Getting Comfortable With The Basics

Security

Best Password Managers

The Best Password Managers to Secure Your Digital Life – By Scott Gilbertson WIRED
Password managers are the vegetables of the internet. We know they’re good for us, but most of us are happier snacking on the password equivalent of junk food. For seven years running, that’s been “123456” and “password”—the two most commonly used passwords on the web. The problem is, most of us don’t know what makes a good password and aren’t able to remember hundreds of them anyway.

Chromebook security tips

4 Chromebook security tips for data privacy and protection – By Kevin C. Tofel aboutchromebooks.com
Chromebook security may sound like an oxymoron to some, but it’s a real thing. This morning I read a great checklist on Michael Horowitz’s “Defensive Computing” site and was thrilled to see a section devoted to Chromebooks. Michael’s entire checklist is a recommended read when you have time, regardless of your device or platform choice. There are so many good suggestions here that I decided to surface some of them, along with a few of my own. Here are four Chromebook security tips for improving your data privacy and protection.

How to set your Google calendar to private

How to set your Google calendar to private – By Barbara Krasnoff The Verge
Recently, journalist, author of Platformer, and former Verge reporter Casey Newton tweeted something that had many readers both laughing and panicking: that entrepreneur David Sacks’ calendar at Twitter was not set to private and, as a result, was being carefully scrutinized by curious Twitter employees.

Should You Use Facebook or Google to Log In to Other Sites?

Should You Use Facebook or Google to Log In to Other Sites? – By Talon Homer computer.howstuffworks.com
When you’re considering creating a new account for a website, chances are you’ll be given an option to use your existing Facebook, Google or other account as a sign-in. This method is commonly known as single sign-on (SSO). Facebook and Google connectivity are the most common offers but some services add Apple, Twitter and LinkedIn accounts as well.


Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere – By Lily Hay Newman WIRED
If you’re drowning in website logins and constantly using Forgot My Password prompts to get into random accounts, a “Log In With Google” or “Log In With Facebook” button can look a lot like a lifeline. The services provide a quick way to continue whatever you’re doing without having to set up a whole account and choose a new password to guard it. But while these “single sign-on” tools are convenient, and do offer some security benefits, they’re not the panacea you might think.


Should You Use Facebook or Google to Log In to Other Sites? – By Natasha Stokes techlicious.com
We’re all used to seeing “Log in with Facebook” or “Log in with Google” at sites around the Internet — or less frequently, an offer to log in with Twitter, LinkedIn or Pinterest. It’s a common option at news sites like CNN.com and the UK’s Guardian newspaper, music streaming services such as Spotify and tens of thousands of other online retailers, apps and games.

– What Is Phishing?

What Is Phishing?
What Is Phishing, and How Do You Avoid It? – By Review Geek Review Geek

“Phishing” is a catchall term for a variety of cybercrimes. But in its most basic form, phishing (pronounced “fishing”) is a scam in which a victim is tricked into sharing sensitive information or downloading ransomware.

Most Common Forms of Phishing

Here are the common forms of phishing which should illustrate my point:

  • Email Phishing:
    It is the most common form of phishing. A scammer impersonates a popular website or figure, like Amazon or a politician, in an attempt to steal your information or trick you into downloading ransomware. They may even create a custom domain name to make their email address look “official.”
  • Spear Phishing:
    Scammers who want to hit a specific target will resort to “spear phishing.” They gather information on their victim before impersonating a trustworthy person, business, or automated message.
  • Clone Phishing:
    Most phishing emails are sent to victims at random. But sometimes, a scammer will send you a duplicate version of an actual email. For example, a hacker may send a copycat “order confirmation” containing malicious links or attachments if you receive an order confirmation.
  • Pop-Up Phishing:
    Popups are still a common vector for scams and malware. For example, modern popup phishing attacks usually take advantage of a browser’s notification settings to send you “antivirus warnings.”
  • Angler Phishing:
    The world of social media lets scammers “angler phish” for victims. Essentially, scammers will impersonate a public figure or company on social media. For example, someone may copy a YouTube creator to share scammy “sweepstakes” links in a video’s comments.
  • Whaling:
    When a phishing attack is aimed toward an important person, such as a CEO, it’s called “whaling.” These targets are often wealthy, easy to blackmail or have access to a corporation’s backend.
  • Smishing and Vishing:
    These terms describe phishing through an SMS, text message, or phone call. Most of the spam messages or robocalls you receive are forms of “smishing” or “vishing.”

What Should You Do if You’re a Victim of Phishing?

According to the U.S. Federal Trade Commission, you should report all phishing attacks to the Report Fraud website. You can also forward phishing emails to [email protected] and forward phishing text messages to SPAM (7726). If a phishing attack impersonates a person or organization, you should also warn them of the attack (especially if they’re a family member or someone within your company).

If you fall victim to a phishing attack, it’s time to enter harm reduction mode. Change the passwords to all sensitive or affected accounts, and enable 2FA to lock out scammers who have your password—a password manager will help you get the job done.

And if a scammer gets your credit card information or bank details, tell your bank! They’ll help you replace the affected card and dispute fraudulent charges. You may also need to freeze your credit cards or set up a fraud alert if a scammer obtains your social security number, address, or birthday. This will prevent unwanted transactions and keep scammers from opening new lines of credit under your name.

Things to Know to Avoid the Latest Gmail Phishing Attack

Things to Know to Avoid the Latest (Very Dangerous) Gmail Phishing Attack – By Jill Layton techwalla.com
As internet users, we have to constantly be on high alert when it comes to online security. Even with security measures like two-step verification and strong passwords that no one will ever guess (which even you might have a hard time remembering), it’s not always enough protection.

I switched to Bitwarden for my password manager

Why I switched to Bitwarden for my password manager – By Jared Newman PCWorld
Like many former users of LastPass, I was miffed when the company delivered an ultimatum to non-paying customers last year. I’ve since switched to Bitwarden, and haven’t looked back.


Best Guide for Bitwarden Password Manager | Detailed Review – By Vidya M A anoopcnair.com
Let’s learn the best way to use Bitwarden Password Manager. We are managing more and more of our real-world lives online, which means you all have too many passwords to remember. Are you tired of hitting that forgot password button? Or Are you looking for the safest password manager?

Tech News by Topic