January 24, 2020
It’s 2020 and unless you’re Ron Swanson, the odds are high you’re dependent on the internet for many things. Banking, getting a ride home after a late-night, filing your taxes, paying your friend back for pizza, managing your pension ― the list goes on.
A Guide To Not Getting Hacked
A lot of your personal information is out there, and a lot of bad things could happen should it ― and the accounts that safeguard it ― be divulged to the wrong people.
The good news is unless you’re Amazon head honcho Jeff Bezos, Saudi Crown Prince Mohammed bin Salman probably isn’t targeting you with elite hacking tools. Probably. You may have been targeted by a covert Saudi disinformation campaign on Facebook, though!
The more realistic threat to your personal information will arrive in a data breach. A corporate firm will fail to safeguard a database containing hundreds of millions of usernames, passwords and other private information you never realised you consented to their amassing in the first place. It’s a common enough occurrence that the term “breach fatigue” exists. (See incidents at Equifax, Experian, Target, LinkedIn and more.)
Another likely threat: A bad actor could lure you into divulging your password or inadvertently installing malware on your computer via a cleverly designed phishing email. Russia hacked John Podesta, chair of Hillary Clinton’s 2016 campaign, with one of these, giving Donald Trump a boost in his 2016 bid for the presidency.
It’s easier to protect yourself with a couple of simple steps now than to try to recover once the damage is done. So shake off that “it won’t happen to me” mantra and follow along. Here are the basic do’s and don’ts of online security.DOPractice password common senseCheck to see if your email address has been involved in a breach at HaveIBeenPwnd.com, a database created by web security expert Troy Hunt. If your account has been compromised, you’ll want to change your login(s) to something new and unique. Even if it hasn’t, you should seriously consider changing your logins if it’s been a while.
Use different passwords for all of your logins. Reused passwords give attackers easy access to other accounts you use instead of keeping them siloed in one compromised account. On that note, it’s also better to avoid using the “login via Facebook” or “sign in with Google” buttons.
“Steer clear from using third-party platforms or social media profiles to log into accounts,” said Wendy Zamora, editor-in-chief of Malwarebytes Labs, a cyber threat detection and prevention company. “If a prompt asks you to sign in using Facebook or Twitter, best to create separate credentials — otherwise if that account is ever compromised, or your social media profile is hacked, any linked accounts could be compromised as well.”
If your password(s) are on this list of the 50 most commonly used passwords of 2019, give this Electronic Frontier Foundation explainer about creating strong passwords a read. As Hunt says, “The only secure password is the one you can’t remember.”Use a password managerUsing a password manager ― which can generate secure, unique passwords at the click of a button and automatically remember them for you ― is the easiest way to manage all of the above. Here’s a review of commonly used password managers, many of which offer basic options for free. All you have to do is remember one master password to log in to the manager itself.Keep that phone on lockdownWhile we’re on the subject of passwords: If all it takes to log into your phone is mashing “0” a bunch of times ― looking at you, Kanye ― your phone represents a painfully weak link in your personal security. Anyone who can unlock your phone can likely also access your email and messages, which they can then use to reset passwords for your other accounts.
Use your fingerprint to unlock it, or use a longer alphanumeric passcode that doesn’t follow an obvious pattern (e.g., don’t use something a bystander could easily remember after seeing it once).
Change the default passwords on any internet-connected device you have in your home. Your modem, router, baby monitor, smart TV and smart fridge (yes, they too have been hacked) likely came with a weak preset password that can be easy to crack. Keep all of your software up to dateCompletely shutting down your computer every night is a good habit that can help with this.
“This is good because it frees up RAM for startup the next day, and it also forces your system to install updates when you’re done with work, rather than it trying to do so while you’re in the middle of something,” Malwarebytes Labs director Adam Kujawa said. “Also, offline systems are less likely to be infected with malware ― at least while they are offline.”Encrypt your devicesEncryption encodes the information on your device, keeping it out of someone’s hands if your device is lost or stolen. If you have a newer iPhone or Android phone that’s protected with a passcode, it should be encrypted by default, but here’s a helpful guide to double-check just in case. The Intercept has a guide on how to encrypt your laptop.Think twice aboutputting stickers on yourlaptopCertain stickers could make your device, the information it contains and the work you do on it a more enticing target.Use two-factor authenticationThat’s the fancy name for needing to enter a code from your phone in addition to your password to log in. Ideally, you’d get that code via an app called an “authenticator” instead of via text message, since text messages can be tampered with, but a text message is better than nothing.
