Security Sandboxes and Virtualization

The easiest way to take advantage of the new security sandbox technology is to upgrade your hardware and software. Not everyone can afford to do that. What other options are there if you want a security sandbox? Sandboxing is closely related to virtualization. Virtual computing is a good way to get some of the benefits […]

How to Use Facebook Securely

There’s a lot of routine activity on Facebook that I bet people would think twice about if they considered it from a security perspective:

How many times have you seen posts like, “I’m out at Starbucks getting my morning coffee and reading the paper…” Great! All a burglar (or the NSA) needs to know is […]

Targeted Advertising

Ever been interested in a certain product, and done some Google research about it? Then, for days afterwards, whenever you go to a website, you see ads for that very same thing? What a coincidence! Well, actually, it is not a coincidence. It is called Targeted Advertising. Whenever you browse to a certain site, the […]

How to Make Your Browser More Secure

Indulge me in a little test. Create a text file on your PC. Copy and paste this into it:

<html>

<body>

<br>My secret plans to become the next billionaire.

<br>My secret recipe for killer scones to sell to Starbucks.

<br>My password to all my websites.

[…]

A GREAT Book on Security

A while ago, there was something called the Trusted Computing initiative. Here is its marketing message. Sounds great, right? I think the truth is probably closer to these Trusted Computing FAQs. Just to make matters more confusing, there is also a Trustworthy Computing initiative. According to Wikipedia, “More recently, Microsoft has adopted the term Trustworthy […]

How to Opt Out of Junk Mail

Data Marketers have lots of data about you. Acxiom’s latest ploy is for them to show you what data they already have on you. I checked at https://aboutthedata.com/portal. It really wasn’t that interesting, and much of it was wrong. The Acxiom website allows you to correct the information that is wrong. You can do that, […]

How to Download Software Safely

There is no such thing as free. “Free” software, music, video, and toolbar downloads are some of the the most common culprits for malware infection.

If you want to run software on your computer, you have to trust the software vendor not to do anything stupid, malicious, or sneaky on your computer. Most software […]

Security Concerns with Quicken

Suppose you run Quicken. You enter your checkbook balance, and some checks that haven’t cleared the bank. Then, you enter the password for your online account at the bank, and download your checking account history and/or your credit card history.

Now that you have synchronized your computer with your bank, Intuit (the makers of Quicken) […]

Be Suspicious of Online Software Delivery

If you download software from the Internet, it is possible that the downloads have been tampered with by someone malicious. Very unlikely, but it is possible. Every once in a while, I hear a news report about some site being hacked, and the software on the site is now suspected of being tampered with.

Well, […]

How to Install an Internet Security Suite

You probably need an Internet Security Suite. Both Windows and Mac users need it. I don’t know of a good Internet Security Suites for Linux. But, if you’re running Linux, you are probably already fairly computer savvy. An Internet Security Suite usually has a number of components to protect you against different dangers from hackers:

[…]