January 24, 2020
It’s 2020 and unless you’re Ron Swanson, the odds are high you’re dependent on the internet for many things. Banking, getting a ride home after a late-night, filing your taxes, paying your friend back for pizza, managing your pension ― the list goes on.
A Guide To Not Getting Hacked
A lot of your personal information is out there, and a lot of bad things could happen should it ― and the accounts that safeguard it ― be divulged to the wrong people.
The good news is unless you’re Amazon head honcho Jeff Bezos, Saudi Crown Prince Mohammed bin Salman probably isn’t targeting you with elite hacking tools. Probably. You may have been targeted by a covert Saudi disinformation campaign on Facebook, though!
The more realistic threat to your personal information will arrive in a data breach. A corporate firm will fail to safeguard a database containing hundreds of millions of usernames, passwords and other private information you never realised you consented to their amassing in the first place. It’s a common enough occurrence that the term “breach fatigue” exists. (See incidents at Equifax, Experian, Target, LinkedIn and more.)
Another likely threat: A bad actor could lure you into divulging your password or inadvertently installing malware on your computer via a cleverly designed phishing email. Russia hacked John Podesta, chair of Hillary Clinton’s 2016 campaign, with one of these, giving Donald Trump a boost in his 2016 bid for the presidency.
It’s easier to protect yourself with a couple of simple steps now than to try to recover once the damage is done. So shake off that “it won’t happen to me” mantra and follow along. Here are the basic do’s and don’ts of online security.DOPractice password common senseCheck to see if your email address has been involved in a breach at HaveIBeenPwnd.com, a database created by web security expert Troy Hunt. If your account has been compromised, you’ll want to change your login(s) to something new and unique. Even if it hasn’t, you should seriously consider changing your logins if it’s been a while.
Use different passwords for all of your logins. Reused passwords give attackers easy access to other accounts you use instead of keeping them siloed in one compromised account. On that note, it’s also better to avoid using the “login via Facebook” or “sign in with Google” buttons.
“Steer clear from using third-party platforms or social media profiles to log into accounts,” said Wendy Zamora, editor-in-chief of Malwarebytes Labs, a cyber threat detection and prevention company. “If a prompt asks you to sign in using Facebook or Twitter, best to create separate credentials — otherwise if that account is ever compromised, or your social media profile is hacked, any linked accounts could be compromised as well.”
If your password(s) are on this list of the 50 most commonly used passwords of 2019, give this Electronic Frontier Foundation explainer about creating strong passwords a read. As Hunt says, “The only secure password is the one you can’t remember.”Use a password managerUsing a password manager ― which can generate secure, unique passwords at the click of a button and automatically remember them for you ― is the easiest way to manage all of the above. Here’s a review of commonly used password managers, many of which offer basic options for free. All you have to do is remember one master password to log in to the manager itself.Keep that phone on lockdownWhile we’re on the subject of passwords: If all it takes to log into your phone is mashing “0” a bunch of times ― looking at you, Kanye ― your phone represents a painfully weak link in your personal security. Anyone who can unlock your phone can likely also access your email and messages, which they can then use to reset passwords for your other accounts.
Use your fingerprint to unlock it, or use a longer alphanumeric passcode that doesn’t follow an obvious pattern (e.g., don’t use something a bystander could easily remember after seeing it once).
Change the default passwords on any internet-connected device you have in your home. Your modem, router, baby monitor, smart TV and smart fridge (yes, they too have been hacked) likely came with a weak preset password that can be easy to crack. Keep all of your software up to dateCompletely shutting down your computer every night is a good habit that can help with this.
“This is good because it frees up RAM for startup the next day, and it also forces your system to install updates when you’re done with work, rather than it trying to do so while you’re in the middle of something,” Malwarebytes Labs director Adam Kujawa said. “Also, offline systems are less likely to be infected with malware ― at least while they are offline.”Encrypt your devicesEncryption encodes the information on your device, keeping it out of someone’s hands if your device is lost or stolen. If you have a newer iPhone or Android phone that’s protected with a passcode, it should be encrypted by default, but here’s a helpful guide to double-check just in case. The Intercept has a guide on how to encrypt your laptop.Think twice aboutputting stickers on yourlaptopCertain stickers could make your device, the information it contains and the work you do on it a more enticing target.Use two-factor authenticationThat’s the fancy name for needing to enter a code from your phone in addition to your password to log in. Ideally, you’d get that code via an app called an “authenticator” instead of via text message, since text messages can be tampered with, but a text message is better than nothing.