“You get what you can get,” Kujawa said, “and even one extra layer of authentication can defeat many attackers who are just looking for low-hanging fruit and don’t want to put in any extra work.”Look out for a padlock in your address barThat’s an icon used to signify the website uses a more secure, encrypted protocol known as HTTPS. If the padlock is broken or you see some other, more jarring icon like an exclamation point, don’t trust the page with any personal or sensitive information.Use a VPNA virtual private network acts as a secure tunnel for your internet traffic, shielding it from outside view when you’re on a public, unsecured network. Turn on your VPN when you’re using public Wi-Fi, and consider using it at home, too. In 2017, Republicans voted to allow internet service providers to sell your web browsing history. A VPN will also keep that ISP snooping at bay.
Choosing a good VPN can actually be a bit tricky. As a general rule of thumb, if it’s free, be suspicious. Facebook pushed a “free” VPN for years that claimed to keep users safe from snooping when in reality it was harvesting users’ data. DON’TOvershare on social media Social media pages are prime sources of personal information someone could use to compromise your accounts. The answers to a surprising number of security questions are often hiding in plain view on social media. Make your social accounts private, lockdown any public-facing information and limit what you share. (Here’s a good guide for all of that.) Better yet, consider deleting Facebook entirely. Your mental health and democracy will thank you.Email sensitive informationThe technology used to schlep an email from one mail server to another is remarkably insecure. Anyone with access to a server in the middle could, with very little effort, access the contents of the emails it’s delivering. It’s OK if hackers make off with Aunt Edna’s famous green chili recipe, not so much if it’s your Social Security number. That’s the sort of information that’s still generally better transmitted via phone call or even fax.Auto-connect to public Wi-Fi networksKujawa explained:Lots of attackers can set up hotspots in airports, hotels, hospitals, etc. and broadcast their network with the same ID as default routers or try to mimic the wireless network of the place they are set up in.
For example, at an airport I’ve been to a dozen times, they have free internet. So I connect to their network all the time and my phone auto-connects when it recognises it now, because of that.
Well, Hacker Dude comes along and sets up their own wireless access point, maybe 100 feet from you, on their laptop. They have mimicked the airport wireless access point and your phone connects to it because it’s closer, has a stronger signal, and it thinks it recognises the network and can trust it.
The hacker sets up internet forwarding so anyone connected to their network has access to the same internet they would have if they connected to the legitimate network, with the difference being the criminal has set themselves up between you and the airport’s access points.Get phishedThere was once a time when the biggest threat in your inbox came from a stranger claiming to be a wealthy Nigerian prince. Those halcyon days are long gone.
Scammers have perfected the craft of deceptive phishing emails. They come in the form of convincing counterfeits claiming to be some overdue invoice, or to be from Netflix or a large social media platform that “just needs you to confirm your login information.” Even fake emails impersonating climate activist Greta Thunberg are a thing now.
All it takes is a little disbelief to rob phishing emails of all their power. Be sceptical of every email in your inbox, especially ones with attachments (regardless of file type ― even PDFs can be weaponised) or links to sites that ask for your personal information.
Here are some pointers from the Federal Trade Commission on how to spot scam phishing emails. Be especially wary if: The email looks like it’s from a company you may know and trust.The email says your account is on hold because of a billing problem.The email has a generic greeting, such as “Hi Dear.” If you have an account with the business, it probably wouldn’t use a generic greeting.The email invites you to click on a link to update your payment details.If you’re unsure, reach out to the person who sent it and ask whether it’s legitimate. Do this in a separate email ― don’t just reply to the one you received. If the email claims to have been sent by your bank or other recognizable company (including your employer!), log into your account via the company’s website (not via the link “they” emailed you) to verify whether it’s real. Or pick up the phone and give them a call.
Other forms of communication can also be weaponized, so be wary of texts, WhatsApp messages, and even old-school phone calls that seem odd. 
For more information on how to spot ― and avoid ― phishing attempts, the Electronic Frontier Foundation has an excellent guide.  Related... Amazon Founder Jeff Bezos Has Accused Saudi's Crown Prince Of Personally Hacking His Phone Yes, Your Phone Is Listening In On You (But Not In The Way You Think)
Related Stories
Latest News
Top news around the world
Coronavirus Disease

Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered coronavirus.

Most people infected with the COVID-19 virus will experience mild to moderate respiratory illness and recover without requiring special treatment. Older people, and those with underlying medical problems like cardiovascular disease, diabetes, chronic respiratory disease, and cancer are more likely to develop serious illness.

Around the World

Celebrity News

> Latest News in Media

Watch It
Julia Fox defends viral ‘Uncut Gems’ interview moment: ‘I was stoned’ | Page Six Celebrity News
February 17, 2022
4m-p0_-ePd8
Alexia Echevarria pushed ‘RHOM’ producers to show more of son Frankie’s recovery | Page Six
February 17, 2022
E-wTaN9NfkI
Pete Davidson rejoins Instagram amid Kanye West drama | Page Six Celebrity News
February 17, 2022
SsC3dmsI6t4
Aaron Rodgers And Shailene Woodley Reportedly Break Up | TMZ LIVE
February 17, 2022
FoErdRE8Qe4
Chet Hanks Done Talking About Famous Parents, Becoming Personal Trainer | TMZ
February 16, 2022
5_UrULOkQ6o
Woman Stabbed at Foot Locker During Nike Shoe Release
February 16, 2022
TfuXMs1JdVg
Steph's Freaky Side, "Summer House" & "Love During Lockup"
February 17, 2022
9W_raO0zlA8
Tay or Nay, Offset's Sushi Anxiety & Nick on Monogamy
February 17, 2022
PauYHpJRA6o
Kim Kardashian & North West TWINNING in Matching Pajamas | E! News
February 17, 2022
b-_Oib6R108
Adam McKay - Hollywood Walk of Fame Ceremony
February 17, 2022
tYtzsHoOZzo
Tom Holland, Mark Wahlberg, and the Cast of 'Uncharted' Talk Most Challenging Stunts
February 15, 2022
d3ksX-SKi8c
Ryan Reynolds and Walker Scobell on ‘The Adam Project’, ‘Deadpool’, and Possible ‘Star Wars’ Role
February 16, 2022
5TxJsbJr9Dk
TV Schedule
Late Night Show
Watch the latest shows of U.S. top comedians

Sports

Latest sport results, news, videos, interviews and comments
Latest Events
04
May
CONCACAF CHAMPIONS LEAGUE: Playoffs
Seattle Sounders - Pumas
04
May
USA: Major League Soccer
FC Cincinnati - Toronto FC
03
May
ENGLAND: Championship
Bournemouth - Nottingham Forest
02
May
ENGLAND: Premier League
Manchester United - Brentford
02
May
ENGLAND: Championship
Fulham - Luton
02
May
SPAIN: La Liga
Getafe - Real Betis
02
May
GERMANY: Bundesliga
Bayer Leverkusen - Eintracht Frankfurt
02
May
GERMANY: Bundesliga
Borussia Monchengladbach - RB Leipzig
02
May
ITALY: Serie A
Atalanta - Salernitana
01
May
ENGLAND: Premier League
Tottenham Hotspur - Leicester City
01
May
SPAIN: La Liga
Barcelona - Mallorca
01
May
ITALY: Serie A
Roma - Bologna
01
May
ENGLAND: Premier League
West Ham United - Arsenal
01
May
ENGLAND: Premier League
Everton - Chelsea
01
May
ITALY: Serie A
Udinese - Inter Milan
01
May
ITALY: Serie A
AC Milan - Fiorentina
01
May
ITALY: Serie A
Juventus - Venezia
01
May
SPAIN: La Liga
Rayo Vallecano - Real Sociedad
30
Apr
GERMANY: Bundesliga
Mainz - Bayern Munich
30
Apr
GERMANY: Bundesliga
Borussia Dortmund - Bochum
30
Apr
ENGLAND: Premier League
Newcastle United - Liverpool
30
Apr
SPAIN: La Liga
Athletic Bilbao - Atletico Madrid
30
Apr
ENGLAND: Premier League
Leeds - Manchester City
30
Apr
SPAIN: La Liga
Real Madrid - Espanyol
30
Apr
ITALY: Serie A
Napoli - Sassuolo
28
Apr
ENGLAND: Premier League
Manchester United - Chelsea
27
Apr
CHAMPIONS LEAGUE: Semifinal
Liverpool - Villarreal
27
Apr
ITALY: Serie A
Bologna - Inter Milan
26
Apr
CHAMPIONS LEAGUE: Semifinal
Manchester City - Real Madrid
25
Apr
ITALY: Serie A
Sassuolo - Juventus
24
Apr
SPAIN: La Liga
Barcelona - Rayo Vallecano
24
Apr
ITALY: Serie A
Lazio - AC Milan
24
Apr
ENGLAND: Premier League
Liverpool - Everton
24
Apr
ENGLAND: Premier League
Chelsea - West Ham United
24
Apr
ITALY: Serie A
Empoli - Napoli
23
Apr
ENGLAND: Premier League
Brentford - Tottenham Hotspur
Find us on Instagram
at @feedimo to stay up to date with the latest.
Featured Video You Might Like
zWJ3MxW_HWA L1eLanNeZKg i1XRgbyUtOo -g9Qziqbif8 0vmRhiLHE2U JFCZUoa6MYE UfN5PCF5EUo 2PV55f3-UAg W3y9zuI_F64 -7qCxIccihU pQ9gcOoH9R8 g5MRDEXRk4k
Copyright © 2020 Feedimo. All Rights Reserved.