Normal view

There are new articles available, click to refresh the page.
Yesterday — 3 December 2024Main stream

Windows 7 in 2024: The hidden dangers of clinging to the past

3 December 2024 at 10:00

Computers are a significant investment, especially for those on fixed incomes. Fortunately, with proper care and maintenance, older computers can remain secure and functional for years. Let's address a concern from Connie in Rochester, Minnesota, who wrote to us about her older computer's vulnerability to hackers:

"I'm still using Windows 7 on my 2013 computer. It says I have Security Essentials, but I saw somewhere that it ended in 2023? When I click on it, it says it's scanning, but am I protected or not? I pay yearly for MSN extra and use an iPhone 14. All the worrisome reports make a senior citizen a little nervous. What's your advice? A new computer? Will your virus protection be compatible with my old computer? I'm not keen on spending more on a new computer on a fixed budget."

This question is relevant to many users with older computers. Let's dive deeper into the situation and provide some comprehensive advice for Connie and others in similar situations.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET

Enter by signing up for my free newsletter.

Using Windows 7 does pose significant security risks. Since Jan. 14, 2020, Microsoft has stopped providing security updates and technical support for Windows 7. This means that any new vulnerabilities discovered in the operating system will not be patched, leaving your computer exposed to potential attacks.

Since the start of 2023, 47 vulnerabilities have been discovered in Windows 7. Cybercriminals actively target outdated operating systems because they're more likely to be unpatched and vulnerable. Without official support, Microsoft is no longer compelled to disclose formal vulnerabilities, making it harder for users to stay informed about potential security risks.

Connie, you mentioned that you have Microsoft Security Essentials installed. Unfortunately, this software also stopped receiving updates on January 14, 2020. While it may still scan your computer, it's not providing up-to-date protection against new threats.

TOP WAYS TO OPTIMIZE YOUR PC AND MAC DEVICES

Given the security risks, it's advisable to take action. Here are some options to consider:

1) Upgrading your operating system or computer: While it’s possible to continue using Windows 7 with a third-party antivirus, it’s generally recommended to upgrade to a newer operating system for the best security. If your current computer meets the system requirements, you could consider upgrading to Windows 10 or even Windows 11. However, if a new computer isn’t in your budget right now, using a supported antivirus on your Windows 7 machine is a good step.

2) Install strong antivirus software: If upgrading isn't possible immediately, install a strong, reputable, up-to-date antivirus software that's compatible with Windows 7. However, keep in mind that this is a temporary solution and doesn't address all the vulnerabilities in the operating system itself. There are several antivirus programs that continue to support Windows 7. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Consider a new computer: While it's understandable that you're on a fixed budget, investing in a new computer might be the most cost-effective solution in the long run. New computers come with the latest operating systems and security features, providing better protection against current threats. You can see our picks for a variety of laptop computers and desktop computers (at a variety of price ranges). If you decide to upgrade and get a new computer, check out how to securely get rid of your old PC or Mac.

HOW TO SAFEGUARD YOUR OLDER PC

You might be wondering if it's really that dangerous if you're careful about what you download. The truth is, even if you're cautious, you're still at risk. Modern malware can be incredibly sophisticated. There's a type of threat called a "persistent threat" that can hide on your machine indefinitely, continuously monitoring your computer and stealing information without you even knowing it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Let's address two other points you made in your email to us. Your iPhone 14 is not affected by the Windows 7 issue. Apple regularly updates its iOS software, providing security patches for supported devices. So, make sure your iPhone's software is up to date to ensure you have the latest security features. Here's how:

As for MSN Extra, while it may provide some additional features, it doesn't compensate for the lack of operating system security updates.

10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE

Look, Connie, I know all this tech stuff can be overwhelming, but here's the deal: While we can't make your computer 100% hacker-proof, these steps will definitely up your security game. Keep your eyes peeled when you're checking emails or downloading stuff, especially if it's from someone you don't know. Now, about getting a new computer. I get it, it's not cheap. But think about it this way: It's like insurance for your digital life. The headache and costs of dealing with a hacked computer? Trust me, that's way worse. In this day and age, when we're all connected 24/7, keeping your digital self safe is super important. So, if you can swing it, seriously think about upgrading your system or getting a new computer with all the latest security bells and whistles. Bottom line? Taking these steps isn't just about protection. It's about giving yourself peace of mind every time you hop online. And let's face it, that's pretty priceless.

