digital services. Password managers can help with “one… Continue reading Security vs. convenience — who wins?

PC Security Tips — common tricks

PC World’s latest article “How to protect your PC against devious security traps” provides a useful summary of malicious attacks: Phishing Bogus email Fake warnings Out-of-date app exploits Zero-day attacks Port sniffing

Best Practices — Personal Computer Configuration

Here’re some standard recommendations that I discuss with my clients: 1. Use a password for your computer account. In other words, when you start up your computer, you’ll need to enter a password to access your desktop. While you may be able to change settings so this step is not required, remember that such a… Continue reading Best Practices — Personal Computer Configuration

Security Risk Outlook 2014

A recent PC World article “Threat forecast for 2014: Ransomware, scams, snoops” summarized security firm AVG’s outlook for 2014: AVG Technologies Australia security advisor, Michael McKinnon, said the emergence of ransomware such as Cryptlocker shows the increasing sophistication of modern malware, and should be a concern for individual users and business. Here’s an excerpt from… Continue reading Security Risk Outlook 2014

Holiday Cyber Risks

IDG’s CSO* recently posted an article titled “5 risks to avoid for the holidays” summarizing scams and risks to beware of for the holidays. In particular, watch out for spoofed emails purportedly from shippers and payment processing agents. Also fake e-cards. Fake messages frequently include instructions to open an attachment or click on a link.… Continue reading Holiday Cyber Risks

Best Practices for Keeping Home Network Secure

The Government’s Information Assurance Mission at NSA issued “Best Practices for Keeping Your Home Network Secure” in April 2011. The document summarizes recommended practices for home personal computers and networks.