Category: Security

FTC Identity Theft website guides victims through the recovery process

Filed under: Internet Tips,Security - Feb 17 2021

If you’ve been a victim of identity theft, the Federal Trade Commission’s IdentityTheft.gov is the federal government’s one-stop resource for identity theft victims. The site provides streamlined checklists and sample letters to guide you through the recovery process.

If you haven’t been a victim, read these tips to help keep your identity from being stolen or compromised in the first place: Prevent Identity Theft.

Print This Article Print This Article

Goodbye Flash Player

Filed under: Internet Tips,Security - Dec 25 2020

Adobe Flash Player – not to be confused with Adobe (PDF) Reader – in the last decade had been the most common method of viewing video and animation files in the web browser. But the latest web coding standards includes the ability to play videos and animations natively – without the need for a browser extension or add-on.

In July 2017 Adobe announced it would no longer support Flash Player at the end of 2020, and recently all major web browsers have blocked or completely removed the ability to play Flash content. Around that time many security vulnerabilities plagued the software and it became a common vector for spreading malware through the computer browser.

What can you do if the web content you are trying to view says it requires Flash Player? Nothing – it’s up to the website developer to reprogram the site with modern standards that doesn’t require Flash Player.

Massive government and business computer hack will likely effect home users too – What you need to do

Filed under: Computing Tips,Passwords,Scams,Security - Dec 24 2020

A massive government and business computer hack was discovered early this month (December 2020), but the long term effects likely won’t be known for months or years as more knowledge is obtained about what companies were affected and what data may have been (or will be) breached.

Early details of the hack are explained in these comprehensive articles from CNN and CNET. The hack was spread to thousands of computer systems, altogether likely containing the private data of a majority of US citizens. That data may be compromised and leaked to miscreants if the data on those computer systems was not securely stored or encrypted. Hackers may be holding onto such data for months or years to come.

So what should the home computer user do?

  • Change your passwords ASAP: Data breaches usually contain email addresses and sometimes passwords. If you use the same password for different websites, you are more vulnerable to having your other accounts hacked. Click here to read the top 5 password tips that you need to know.
  • Make sure all of your devices are up to date: By default Windows and MacOS computers update automatically. But other internet connected software and hardware usually require manual updates – such as iOS, iPadOS, Android, internet routers, video doorbells and cameras, streaming media players, etc. If you need help making sure all of your internet connected devices have the latest security patches, please contact us.
  • Be suspicious of every email, phone call, SMS or browser pop-up: Initially do not trust any unsolicited email, phone call, SMS or pop-up in your web browser – particularly if it’s asking you to do something. Treat everything as “guilty until proven innocent”. See how to recognize scams and phishing attempts, and for more information review all of our security articles.

Can you spot “phishing” or a scam? Take the quiz.

Filed under: Computing Tips,Scams,Security - Jun 24 2020

How well can you spot a scam? Take the following quizzes to help protect yourself the next time you get an email, text message, website pop-up or phone call.

Scam Spotter

Can you spot when you’re being phished?

OpenDNS Phishing Quiz

The dangers of using the same password for different websites

Filed under: Passwords,Security - Apr 17 2020

Sure it’s easy to just use the same password for everything. But with data breaches seemingly occurring on a daily basis, your email address and password that’s part of any data breach is surely being used to try to log into your email account and other accounts that hold personal, financial and other private information.

It’s been suggested by some clients that nobody would be interested in reading their email, so their email password doesn’t need to be secure or unique. However if a hacker accesses your email consider the following common occurrences:

  • A hacker can reset/change your email password and lock you out of your account.
  • A hacker can read all of your emails to figure out all the financial and shopping accounts that you do business with. With that information they can begin attempting to login to those websites, and if unable to do so – they can intercept the password reset emails sent to your email address and reset the passwords for those accounts too.
  • A hacker can copy your contact list and/or send emails on your behalf asking for money, gift cards or to send spam and phishing emails that appear to come from you.

If your email password is not unique or easily guessed by others, please change your email password now!

Not only does your email account password need to be unique, your login information obtained from data breaches and phishing emails are also being used to login into other types of online accounts:

  • Online file storage and personal backup accounts – to access to any personal documents that may contain private or financial data.
  • Your wireless phone provider – to attempt to hijack your phone number and receive password reset codes.
  • Online shopping accounts – to order merchandise with your stored payment information, and have it sent to the hacker.
  • Online social media accounts – to impersonate you in attempt to convince friends or family to send money or gift cards to the hacker.

