When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.
When a helpful feature (that you probably didn't need) turns into an exploitable vulnerability...
Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.
That's funny. I could have sworn I didn't run a print job yesterday... but will you look at that?
Another week, another cryptocurrency catastrophe. This time, it's "only" $100 million's worth...
Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider, find their number on their website and call them.
Lastest episode - listen, laugh and learn! This week, Chester Wisniewski joins us on the show.
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.
Home automation. Internet of Things. Cloud management. And a security bug that could let other people watch you online...
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.
Forewarned is forearmed. Here's our advice on dealing with "copyright infringement" scammers.
Latest episode - listen now! (And learn about the Navajo Nation's selfless cryptographic contribution to America.)
Where have all the cryptocoins gone? Will we ever get them back?
Practical advice for homes and small businesses, following news that a recently disclosed router bug is actively being exploited by crooks.
Some of the most common indicators that you may have been include the following. Your friends tell you that they have received odd emails or messages from you, messages you know you did not send. Your password no longer works for one of your accounts, even though you know you never changed the password. Your anti-virus informs you that one of your files or computer is infected. You receive a pop-up message informing you that the files on your computer have been encrypted and you must pay a ransom to recover them.
When hosting or attending conference calls, only record the call if you have prior permission, a work related need to record the call, and you make sure everyone on the call knows it will be recorded.
Latest episode - listen now!
Once more unto the breach, dear friends, once more...
Ahhhh, the irony! Red-team network attack tool has its very own bug for Blue Teams to counterexploit.
Calling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.