Here’s an update to a topic discussed in my January 31, 2019, post “Best PC anti-virus — free or not” and whether Microsoft Windows 10’s built-in Windows Defender is adequate for many PC users. PC World > “Windows Security review: There are better options, but not for the ‘price’” – Windows Security (nee Windows Defender)… Continue reading Is Windows 10’s built-in security all the free you need?
Forbes > How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips by Davey Winder, Senior Contributor, Cybersecurity (Nov 1, 2019) Just because you’ve invested in a smartphone that isn’t exposed to quite the same degree of malware and exploit issues as an Android device, that doesn’t mean you can safely ignore good… Continue reading iPhone security best practices
An annual review by PC World: “Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more” (updated August 27, 2018): Antivirus software is nearly as crucial as a PC’s operating system. Even if you’re well aware of potential threats and practice extreme caution, some threats just can’t be prevented without the extra… Continue reading Best PC anti-virus program?
Much in the media this week about an industry-wide problem with all devices using Intel processors — CPU chips, and perhaps those from other manufacturers as well. A security vulnerability: Meltdown and Spectre. It’s like Dorothy, the Tin Man and the Scarecrow walking through the dark forest in the 1939 classic The Wizard of OZ and… Continue reading Spectre and Meltdown — phones, tablets, and computers, oh my!
“Fortify your PC against all manner of attacks—for free!” This PC World article “How to build the best free PC security software suite” (October 16, 2017) is one of the best digests of the topic that I’ve encountered. The article offers a ready summary of what you need to cover various security risks on your… Continue reading Best free PC security software
Well, Yahoo’s much in the news again. Once again, as noted by the New York Times, “Yahoo Says 1 Billion User Accounts Were Hacked.” The newly disclosed 2013 attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions that could be used to reset a password. Yahoo… Continue reading Yahoo breach — things to do
As noted by the Department of Homeland Security: October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber… Continue reading National Cyber Security Awareness Month
Big news this week regarding data breaches. Yahoo revealed that account information for at least 500 million users was stolen by state-sponsored hackers two years ago. PC World’s article “Here’s what you should know, and do, about the Yahoo breach” discusses the breach and reviews best security practices. An email compromise is one of the… Continue reading Biggest data breach ever — Yahoo + some AT&T accounts
The Malwarebytes Blog recently discussed “10 easy ways to prevent malware infection” — for your PC, Mac, or mobile device. Read the article for the complete text. Here’s the summary below. Protect vulnerabilities: Update your operating system, browsers, and plugins; Enable click-to-play plugins; Remove software you don’t use (especially legacy programs). Watch out for social… Continue reading Prevent malware infection — best practices review
Imagine you’re visiting a mall and occasionally someone stops you and asks for some personal information: Your favorite places to shop? Things you like to purchase? Brands you like? … You’re told that as a reward for providing that information you’ll get a gift certificate. What if that happens to you on the street, just… Continue reading Trading away personal info — twilight of privacy?
I’ve discussed this topic with many of my clients, especially those who complain about remembering or keeping track of passwords — the trade-off between security and convenience for consumer products and services. We recognize this trade-off everyday with different keys for physical locks and passwords for different digital services. Password managers can help with “one… Continue reading Security vs. convenience — who wins?
PC World’s latest article “How to protect your PC against devious security traps” provides a useful summary of malicious attacks: Phishing Bogus email Fake warnings Out-of-date app exploits Zero-day attacks Port sniffing
Here’re some standard recommendations that I discuss with my clients: 1. Use a password for your computer account. In other words, when you start up your computer, you’ll need to enter a password to access your desktop. While you may be able to change settings so this step is not required, remember that such a… Continue reading Best Practices — Personal Computer Configuration
A recent PC World article “Threat forecast for 2014: Ransomware, scams, snoops” summarized security firm AVG’s outlook for 2014: AVG Technologies Australia security advisor, Michael McKinnon, said the emergence of ransomware such as Cryptlocker shows the increasing sophistication of modern malware, and should be a concern for individual users and business. Here’s an excerpt from… Continue reading Security Risk Outlook 2014
IDG’s CSO* recently posted an article titled “5 risks to avoid for the holidays” summarizing scams and risks to beware of for the holidays. In particular, watch out for spoofed emails purportedly from shippers and payment processing agents. Also fake e-cards. Fake messages frequently include instructions to open an attachment or click on a link.… Continue reading Holiday Cyber Risks
The Government’s Information Assurance Mission at NSA issued “Best Practices for Keeping Your Home Network Secure” in April 2011. The document summarizes recommended practices for home personal computers and networks.