Navigating the internet can be a trouble-filled journey. Bad actors intent on exploiting uninformed users are constantly lurking behind emails, websites, and social media invites. Even your Wi-Fi router and those now-ubiquitous QR codes can be danger points. Add to that, the never-ending virus and malware threats.
Computer and mobile device users are often unaware of the danger zones. However, the internet need not be a constant trip through the badlands. What it takes to stay protected online is knowing what to avoid and how to protect yourself.
Here are five things in your control to help keep your digital activity safe.
These postage-size image links to websites can be convenient. Just point your smartphone camera at it and instantly go to a website, tech support location, discount offer on a purchase, or restaurant menu.
However, QR codes can also take you to a nefarious place where malware or worse is waiting. QR codes can be programmed to link to anything, putting your privacy and security at big risk.
Think before you scan a QR code. If the code is displayed on a website or printed document you trust, it is probably a safe. If not, or you are unsure, check it out.
You can download reputable QR reader apps that will perform a security check on the endpoint of the QR code’s destination. One such safety tool I use is the Trend Micro QR Scanner app, available for Android and iOS.
This is a popular ongoing scam that has a high success rate for hackers. Potential victims get an email for a product offer or other business invitation. The opt-out action step is enticing, looks familiar, and sounds reasonable. “Don’t want to receive our emails? Click here to unsubscribe,” it beckons.
Sometimes the annoying repeat emails ask if you want to unsubscribe from future emails. Some even offer you a link to cancel a subscription.
Do not select any options. Clicking on the links or replying confirms your active address.
Never input your email address in the “unsubscribe me” field, either. More senders will follow.
A better solution to deleting the unwanted email, especially from an unknown sender, is to mark it as spam. That moves it to the spam folder. You also can add that sender to your email program’s block list, or set up a filter to automatically delete it before it reaches your inbox.
Finally, check out the free service Unroll.me. There you can unsubscribe from unwanted emails, keep others, or get the rest in a daily digest.
Other villains try to usurp Facebook accounts. Hackers can change your password, email address, phone number, and even add a security code to lock you out of the pirated account. Before trouble happens, be proactive to prevent these situations. Facebook provides the following security settings you need to enable.
To do this, log in to your Facebook account on a desktop computer and navigate to Settings & privacy. Next, select Security and login. Then scroll down and edit the Two-factor authentication option.Â
To complete this step, you must enter your Facebook password.
First, open the Facebook mobile app and tap the magnifying glass, enter the term “code generator” and tap the search icon. Tap the result Code Generator to navigate to the next screen, then tap the button “Turn On Code Generator” to get a 6-digit code that changes every 30 seconds. You must enter this code within that short time span to login to your account on another device.
Next, set up alerts about unrecognized logins. You can do this from either a computer or a mobile device.
If you have trouble logging in, head to facebook.com/login/identify to fix the problem. If you are unable to login there, go to this Facebook help page instead and fill out the request form for Facebook to review your account. You will need to answer a few security questions to prove your identity. This might include providing proof of ID like a photo of a driver’s license.
The flood of people working remotely since Covid put home Wi-Fi routers squarely in hackers’ target sights. As a result, malware attacks on home Wi-Fi networks are on the rise because residential setups often lack the level of security and protection that is found on enterprise networks.
One nasty attack tool, dubbed ZuoRAT, is a remote access trojan designed to hack into small office/home office routers. It can affect macOS, Windows, and Linux computers.
With it, hackers can collect your data and hijack any sites you visit while on your network. One of ZuroRAT’s worst factors is that once your router is infected, it can infect other routers to continue spreading the hackers’ access.
The strongest passwords have all these characteristics:
Pro Tip: When using a password generator, always change at least a few characters from the random result to create your final credentials.
Some fraudsters call on the phone to tell you they are a tech support division working for a well-known computer or software company. The caller claims to be calling in response to an alert from your computer of a virus detection or malware on your device. The scammer offers to fix it if you simply provide your credit card number.
Hang up. Your computer is not infected.
A modified version of this tech support scam is a text or email claiming the same details. Do not reply. Just delete the message and move on.
You might also be browsing the web when a pop-up message crashes onto your screen. I have received very loud audio alerts warning me that my computer is at risk and not to turn it off without responding for help.
In all these cases, the scammers want to scare you to comply with their instructions. The action they want you to take to let them fix the alleged problem will hurt your bank account and possibly let them transmit real infections.
If you suspect your computer has a virus or malware problem, initiate contact with a repair center yourself. You probably already have a support plan or active warranty from where you purchased the computer. If you have not contacted a tech support company, the call or message you received is illegitimate.
