Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, February 2, 2025

Microsoft Edge Introduces Scareware Blocker: Your New Best Friend Against Online Scams

Microsoft Edge Introduces Scareware Blocker: Your New Best Friend Against Online Scams

Microsoft Edge's new Scareware Blocker feature uses AI to detect and block tech support scams, providing an extra layer of security for users.

By Rodger Mansfield, Technology Editor
February 2, 2025


Microsoft Edge
Have you ever encountered a pop-up claiming your computer is infected with a virus and urging you to call a fake tech support number? 

These "scareware" scams are not only annoying but also dangerous. But what if there was a way to block them automatically? 

Here's a Cool Tip:  Set the New Scareware Blocker in Microsoft Edge.

Microsoft Edge has introduced a new feature called Scareware Blocker, designed to protect users from tech support scams. 

Using a local AI model, this feature analyzes web pages in real-time to detect signs of scams. 

Sunday, August 18, 2024

How to Set Stolen Device Protection on Your iPhone

How to Set Stolen Device Protection on Your iPhone

Discover the ins and outs of iPhone’s Stolen Device Protection feature, ensuring your personal data remains secure even if your device falls into the wrong hands.

By Rodger Mansfield, Technology Editor
August 18, 2024


iPhone Settings
Have you ever considered what happens to your personal data when your iPhone is stolen? 

Could a thief access your photos, messages, or even financial information?

Here's a Cool Tip:  Use iPhone's Stolen Device Protection.

Tuesday, August 6, 2024

FBI Warns: Don't Fall for This Debit Card Scam

FBI Warns: Don't Fall for This Debit Card Scam

The FBI has issued a public service announcement warning about a fraudulent scheme where impersonators trick bank customers into surrendering their debit cards.  

By Rodger Mansfield, Technology Editor
August 6, 2024


FBI Logo
Have you received an unexpected call from your bank about suspicious activity on your account?

Did they ask you to cut up your debit card and provide your PIN?

Here's a Cool Tip.  If it sounds too good to be true, it probably is.

In a recent public service announcement, the FBI warned about a fraudulent scheme where impersonators trick bank customers into surrendering their debit cards.

Wednesday, June 12, 2024

Lost Your Windows Device? Here’s How to Find and Lock It Remotely

Lost Your Windows Device? Here’s How to Find and Lock It Remotely

Learn how to enable “Find My Device” on both Windows 10 and Windows 11, locate your lost device, and secure it remotely. Whether it’s a laptop, tablet, or desktop, these steps will help you regain control and protect your data.

By Rodger Mansfield, Technology Editor
June 12, 2024


Windows 11
Imagine this scenario: You’re rushing through a crowded airport, and suddenly, panic sets in. 

Your laptop—the repository of your work, memories, and cat videos—is nowhere to be found. 

Here's a Cool Tip.  Enable Find My Device in Windows 10 and Windows 11.

Find My Device is a built-in feature in Windows 10/11 that allows you to track your PC’s location. 

Think of it as Windows’ counterpart to Apple’s Find My feature. 

Once enabled, you can use your Microsoft account to locate your Windows PC on a map. 

Not only that, but you can also lock the PC remotely, preventing unauthorized access to your data. 

Additionally, you have the option to display a message on the lost device, making it easier for someone who finds it to return it to you




Here's how to do it.

Saturday, June 8, 2024

Oh No! Has My Email Been Hacked? Find Out Now with This Free Tool

Oh No! Has My Email Been Hacked? Find Out Now with This Free Tool

Have I Been Pwned is a free service that helps you discover if your email  has been compromised in a data breach. Learn how to use this powerful tool to protect your online identity.

By Rodger Mansfield, Technology Editor
June 8, 2024


Have I Been Pwned?
Do you ever wake up in a cold sweat, wondering if your personal information has been leaked in one of the many data breaches plaguing the internet?  

The fear is real, and the consequences can be severe. 

Here's a Cool Tip.  Use Have I Been Pwned to check.

Have I Been Pwned (HIBP) is a free and easy-to-use tool that can give you answers – and peace of mind.


Have I Been Pwned?

fig. 1 - Have I Been Pwned?

Saturday, May 11, 2024

Urgent Chrome Security Alert: Update NOW to Patch Zero-Day Exploit (CVE-2024-4671)

Urgent Chrome Security Alert: Update NOW to Patch Zero-Day Exploit (CVE-2024-4671)

Google has released a critical security update for Chrome to address a zero-day vulnerability actively exploited by hackers. 

Update your browser to version 124.0.6367.201/.202 IMMEDIATELY.

By Rodger Mansfield, Technology Editor
May 11, 2024


Have you updated your Google Chrome browser recently? 

If not, you may be at risk. Google has issued an urgent security patch to address a zero-day vulnerability actively exploited by cybercriminals. 

Here's a Cool Tip.  Update Chrome Immediately!

What is a Zero-Day Exploit?

A zero-day exploit is a software vulnerability that hackers discover and exploit before the software developer can release a patch. 

This makes them incredibly dangerous because there's no defense against them until a fix is available.

The CVE-2024-4671 Vulnerability

The vulnerability in question, tracked as CVE-2024-4671, exists in Chrome's Visuals component. 