What are your biggest challenges when it comes to maintaining your devices and why? Share your tech hacks by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Data broker blunder: More than 600,000 sensitive files exposed in data services leak

2 December 2024 at 10:00

There are companies whose entire business model is built around collecting personal data, including criminal records, employment details, addresses and more. They use this data to offer background check services to other businesses and individuals. However, while they profit from this information, they often fail to adequately protect it. Earlier this year, the National Public Data made headlines for failing to secure 2.7 billion records of people whose data it collected. Now, on a smaller scale, another data aggregator has exposed the personal information of 600,000 Americans.

ENDS TOMORROW: I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

As reported by Website Planet, the exposed database contained 644,869 PDF files, totaling 713.1 GB of sensitive data. These documents mainly consisted of background checks but also included court records, vehicle ownership details such as license plates and VINs, and property ownership reports. The background checks alone revealed highly sensitive personal data, including full names, home addresses, phone numbers, email addresses, employment details, information about family members, social media accounts and criminal histories.

The worst part is that the database was left publicly accessible without password protection or encryption, allowing anyone to grab it. Anyone with the link could view and download the files. Plus, the files were named in a way that exposed personal details, using formats like "First_Middle_Last_State.PDF." This made sensitive information visible even without opening the files.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

The database that exposed over 600,000 records belongs to SL Data Services LLC, an information research provider that appears to prioritize convenience over basic data security. The company operates a sprawling network of around 16 websites, including Propertyrec, which advertises real estate ownership data and property records. However, SL Data Services’ business goes far beyond property records, offering services like criminal background checks, DMV records and even birth and death records.

While Propertyrec promotes its affordability, claiming users can search for documents for as little as $1, customer reviews paint a different picture. Many users report being unknowingly enrolled in subscription services, resulting in recurring charges instead of the promised one-time fees. This predatory business practice raises further questions about the company’s ethics and transparency.

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

The exposure of sensitive personal info in this breach is a big deal for the people involved. The database has detailed data about them, and that’s basically a jackpot for cybercriminals. This kind of leak can lead to various dangerous outcomes. 

For one, attackers could use this info to run phishing scams or social engineering tricks. If they know details like your job, family or even criminal history, they can send super convincing messages to trick you into sharing even more sensitive details, like your financial info. That’s not all. Criminals could also use this leaked data to impersonate someone and apply for loans, credit cards or other services in their name.

What really gets me, though, is that most people whose info got leaked probably won’t even find out about it unless they’re using a service to remove their data. A lot of them might not have even known they were being background-checked in the first place. For those with criminal records, this kind of leak could cause major reputational damage or lead to discrimination, even if the info is outdated or flat-out wrong.

We reached out to SL Data Services/Propertyrec for a comment but did not hear back before our deadline.

1) Remove your personal information from the internet: While no service can promise to completely erase your data from the internet, using a data removal service is one of the best steps you can take. They do the heavy lifting by actively scanning and removing your personal information from hundreds of websites. This helps protect you from scammers who may cross-reference data from breaches with other information they find on the dark web. Check out my top picks for data removal services here.

2) Be wary of mailbox communications: With your address exposed, bad actors could try to scam you through physical mail. They may impersonate companies or people you trust and send fake urgent letters about things like missed deliveries, account suspensions or security alerts. Be skeptical of unexpected communications and verify any claims before taking action.

3) Be cautious of phishing attempts and use strong antivirus software: The leaked data could lead to phishing attacks via email, phone calls or messages from unknown sources. Be on high alert for any requests for personal information, especially if they seem urgent or ask you to click on suspicious links. Always verify the legitimacy of any request before responding.

To protect your devices from malicious links, make sure you have strong antivirus protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4) Monitor your accounts: Given the scope of this breach, it’s crucial to start regularly reviewing your bank accounts, credit card statements and other financial accounts. Keep an eye out for any unauthorized transactions and report them immediately to your bank or credit card company to prevent further damage.

5) Use strong, unique passwords: Create complex passwords for each of your online accounts and consider using a password manager to keep track of them securely.

6) Enable two-factor authentication (2FA): Implement this extra layer of security on all accounts that offer it to prevent unauthorized access.

