What to Do If You Spill Liquid on Your Computer or Phone

Accidents happen, and eventually you’ll find yourself faced with a spill. Whether you’ve knocked coffee onto your laptop or dumped soda on your phone, here’s what to do. Will a spilled beverage destroy an electronic device? That depends on the beverage and the device. Water on a desktop computer keyboard? No big deal. Can of … Continue reading What to Do If You Spill Liquid on Your Computer or Phone

You Need Better Antivirus Than Your Computer’s Built-In Software

Your computer’s built-in antivirus software is no match against today’s Internet threats. Here’s why you should replace it with something stronger. Windows and Mac computers both have default antivirus programs, Windows Defender and Apple’s XProtect. (If you haven’t noticed XProtect running on your Mac, that’s because it runs silently in the background as part of … Continue reading You Need Better Antivirus Than Your Computer’s Built-In Software

Fleeceware Scams: The App Might Not Get You, but the Subscription Fees Will

There’s a new online scam called fleeceware making the rounds. Here’s how to avoid getting fleeced by it. Fleeceware differs from fake apps in one crucial way. Fake apps are typically malware in disguise, trading on the good names of reputable software to lure consumers into installing. Fleeceware apps, on the other hand, usually work … Continue reading Fleeceware Scams: The App Might Not Get You, but the Subscription Fees Will

The Essential Guide to Strong Passwords (2021 Edition)

If there's one thing you do for your own computer safety, please, use strong, unique passwords! Doing so decreases your chances of suffering virus infection, account hijacking, identity theft, and even financial fraud. People continually re-use passwords, or create weak passwords, or don't change the default passwords on important devices like routers and smart home gadgets. … Continue reading The Essential Guide to Strong Passwords (2021 Edition)

What You Need to Know About Tech Support Scams

Tech support scams are a continuing threat to consumers, especially with so many people working from home. Here’s how to avoid them, and how to find real tech support. A tech support scam usually starts with a fake phone call, phishing email, or pop-up ad. Phone calls are an especially popular choice for reaching consumers … Continue reading What You Need to Know About Tech Support Scams

Avoid Computer Problems By Updating Your Apps

We’re all guilty of ignoring app updates, myself included. But keeping your apps updated not only prevents computer problems, it also helps to protect your data. Updating your apps is an easy way to prevent computer problems before they start. If your app is crashing or causing errors, an update can fix the problem. Features … Continue reading Avoid Computer Problems By Updating Your Apps

The Beginner’s Guide to Two-Factor Authentication

Two-factor authentication, or 2FA, is an easy way to add extra security to your accounts. Here’s what home users need to know about setting up and using 2FA. How Two-Factor Authentication WorksTwo-factor authentication works in tandem with your password. When logging in, you’ll enter your password plus a one-time token, such as a code sent … Continue reading The Beginner’s Guide to Two-Factor Authentication

Ransomware: A Dangerous Threat to Your Computer

Ransomware is a particularly nasty form of computer virus that encrypts your data, then demands payment for the encryption key. Why is ransomware so hazardous, and how can you remove it? Ransomware is vicious because it doesn’t just render your computer unusable. It encrypts all of your files, including those on networked computers, removable drives, … Continue reading Ransomware: A Dangerous Threat to Your Computer

A Home User’s Guide to Mobile Device Internet Security

Few of us maintain the same security precautions on our tablets and phones that we do on our computers. But mobile devices contain personal data, and they go wherever we do. Here’s what you need to know to keep your mobile devices protected. In general the same security rules we use for computers also apply … Continue reading A Home User’s Guide to Mobile Device Internet Security