Security
Help! My Account Has Been Hacked—What Should I Do?
How would you realize that one or more of your Internet accounts—email, social media, financial—have been hacked? (Some prefer the terms “compromised” or “breached”—you may hear them from support techs.) Unfortunately, there’s no telltale warning sign because “hacked” could mean any number of things. Here are some possible indications: People you trust report receiving email […]
Read MoreUse iOS 17.3’s Stolen Device Protection to Reduce Harm from iPhone Passcode Thefts
Last year, a series of articles by Wall Street Journal reporters Joanna Stern and Nicole Nguyen highlighted a troubling form of crime targeting iPhone users. A thief would discover the victim’s iPhone passcode, swipe the iPhone, and run. With just the passcode, the thief could quickly change the victim’s Apple ID password, lock them out […]
Read MoreAfter “Mother of All Breaches,” Update Passwords on Compromised Sites
January’s big security news was the Mother of All Breaches, the release of a massive database containing 26 billion records built from previous breaches across numerous websites, including Adobe, Dropbox, LinkedIn, and Twitter. It’s unclear how much of the leaked data is new, but it’s a good reminder to update your passwords for accounts on […]
Read MoreImprove Your Digital Security in 2024 with These New Year’s Resolutions
Happy New Year, and welcome to 2024! For many of us, starting a new year means reflecting on fresh habits we’d like to adopt. Although we support any resolutions you may have made to get enough sleep, eat better, exercise more, and reduce social media usage, allow us suggest a few more that will improve […]
Read MoreNo, NameDrop in iOS 17 Isn’t a Privacy Concern. Here’s How to Use It
One of the prominent new features in iOS 17.1 and watchOS 10.1 is NameDrop, which makes it easy to exchange contact information with someone merely by putting your iPhone or Apple Watch next to theirs. When you do that, you can share your contact card and receive theirs, or just receive theirs—nothing happens unless you […]
Read MoreLearn to Identify and Eliminate Phishing Notifications
Email may be the most common form of phishing, but it’s not the only one. Modern Web browsers support a technology that enables websites to display system-level notifications just like regular apps. These push notifications have good uses, such as letting frequently updated websites inform users of new headlines, changed discussion threads, and more. Unfortunately, […]
Read More“Juice Jacking” Returns to the News but Still Hasn’t Happened
Much has been made in the media about a recent FBI warning about “juice jacking,” the theoretical act of installing malware on or stealing data from an iPhone connected to a public charging station. Researchers first demonstrated juice jacking in 2011 at the Defcon security conference. There’s no harm in following the FBI’s advice, but […]
Read MoreA Practical Guide to Identifying Phishing Emails
Phishing is becoming an ever more common way for people to get in trouble when using the Internet. A phishing attack is some communication, usually an email, that tries to lure you into revealing login credentials, financial information, or other confidential details. A State of Phishing report from security firm SlashNext claims that there were […]
Read MoreIs Your Wi-Fi Network a Security Risk?
With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your devices to your Wi-Fi network means it’s equally as easy for a hacker to connect […]
Read MoreLastPass Security Breach: Here’s What to Do
Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the data of users who abided by LastPass’s defaults and created master passwords of […]
Read More