Amazon’s Ring says its connected-doorbell devices are building “safer neighborhoods.” Follow these steps to better protect the data (and video) they collect from hackers and partners.
By tracking location, speed, and sudden braking, these devices can help people keep tabs on where and how their cars are being driven. But privacy experts advise taking precautions.
Do you use a code-generating app from Google, Microsoft, LastPass, or Authy that supports multiple services? Migrating it to your new Android or iOS device requires a few steps.
There isn’t yet a one-size-fits-all way to prepare for or respond to social-media search demands—or device searches—at the border. But there are guidelines.
Before booking a stay, read the home description for a required camera disclosure. And after checking in, you can take these steps to find a hidden camera and protect your privacy.
Outages and privacy policies are among valid reasons to switch to a free third-party DNS service like Cloudflare, Google Public DNS, or Cisco OpenDNS. But there are caveats.
How easy is it to destroy the DNA samples held at genetic-testing labs, or delete the resulting genealogical profile? We compare some of the most popular services’ policies.
Even when we’ve exposed our bank log-in credentials through a phishing attack, we need to cap our emotions and respect the rep on the line. Here’s how to get efficient help on the call.
Major sites and browser vendors are increasingly supporting physical two-step authentication keys, known as U2F keys. Could they remedy your account security anxiety?
A device’s unwitting participation in a malicious robot network, or botnet, is practically detectable only through a forensic examination, experts tell us. But we can take steps to protect our devices.
The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t lik... Read More...
Even if your boss isn't actively surveilling you—or you think you have nothing to hide—you should know how blurring the line between personal and professional puts your privacy at risk.
Beyond the big three credit-reporting bureaus, a universe of secret companies can make or break your ability to get a job, insurance, home, or even a seat at a poker table. Take note.
New year, new job? Getting a fresh start means ensuring that you don’t leave any personal data baggage behind. Here’s how to clean up your company-issued devices before turning them in.
Channel those feelings you have about getting hacked in 2017. To better secure your digital life in 2018, make a resolution to follow these seven steps, garnered from how-tos we’ve published this year.
To gain unrestricted access to Macs running High Sierra prior to patching, someone could simply enter the word “root” as the username. Apple’s major misstep isn’t isolated, experts say.
A free year of a service like Equifax’s TrustID might feel like adequate identity theft protection. But experts say breach victims need much more than just credit monitoring, “indefinitely.”
Using Wi-Fi with proper precautions can prevent hacks of your devices, as well as exposure of the sites you browse to the apps you rely on.
Worms autonomously spread through system vulnerabilities, not actions like opening an email attachment. Nevertheless, there are ways to protect your technology against infections.
While fitness apps and devices could help you improve your physical health, they could also jeopardize your personal privacy, career, or insurance rates. Here’s what to look out for.
Is there a difference between computer security in your home versus in a small business? Absolutely, says the founder of Townsquared. But it’s not as big as you might think.
Interest in the software has skyrocketed as Trump rolls back consumer protections from Internet providers. But choosing a good VPN can require a little digging. Here’s what to look for.
Although you can’t necessarily increase how much privacy and security these voice-controlled personal-assistant devices provide, you can limit the info they collect and store. Here’s how.
Trump’s travel ban accompanied increased scrutiny of travelers’ electronic devices and social-media activity. Here are a few steps you can take to minimize your exposure at country borders.
Moving away from Yahoo isn’t trivial. But in light of recent security revelations, experts have decided that it’s time. Here’s how to back up, migrate away from, and shutter your accounts.
End-to-end encryption can’t mask message metadata, which WhatsApp is now sharing with other Facebook companies. Here’s why—and how security experts advise responding.
More and more of your data is getting distributed through the browser. To prevent it from getting compromised, experts recommend taking these five simple steps.
Billions of connected devices gaining in popularity don’t adequately address experts’ privacy and security concerns. Here’s a quick checklist to get through before purchasing one.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
The social network says it isn’t listening to users’ conversations to better target ads. For good measure, here are several ways to limit app access to your voice and online interactions.
Ask data brokers why your information is important to them, and they’ll tell you that it helps their partners provide you with more personalized services.As... Read More...
From your wireless carrier to your favorite retailer, hundreds of businesses could be following your movements. Here’s how and why—and what they could be doing with your location information.
Google’s massively popular Android operating system powers billions of phones and tablets around the world, but it’s also far easier for hackers to infiltrate than Apple’s iPhones. Here’s why.
No more articles