7) Regularly update your software: Keep your operating system, apps and security tools up to date to protect against known vulnerabilities.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

It’s alarming how many companies profit from collecting personal data, yet fail to protect it adequately. Recent breaches, including one exposing the sensitive information of 600,000 Americans, highlight this negligence. With unprotected databases containing everything from criminal records to addresses, cybercriminals have a treasure trove of information to exploit. This situation underscores the urgent need for you to take proactive steps to safeguard your privacy and demand better security practices from these data aggregators.

Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

Kurt’s Best New Cyber Monday Deals

Copyright 2024 CyberGuy.com. All rights reserved.

Is your friend's phone number compromised? Here's what to look for

2 December 2024 at 06:00

Phone hacking is a bigger deal than most of us realize, and it's something we all need to be aware of. Just the other day, Dennis sent an email sharing that he had a pretty unsettling experience with a suspicious text message that seemed to come from a friend's number. His story is a wake-up call for all of us to stay alert and informed. By understanding the signs of potential hacking, we can better protect ourselves and our loved ones from cyber threats.

ENDS TOMORROW: I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Dennis received a text from a friend that was unusually brief and out of character, simply asking, "Would you like to chat?" This raised immediate concerns, especially since the number appeared to be his friend's but wasn't recognized by Messenger as being in his contact list. Such scenarios often suggest phone number spoofing or hacking, where cybercriminals disguise their identity by using someone else's number.

HOW TO STOP ANNOYING ROBOCALLS

Understanding the signs of a compromised phone number is crucial for protecting your personal information and that of your friends. Here are some indicators that your friend's number might be hacked:

Unusual messages: If your friend starts sending texts that seem out of character – such as odd phrasing, unexpected links or requests for personal information – it could indicate their number has been hacked.

Unknown contacts: If Messenger says the number is not in your contact list when it actually is, it might indicate a problem.

Unexpected phone behavior: If your friend mentions their phone is acting strangely, they should look out for:

Unauthorized charges: If your friend’s phone bill shows unexpected charges, it can result from premium SMS services or calls made by malicious apps.

Spam sent from your friend's number: If you or other contacts receive spam or suspicious messages from your friend's number, it's a strong sign that their phone might be compromised.

KURT’S BEST NEW CYBER MONDAY DEALS

WHY AM I GETTING SPAM FROM MY OWN EMAIL ADDRESS AND HOW TO STOP IT

If you suspect your friend's phone number has been hacked, consider these actions:

1) Verify with your friend: Contact them through another method to confirm if they sent the message.

2) Check for malware using strong antivirus software: Advise your friend to use strong antivirus software to scan for malicious apps or malware on the device. The best way for them to safeguard from malicious links that install malware, potentially accessing their private information, is to have antivirus software installed on all their devices. This protection can also alert them to phishing emails and ransomware scams, keeping their personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Change passwords: If your friend suspects their phone number has been hacked, they should change their passwords for all accounts linked to their phone number. They should consider using a password manager to generate and store complex passwords.

4) Contact service provider: Your friend should contact their mobile service provider to report the issue. The provider can help secure their account and prevent further unauthorized access.

5) Enable two-factor authentication: Encourage your friend to enable two-factor authentication nn their accounts for added security.

6) Monitor accounts: Advise your friend to regularly check their bank statements and credit reports for suspicious activity.

Phone hacking is a bigger issue than most people realize, and Dennis's recent experience is a stark reminder of that. It's crucial for all of us to stay vigilant and informed about the signs of potential hacking. By recognizing these warning signs and taking proactive steps, we can better protect our personal information and our loved ones from cyber threats.

Have you ever experienced a suspicious message or a potential hacking incident? Share your story with us and let us know how you handled it by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

Kurt’s Best New Cyber Monday Deals

Copyright 2024 CyberGuy.com. All rights reserved.

6 sneaky gift card scams to watch out for this holiday season

27 November 2024 at 10:00

With the holiday season just around the corner, many of us are gearing up to spread some cheer with gift cards. 

However, it’s important to remember that these convenient gifts are also a favorite target for scammers. We're going to break down six sneaky gift card tricks that could leave you out of pocket during this time of year. 

Don’t worry, though. We’ve got your back with solid tips on how to outsmart these scammers and keep your hard-earned cash safe.

6 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

One of the latest gift card tricks involves tampering with the gift cards on the display racks at retail stores. Scammers will record the activation code on the card or place a custom barcode sticker over the real barcode, which allows them to secretly load the cash onto their own card immediately after you purchase the gift card. This means that when you or your recipient try to use the gift card, it will be empty or invalid.