Jack M. Germain has been an ECT News Network reporter since 2003. His main areas of focus are enterprise IT, Linux and open-source technologies. He is an esteemed reviewer of Linux distros and other open-source software. In addition, Jack extensively covers business technology and privacy issues, as well as developments in e-commerce and consumer electronics. Email Jack.
Please sign in to post or reply to a comment. New users create a free account.
Will Elon Musk ultimately purchase Twitter? Yes - at a price below the $44 billion contracted agreement Yes - the court will force Musk to close the deal at $44 billion No - Musk will end up paying the $1 billion breakup fee to cancel the deal No - Musk will prove Twitter violated the agreement and walk away without paying a penalty Loading ...
Yes - at a price below the $44 billion contracted agreement
Yes - the court will force Musk to close the deal at $44 billion
No - Musk will end up paying the $1 billion breakup fee to cancel the deal
No - Musk will prove Twitter violated the agreement and walk away without paying a penalty
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/cyberwarfare-3-300x156.jpg
https://www.technewsworld.com/story/attacks-on-cloud-service-providers-down-25-during-first-4-months-of-2022-176678.html
Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022
Canonical Lets Loose Ubuntu 22.04 LTS ‘Jammy Jellyfish’
Low-Code Platforms Help Ease the Shadow IT Adversity Pain
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/livestream-sports-300x156.jpg
https://www.technewsworld.com/story/study-finds-sports-is-king-among-livestreamers-176771.html
Study Finds Sports Is King Among Livestreamers
New Cisco Conferencing Devices Designed To Heal Meeting Fatigue
Amazon Puts High-Tech Spin on Play Dates With Kiddie Video-Calling Device
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/apple-wwdc-2022-300x156.jpg
https://www.technewsworld.com/story/apple-shows-off-vast-upgrades-to-software-hardware-user-experiences-at-wwdc22-176822.html
Apple Shows Off Vast Upgrades to Software, Hardware, User Experiences at WWDC22
Microsoft’s Innovative 4-Processor PC
Slipping Graphics Chip Prices Could Signal Coming End of Semiconductor Shortages
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/server-room-300x156.jpg
https://www.technewsworld.com/story/security-demands-shifting-business-backups-away-from-on-prem-boxes-176873.html
Security Demands Shifting Business Backups Away From On-Prem Boxes
Ubuntu Core 22 Release Addresses Challenges of IoT, Edge Computing
KYY 15.6″ Portable Monitor Packs Value With a Healthy Feature Set
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/phone-fraud-300x156.jpg
https://www.technewsworld.com/story/5-cyber-safety-tips-to-survive-the-internet-hackers-and-scammers-176979.html
5 Cyber Safety Tips To Survive the Internet, Hackers and Scammers
Top Universities Exposing Students, Faculty and Staff to Email Crime
Unprotected Machine Identities Newest Enterprise IT Security Concern
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/sysadmin-data-300x156.jpg
https://www.technewsworld.com/story/data-observabilitys-big-challenge-build-trust-at-scale-176667.html
Data Observability’s Big Challenge: Build Trust at Scale
The Business Case for Clean Data and Governance Planning
6 Critical Steps for Scaling Secure Universal Data Authorization
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/devops-300x156.jpg
https://www.technewsworld.com/story/leapwork-ceo-no-code-platforms-democratize-testing-automation-176913.html
Leapwork CEO: No-Code Platforms Democratize Testing Automation
Cognitive Skills for Engineering Success
Apple and Microsoft Developers Conferences Exhibit Companies’ Strengths, Weaknesses
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/virtual-reality-metaverse-300x156.jpg
https://www.technewsworld.com/story/the-metaverse-future-are-you-ready-to-become-a-god-176974.html
The Metaverse Future: Are You Ready To Become a God?
Home Security Market Thriving Despite Dread of False Alarms
Lucid, Nvidia and the Rapidly Changing Future of Electric Cars
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/accountant-300x156.jpg
https://www.technewsworld.com/story/b2b-funding-firms-banking-on-embedded-finance-176805.html
B2B Funding Firms Banking on Embedded Finance
Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security
Cryptocurrency Custody Concerns: Who Holds the Digital Storage Keys?
