一个很棒的播客是我深入黑客思想的那一集. 点击或单击以收听我的播客的一集, 金科曼多解释, 与 IBM 社会工程师. She spills the secrets hackers use to scare and confuse people.
I know you have seen a common trick: fake calls and emails pretending to come from government agencies. No one wants to deal with the IRS or a problem with Social Security. Tap or click for a new government scam making the rounds.
Here are five more ways you’re at risk — with easy solutions to be a little safer online.
1. You post for the whole world to see
I read a study from Pew Research that blew me away. Of those polled, 53% of Twitter users said that their profiles were set to public. Pew examined the profiles of everyone who submitted their account handle, and a whopping 89% were public.
Yikes. It looks like we could all use a reminder to check if our profiles are 私人的.
An easy way to check what others see is to open up a new browser window in 私人的 or incognito mode. Navigate to your profile, 如 https://twitter.com/kimkomando. If your tweets are visible, your profile is public.
To lock down your Twitter account from a computer:
- Log in. On the left-hand side, 点击 更多 > Settings and privacy > Privacy and safety
- Go to Audience and tagging > Check the box next to Protect your Tweets
Now only those who follow you can see your posts. It’s your job to clean up that list and block anyone you 别 want following you.
What about on Facebook? Tap or click for an easy way to keep out creeps and snoops.
2. Your home network is exposed
Weak Wi-Fi protections stopped the lives of one British couple right in the middle of the 大流行. They couldn’t work or support their children. 据英国广播公司报道, someone used their Wi-Fi connection to upload child abuse material to an online chat site. That led the police straight to their front door.
Don’t let that be you! Step one: Create a unique password that’s hard to crack and store it somewhere safe, like a password manager or notebook you keep hidden away. Make sure your router also has a strong, 安全的, and unique password.
After you take care of the password, there are a few other steps you should take. Start with gathering a list of everything using your network. If you find anything you don’t recognize, I’ll show you how to lock out anyone mooching your connection.
Like what you’re reading? Get tech news straight to your inbox and be up to date in five minutes or less. See a sample and sign up at TheCurrentNewsletter.com.
3. You’re a serial reuser
I’ve told you repeatedly not to reuse your passwords made up of letters, 数字, and symbols. The same goes for PIN codes. If you’re using the same four digitals to unlock your phone, open your PC, and make debit card purchases, you’re asking for trouble.
And don’t use your address, digits in your phone number, your birthday, or the birthdays of those close to you.
Maybe now you’re wondering if you should ditch the code altogether for a biometric method like Face ID or your fingerprint. Here’s a look at which method is safest.
4. You shop directly from ads
社交媒体 ads can be a decent way to find new products that appeal to you. They are targeted based on what you have browsed and bought, 毕竟. But they’re also a common way for criminals to try to swindle you out of cash.
It’s easier than you’d think to create an ad that goes to a shady site. Maybe you won’t get anything at all after you place an order, or what you receive isn’t at all what you were expecting.
You’re better off heading to your search bar and visiting the brand website itself. 那里, search for the item in the ad. 当然, it requires a few extra steps, but it’s better to be safe than sorry. You should look up the company on bbb.org while you’re at it if the name is new to you.
5. You give apps access without a second thought
Over at Komando.com, we often write about apps you need to remove from your phone. Here’s our latest tip on the types of apps you should say goodbye to.
Sometimes these apps are simply a waste of space. Others are spreading malware that could do severe damage to your device and steal your money in the process.
Then there are all the apps in that gray area in between. They aren’t malicious, but they may be asking you to give up more info than you really should.
一个 天气 应用程式, 例如, needs access to your location to tell you the forecast for your area. But does it need access to your camera? I say no.
Tap or click for my guide to controlling exactly what permissions your apps have. This is worth your time.