Check the packaging of the gift card before buying it. Look for signs of tampering, such as the wrapping being torn or resealed or stickers placed over the barcode or card number. Also, choose a card from the back of the rack, as scammers often place their fraudulent cards at the front of the display.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME

Another common gift card trick scammers use involves impersonating someone you know or trust, such as a family member, a romantic interest, a company or the government. Scammers will contact you by phone, text, email or social media and create a fake story or emergency that requires you to send them money urgently.

They will ask you to buy a gift card or multiple gift cards and then send them a photo of the card or the numbers on the back of the card. Once they have the gift card information, they will disappear with your money and cut off contact.

Never send money or gift cards to anyone you don’t know personally or haven’t met in person. If someone claims to be someone you know or trust, verify their identity by contacting them directly through a different channel.

Don’t trust caller ID, as scammers can spoof phone numbers. Don’t be pressured by threats or promises, as scammers use emotional manipulation to get you to act quickly and without thinking. And remember, no legitimate company or government agency will ever ask you to pay them with a gift card.

HARDEST LESSON I LEARNED ABOUT GIFT CARDS LAST HOLIDAY SEASON

Another gift card trick involves buying or selling gift cards on online platforms, such as websites, apps or social media groups. Scammers will offer to sell you gift cards at a discounted price or buy your unwanted gift cards for cash.

However, they will either send you a fake or empty gift card or take your gift card information and money without sending you anything in return. They may also use stolen credit cards or hacked accounts to buy or sell gift cards, which can put you at risk of fraud or identity theft.

Only buy or sell gift cards from reputable sources, such as official retailers, authorized resellers or trusted friends and family. Avoid buying or selling gift cards from strangers online, especially if they offer a deal that sounds too good to be true.

Don’t share your gift card information or personal details with anyone you don’t know or trust. And use a secure payment method that offers protection, such as a credit card or PayPal, instead of a gift card, wire transfer or cash.

HOW TO RECYCLE YOUR OLD ELECTRONICS INTO AMAZON GIFT CARDS 

A very popular gift card trick this holiday season involves phishing, which is a type of online fraud that tries to trick you into revealing your personal or financial information. Scammers will send you an email, text or pop-up message that looks like it comes from a legitimate company, such as a retailer, bank or tech support service.

They will claim that there is a problem with your account, your order, your device or your security and that you need to verify your identity, update your information or fix an issue. They will then ask you to click on a link, open an attachment or call a number and then request that you pay them with a gift card or provide them with your gift card information.

Never click on links, open attachments or call numbers from unsolicited messages, as they may lead to fake or malicious websites or software. Don’t provide any personal or financial information, such as your passwords, PINs, account numbers or gift card numbers, to anyone who contacts you unexpectedly.

Don’t trust messages that create a sense of urgency, pressure or fear, as they are designed to make you act without thinking. If you have any doubts about the legitimacy of a message, contact the company directly using a verified website, phone number or email address.

Using antivirus protection will help to protect you against scammers and hackers who try to steal your money and personal information using gift card tricks, especially through phishing. The best way to protect yourself from clicking on any malicious links, fake websites, phishing emails and text messages is to have strong antivirus protection installed and actively running on all your devices. It’s the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked. 

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

This gift card trick involves loyalty programs, which are rewards programs that offer you points, discounts or freebies for being a loyal customer. Scammers will pretend to be representatives of a loyalty program that you are a member of or that you are eligible to join.

They will tell you that you have won a prize, sweepstakes or a promotion and that you need to pay a fee, a tax or a shipping cost to claim it. They will then ask you to pay them with a gift card or provide them with your gift card information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Be wary of any unsolicited offers or notifications that claim that you have won something, especially if you don’t remember entering or signing up for anything. Don’t pay any money or fees to receive a prize, as legitimate loyalty programs will never ask you to do that. Don’t provide any personal or financial information, such as your passwords, account numbers or gift card numbers, to anyone who contacts you unexpectedly.

Don’t trust messages that create a sense of excitement, curiosity or greed, as they are designed to make you act impulsively. If you have any doubts about the legitimacy of a message, contact the loyalty program directly using a verified website, phone number or email address.

In this scam, fraudsters set up fake websites or phone services that claim to check the balance of your gift cards. Victims are lured into providing their gift card numbers and PINs under the guise of verifying their balance. Once the information is entered, scammers can drain the funds from the card almost immediately.

