The Malwarebytes Blog recently discussed “10 easy ways to prevent malware infection” — for your PC, Mac, or mobile device. Read the article for the complete text. Here’s the summary below. Protect vulnerabilities: Update your operating system, browsers, and plugins; Enable click-to-play plugins; Remove software you don’t use (especially legacy programs). Watch out for social… Continue reading Prevent malware infection — best practices review
Tag: Security
Trading away personal info — twilight of privacy?
Imagine you’re visiting a mall and occasionally someone stops you and asks for some personal information: Your favorite places to shop? Things you like to purchase? Brands you like? … You’re told that as a reward for providing that information you’ll get a gift certificate. What if that happens to you on the street, just… Continue reading Trading away personal info — twilight of privacy?
Apple’s updated privacy policy — plainly different than others’ policies?
As noted in previous posts, the privacy policies of major tech companies, especially those with products and services that we interact with on a daily basis using our mobile devices, are getting a lot of media attention. And rightfully so. What’s moot? What’s not? Just because “it can be collected” begs the question of whether… Continue reading Apple’s updated privacy policy — plainly different than others’ policies?
Security vs. convenience — who wins?
I’ve discussed this topic with many of my clients, especially those who complain about remembering or keeping track of passwords — the trade-off between security and convenience for consumer products and services. We recognize this trade-off everyday with different keys for physical locks and passwords for different digital services. Password managers can help with “one… Continue reading Security vs. convenience — who wins?
PC Security Tips — common tricks
PC World’s latest article “How to protect your PC against devious security traps” provides a useful summary of malicious attacks: Phishing Bogus email Fake warnings Out-of-date app exploits Zero-day attacks Port sniffing