When a site asks you to set up a type of two-level security, you might wonder what they’re talking about. Here’s what you should know about this relatively new way to protect your online identity…and your money!
If you’ve ever called your credit card company, you’ll remember that they always ask a few qualifying questions before they discuss your account. You have to prove that you are you, essentially. When you’re online, most everything you do is secured by a password. What happens when you lose that password or, worse yet, someone steals it? This is where multi-level protection comes in.
Take online banking, for instance. Most banks use a second level of security, taking the form of a question that you must answer correctly after you enter your password. If your bank doesn’t use this type of account lock, you should really consider moving to a more secure banking facility. Additionally, make sure your answers do not have anything to do with the question. If the question chosen is ‘Name of your first pet’, set the answer to be anything but the name of that pet. Your birthplace? Same thing. Almost anyone can pick up bits and pieces of your personal information from many different sources. Lock up your bank account(s) with cryptic answers to all security questions.
For Facebook, Twitter, Gmail, Outlook, etc. make sure you sign up for two-step confirmation. For all of these sites, you can use your mobile number to receive a code that lets the site know it’s OK to let you change your password or log in from a new device. Look for ways to activate this. Facebook has been using this technique for quite a while. Outlook now makes it mandatory. Sure, it is a bit of a pain but they’re doing this for you, not for themselves. Protect your identity and personal information with as many levels of security as possible. You’ll regret it if you don’t.
Thanks for reading! Here’s a link to our very own Facebook page: Computers Made Simple on Facebook Like the page and you’ll get all of our updates instantly.
Today’s post could be titled ‘The Ten Commandments of Staying Safe Online’ but we didn’t want to confuse people who were googling for the real ten commandments. Staying safe online is based on common sense, there’s no rocket science about it. Use your head and you’ll be safe. If something happens, we’re always ready to help.
1. Don’t click on email attachments.
We dealt with attachments earlier this week, explaining what they are and how to avoid getting tricked by a malicious one. Even if the email is from someone you know, double check with them before opening anything that’s attached to an email.
2. Don’t click on links in the body of unknown or suspicious emails.
Credit card companies and banks DO NOT send emails with links in the body of the email, at least not the ones that we deal with. If you get regular mailings from companies who are sending you updates on merchandise or sales they are having, fine. If you don’t deal with the company that sent the email, don’t click on anything inside it. Even if the email is from a friend, be suspicious. Some friends send or forward all kinds of things, right? Laugh at this, chuckle at that, you know the type. What are you going to miss if you don’t click on the link? Nothing. We can’t think of any reason why you should click on a link anyway. It’s not worth the risk.
3. Use and maintain a good anti-virus program.
We told you about several free AV programs this week so make sure you’re protected. Lack of money is no excuse. If you’re go online without the protection of AV software, you’re pretty much begging for trouble.
4. Use Google Chrome.
Not only is Chrome fast, it also updates itself every time you start it and it has a built-in protection from malware sites. If you use Internet Explorer from Microsoft, well, you’re on your own there.
5. Don’t think the Macs are safe from viruses and malware.
They aren’t. Apple is just as big of a target as Microsoft. Thousands of people around the world are busy 100% of the time trying to find holes in Windows. iOS and all of the software that goes with them.
6. Don’t use torrents to download movies or software.
Not only is it illegal but it’s also dangerous. Unless your AV software is completely up-to-date, a virus attached to a file that you’ve downloaded can wreck your computer and/or your identity in seconds. Steer clear of torrents!
7. Only download software from trusted sites.
This applies to apps that you get for your mobile devices, too. The software that we mention here is almost always free and we provide direct links to the home page of the people who create the apps. Tucows, a site that’s been around for years, is safe while sourceforge, a site that’s also been around for years, isn’t safe. Sourceforge now adds other software during the installation process while Tucows doesn’t. The added software is usually some kind of toolbar or adware that changes your browser settings completely. If in doubt, ask us first.
8. Don’t share flash drives. If you do, make sure you scan the drive with your AV software before you transfer any files.
Flash drives are wonderfully handy, aren’t they? If you use them on your own computers, you’re probably quite safe. If you lend them out to your kids or friends, scan the drive before you use any of the files on it. If your children have used a drive on a computer at their school, double and triple check it with your AV software. You’ve been warned.
9. Don’t sign in to your email, Facebook or other social media account just because something asks you to do so.
If you type in ‘facebook.com’ and then sign in to your account, that’s one thing. Typing your email and password into a pop-up window is something else. There is a good chance that something has hijacked your browser if you get these kind of pop-ups. Don’t be tricked. Always enter the website address yourself. If you happen to accidentally sign in using a pop-up window, close the window, close your browser, open it again and type in the site url yourself. Sign in and immediately change your password.
