So far, government-mandated Internet shutdowns have yet to mar Black Lives Matter protests. But they do occur far more regularly than you might expect.
Coronavirus has brought on a Zoom boom, making the videoconferencing software a more attractive hacking target. As the company plugs holes, we can adjust our meeting settings.
Amazon’s Ring says its connected-doorbell devices are building “safer neighborhoods.” Follow these steps to better protect the data (and video) they collect from hackers and partners.
Google has made it possible to use your iPhone as a two-factor authentication key for account log-ins, just as it did last year for Android phones. Follow these steps to set it up.
Microsoft is no longer supporting Windows 7. Everyone should have long since left it behind for a more secure operating system. But for some, upgrading isn’t an easy option.
Ever come across a jarringly unfamiliar event like ““$$$ Playmate Wanted $$$” in your online calendar? It’s time to report calendar spam and update your calendar settings.
Before using an app, privacy experts advise searching its fine print for keywords that may highlight the company’s data collection, retention, protection, and sharing practices. Here’s how.
By tracking location, speed, and sudden braking, these devices can help people keep tabs on where and how their cars are being driven. But privacy experts advise taking precautions.
You know that on its own, email is not secure for sending credit card or passport numbers. But you still need to send some personal information over the Internet. Here’s how.
As smart TVs with very little built-in security features become ubiquitous, consumers can take basic steps to better secure their network access, microphones, and cameras.
Do you use a code-generating app from Google, Microsoft, LastPass, or Authy that supports multiple services? Migrating it to your new Android or iOS device requires a few steps.
While traditional malware infects a system via a file that requires execution, fileless malware can infect a device’s memory via an instruction set hiding in an email attachment.
There isn’t yet a one-size-fits-all way to prepare for or respond to social-media search demands—or device searches—at the border. But there are guidelines.
Before booking a stay, read the home description for a required camera disclosure. And after checking in, you can take these steps to find a hidden camera and protect your privacy.
Google’s move to turn Android devices—the ones already in consumers’ hands—into the physical keys needed to unlock accounts is a “game changer.” Here’s why, and how to do it.
Limiting the location data that mapping apps store about you doesn’t mean abandoning location services. Here’s how to better control or delete the data your movements generate.
Because Signal ties its app to phone numbers, it intercepts text messages between former and current users. That is, unless former users properly deregister their numbers. Here’s how.
Outages and privacy policies are among valid reasons to switch to a free third-party DNS service like Cloudflare, Google Public DNS, or Cisco OpenDNS. But there are caveats.
If you'd rather not get personalized offers from brands—or at least have more control over the sensitive data used to generate them—your options are pretty limited.
How easy is it to destroy the DNA samples held at genetic-testing labs, or delete the resulting genealogical profile? We compare some of the most popular services’ policies.
Even when we’ve exposed our bank log-in credentials through a phishing attack, we need to cap our emotions and respect the rep on the line. Here’s how to get efficient help on the call.
Major sites and browser vendors are increasingly supporting physical two-step authentication keys, known as U2F keys. Could they remedy your account security anxiety?
Monitoring the apps your kids use—and knowing the difference between ones that respect and exploit their privacy—can be an overwhelming responsibility. Here’s how to approach it.
A device’s unwitting participation in a malicious robot network, or botnet, is practically detectable only through a forensic examination, experts tell us. But we can take steps to protect our devices.
The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t lik... Read More...
As endless studies show, the first lesson in stopping a phishing attempt is to be skeptical of links in emails, text messages, or anything appearing to be a personal, private communication.
You can’t personally prevent a data breach, nor someone from attempting to defraud your insurance provider. But you can take steps to minimize how much a breach can affect you.
Many social-media companies and email providers have services to help executors settle a decedent’s digital assets, and some have services to help users prepare for their own death.
Need to lock down your accounts, block a harasser, and move on with your digital life? Follow these five steps, from documenting and reporting to adding two-factor authentication.
Even if your boss isn't actively surveilling you—or you think you have nothing to hide—you should know how blurring the line between personal and professional puts your privacy at risk.
Watering-hole attacks use predator tactics to improve attackers’ odds of infiltrating large organizations. They’re hard to detect or defend—and they can have devastating effects.
