Article by Fearless Web Team
Filed under: Miscellaneous | RSS 2.0 | No Comments |
The Trend Micro employees who were blogging on this Fearless Web blog have moved over to Trend Micro’s corporate blog called Simply Security.
Same great writers and same great content just in a different place. Check it out now at: blog.trendmicro.com
Could your Yahoo! account be up for grabs?
Yahoo! recently announced that it will make inactive Yahoo! accounts available for the public. Starting today July 15, anyone can grab Yahoo! IDs that have been unused for the past 12 months.
So what does this all mean?
Now is the time to revisit the past and clean house. You should check if you have any unused Yahoo! accounts. While you might be ready to let go of your high school era Yahoo! ID, it might still have important or sentimental emails that could become inaccessible after the deadline.
It’s also the time to check and update your information for your online accounts. Your inactive Yahoo! email addresses might still be your recovery contact for your online accounts. This can become a problem in instances of password recovery. Strangers might be able to rest and get into your accounts if they receive the recovery email that was meant for you.
You should also inform your contacts of your deactivated Yahoo! ID. They might message or email the new owner and inadvertently share sensitive information. At best, this honest mistake could end up as a funny anecdote you can tell at parties; at worst, your online identity could be stolen. On the flip side, you should be verifying Yahoo! IDs before communicating with them. Your Yahoo! contacts could very well be strangers.
Check out our e-guide How to Secure Your Multiple Online Accounts for tips to better secure your (active) online accounts. You can then use our e-guide Keeping Things Private Online to make sure all your data remains private.
Facebook has over 1 billion active users who log on at least once per month. Whether we like it or not, the world has gotten closer with the introduction of the Facebook Graph Search. Put simply, it allows you to use social engineering to create a detailed search within Facebook. The potential ramifications of this new search engine are literally mind-blowing.
It’s coming up to the end of the financial year here in Australia and everyone seems to be on the lookout for bargains and preparing to fill in their tax returns, especially online. But remember that cybercriminals are also on the lookout – hoping to trick unassuming web users into handing over their credit card and personal details.
All it takes is one little mistake, so let’s take a minute to look at the main online risks and some simple steps on how to protect yourself.
One of the troubles with this mobile computing world of ours is that having our data files by our sides at all times increases the risk of data loss and unwanted exposure. You’ve probably heard about the careless company executive that had his laptop PC stolen and then found out later that sensitive company data was contained on the system, including credit card numbers, financial account, information, company network passwords and so on.
I think many of us – not just this executive who’s probably looking for a new job right about now – keep sensitive files on our laptop PCs, particularly if we don’t use desktop systems anymore. I know I do.
Take Internet account passwords for example. Unless you use one password for everything – a really bad idea – or you have a great memory, you probably put those passwords in a spreadsheet or other kind of file for easy access and reference. Or maybe you are running off to your tax accountant with all sorts receipts that contain your bank account information and credit card numbers. In either case, I’ll show you how to use Trend Micro™ Titanium™ Maximum Security‘s Vault feature to keep the data you store on your computer safe and sound.
I worry about what the world will look like in five years time when my son reaches high school. I was leaving school and starting college when phones started to include cameras. Luckily for me, we didn’t have them at high school and the cameras on phones in those days were too poor to shoot pictures at night or inside.
I don’t know about you, but I’m one of those guys who likes the convenience and synergy of Comcast’s XFINITY Triple Play service, because it provides phone, Internet, and TV access all wrapped up in a single package. (If it were cheaper, I’d like it even better!)
Dealing with one company, rather than two or three (particularly when things go wrong), is one advantage. Paying a single bill is another. Cable Internet speeds are also great for Netflix and other smart TV apps, so that’s a third. And the Caller ID-TV combo, (where I can see who’s calling in the middle of my favorite TV show, because the name or phone number pops up on the screen) is definitely a fourth. If I can’t tell who’s calling, I ignore it. (Truth be told, I often ignore it even when I can! Please don’t tell my family or friends.)
In a similar way—and for a lot less money—I like the synergy of the triple play of Trend Micro’s Mobile Security, Privacy Scanner for Facebook, and Mobile Backup and Restore apps. I get protection against malware and viruses with the first app; protection for my privacy with the first and second; and protection for my data and devices with the first and third.
This message will self-destruct in five seconds. That’s the premise behind SnapChat and is hailed as the new Instagram. The app currently sends over 1,000 pictures every second and here’s how it works:
You take a picture and pick who you want to send it to. You then choose how long that picture will stay on their phone before it “self-destructs.” The app is alleged to even warn senders if recipients attempt to create a screen capture of self-destructing materials.
The first function of the app that comes to mind is that it could be a safe way to “sext.” Dig a little deeper and it’s not that difficult to think of other nefarious ways to use SnapChat. It could be used to distribute answers on a test. Or, you could use to help set up drug deals or to secretly communicate with your mistress. The list could go on forever, but I think you get the picture.
“Can you hear that?” my mother shouts arm’s length distance from the phone.
“What am I listening for?” I reply.
“A buzzing and whooshing sound, coming from my computer,” she yells again.
This is just an example of the tech support request calls I get regularly from my cute little mama. She only calls about once a month or less for her gadget questions, but I can’t say how many times she’s calling her wireless Internet provider.
According to a recent survey we conducted at Trend Micro to commemorate Mother’s Day, about a quarter of you are in the same boat as me, getting these calls about once a month (the survey dives into perceptions of moms’ technology and device knowledge). My heart goes out to the eight percent of you who said their tech-challenged moms contact them once a day (Mother’s Day Gift Idea: Premium Tech Support Package from Trend Micro and read Mike Miley’s blog). Yikes.
Any day can be Mother’s Day—especially when mom needs help with her computer! The phone will ring and her frustrated voice will be on the line with one or more complaints. Here’s a typical list:
“I can’t get my email.”
“I’m getting an error message when I try to print.”
“How do I create new folders in my email or on my desktop?”
“My browser is acting funny whenever I try to browse the web. Can you fix it?”
“Everything seems really slow. Can you speed up my computer?
“I think I might have a virus. I’m getting a weird popup message saying something about a firewall violation. What should I do?”
Rather than rush across town to fix these or other problems in the midst of my workday (or in the evening when I’m trying to relax), I’ve installed software called LogMeIn on her computer, so I can access and manage it remotely.