To create secure and unique passwords for every online account, check out how to safely manage your passwords, which includes tips for creating a secure a memorable password system.

For more information, I suggest reading this more in-depth article by security researcher and former Washington Post reporter, Brian Krebs: The Value of a Hacked Email Account.

Print This Article Print This Article

The good and bad of browser extensions

Filed under: Internet Tips,Passwords,Security - Aug 20 2019

You likely spend most of the time on your computer using your web browser. Years ago the web browser was primarily used for reading news and email. Now we can do everything from grocery shopping, managing finances, word processing, and even work in browser-based versions of powerful business applications – without leaving a browser window. Part of what has made web browsers so useful – but also potentially hazardous – is the popularity of browser extensions.

Browser extensions are applications, often developed by third party developers, that users can download to expand the functionality of their web browsers. A few different extensions that we recommend can block ads, manage passwords, manage too many open browser tabs, or save web pages to Google Drive or Evernote – just to name a few. However there’s also an abundance of extensions that promise to do great things, yet cause far more trouble than they’re worth.

Some of these “bad” extensions just cause annoyances, displaying ads or automatically redirecting you to websites that you didn’t intend to browse to. Others are more malicious, spying on your browsing, stealing your data, or injecting malware into your system. What’s worse is that some extensions start out life perfectly legitimate, but then get bought by bad actors and become malicious.

Some of our most common calls for service are due to bad browser extensions. So how do you get the most out of browser extensions without falling prey to malicious ones? Here are 5 tips:

1. Be very wary of pop-ups advertising an extension.

Many users install extensions because they are prompted to in pop-up messages on websites. You always have the option to decline the extension, or close your browser to avoid installing a persistent installation prompt. If you didn’t go to a website looking to install an extension, it’s best to decline, since a large majority of the time the website is offering something that’s in their best interest – not yours.

2. Only download extensions from websites that you trust.

Do some research into the company behind the extension you’d like to download. Many extensions are developed by companies you know, such as Google or Microsoft, and these are generally safe. If you don’t recognize the vendor, be sure to read reviews of the extension on the browser’s extension interface – such as Chrome’s Web Store or Firefox’s Add-Ons page. Often malicious extensions will receive enough bad reviews to warn careful users away.

3. Take time to read all the fine print.

Whenever you’re downloading extensions, slow down to read all the messages your browser gives you about the extension. Chrome, for example, will show you exactly what information the extension will have access to, as pictured below.

In this example, you’d need to absolutely make sure that you want to give the extension – a third party app – access to “read and change all your data” and to “capture the content of your screen” before clicking “Add extension.”

4. Don’t download extensions bundled with other apps.

We’ve written before about the potential dangers of downloading/installing free software from the web. In many cases, free software applications will include browser extensions, which the user may download without paying attention, simply because they click “Next” on the installer window without reading the fine print. When downloading anything from the internet, always be sure to read every message carefully so that you are downloading only what you want and expect.

5. Monitor extension permissions

Be wary of any permission updates from extensions you already have installed. Pay attention to notifications about new permissions, especially if the extension has changed publishers.

6. Block or close prompts to allow websites to send notifications

Though not technically a browser extension – web browsers have enabled a “feature” to allow websites to pop-up notifications from a website, even when you’ve left that site. Though it may be useful to get notification alerts when you’re favorite news website is not open, or notifications about new email or Facebook activity – some untrustworthy websites have abused the feature and are causing excessive pop-ups for unrelated content. We recommend being very judicious if clicking to “allow” notifications, and only do so on websites that you know and trust. For more information read: How to block browser notification pop-ups.

Are you getting excessive pop-ups and getting redirected to websites that you didn’t intend to visit? Please contact us if you need help cleaning up your browser.

Print This Article Print This Article

The difference between Credit Monitoring Vs. Identity Theft Protection

Filed under: Internet Tips,Passwords,Security,Useful Websites - Aug 06 2019

Considering all the data breaches lately, you should be monitoring and protecting your accounts and personal information – but what is the best method for you? Should you use a credit monitoring service or subscribe to identity theft protection instead? What’s the difference between the two methods?

Credit monitoring services monitor activity on your accounts with the major credit reporting agencies (TransUnion, Experian, and Equifax). Creditors report all activities related to borrowing money, including your payment history, to credit reporting agencies. Monitoring services may monitor your history with all three agencies or be exclusive to a certain agency.

With credit monitoring, you’re alerted to various changes in your credit report – for example, when a potential creditor asks for your credit history or when new credit card accounts or loans are opened in your name. Any activity that is reported to the credit reporting agency is monitored.