As Google reveals a Duplex power boost to its Assistant, security experts weigh in on the risks. In the smart home, added conveniences and insights come with a wider “attack surface.”
Connected car data could be worth $750 billion by 2030. That’s great, if you’re a car company. But if you’re a consumer, you’ll want to be able to weigh the benefits against the risks.
Spear phishing differs from its more prevalent counterpart, phishing, in that it casts a smaller, more targeted net. Its tactics are also much more sophisticated.
“No one is immune” to advanced persistent threats, or APTs, which hackers use to surreptitiously gain access to a network and stay undetected for a long period of time.
Heading to the Winter Olympics in South Korea or another major public event? Don’t let yourself get so carried away with excitement that you forget that the bad guys are just waiting for you to slip up.
Combine its nefarious applications with its inherent stealthiness and rapid proliferation, and it’s easy to see why cryptojacking has become a hot new topics in security circles.
Beyond the big three credit-reporting bureaus, a universe of secret companies can make or break your ability to get a job, insurance, home, or even a seat at a poker table. Take note.
New year, new job? Getting a fresh start means ensuring that you don’t leave any personal data baggage behind. Here’s how to clean up your company-issued devices before turning them in.
Channel those feelings you have about getting hacked in 2017. To better secure your digital life in 2018, make a resolution to follow these seven steps, garnered from how-tos we’ve published this year.
To gain unrestricted access to Macs running High Sierra prior to patching, someone could simply enter the word “root” as the username. Apple’s major misstep isn’t isolated, experts say.
From peer-to-peer apps to debit cards at retail, security experts sort through the myriad ways to make holiday purchases—and explain why Pay apps are the most secure.
A free year of a service like Equifax’s TrustID might feel like adequate identity theft protection. But experts say breach victims need much more than just credit monitoring, “indefinitely.”
From verifying link destinations to being cautious about what you share, social-media privacy expert Hayley Kaplan outlines how to safely use President Trump’s favorite pulpit.
Like the Trojan horse of Greek mythology, malware like Kronos carries a destructive payload, helping criminals steal hundreds of millions of dollars. Here’s what to look out for.
You might be protected against credit card fraud, but your payment apps are still susceptible to attacks intended to take over your accounts, or steal your credentials and use them elsewhere.
Crime kits are automated, self-contained tools that cybercriminals of any skill level can deploy to exploit a vulnerability. Protecting their proliferation requires a multipronged approach.
Worms autonomously spread through system vulnerabilities, not actions like opening an email attachment. Nevertheless, there are ways to protect your technology against infections.
With phishing attacks spoofing password reset emails on the rise, experts advise, above all else, manually going to the site to log in rather than clicking on any links within the email.
While fitness apps and devices could help you improve your physical health, they could also jeopardize your personal privacy, career, or insurance rates. Here’s what to look out for.
Is there a difference between computer security in your home versus in a small business? Absolutely, says the founder of Townsquared. But it’s not as big as you might think.
Interest in the software has skyrocketed as Trump rolls back consumer protections from Internet providers. But choosing a good VPN can require a little digging. Here’s what to look for.
Although you can’t necessarily increase how much privacy and security these voice-controlled personal-assistant devices provide, you can limit the info they collect and store. Here’s how.
Scammers are looking to capitalize on the spike in “rage donations.” Here are four ways to ensure that your personal data and funds reach an intended legitimate charity—and nobody else.
Trump’s travel ban accompanied increased scrutiny of travelers’ electronic devices and social-media activity. Here are a few steps you can take to minimize your exposure at country borders.
Given predicted threats to your personal data and security this year, it’s more important than ever to break your bad online habits. Here’s a quick checklist.
We asked security experts how to better control the personal data that mobile apps, including those of Facebook and Google, expose about us. Here’s their advice.
Making a new year’s resolution to clean up your digital-security act? Here are 10 secure apps to consider, from ad blockers and password managers to private browsers and secure messaging apps.
Believe it or not, you can arm yourself against scammers lurking on dating sites and apps—and ensure that they’re doing right by you and your quest to not die alone. Here’s how.