“You get what you can get,” Kujawa said, “and even one extra layer of authentication can defeat many attackers who are just looking for low-hanging fruit and don’t want to put in any extra work.”Look out for a padlock in your address barThat’s an icon used to signify the website uses a more secure, encrypted protocol known as HTTPS. If the padlock is broken or you see some other, more jarring icon like an exclamation point, don’t trust the page with any personal or sensitive information.Use a VPNA virtual private network acts as a secure tunnel for your internet traffic, shielding it from outside view when you’re on a public, unsecured network. Turn on your VPN when you’re using public Wi-Fi, and consider using it at home, too. In 2017, Republicans voted to allow internet service providers to sell your web browsing history. A VPN will also keep that ISP snooping at bay.
Choosing a good VPN can actually be a bit tricky. As a general rule of thumb, if it’s free, be suspicious. Facebook pushed a “free” VPN for years that claimed to keep users safe from snooping when in reality it was harvesting users’ data. DON’TOvershare on social media Social media pages are prime sources of personal information someone could use to compromise your accounts. The answers to a surprising number of security questions are often hiding in plain view on social media. Make your social accounts private, lockdown any public-facing information and limit what you share. (Here’s a good guide for all of that.) Better yet, consider deleting Facebook entirely. Your mental health and democracy will thank you.Email sensitive informationThe technology used to schlep an email from one mail server to another is remarkably insecure. Anyone with access to a server in the middle could, with very little effort, access the contents of the emails it’s delivering. It’s OK if hackers make off with Aunt Edna’s famous green chili recipe, not so much if it’s your Social Security number. That’s the sort of information that’s still generally better transmitted via phone call or even fax.Auto-connect to public Wi-Fi networksKujawa explained:Lots of attackers can set up hotspots in airports, hotels, hospitals, etc. and broadcast their network with the same ID as default routers or try to mimic the wireless network of the place they are set up in.
For example, at an airport I’ve been to a dozen times, they have free internet. So I connect to their network all the time and my phone auto-connects when it recognises it now, because of that.
Well, Hacker Dude comes along and sets up their own wireless access point, maybe 100 feet from you, on their laptop. They have mimicked the airport wireless access point and your phone connects to it because it’s closer, has a stronger signal, and it thinks it recognises the network and can trust it.
The hacker sets up internet forwarding so anyone connected to their network has access to the same internet they would have if they connected to the legitimate network, with the difference being the criminal has set themselves up between you and the airport’s access points.Get phishedThere was once a time when the biggest threat in your inbox came from a stranger claiming to be a wealthy Nigerian prince. Those halcyon days are long gone.
Scammers have perfected the craft of deceptive phishing emails. They come in the form of convincing counterfeits claiming to be some overdue invoice, or to be from Netflix or a large social media platform that “just needs you to confirm your login information.” Even fake emails impersonating climate activist Greta Thunberg are a thing now.
All it takes is a little disbelief to rob phishing emails of all their power. Be sceptical of every email in your inbox, especially ones with attachments (regardless of file type ― even PDFs can be weaponised) or links to sites that ask for your personal information.
Here are some pointers from the Federal Trade Commission on how to spot scam phishing emails. Be especially wary if: The email looks like it’s from a company you may know and trust.The email says your account is on hold because of a billing problem.The email has a generic greeting, such as “Hi Dear.” If you have an account with the business, it probably wouldn’t use a generic greeting.The email invites you to click on a link to update your payment details.If you’re unsure, reach out to the person who sent it and ask whether it’s legitimate. Do this in a separate email ― don’t just reply to the one you received. If the email claims to have been sent by your bank or other recognizable company (including your employer!), log into your account via the company’s website (not via the link “they” emailed you) to verify whether it’s real. Or pick up the phone and give them a call.
Other forms of communication can also be weaponized, so be wary of texts, WhatsApp messages, and even old-school phone calls that seem odd. 
For more information on how to spot ― and avoid ― phishing attempts, the Electronic Frontier Foundation has an excellent guide.  Related... Amazon Founder Jeff Bezos Has Accused Saudi's Crown Prince Of Personally Hacking His Phone Yes, Your Phone Is Listening In On You (But Not In The Way You Think)
Related Stories
Latest News
Top news around the world
Academy Awards

