Security's posts - English uPOST

Sign Your Address Up For USPS Informed Delivery Before Scammers Do Sign Your Address Up For USPS Informed Delivery Before Scammers Do

If you haven’t signed up for the US Postal Service’s Informed Delivery service, you might want to do so now.

How to Switch to Software Encryption on Your Vulnerable Solid-State Drive How to Switch to Software Encryption on Your Vulnerable Solid-State Drive

Researchers at the Netherland’s Radboud University have uncovered serious security issues with several solid-state drives that use hardware-based encryption—vulnerabilities that would allow an attacker to access a drive’s “encrypted” contents without needing the password that decrypts it.

Secure Your Accounts and Passwords With a Hardware Token Secure Your Accounts and Passwords With a Hardware Token

Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the YubiKey or Google Titan. They’re incredibly easy to set up, and as long as you keep the USB accessory on or near you—on your…

How to Install a Windows Keylogger How to Install a Windows Keylogger

I’m not going to ask why you need a keylogger. Just know that installing one on someone else’s system is a great way to get yourself dumped, fired, or prosecuted, depending on your situation. It’s also a great way to really put someone in a world of hurt, should the little utility you’ve downloaded capture keystrokes…

Set Up Your Financial Accounts Like You're Going to Be Hacked Set Up Your Financial Accounts Like You're Going to Be Hacked

In the past week alone, Experian, Facebook and Google have all experienced (or divulged, in Google’s case) security breaches of various levels of seriousness, potentially exposing people’s private information. Never mind Equifax and the thousand-plus other breaches that occurred last year.

How to Make Your Mac as Secure as Possible  How to Make Your Mac as Secure as Possible 

In a recent blog post titled “Hardening macOS,” Ricard Bejarano offers an extensive list of settings you can tweak to make macOS as secure as possible. It’s a comprehensive list of tasks—and we love it—but it’s important that you understand the “why” behind his recommendations, too. Here are a few of his top tips and…

Use Your Password Manager for Security Answers, Too Use Your Password Manager for Security Answers, Too

It’s been a while since I’ve had to type in some stupid answer to a made-up question when creating an account on a new service. You know what I’m talking about: Forget your password, and you can regain access to your account by typing in the name of your first pet (Mr. Mrglglrm), your favorite sports team (Saskatoon…

How to Protect Yourself After Facebook's Recent Hack  How to Protect Yourself After Facebook's Recent Hack 

It’s safe to say that this recent Facebook access token hack is a complete mess—much more than a simple inconvenience that might have forced you to log back in to your Facebook account on your devices. And while the company is still sorting out the details and working on ways for developers to mitigate the effects of…

How to Delete Your Facebook Account: A Checklist How to Delete Your Facebook Account: A Checklist

Let’s talk about that elephant in the room: Facebook’s recent disclosure that attackers got their hands on access tokens for an unknown number of Facebook accounts is a big deal, since it’s the kind of hack that you, a happy Facebook user, could not prevent.

Prevent Apps From Tracking if You've Opened an Email With This Gmail Extension Prevent Apps From Tracking if You've Opened an Email With This Gmail Extension

A few years ago a friend told me about Streak, a Gmail extension that allows you to track whether your email has been opened. For me it was a game changer, simply because it allowed me to have some concept of whether or not a message had made it to the person I intended or had gotten stuck in a spam folder in…

How to Remove Your Phone Number From Facebook How to Remove Your Phone Number From Facebook

This week a TechCrunch article revealed that Facebook is using phone numbers users have provided as a security measure for two-factor authentication as a way to send targeted ads to those users.

Keep Your Data Secure With Mozilla's Newest Tools Keep Your Data Secure With Mozilla's Newest Tools

Mozilla has been on a tear for data security and privacy lately, and we applaud that. Keeping your information safe from the prying eyes (and hacks) of others should be at the top of your mind every time you sign up for a new service or mess around on the web. And it’s refreshing to see good news about browsers and…

How to Wipe Your Smart Gadgets Before You Get Rid of Them How to Wipe Your Smart Gadgets Before You Get Rid of Them

You probably know you have to wipe your old computers and smartphones clean before you sell, donate, or recycle them. After all, you don’t want whoever ends up with your secondhand gadget to access your documents, login credentials, or any personal information.

The Best New Features to Try in iOS 12 The Best New Features to Try in iOS 12

The latest version of Apple’s iPhone and iPad operating system, iOS 12, is out. It features dozens of new features and improvements; there’s something for everybody.

How to Stop an Ex From Breaking Into Your Accounts How to Stop an Ex From Breaking Into Your Accounts

In this week’s tech-support column, I’m taking on an uncomfortable issue: How to regain control of your accounts from a not-so-kind ex. I’m hoping your former loved one isn’t a complete psychopath—or, at least, isn’t a psychopath that has access to your accounts—but it’s an all-too-familiar story. You live with…

What's the Best Way to Unlock Your iPhone? What's the Best Way to Unlock Your iPhone?

I remember all the hubbub when Apple first announced Face ID back in September of 2017. There were countless articles and thought pieces criticizing Apple for the terrible experience its new security technique was about to create. Instead of just pressing on your iPhone’s Home button, a natural task as you pull your…

How to Set Up Two-Step Authentication on Your Microsoft
Account How to Set Up Two-Step Authentication on Your Microsoft Account

If we’ve said it once, we’ve said it a million times: You should use two-factor authentication everywhere you can. It’s an easily enacted security measure that should give you a lot more peace of mind.

How to Use Amazon Echo as Your Home Security System How to Use Amazon Echo as Your Home Security System

If you’re renting, you may not be able to install a traditional wired security system—and if you live in a small space, you probably won’t need to. Instead, consider building your own security system piecemeal with an Amazon Echo device as the brains of the operation. Amazon’s Alexa integrates with literally thousands…

Strengthen Your Online Security With C.O.A.C.H. Strengthen Your Online Security With C.O.A.C.H.

Do you have any idea whether you’re “safe” online? Online security and privacy are complicated, and risks vary by person: you might worry about getting harassed, hacked, or your boss finding your terrible old blog posts and using them as an excuse to fire you. Crash Override’s Automated Cybersecurity Helper helps you…

How to Disable the Automatic Wifi Wakeup Feature in Android Pie How to Disable the Automatic Wifi Wakeup Feature in Android Pie

If you’ve updated to Android 9 Pie, you may have noticed that your smartphone will now automatically turn on your wifi connection—if you’ve turned it off—when you’re near familiar network with a strong signal. This feature, which debuted in Android Oreo, is now flipped on by default in Android Pie.

More Security's posts »

Language