5 secrets only cybersecurity professionals and hackers know

Some security steps are common knowledge. I don’t have to remind you to install that latest update on your computer, do I?

Others are less obvious. Do you lock your computer every time you get up? Unless you live alone, you should. Here’s the easiest way to do it if you’re lazy.

On your phone, you’d probably never guess that leaving your Bluetooth connected 24/7 is a mistake. Here’s why — and what to do if you can’t live without your AirPods.

I’ve got your back with more secrets only tech pros know to keep you safe.

DO NOT USE TIKTOK? THE CHINA SOCIAL NETWORK MAY STILL CONTAIN YOUR DATA.

1. See if anyone is secretly receiving copies of your emails

I always get calls from my national radio show from people concerned that someone is watching everything they do.

One of the first steps I recommend: make sure your inbox is locked. Here are steps if you notice or suspect common logins.

Log in to your email and then go to your account or security settings.

You will find an option that allows you to view your recent login activity or login history. It will be labeled as “Recent Activity,” “Security,” or “Login History.”

Pro Tip: Using Gmail? Click the Details link next to Last Account Activity at the bottom of any Gmail page.

View the list of recent logins. See something that doesn’t belong to you or one of your devices? You may also see a strange location.

If you see an unfamiliar location or a device that doesn’t belong to you, act quickly. Change your password, make sure two-factor authentication is enabled, and log all devices out of your account.

Are you in the middle of a breakup or have you just divorced? Read this guide to untangling your digital life. It’s worth your time.

2. Make sure your printer isn’t hacked

Like your computer, your printer is a gold mine for hackers. Why? Printers often keep copies of the documents that have been printed. Any cybercriminal can get copies of sensitive information, such as your financial information.

Here are three signs that your printer has been hacked:

Your printer starts printing blank pages or some characters.

A person works on a computer during the 10th International Cybersecurity Forum in Lille on January 23, 2018. (Photo by PHILIPPE HUGUEN/AFP via Getty Images)

You see print jobs that you have not started.

Your printer’s settings have changed – and it wasn’t you.

What should you do?

Unplug the printer. Press and hold the Reset button, usually located on the back or bottom of the printer.

Press and hold the Reset button, plug the printer back in and turn it on. After about 20 seconds, the lights will flash to indicate it’s done.

Running out of ink halfway through printing is the worst. Use these secrets to save on ink costs.

3. There is a hidden location tracker on your iPhone

I recommend going through the location settings on your phone. That will go a long way in shutting down much of the GPS tracking. But you can’t stop there.

Why does your phone tell you how long it takes to get to the office or know your arrival time for the supermarket when you get in the car for groceries on a Saturday morning? That’s part of Significant Locations.

Apple says this feature exists so your phone can learn important places for you and provide personalized services like traffic routing and better photo reminders.

Here’s how to access it – and shut it down.

Open your iPhone’s institutionsand then tap Privacy and security.

PEOPLE HAVE A RIGHT TO BE INVOLVED AFTER LATEST TWITTER FILES RELEASE: KARA FREDERICK

Select Location Services.

Scroll down and tap System Services.

Scroll until you see important locations and tap on that.

If you don’t want your iPhone to track your whereabouts, slide the switch next to Significant Locations to the left to disable the setting.

Do you want to clear this list of important locations? Follow the steps here.

4. You can erase your phone if you lose it

The very idea of ​​your phone being in someone else’s hands is creepy. Imagine a stranger browsing your photos, videos, apps, conversations, and browser tabs.

So what if you lose your phone? You can take a step to protect your data, even if you never get that phone back.

To wipe your iPhone remotely:

Open iCloud.com/find and go to the Find iPhone function.

Select your lost phone and then select Erase the iPhone.

Person has an iPhone

Remotely erase your Android phone:

Go to android.com/find and sign in to your Google account. Select your lost phone and you will get information about its location.

Select when prompted Turn on lock and wipe.

Select Erase device to delete its data.

Check out my guide here for more methods to find, back up, or erase your phonee.

5. Apps are desperate for you to share the juicy details

Social media companies are scrambling to get their hands on your contacts’ birthdays, photos, full names, email addresses, and more. They tell you it’s a useful tool for finding your friends, but your friends’ information isn’t yours to give away. That’s their own to decide where to share.

Companies build so-called shadow profiles from your address book. They can learn a lot from those you know, even if they don’t use those platforms. Secret things.

How can you make a difference? Don’t let apps access your phone’s contacts. See which apps do have access and disable them. And always pay attention and stop sharing info without one Real benefit to you.

Even your phone number is mighty in the wrong hands. This is why I use a burner, not my real number when to give it.

Keep your technical knowledge going

My popular podcast is called “Kim Komando todayIt’s a solid 30 minutes of tech news, tips, and callers with tech questions like you from around the country. Look for it wherever you get your podcasts from. For your convenience, click the link below for a recent episode.

PODCAST CONTENT ON THE GO: Nude photos of cancer patients leaked, TikToker steals widow’s ashes and Florida wants government registration of bloggers

NEW YORK, NEW YORK - OCTOBER 18: Phones are seen in the recreation room during a tour of the Randall's Island Humanitarian Emergency Response and Relief Center on October 18, 2022 in New York City.  Construction on the shelters began after NYC Mayor Eric Adams, who declared a state of emergency over the continued arrival of migrants, announced their move to Randall's Island from Orchard Beach in the Bronx amid flood concerns.  The tent-like structures will provide temporary housing for 500 asylum seekers wheeled into the city by Republican governors from border states.

NEW YORK, NEW YORK – OCTOBER 18: Phones are seen in the recreation room during a tour of the Randall’s Island Humanitarian Emergency Response and Relief Center on October 18, 2022 in New York City. Construction on the shelters began after NYC Mayor Eric Adams, who declared a state of emergency over the continued arrival of migrants, announced their move to Randall’s Island from Orchard Beach in the Bronx amid flood concerns. The tent-like structures will provide temporary housing for 500 asylum seekers wheeled into the city by Republican governors from border states. ((Photo by Michael M. Santiago/Getty Images))

Moreover, you do not believe which jobs are on the verge of extinction due to AI. Teachers, Brace Yourself! Get the latest on the government’s TikTok ban, e-bikes exploding and the biggest tax fraud that is spreading like wildfire. Plus, I’ll spill the beans on the ultimate day to send your email newsletter for maximum impact!

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotifyor your favorite podcast player.

CLICK HERE TO GET THE FOX NEWS APP

Listen to the podcast here or wherever you get your podcasts from. Just search my last name, “Komando.”

Sound like a tech pro even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or download the podcast. And join more than 400,000 people who get her free daily 5 minute email newsletter.

Copyright 2023, WestStar Multimedia Entertainment. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *