Q: How to Configure VPN for IoT Devices?
A: VPN was initially designed to be used by computers. As such, there are software and network drivers to install and configure. The problem with IoT devices (Internet of Things, such as wireless thermostats, webcams, remote doorbells, wireless garage door openers, etc.) is that with almost no exceptions, developers have not included an option to add 3rd-party software and drivers. So by themselves, IoT devices cannot be secured.
Q: Is It Still Safe to Use Tor?
A: Get 100 consultants in a room, end up with 100 opinions. A bit of background information for those not familiar with Tor. Tor was created by the US Navy as a method to create secure, anonymous internet communications. It was soon after released from restricted...
TPM 2.0 and Windows 11- Part 1
With the roll out of Windows 11, the term TPM 2.0 has been introduced to the general public. What is it exactly? Fundamentally, it is a platform integrity and security device. Beyond that, it depends on who you ask.
Q: How Does Our Privacy Get Violated When You Are Told It’s Secure?
When you leave your home for vacation and lock the front door, is your home now “secure”? Not if you left the back door unlocked.
When you leave your home for vacation and lock all doors and windows, is your home now “secure”? Not if someone can toss a rock through a window for access.
Q: Can a Firewall Prevent Phishing?
Phishing is an attempt to gather information from someone while posing as someone or something else. For example, receiving an email that appears to be from your bank, asking for you to confirm your social security number.
Q: Which is the most secure browser, Brave, Chrome, or Firefox?
A: Great question! Few people ever give thought to the browser they are using, and just grab the one in front of them.
Let’s start with the 800 pound gorilla in the room–Chrome.
Q: Why do I need to Change Passwords so Often?
A: Actually, changing passwords on a routine basis is very old school, and is no longer mentioned in any US government cybersecurity guidelines.
What was found is that the more often people are forced to change their passwords, the sloppier they became with password creation – making passwords that were easier and easier to hack.
Android Phones Constantly Snoop On Their Users
As reported in a study released 20211006 by University of Edinburgh, UK and Trinity College, Dublin, Ireland, despite the public discontent over data harvesting by big tech, it is (of course) worse than any of us thought.
Your Location Data is Part of a $12 Billion Market
Something few of us pay any attention to is the location data that our mobile device is collecting and sharing. Literally every single step you take is recorded, archived, and sold. Based on your location data, your gender, income, political leanings, education, pregnancy status, and more can be inferred. Once this information has been sold, it can be used not only for marketing, but to spoon feed you targeted news and alerts.
It is Time For a New Router
A router is a hardware network device that allows other devices (such as computers, tablets, mobile phones, printers, smart watches, smart doorbells, webcams, etc.) to connect to your local area network (LAN), and then trough the router, communicate with each other (such as sending a file to be printed, or opening a file on the server), and connect to the internet.
Q: Would an online dating site request a credit card IMFO for a forgotten password? If fraud, what’s the next step?
A: If you use a credit card to pay for the service, and have forgotten your password, it is routine to use your credit card number to validate your identity.
Q: Can a person remotely control my phone with just my number or email without a password? Is there an app for them to do it?
A: If we are talking state actors, like CIA? Sure it can and has been done. The Pegasus malware has been in the news lately for doing just that. if you are talking hackers or high-level organized crime? There has been no evidence of it ever done.
Q: Why is Security So important to Apple?
Every business, to be successful, must differentiate themselves from the competition.
An obvious differentiator to use is security and privacy. MS has a long history of paying little attention to security and privacy. This makes it easy for a competitor – particularly one with a history of having better security and privacy (Apple) to fill that niche.
Q: What is the best anti-virus software to use with Firefox, and why?
A: Antivirus software typically works with your operating system. But there are a few that are specifically designed for use with browsers. As such, they are browser plug-ins or extensions. Such antivirus tools can block access to malicious websites or downloading malicious files.
Q: How do I hide browsing history from a network administrator?
A: You don’t. That is why they are the administrator and you are not! In any organization I support, attempting such action would be considered a breach of computer policy, with termination as the likely result.