When Good Apps Go Bad: How to Avoid Malicious Software

Fake apps proliferate online, and it’s hard to tell the good apps from the bad. Scammers are getting sneakier by hiding their malicious apps behind the smokescreen of reputable ones. Your garden-variety fake app is typically malware disguised as a fun game or useful utility. Behind the shiny exterior lies code that can steal your … Continue reading When Good Apps Go Bad: How to Avoid Malicious Software

Fleeceware Scams: The App Might Not Get You, but the Subscription Fees Will

There’s a new online scam called fleeceware making the rounds. Here’s how to avoid getting fleeced by it. Fleeceware differs from fake apps in one crucial way. Fake apps are typically malware in disguise, trading on the good names of reputable software to lure consumers into installing. Fleeceware apps, on the other hand, usually work … Continue reading Fleeceware Scams: The App Might Not Get You, but the Subscription Fees Will

The Essential Guide to Strong Passwords (2021 Edition)

If there's one thing you do for your own computer safety, please, use strong, unique passwords! Doing so decreases your chances of suffering virus infection, account hijacking, identity theft, and even financial fraud. People continually re-use passwords, or create weak passwords, or don't change the default passwords on important devices like routers and smart home gadgets. … Continue reading The Essential Guide to Strong Passwords (2021 Edition)

What You Need to Know About Tech Support Scams

Tech support scams are a continuing threat to consumers, especially with so many people working from home. Here’s how to avoid them, and how to find real tech support. A tech support scam usually starts with a fake phone call, phishing email, or pop-up ad. Phone calls are an especially popular choice for reaching consumers … Continue reading What You Need to Know About Tech Support Scams

The Beginner’s Guide to Two-Factor Authentication

Two-factor authentication, or 2FA, is an easy way to add extra security to your accounts. Here’s what home users need to know about setting up and using 2FA. How Two-Factor Authentication WorksTwo-factor authentication works in tandem with your password. When logging in, you’ll enter your password plus a one-time token, such as a code sent … Continue reading The Beginner’s Guide to Two-Factor Authentication

A Home User’s Guide to Mobile Device Internet Security

Few of us maintain the same security precautions on our tablets and phones that we do on our computers. But mobile devices contain personal data, and they go wherever we do. Here’s what you need to know to keep your mobile devices protected. In general the same security rules we use for computers also apply … Continue reading A Home User’s Guide to Mobile Device Internet Security

Why You Need To Delete Your Old Accounts

Most people let old accounts languish. But abandoned accounts are filled with information that can be used to send spam, spread malvertising, and commit cybercrimes. For example, I frequently get email messages from people I know, but haven’t talked to in a while. Invariably the email subject is blank or says nothing but, “Re:”. Sometimes the … Continue reading Why You Need To Delete Your Old Accounts

A Parent’s Guide To Protecting Your Kids Online

It's hard to protect kids online, because parents and educators often have a hard time finding resources that can help them understand the latest risks and recommendations. I've gathered a variety of information in one place so you can learn about antivirus, parental controls, and protecting your kids while using mobile devices and video games. … Continue reading A Parent’s Guide To Protecting Your Kids Online

How To Backup And Restore Files On Your PC Or Mac

Everyone knows you're supposed to make backups, but choosing a method can be confusing. Here's a rundown of your choices for Windows and Mac. Related article: Today's Backups Offer More Flexibility by Triona Guidry (The Northwest Herald) Built-In Backups All modern computers come with utilities which you can use to back up to an external … Continue reading How To Backup And Restore Files On Your PC Or Mac