10. Don’t upgrade your flash player from any website that tells you to.
That’s why we advise you to use Chrome. Chrome updates its flash component automatically, you cannot do it yourself. If you are on a video site, other than Youtube we mean, and something pops up to tell you that your ‘flash player’ is out of date, don’t believe it. Chrome can play any video from any site on the Internet. You do not need anything else on any site that we’ve seen yet. If you’re using Chrome, your flash player/software is always up to date.
There are many more tips and tricks for keeping safe online but if you remember these ten, you’re well on your way to smooth cruising on the Internet. For more tips and tricks, Like us on Facebook. Here’s the link:
Part four in our virus and malware series will deal with free tools to protect your computer from all things nasty. These are our recommendations. If you have some of your own, please let us know in a comment.
Housecall is an excellent free online virus scan. Sometimes your own anti-virus can be compromised or shut down completely by malware. Head to the site linked above and Housecall will check your computer for free. Download and install a small app then let it run. Once the verdict comes through, you can choose to get rid of anything that Housecall finds. Full instructions are on the site.
Microsoft puts out a free package of security products that will watch over your computer as you work, updating itself when it needs to do so. MSE is part of Windows 8 but you have to download it and install it yourself if you’re using other versions of Windows. Click the link above and get it. We use it on several of our computers and recommend it highly.
On some of our other machines, we use AVG Free AntiVirus. AVG is fast when it scans and protects any computer it’s on, even Macs. You have to update it every year, as in a whole new version, but that’s a good thing. AVG has pay versions too but that’s up to you. We like free.
If your problem isn’t from a virus, and it probably isn’t, check out Malware Bytes. The term malware is all-inclusive, including adware, cookies, viruses and many other things that can slow your computer down. If you’ve installed a bit of software and things keep popping up on your screen when you’re surfing, chances are that Malware Bytes will get rid of it. These bad things almost always come with helper apps, things such as toolbars that pretend to speed up your searching or assist you with downloads. No worries. Malware Bytes will find them. Malware Bytes doesn’t work in the background, you have to initiate a scan whenever you think you should. We’d advise that you do this about once a week, maybe once every two weeks but, again, that’s up to you.
That’s a quick rundown on some free bits and pieces that can keep your computer safe from harm. Windows already has a built-in firewall but, unless you are running Windows 8, you must always install anti-virus software.
TIP: You don’t need to pay for this protection. New computers come with trial versions of Norton or McAfee AV products. Here at Computers Made Simple, we delete those products right off the bat. Why? First, they really slow your computer down and, second, they don’t work any better than the free AV software.
If you’re confused about what virus, malware, adware, and Trojans, etc. are, here are some definitions for you:
1. Virus
This is an all -encompassing term but, fortunately, it’s a type of malware that we don’t see to often these days. A virus in a computer performs pretty much the same as it does in a human; it takes over completely, preventing other systems from working. A bad virus in either host can sometimes destroy that host completely. Many viruses were written to simply show the awesome skill of the person who wrote the script. Read that with heavy sarcasm. Some script kiddies , as they are sometimes called, don’t even write their own stuff. They copy scripts from more knowledgeable coders and claim them as their own, often signing their names somewhere in the virus code. These days, this type of individual would rather leave their work unseen and unnoticed by the users that they try to infect, in order to extract as much information as possible from them. A virus seeks to attach itself to as many files as it can on the host computer. This is the activity that your AV software should pick up. It’s the speed of the replication that makes them so very dangerous.
2. Malware
Anything that does damage, extracts private information or uses someone’s computer for purposes unknown to that user could be termed malware. There are many different kinds but, basically, things that do bad stuff to computers are designated as malware.
3. Adware
Adware is not nearly as bad as malware but it is aggravating and frustrating all the same. Most adware is installed with those seemingly helpful toolbars which many companies install with their software. Adware wants you to use a certain page for your homepage, a specific search engine, etc. Adware pretends to help you but, in reality, it only helps the company that installed it on your computer. One of the main problems with adware is that it frequently is missed by your anti-virus software. It’s not really harming your computer and it doesn’t act like malware so your AV program will likely not even notice that it’s running or pick it up on a scan. There are specific programs that seek out and destroy adware and we’ll get into these in a future post.
4. Trojan
These are things that pretend to be other things, just as the original Trojan Horse pretended to be a gift way back in history. The computer user expects a file to be a certain thing, let’s say a Word document or PDF, but that file is actually the installer for a piece of malware. The unwitting computer user won’t know what’s going on behind the scenes when they click on the infected file. While everything may seem normal and the software may do exactly what the user expects it to do, it has also infected the computer with any one of dozens of kinds of malware. It’s not only hackers that do this. Governments use Trojans to manipulate computers and machinery in countries that may be a threat to them. If you’ve ever heard the term ‘backdoor’ in discussions of malware, this is what a Trojan seeks to install on the host computer. Once the backdoor is up and running, the infected computer can be manipulated without its owner knowing about it.
