How to Recognize Counterfeit Electronics

In this week’s member-exclusive How-To Tuesday on Simple Tech Tips, we’re talking about how to recognize counterfeit electronics. The recent chip shortage has exacerbated the problem of counterfeits, but there are steps consumers can take to avoid them. Learn how to recognize the warning signs of counterfeit goods and find genuine deals on computers and … Continue reading How to Recognize Counterfeit Electronics

Typosquatting: How Mistyped Web Sites Lead To Malware and Scams

Ever type the wrong Web address by mistake? Did you know that cybercriminals snatch up typoed domains in order to create tempting lookalikes? Typosquatting is the practice of registering a domain that is a typo of a common site, like goole instead of google or microsft instead of microsoft. Most people don't notice typos, especially … Continue reading Typosquatting: How Mistyped Web Sites Lead To Malware and Scams

When Good Apps Go Bad: How to Avoid Malicious Software

Fake apps proliferate online, and it’s hard to tell the good apps from the bad. Scammers are getting sneakier by hiding their malicious apps behind the smokescreen of reputable ones. Your garden-variety fake app is typically malware disguised as a fun game or useful utility. Behind the shiny exterior lies code that can steal your … Continue reading When Good Apps Go Bad: How to Avoid Malicious Software

The Essential Guide to Strong Passwords (2021 Edition)

If there's one thing you do for your own computer safety, please, use strong, unique passwords! Doing so decreases your chances of suffering virus infection, account hijacking, identity theft, and even financial fraud. People continually re-use passwords, or create weak passwords, or don't change the default passwords on important devices like routers and smart home gadgets. … Continue reading The Essential Guide to Strong Passwords (2021 Edition)

What You Need to Know About Tech Support Scams

Tech support scams are a continuing threat to consumers, especially with so many people working from home. Here’s how to avoid them, and how to find real tech support. A tech support scam usually starts with a fake phone call, phishing email, or pop-up ad. Phone calls are an especially popular choice for reaching consumers … Continue reading What You Need to Know About Tech Support Scams

The Beginner’s Guide to Two-Factor Authentication

Two-factor authentication, or 2FA, is an easy way to add extra security to your accounts. Here’s what home users need to know about setting up and using 2FA. How Two-Factor Authentication WorksTwo-factor authentication works in tandem with your password. When logging in, you’ll enter your password plus a one-time token, such as a code sent … Continue reading The Beginner’s Guide to Two-Factor Authentication

Ransomware: A Dangerous Threat to Your Computer

Ransomware is a particularly nasty form of computer virus that encrypts your data, then demands payment for the encryption key. Why is ransomware so hazardous, and how can you remove it? Ransomware is vicious because it doesn’t just render your computer unusable. It encrypts all of your files, including those on networked computers, removable drives, … Continue reading Ransomware: A Dangerous Threat to Your Computer

How to Stop Your Webcam and Microphone From Spying On You

With everyone relying on webcams and microphones these days, it’s vital to know how to protect yourself from accidental—or intentional—spying. Cameras can be hijacked in a number of ways. Cybercriminals can commandeer them with viruses or ransomware, then extort you by demanding money for the deletion of potentially embarrassing photos and videos. There’s always the … Continue reading How to Stop Your Webcam and Microphone From Spying On You