To avoid this scam, always use official websites or apps from reputable retailers to check your gift card balance. Be wary of unsolicited calls or messages asking for your gift card information, especially if they claim to be from a legitimate company. It is important never to enter your gift card details on unfamiliar websites.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

Below are some next steps if you find you or your loved one is a victim of identity theft as a result of a gift card trick by scammers or hackers.

1. If you can regain control of your accountschange your passwords and inform the account provider.

2. Look through bank statements and checking account transactions to see where outlier activity started.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

4. Report any breaches to official government agencies like the Federal Trade Commission and the gift card company.

5. Get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft and if being a victim of criminal identity theft leaves you unable to secure employment or housing.

6. Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7. Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.

If you are a victim of identity theft because of a gift card scam, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm. 

As we head into the holiday season, it’s important to keep an eye out for these six gift card scams we’ve talked about. If something feels off or sounds too good to be true, trust your gut and don’t be afraid to ask questions or walk away. Gift cards are meant to bring joy, not stress, so keep these tips in mind as you shop and share this season.

Have you ever fallen victim to a gift card scam? If so, how did it happen, and what did you do? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Lost access? Here’s how to reclaim your Facebook account

26 November 2024 at 10:00

There are a variety of reasons why you could be locked out of your Facebook account. Such reasons can range from the mundane (forgetting your password) to the worst case scenario (being hacked or banned). Whatever the reason for being locked out of your Facebook account, there are different steps you can take to get back into your Facebook account.

1 WEEK LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Unless you’ve got a reliable password manager, you’re likely to forget your password once in a while. In order to gain access to your Facebook account without remembering your password, you would need to follow the steps below:

BEST PASSWORD MANAGERS EXPERT REVIEWED 2024

CLONED ON FACEBOOK? HERE'S HOW TO TAKE BACK CONTROL

If you’ve, unfortunately, been hacked, you have to follow different steps to access your account. Below are the steps to recover your account if your Facebook account has been hacked:

You may realize a hacker has taken over your account if you can’t log in, or you may notice some red flags while still logged into your account, like posts you didn’t create or friends letting you know you've been hacked. You may also notice that your account details, such as your name, birth date, etc., have been changed.

If you know you've been hacked, and you've been signed out of your account:

FOOLPROOF STEPS TO HELP PROTECT YOUR FACEBOOK ACCOUNT FROM HACKERS

If you've tried the above method, and you're still locked out of your account, it could be because the hacker has changed the email address and other verification information on file, which means any reset password links after that will go to them.

The good news is that you can reverse this. When the hacker changes the email, Facebook sends a message to the previous email account with a special link to verify, aka your email. Search your inbox for an email from Facebook. Then, you can click this link to reverse the email change and follow the steps to secure your account.

If you cannot access the phone number or email associated with your Facebook account (perhaps because the hacker has also compromised your email).

Facebook also allows friends to help each other recover their accounts. This is also true if your friend has passed away or is incapacitated and can no longer use their Facebook. By doing this, you help prevent hackers from taking over a vulnerable account. The steps you'd take, though, depend on the situation. For instance, there are cases where hackers create fake profiles to impersonate you.

Getting back access to a hacked account is our No. 1 question. However, if you've tried the above, and it doesn't work, there is currently no other way to get in touch with Facebook. Therefore, because of that, you should follow our tips to secure your Facebook account. Whether you get back into your account or end up creating a new one, you must take all the steps you can to secure your account to prevent hackers from getting in:

1) Visit Facebook's Privacy, Safety and Security settings in the Help Center.

2) Consider keeping your account as private as possible.

3) Be sure to use a strong password that you aren't using for other accounts. Consider using a password manager to generate and store complex passwords.

4) Under your account settings, set up 2FA via SMS. This means if someone changes your email or phone number, at least one of the methods can help you get back in.

5) Log out from your Facebook account when you access it on a public or friend’s device.

6) Don’t share your login details with anyone, not even friends or relatives.

7) Don't click on suspicious links or posts. The best way to protect yourself from clicking malicious links that install malware that may access your private information is to install antivirus protection on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

8) Frequently do software updates on your device to prevent malware from getting in.

SUBSCRIBE TO KURT’S FACEBOOK PAGE FOR QUICK TECH TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Whether you’ve forgotten your password or gotten hacked, recovering access to your Facebook account doesn’t have to be hard. Facebook has multiple ways to access your account with appropriate security measures in place so that unscrupulous people don’t try to use these methods to compromise your existing Facebook account. Even though it may feel like an annoying extra step, setting up the multifactor authentication option for your Facebook account can keep your account even more secure.