‘Oppenheimer’ Reigns at Oscars With Seven Wins, Including Best Picture and Director

Get the latest news about the 2024 Oscars, including nominations, winners, predictions and red carpet fashion at 96th Academy Awards

Around the World

Celebrity News

> Latest News in Media

Watch It
Millie Bobby Brown & Jake Bongiovi Celebrate “Three Years of Bliss” Ahead of Wedding
March 24, 2024
C4Ehegcq1-A
Kate Middleton & Prince William "Enormously Touched" by Public Support
March 24, 2024
s8fig-RCjFc
Gisele Bündchen Denies Cheating on Ex-Husband Tom Brady
March 23, 2024
_SpRMagA8BM
Eminem, 50 Cent & Snoop Dogg Present Dr. Dre with a Star on the Walk of Fame
March 19, 2024
4bNLs1hxVp8
Opening Remarks for the Variety Summit October 20th, 2023 Jay Penske
March 18, 2024
c6Z707iLq8E
'Everybody Was S----ing Their Pants': Nick Thune Jokes About Being Born in the '70s and Fatherhood
March 16, 2024
mm7Baf6o2d8
Gunna Says Tour Will Up Creativity in Rap, Endorses Flo Milli | TMZ
March 22, 2024
QfMU24fw-Qo
Reporter Taylor Lorenz Says Palace Botched Kate Cancer News Rollout | TMZ Live
March 22, 2024
o43ZucdiyEo
Riley Strain's Body Found After Going Missing in Nashville 2 Weeks Ago | TMZ NOW
March 22, 2024
1m1zM-4_Cs8
Kyle Richards hasn’t spoken to co-star Dorit Kemsley, denies sending her a ‘manipulative’ text
March 24, 2024
LqLZzDP1hm4
Jordan Emanuel on her connection to 'RHOSLC' star Meredith Marks, advice from Amanda Batula
March 24, 2024
5NPAwlOov1Y
Kate Middleton’s uncle Gary apologizes after slamming ‘fickle’ Meghan Markle in scathing interview
March 24, 2024
JWG9kitALZk
TV Schedule
Late Night Show
Watch the latest shows of U.S. top comedians

Sports

Latest sport results, news, videos, interviews and comments
Latest Events
20
Mar
CHAMPIONS LEAGUE: Playoffs - Women
SK Brann W - Barcelona W
20
Mar
CHAMPIONS LEAGUE: Playoffs - Women
Hacken W - PSG W
19
Mar
CHAMPIONS LEAGUE: Playoffs - Women
SL Benfica W - Lyon W
19
Mar
CHAMPIONS LEAGUE: Playoffs - Women
Ajax W - Chelsea W
17
Mar
SPAIN: La Liga
Atletico Madrid - Barcelona
17
Mar
ENGLAND: FA Cup
Manchester United - Liverpool
17
Mar
ITALY: Serie A
Inter Milan - Napoli
17
Mar
ENGLAND: Premier League
Brighton - Manchester City
17
Mar
GERMANY: Bundesliga
Borussia Dortmund - Eintracht Frankfurt
17
Mar
ENGLAND: FA Cup
Chelsea - Leicester City
17
Mar
ITALY: Serie A
Roma - Sassuolo
17
Mar
ITALY: Serie A
Verona - AC Milan
17
Mar
ITALY: Serie A
Juventus - Genoa
16
Mar
GERMANY: Bundesliga
Darmstadt - Bayern Munich
16
Mar
ENGLAND: FA Cup
Manchester City - Newcastle United
16
Mar
ENGLAND: Premier League
Fulham - Tottenham Hotspur
16
Mar
SPAIN: La Liga
Osasuna - Real Madrid
13
Mar
CHAMPIONS LEAGUE: 1/8 Final
Atletico Madrid - Inter Milan
12
Mar
CHAMPIONS LEAGUE: 1/8 Final
Barcelona - Napoli
12
Mar
CHAMPIONS LEAGUE: 1/8 Final
Arsenal - Porto
11
Mar
ENGLAND: Premier League
Chelsea - Newcastle United
10
Mar
ENGLAND: Premier League
Liverpool - Manchester City
10
Mar
SPAIN: La Liga
Real Madrid - Celta Vigo
10
Mar
ENGLAND: Premier League
Aston Villa - Tottenham Hotspur
10
Mar
ITALY: Serie A
Juventus - Atalanta
10
Mar
ITALY: Serie A
Fiorentina - Roma
10
Mar
ITALY: Serie A
AC Milan - Empoli
Find us on Instagram
at @feedimo to stay up to date with the latest.
Featured Video You Might Like
zWJ3MxW_HWA L1eLanNeZKg i1XRgbyUtOo -g9Qziqbif8 0vmRhiLHE2U JFCZUoa6MYE UfN5PCF5EUo 2PV55f3-UAg W3y9zuI_F64 -7qCxIccihU pQ9gcOoH9R8 g5MRDEXRk4k
Copyright © 2020 Feedimo. All Rights Reserved.