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/netflix-games-300x156.jpg
https://www.technewsworld.com/story/stat-firm-reports-less-than-1-of-subscribers-playing-netflix-games-176977.html
Stat Firm Reports Less Than 1% of Subscribers Playing Netflix Games
Nvidia Showcases the Metaverse Future at GTC
Play-To-Earn Gaming Faces Hurdles To Rapid Growth
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/smartphone-user-puzzled-300x156.jpg
https://www.technewsworld.com/story/6-signs-cybercriminals-infected-your-phone-and-how-to-fix-it-176911.html
6 Signs Cybercriminals Infected Your Phone and How To Fix It
Security Pros Lured to Bug Bounties by Big Pay Days
Digital Devices of Corporate Brass Ripe for Hacker Attacks
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/hp-dev-one-pop-os-300x156.jpg
https://www.technewsworld.com/story/new-linux-laptop-line-advances-hp-system76-open-source-collaboration-176562.html
New Linux Laptop Line Advances HP, System76 Open-Source Collaboration
InnoView’s 15.6″ 4K Portable Panel Could Be the Ultimate Touchscreen Accessory
The 5 Coolest Things at Dell World Almost No One Saw
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/covid-news-smartphone-300x156.jpg
https://www.technewsworld.com/story/meta-moves-to-back-off-removing-covid-misinformation-from-platforms-176937.html
Meta Moves To Back Off Removing Covid Misinformation From Platforms
Hack Your Metabolism To Improve Health With the Lumen Smart Device
Amazon Rolls Out Alexa for Senior Living and Healthcare Providers
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/smart-home-controls-300x156.jpg
https://www.technewsworld.com/story/home-automation-faces-3-perpetual-problems-176684.html
Home Automation Faces 3 Perpetual Problems
How the War in Ukraine Is Changing the Technology Landscape
The Coolest Stuff From CES 2022
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/code-tux-300x156.jpg
https://www.technewsworld.com/story/start-here-when-things-go-wrong-on-your-linux-system-176520.html
Start Here When Things Go Wrong on Your Linux System
Computers Use Processes, So Should You
NICE Platform Answers Call for Hyper-Personal CX Tools
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/teamwork-300x156.jpg
https://www.technewsworld.com/story/foundries-and-arduino-team-to-patch-iot-devices-87464.html
Foundries and Arduino Team To Patch IoT Devices
Remote Work Heightens Privacy and Security Anxiety Among Employees
Amazon Super Smart Fridge Is Reportedly in the Works
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/digital-quality-of-life-index-300x156.jpg
https://www.technewsworld.com/story/denmark-tops-in-digital-quality-of-life-us-in-fifth-place-176961.html
Denmark Tops in Digital Quality of Life, US in Fifth Place
Cybersecurity Pros Preach Constant ID Challenging, Attack Readiness To Defeat Threats
Lax Cyber Skills, Dev Blind Spots Behind Organizations’ AppSec Breakdowns
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/microsoft-word-300x156.jpg
https://www.technewsworld.com/story/new-software-vulnerability-zeroes-in-on-microsoft-programs-176806.html
New Software Vulnerability Zeroes In on Microsoft Programs
Hackers Cast LinkedIn as Most-Popular Phishing Spot
Forrester Pegs B2B Fraud, Cyber Insurance Complacency as Top Threats in 2022
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/boy-screen-time-300x156.jpg
https://www.technewsworld.com/story/kids-screen-use-sees-fastest-rise-in-4-years-176735.html
Kids’ Screen Use Sees Fastest Rise in 4 Years
Sports Betting Platforms Gambling With Substandard CX
Appdome CEO on Mobile App Security: No Developer, No Code, No Problem
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/Titan-Linux-300x156.jpg
https://www.technewsworld.com/story/titan-linux-beta-brings-simplicity-finesse-to-kde-remake-176554.html
Titan Linux Beta Brings Simplicity, Finesse to KDE Remake
Linux Security Study Reveals When, How You Patch Matters
New Breeze Theme Gives KDE Neon Release Lots of Sparkle
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/personal-file-300x156.jpg
https://www.technewsworld.com/story/pii-of-many-fortune-1000-execs-exposed-at-data-broker-sites-176668.html
PII of Many Fortune 1000 Execs Exposed at Data Broker Sites
US-Led Seizure of RaidForums May Defy Lasting Effect on Security
Atlas VPN Debuts MultiHop+ for Added Layer of Internet Privacy and Security
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/apis-cor-3d-building-300x156.jpg
https://www.technewsworld.com/story/rebuilding-ukraine-3d-printing-and-the-metaverse-could-help-create-the-cities-of-tomorrow-87455.html
Rebuilding Ukraine: 3D Printing and the Metaverse Could Help Create the Cities of Tomorrow
InnoView 15.8″ Portable Display: More Screen Space for Small Devices
Desklab Portable Monitor: Ideal for Work, Play, Mobile Productivity
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/women-in-business-300x156.jpg