What features or tools do you wish Facebook would implement to make account recovery easier or more secure for users? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals

Copyright 2024 CyberGuy.com. All rights reserved.

Don't chance it. Secure your retirement accounts with a VPN and protect your future

26 November 2024 at 06:00

Protecting your financial future goes beyond smart investing and saving. It's crucial to safeguard your retirement accounts from cyber threats. While many believe that using public Wi-Fi to check their 401(k) or IRA is harmless, the reality is that without proper protection, you could be putting your hard-earned savings at risk. Let's explore why using a VPN (virtual private network) is essential for securing your retirement accounts and how you can implement this extra layer of security.

1 WEEK LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

VPNs operate through two primary mechanisms: IP address masking and data encryption. When you connect to a VPN, it hides your real IP address by assigning you a new one from their server network, effectively preventing websites and cyber criminals from tracking your location or identifying you based on your IP address.

Simultaneously, VPNs encrypt all data transmitted between your device and the internet, rendering it unreadable to anyone who might attempt to intercept it. This encryption process ensures that sensitive information, such as credit card details, remains confidential throughout your online activities. By combining these two powerful features, VPNs create a secure tunnel for your internet traffic, significantly enhancing your online privacy and security.

When you access your retirement accounts online, especially through public Wi-Fi networks, you're potentially exposing sensitive financial information to cybercriminals. These hackers can intercept your data, steal your login credentials and potentially drain your accounts. What's more concerning is that retirement accounts are often less frequently monitored than regular bank accounts, making them an attractive target for cybercriminals.

BEST ANTIVIRUS FOR PCS, MACS, IPHONES AND ANDROIDS – CYBERGUY PICKS

By creating an encrypted tunnel for your internet traffic, a VPN makes it extremely difficult for hackers to intercept your sensitive data. Here's a deeper look at why VPNs are indispensable for safeguarding your retirement accounts:

VPNs employ military-grade encryption protocols, such as AES-256, to scramble your data. This means that even if a cybercriminal manages to intercept your information, it would appear as an indecipherable jumble of characters. For your retirement accounts, this translates to an extra layer of security for your login credentials, account numbers and financial transactions.

By masking your IP address and replacing it with one from their servers, VPNs make it significantly harder for malicious actors to track your online activities. This anonymity is crucial when accessing financial accounts, as it prevents cybercriminals from identifying you as a high-value target based on your browsing habits or the financial institutions you visit online.

The ability to check your accounts while traveling or using public Wi-Fi is convenient but risky. A VPN provides a secure connection, essentially creating a protected tunnel between your device and the financial institution's servers. This is particularly important for retirement accounts, which may not have the same level of fraud protection as checking or savings accounts. However, check if your retirement fund platform permits VPN usage, as some might flag it as unusual activity. 

VPNs are excellent safeguards against man-in-the-middle attacks, where hackers position themselves between you and the website you're trying to access. By encrypting your data from end to end, VPNs make it nearly impossible for attackers to insert themselves into your connection and steal your information.

If you're traveling abroad and need to access your U.S.-based retirement accounts, some financial institutions may block access from foreign IP addresses. A VPN allows you to connect through a U.S.-based server, ensuring you can manage your accounts securely from anywhere in the world.

THINK TWICE BEFORE USING A PUBLIC COMPUTER: HERE'S WHY

To ensure the security of your retirement accounts, follow these steps:

1) Choose a reliable VPN: Select a reputable VPN service with strong encryption protocols. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

2) Always use VPN on public Wi-Fi: Never access financial accounts on public networks without activating your VPN first.

3) Enable two-factor authentication (2FA): Add an extra layer of security to your accounts by enabling 2FA.

4) Use strong, unique passwords: Create complex passwords for each of your accounts and consider using a password manager. Consider using a password manager to generate and store complex passwords.

5) Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.

6) Keep software updated: Ensure your devices and apps are always up to date with the latest security patches.

7) Be wary of phishing attempts: Don't click on suspicious links or provide personal information in response to unsolicited emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Securing your retirement accounts is not just about protecting your current savings; it's about safeguarding your future. By implementing a VPN and following best security practices, you're taking proactive steps to ensure that the nest egg you've worked so hard to build remains safe and secure. Remember, the small investment in a quality VPN service is negligible compared to the potential losses from a compromised retirement account.