Holiday chaos, combined with increases in online gift shopping and charitable giving, form a perfect storm for scammers to strike. From email scams to fake charities, here’s what to look out for.
The Yahoo microblogging service acknowledges that millions of its users’ account credentials have been compromised in recent years. Here’s how to regain control of and further secure yours.
Moving away from Yahoo isn’t trivial. But in light of recent security revelations, experts have decided that it’s time. Here’s how to back up, migrate away from, and shutter your accounts.
Security experts worry that short-term rentals like Airbnb will attract casual hackers looking to steal credentials, infect machines, or even spy on browsing patterns. Here’s how to protect your home.
Creating and remembering a plethora of strong, unique passwords can be a challenge, even for security experts. Here’s why they say a password manager can help keep you safe.
Planning to resell your old iPhone or Android device to offset the cost of a new one? Ensure that you’ve properly wiped it first, following these step-by-step directions.
End-to-end encryption can’t mask message metadata, which WhatsApp is now sharing with other Facebook companies. Here’s why—and how security experts advise responding.
Conversations with your aspiring Snapchatter about social-media safety should resemble those you’ve already had about “being safe at the park and at the movies,” experts say.
Hidden trackers and malicious ads can respectively threaten your privacy and security while on the Web. To augment your browser settings, experts recommend installing these extensions.
More and more of your data is getting distributed through the browser. To prevent it from getting compromised, experts recommend taking these five simple steps.
It seems like every day there are more and more options for sending and receiving money online. Here’s six tips for staying safe for handling money on your computer and phone.
Billions of connected devices gaining in popularity don’t adequately address experts’ privacy and security concerns. Here’s a quick checklist to get through before purchasing one.
It’s a quixotic journey at best, PR guru Jonathan Hirshon says. Nevertheless, it’s one he’s successfully navigated for years to “educate people” about privacy, if nothing else. Here’s how.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
The social network says it isn’t listening to users’ conversations to better target ads. For good measure, here are several ways to limit app access to your voice and online interactions.
You’re not helpless. Here are five steps you can take when notified that your information has been involved in a breach to prevent further harm and protect yourself.
Protecting yourself from phishing scams and malware on the network starts with accepting invitations to connect with caution. Here’s what to look out for and how to report fraudsters.
As the social network’s settings and policies evolve, users need to stay on top of what they are sharing with Facebook and others. Take these steps, and you’ll feel more secure.
With the credentials you enter in response, phishers generally hope to access (and wreak havoc) on your financial accounts. Here’s what to look for—and how to deal, if you fall victim.
This one’s for you, Laremy Tunsil. Twitter hacks can create a social-media mess, but the cleanup could be as simple as changing your passwords and running a virus scan.
You can dodge attacks with “good security hygiene.” And if you do get infected, you can take steps to regain control phone or laptop. Here’s a rundown.
Advertisements on your phone do more than just tax your battery and make it hard to see your already small screen. They’re also used to deliver malicious software. Here’s how to block them.
Ask data brokers why your information is important to them, and they’ll tell you that it helps their partners provide you with more personalized services.
As... Read More...
From your wireless carrier to your favorite retailer, hundreds of businesses could be following your movements. Here’s how and why—and what they could be doing with your location information.
Even at 30,000 feet, you’re not necessarily safe from hackers. Our pre-flight safety demonstration includes four steps you can take to protect yourself when using airline Wi-Fi.
The iPhone isn’t the only popular device you can essentially lock government agencies and hackers out of. Here are seven ways to strengthen the walls around your Android.
Worried about the government (or anybody else) getting access to your iPhone? Here are five key ways you can protect it from prying eyes—and two more, for good measure.
Google’s massively popular Android operating system powers billions of phones and tablets around the world, but it’s also far easier for hackers to infiltrate than Apple’s iPhones. Here’s why.
Malicious spam takes form in a variety of ways on the social network. Here are common tactics that cybercriminals use to entice you to click and reveal your personal info.
When your account gets hacked, you may feel as if your best online connection to friends has been shattered. Here’s how you get back to normal—and prevent another attack.
How private your mobile communications are depends on which devices you use and which apps you’ve installed. These apps can help keep your private messages from going public.