https://www.technewsworld.com/story/science-art-inspire-women-in-tech-entrepreneurship-176952.html
Science, Art Inspire Women in Tech Entrepreneurship
Why Commercial Space Travel Is Unlikely To Scale Up
Report Finds US Workers Lagging in Digital Skills
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/microsoft-bing-300x156.jpg
https://www.technewsworld.com/story/microsoft-bing-yandex-create-new-search-protocol-87311.html
Microsoft Bing, Yandex Create New Search Protocol
Botify SEO Platform Helps Brands Navigate Organic Search Rankings
Google Cloud Seeks To Cure Retailers’ Search Woes, Help Compete With Amazon
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/server-admins-300x156.jpg
https://www.technewsworld.com/story/cyber-asset-management-overwhelming-it-security-teams-87457.html
Cyber Asset Management Overwhelming IT Security Teams
30 Years of Linux History Told via Distros
Stale Open Source Code Rampant in Commercial Software: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/digital-wallet-qr-code-300x156.jpg
https://www.technewsworld.com/story/whats-in-store-for-next-gen-digital-wallets-87451.html
What’s in Store for Next-Gen Digital Wallets
Apple Refreshes iPhone SE, iPad Air, Debuts Studio Desktop
Tesla Smartphone Could Be a Game Changer
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps-300x156.jpg
https://www.technewsworld.com/story/a-third-of-us-social-media-users-creating-fake-accounts-176987.html
A Third of US Social Media Users Creating Fake Accounts
Amazon Lawsuit Fingers Facebook Groups Recruiting Fake Reviewers
Big Tech Firms Move To Squash Deceptive Info on Ukraine Crisis
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/global-disaster-300x156.jpg
https://www.technewsworld.com/story/nvidia-launches-earth-2-and-goes-to-war-against-climate-change-87336.html
Nvidia Launches Earth 2 and Goes to War Against Climate Change
Kuo Predicts ‘iPhone 13’ Will Support Satellite Calls and Texting
30 Years Later, the Trajectory of Linux Is Star Bound
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/tech-race-300x156.jpg
https://www.technewsworld.com/story/dont-become-a-fool-in-the-it-gold-rush-176760.html
Don’t Become a Fool in the IT Gold Rush
Marketers: Beware Florida’s Mini-TCPA
Natural Language Speaks Loudly About a Big Shift in AI
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/surface-duo-2-300x156.jpg
https://www.technewsworld.com/story/microsoft-finally-has-truly-competitive-alternatives-to-apple-products-87282.html
Microsoft Finally Has Truly Competitive Alternatives to Apple Products
New iPad Mini Stars at Apple Refresh Event
Chromebook Shipments Jump 75% YoY in Q2
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/tug-of-war-300x156.jpg
https://www.technewsworld.com/story/musk-twitter-qualcomm-apple-netflix-microsoft-deciphering-the-insanity-176915.html
Musk-Twitter, Qualcomm-Apple, Netflix-Microsoft: Deciphering the Insanity
The World Is Not Yet Ready for Electric Cars
The Importance of the Metaverse Standards Forum
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/eu-gavel-300x156.jpg
https://www.technewsworld.com/story/new-eu-law-will-force-google-meta-others-to-expose-algorithms-176689.html
New EU Law Will Force Google, Meta, Others To Expose Algorithms
Pandemic, Compliance Driving Increased Privacy Spending
Report Argues Antitrust Bill Would Hurt Consumers, Stymie Innovation
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/08/electric-car-charging-300x156.jpg
https://www.technewsworld.com/story/rapid-ev-adoption-by-low-income-drivers-needed-to-curb-climate-change-report-176878.html
Rapid EV Adoption by Low-Income Drivers Needed To Curb Climate Change: Report
BlackBerry and Preparing for the Software-Defined Automobile
Wing Picks DFW for First Commercial Drone Deliveries in Major US Metro Area
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/metaverse-shopping-300x156.jpg
https://www.technewsworld.com/story/new-recipe-for-marketing-success-blend-digital-and-cx-mix-well-with-ai-176540.html
New Recipe for Marketing Success: Blend Digital and CX, Mix Well With AI
Meta vs. Varjo and Nvidia: The Bifurcation of the Metaverse
A Step Into Meta’s VR Meeting World, Horizon Workrooms
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/vr-metaverse-300x156.jpg
https://www.technewsworld.com/story/apple-mr-specs-will-shun-metaverse-report-87385.html
Apple MR Specs Will Shun Metaverse: Report
Apple Wearables Holiday Sales Knock It Out of the Park
5 Terrific Tech Gift Ideas for Your Holiday Shopping List
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/07/xl-2016-hacker-2-300x184.jpg
https://www.technewsworld.com/story/cybercriminals-employing-specialists-to-maximize-ill-gotten-gains-87200.html
Cybercriminals Employing Specialists To Maximize Ill-Gotten Gains
Encouraging Research Finds Brain Adjusts to ‘Third Thumb’
E-Commerce Tending to Health and Wellness Needs
Copyright 1998-2022 ECT News Network, Inc. All Rights Reserved.
Enter your Username and Password to sign in.