Have you ever experienced a security breach? If so, what happened, and how did you respond to it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers

Best gifts for Men | Women | Kids | Teens | Pet lovers

Copyright 2024 CyberGuy.com. All rights reserved.

North Korean hackers use disguised apps to target Macs with hidden malware

25 November 2024 at 10:00

Macs are safer than Windows PCs, but they’re not foolproof. Hackers occasionally find ways to infect Apple devices, and in most cases, we’re the ones who allow it. Since infiltrating Apple’s App Store is difficult, hackers trick people into downloading apps from third-party stores or random websites.

These apps look legitimate but are actually tools for infecting devices with malicious software. A recent incident highlights this issue, with North Korean hackers targeting Macs by hiding malware in seemingly harmless macOS apps.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Recent discoveries by Jamf Threat Labs have unveiled a sneaky form of malware targeting macOS computers. While it may sound technical, understanding the basics of how this malware operates can help you stay safe online.

This malware hides in seemingly harmless applications, such as a game called Minesweeper and a note-taking app referred to as a Notepad. These apps function as expected, but behind the scenes, they run malicious programs that could allow hackers to take control of your computer.

The apps use a technology called Flutter, a tool often used to create apps that work on multiple devices like phones and computers. Flutter makes it easier for app developers to design their software, but its unique structure also helps hackers hide their malicious code, making it harder for experts to detect.

Once installed, the malware connects to a remote server (think of it as a command center for hackers) to receive instructions. These instructions could include running commands on your computer without your knowledge. One trick this malware uses is running AppleScripts, a type of script built for macOS systems, which can quietly execute commands to steal your data or even control your device.

Even scarier, some versions of this malware had been signed and approved by Apple’s security system before experts caught on. This means the hackers were testing how far they could push their schemes without raising suspicion.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

This malware isn’t just a random act of cybercrime, it has ties to tactics and techniques often associated with North Korean hackers. Experts have identified similarities between this malware and previous attacks linked to North Korea, including the use of certain coding methods and domains that the country’s cyber teams are known to exploit.

North Korea has a history of using cyberattacks to fund its operations or disrupt systems worldwide, often targeting financial systems or vulnerable individuals. In this case, the malware seems to be in the testing phase, potentially laying the groundwork for a larger attack in the future.

The apps containing the malware were designed to look harmless. These tactics suggest a focus on tricking people through social engineering, a method North Korean hackers have used in the past.

By embedding the malware within apps that appear useful or fun, the attackers can increase the chances of someone downloading and using the infected software. While this particular malware has not yet been linked to active attacks, its connection to North Korea’s cyber playbook is a strong indicator of potential risks ahead.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

1) Use reliable antivirus software: A strong antivirus program is your first line of defense against malicious links and malware that could steal your private information. Avoid clicking on random links, especially in emails or messages that claim to be urgent or demand updates. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. It can also warn you about phishing emails and ransomware scams, helping to keep your personal data and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Be careful with downloads and links: Only download apps from trusted sources like the Mac App Store or official websites of known developers. Hackers often disguise malware as legitimate updates or harmless apps.

3) Keep your software up to date: Regular updates for macOS and installed apps are essential because they patch security flaws. Apple frequently rolls out updates to address vulnerabilities, so enabling automatic updates ensures you stay protected without the hassle of manually checking for them.

4) Use strong, unique passwords: A strong password can help keep your Mac safe from unauthorized access. Avoid reusing passwords across different accounts. A password manager can be incredibly helpful here—it generates and stores complex passwords for you, making them difficult for hackers to crack.

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2024 here.

5) Enable two-factor authentication (2FA): Activate 2FA for key accounts like your Apple ID, email, and financial services. This adds a second layer of security, making it much harder for attackers to access your accounts—even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

I've noticed a significant rise in malware hiding in seemingly harmless apps, whether it's related to Mac, Windows, Android, or even iPhones. It just shows that no device is completely safe, not even one made by Apple. Hackers, including those backed by North Korea, are constantly finding new ways to trick users into downloading malicious software. These attacks often fly under the radar because they look like regular, safe apps. With these threats becoming more sophisticated, it’s more important than ever to stay aware of the risks and be cautious about what you download and click on.

Do you trust third-party app stores or only use official app marketplaces? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