The Internet of Things (IoT) promises all sorts of cool new features for our previously "dumb" devices, allowing them to be controlled from anywhere on the planet. But because the compete on cost, security is lax or nonexistent. If you're going to bring these devices into your home, you need to keep them walled off.
Every new computer comes with one account, and most people never change that – but we all should. The default account on your computer is an administrator or “admin” account. This account has full permissions to do anything – which is convenient, but dangerous for daily use. One of the first things you should do
It’s that time of year again: tax time! And that means it’s also high season for identity thieves and scammers. Millions of people are affected by fake tax return filings every year. And while we’re talking about tax return fraud, we should take the opportunity to discuss some other tax and Social Security scams, as
Despite being available for seven years, less than 10% of Google users have taken advantage of two-factor authentication. This is according to Google engineer Grzegorz Milka, who quoted this figure at a recent tech conference. And yet, two-factor authentication (2FA) is probably the best option today for most people to lock down their online accounts.
In the last week, we learned about a set of nasty computer chip bugs, dubbed Meltdown and Spectre. Unlike most of the bugs we discuss here, these bugs are in hardware, not software. This makes them impossible to truly fix without replacing the chip. In most cases, since the Computer Processing Unit (CPU) itself isn’t
The holiday season is upon us, and that means people will be scrambling to find the best presents for their friends, family and loved ones. Geeky gadgets are always popular, but not just for the recipients! The Internet of Things (IoT) has been a major boon for hackers and marketers, as well. So let me
It’s been a pretty bad week for Apple software, both for their macOS computer software and their iOS smartphone and tablet software. But today I’m going to focus on a truly horrendous software bug that somehow slipped through Apple’s normally stellar quality control process. This one screw up could allow someone to quickly and easily
[Update 2019-04-07: While Quad9 is still a good option, you should check out Cloudflare’s 22.214.171.124 service which will come with a new free VPN service called Warp.] Evading malware can be difficult these days. The bad guys are very clever and surfing the Internet involves several complicated technologies. Software is rife with bugs and traps
With all the news of the Reaper malware that’s infecting Russia and Ukraine, and reminders of the disaster of last year’s Miria botnet, it’s a good time to review basic home network hygiene and best practices for securing the Internet of Things (IoT). What is the Internet of Things (IoT)? The Internet of Things, or
You’ve probably already heard about the massive data breach at Equifax, one of the three major US credit bureaus. The company says that up to 143 million people may be affected, which is almost half of the entire population of the United States. The stolen data may include names, Social Security numbers, birth dates, addresses