However, identity theft can involve more than fraudulent loans or credit accounts in your name. Thieves can use your Social Security number and other personal information to open bank accounts, get jobs, receive government benefits – even commit crimes in your name. None of these activities will show up on your credit report because borrowing is not involved.

Identity theft protection services typically include credit monitoring and also check for non-credit related abuses of your information – or let you know that your compromised information is out there, available to thieves for future abuse. Monitoring may include dark web scans, arrest records, court filings, changes of address, and social media accounts.

Identity theft protection services may also include help to restore your identity and resolve fraudulent uses and claims, as well as identity theft insurance. However despite the marketing claims to scare you into buying such protections there are things that identity theft services can and cannot do for you.

Victims of data breaches are often offered free credit monitoring or identity protection services for a limited period of time – however you need long-term protection, especially once your personal data has been compromised. You can always cancel accounts and change passwords, but once your Social Security number is compromised, you are in for a lifelong battle with identity thieves.

If identity theft protection generally includes credit monitoring, why would you opt for credit monitoring alone? Cost could be a factor, along with any extra services that the identity theft protection service provides that an credit monitoring does not. With some effort on your part do-it-yourself safeguards can be just as effective as paid services. If you’d prefer to pay to have a service take care of it for you, here are some recommendations and paid endorsements for identity theft monitoring services.

Note that most credit monitoring and identity theft protection services are reactive, not proactive. They let you know when suspicious activity has occurred, but they can’t prevent it from happening. You can supplement either service by using following these proactive tips:

  • Shred any sensitive information before discarding it.
  • Follow through with our top 5 password tips.
  • Be suspicious of all e-mails, text messages, pop-ups and unsolicited phone calls claiming that there’s a problem that requires your immediate reaction – such as calling an unfamiliar phone number or divulging your personal information or login credentials over the phone or via an email link.
  • Check your credit frequently, and consider a credit freeze on your accounts to prevent thieves from opening fraudulent accounts in your name.

Help either service by making it more difficult for identity thieves to get your information, or to use your information if they do get it. Now is the time to follow through with whatever protection you choose. Identity thieves look for the easiest unprotected targets – don’t be one of them.

Print This Article Print This Article

Why you should never unsubscribe from certain emails

Filed under: Internet Tips,Security - Jul 25 2019

Updated November 2023:

If you think the way to get less spam email is to click the “unsubscribe” link – not so fast. While legitimate email senders often will remove your email address from their list, spammers use unsubscribe links in emails to track people that take the time to open email and click the link. They then target you for even more junk email.

Some methods that you can use to help identify legitimately sent emails include:

  • Have you knowingly given your email address to the sender?
  • Look to see if the “from” email address closely matches the company that it says it came from. For example if you get an email from “JCPenney” promising $10 off, but the email address displays something@bestdeals.biz or someone@gmail.com – that’s not an email from JCPenney.
  • Does the grammar, spellling and punctuation in the email make it seem as if it was professionally written?
  • Click here for more examples of emails that aren’t from who they say they are.

You should only unsubscribe from emails that you are absolutely sure that they came from a legitimate company that you have given your email address to or conducted business with. Otherwise, just mark the email as Junk/Spam to help train the computer programs that filter your emails to the Inbox or Junk/Spam folders.

Listen to these recordings of scam calls so that you can recognize them and not fall victim

Filed under: Scams,Security - Jul 25 2019

Please listen to our recordings of scam voicemails below, so that you can become familiar with them and not respond to similar calls that you’ll likely receive some day. To listen, click the orange button on the 4 recordings below, or listen to all uploaded recordings of Scam calls on clyp.it.

Installing a home security camera may require updated Wi-Fi

Filed under: Security,Tech Support - Mar 05 2019

Home security cameras and video doorbells have become quite popular in the past few years. Many of the systems from names such as Ring, Nest and Arlo require a speedy and stable wireless internet connection in order to be able to view the live video and recordings – a minimum of 2 Mbps upload speed is recommended per streaming camera . Does your wireless internet meet the minimum system requirements to run such a system? DSL internet and some of the slower speed tiers from AT&T do not meet the minimum upload recommendation.

You can check the internet speed at your computer here . Even if your internet speed qualifies on your computer, it may be too slow if walls, distance and other Wi-Fi devices interfere with the signal between your internet router and wireless security camera.

We can perform an on-site survey of your Wi-Fi and recommend/setup a wireless solution that will work with security camera. For more information read more…

« Previous PageNext Page »