5. Worms
Probably the most famous computer worm is known as the ‘Stuxnet’ worm, designed expressly to infect Iran’s nuclear engineering projects. A worm is a virus but isn’t quite as bent on destruction as a simple virus is. Worms can do many things but their aim is to sit unnoticed, all the while feeding information out to the installer and, in some cases, preventing devices from performing as they should. If one country wants to eliminate a perceived threat, let’s say from a missile installation, it is possible to have those missiles misfire or go off-course through the use of a computer worm. If you’re familiar with the TV series Battlestar Gallactica from about ten years ago, you’ll remember that the Gallactica, which was not networked, was the only spaceship which was not infected with the virus that destroyed the defence capabilities of every other networked military ship. Worms work their way from computer to computer though networks, often through updates. Some worms are designed specifically to target certain types of mechanical systems.
Those are the basics. In our next few posts, we’ll show you how to immunize you and your family from these threats. While dangers do not lurk in every corner of the Internet, there are enough of them out there to make knowing this stuff very important. Tell your friends!
Although we don’t get nearly as many as we used to, some very dangerous emails still make their way into our inbox. Which ones are those? Emails with attachments, that’s what we’re writing about today. We’ll give you a few tips on how to stay safe and protect yourself from these malicious emails.
1. What’s an ‘attachment’?
Most of the time, an email is just words that someone has typed, no different than a text message. Some emails looks much like a webpage, specifically those from companies that you’ve chosen to deal with or receive ads from. Nothing much to worry about there, right? Complications arise when someone attaches a file to an email. Let’s say you’re sending a resume to a company that’s hiring. You could copy and paste your CV into the body of the email or you could attach the whole file to the email. The format for this file may vary, from PDF to .doc to .docx, etc., but the full file is sent with the email. At the other end, the person who opens that email has to download the file and open it on their computer. (Some online email providers allow documents to be opened with their email program but not all do this.) Hopefully, you’ll see where this is going. What if that attachment isn’t a simple Word document?
2. How do I know if an email has an attachment with it?
If you use Outlook/Hotmail, it will look like this:
3. What are the dangers of email attachments?
Some types of files, zips for instance, contain executable files within them. An executable file is one that actually does something, as opposed to a photo that you simply look at. Some other types of files, pdfs for example, can have an executable file hidden inside them. You are not able to send unzipped executable files any more, most email providers, if not all, have chosen to eliminate ‘exe’ files as attachments. This doesn’t mean that you’re safe, just that you have to be more careful.
If you somehow get an .exe file and click on it, you could be allowing a virus to take control of your computer or installing a key-logging program which will remember everything you type then send that data to an identity theft gang; any number of bad things, in other words. That’s why attachments can be dangerous.
4. How do I know if an attachment is safe?
Here are some simple rules to follow when faced with an email that has an attachment:
A. Do you know the sender?
B. If you know the sender, is the attachment described in the email? “I’m attaching a copy of my latest resume. Could you check it over for me?”, something like that.
C. If you know the sender, does the subject line of the email look like something they would say? “Hey! Look at this hot pic I just took!” is an example of something you shouldn’t open, let alone download the attachment.
D. Are you expecting an email with an attachment from someone you know or a company you deal with. Is the company you contacted sending you the manual for something you bought? Is a government agency sending you a new tax form? Did you request something from this person or company?
You’ll have to answer these questions yourself but A. is a definite NO, right? C is very popular now, specially on social media sites but often in emails. Basically, you have to use your head. If you delete an email that has an attachment, don’t worry about it. The rule here is to protect your computer and your identity first. If the attachment was legitimate, that person or company can always send it again.
TIP : Outlook/hotmail has a cool feature that locks attachments and pictures in emails from persons or companies that are not on your contact list or who you haven’t certified as being safe. Here’s what this looks like:
Don’t know the sender? They’re not on your contact list? Outlook protects you from the hidden dangers in these emails. You have two choices besides deleting these. If you know the person or company, click ‘Wait, it’s safe!’. If you’re uncertain, click ‘I’m not sure. Let me check’. If you choose this one, Outlook shows you a bit more of the email but still keeps some things locked down. In the photo above, there are two attachments and we know for sure that these are malware/viruses or other nasty things. Besides, we’ve never heard of the sender. We’d have to go way out of our way to get infected by this email but, unfortunately, people do this every day. Now you know the dangers.
Thanks for reading! Let us know if you have questions or suggestions about this or anything else ‘techish’. Like us on Facebook so you can keep up with our posts and tech tips: Computers Made Simple on Facebook
a little bit of hi-tech, a little bit of common sense and a lot of fun