It's a "use-after-free" issue that can potentially allow attackers to execute malicious code on your device remotely. 

This could lead to data theft, malware installation, or other harmful actions.

Why You Need to Update Immediately

This zero-day exploit is already being used in the wild, meaning your computer is at risk if you haven't updated Chrome. 

While Google hasn't released details about the attacks, the urgency of the update indicates the threat is serious.

Here's how to do it.
  1. Launch your Google Chrome browser.
  2. In the top right corner, click the three vertical dots.
  3. Hover over "Help" and click "About Google Chrome."
  4. Chrome will automatically check for updates and install them if available.
  5. After the update is installed, click "Relaunch" to restart Chrome.

Update Chrome Immediately
fig. 1 - Update Chrome Immediately


The Benefits of Updating Go Beyond Security
  • Enhanced Security: Protect yourself from this specific exploit and other potential threats.
  • Improved Performance: Updates often include bug fixes and optimizations for a smoother experience.
  • New Features: Some updates bring exciting new functionalities to your browser.

A similar zero-day exploit was discovered in Chrome earlier this year (CVE-2024-0519). 

Hackers used it to gain unauthorized access to sensitive information and crash unpatched browsers. 

Conclusion

Updating your Google Chrome browser is a simple yet crucial step to protect yourself from cyber threats. 

Don't delay—update now to version 124.0.6367.201/.202 and safeguard your digital life. 

Remember, cybersecurity is an ongoing battle, and staying updated is your best defense.


READ MORE

Please LIKE and SHARE OneCoolTip.com!
Never miss a Cool Tip: OneCoolTip Newsletter.

Do you have a Cool Tip or question? Email us at onecooltip.com@gmail.com


Rodger Mansfield, a seasoned tech expert, is the mastermind behind OneCoolTip.com, where he serves as both writer and editor. With a keen eye for simplifying complex tech, Rodger delivers practical advice that empowers readers to navigate the digital world with confidence. Dive into OneCoolTip.com for a treasure trove of savvy tips and tricks that keep you one step ahead in tech.


OneCoolTip.com
Cool Tech Tips for a Cooler Life!


#Chrome @Chrome #Google @Google #ChromeUpdate #ZeroDayExploit #Cybersecurity #OnlineSafety #ProtectYourData #TechTips #OneCoolTip @OneCoolTip 



Copyright © 2024 | www.OneCoolTip.com | All Rights Reserved

Tuesday, April 2, 2024

AT&T Data Breach: Millions of Customers' Information Exposed on Dark Web

AT&T confirms a data breach potentially exposing the personal information of over 70 million current and former customers.  The company is investigating the source and offering affected customers credit monitoring.

By Rodger Mansfield, Technology Editor
April 2, 2024


AT&T
Is your personal information safe with AT&T?  

That's the question swirling in the minds of millions of customers after the telecommunications giant confirmed a significant data breach. 

A dataset containing the information of approximately 73 million customers surfaced on the dark web. 

Should you be worried, and what can you do to protect yourself?

Here's a Cool Tip.   Be informed and protect your privacy.

This significant breach raises serious concerns about the security of customer data held by AT&T.  

Affected individuals should remain vigilant in the coming weeks and months to protect themselves from potential identity theft and financial fraud.

AT&T has launched a full-scale investigation into the data breach incident. 

While they've confirmed some AT&T-specific data was present, the full scope of the exposed information and its original source remain under investigation.  

Preliminary findings suggest the information dates back to 2019 or earlier.

What information might be exposed?

While the investigation is ongoing, the types of data potentially exposed could include:
  • Social Security Numbers
  • Contact Details (addresses, phone numbers)
  • Account Passcodes
  • Other personal identifiers

Protect Your Personal Data


What AT&T is doing

AT&T is proactively notifying affected customers. 

The company states they will offer credit monitoring services at their expense where applicable.

How to Protect Yourself
  • Change Passwords: Change your AT&T account passwords immediately, and update passwords on any other accounts where you may have reused them.
  • Monitor Your Accounts: Keep a close eye on your credit reports and financial accounts for any signs of unusual activity.
  • Consider Credit Monitoring: Even if not offered by AT&T, consider subscribing to a credit monitoring service for extra protection.
  • Be Wary of Scams: Fraudsters may try to capitalize on the breach, so be cautious of phishing emails or suspicious calls.
The Takeaway

Data breaches are an unfortunate reality in today's digital landscape. 

This AT&T incident underscores the importance of taking proactive measures to safeguard your personal information. 

Regularly updating passwords, monitoring your accounts, and utilizing credit monitoring services can significantly reduce your risk of identity theft and fraud.


READ MORE


Please LIKE and SHARE OneCoolTip.com!
Visit the OneCoolTip YouTube Channelhttps://www.youtube.com/@onecooltip

Do you have a Cool Tip or question? Email us at
onecooltip.com@gmail.com


Rodger Mansfield, a seasoned tech expert, is the mastermind behind OneCoolTip.com, where he serves as both writer and editor. With a keen eye for simplifying complex tech, Rodger delivers practical advice that empowers readers to navigate the digital world with confidence. Dive into OneCoolTip.com for a treasure trove of savvy tips and tricks that keep you one step ahead in tech.



OneCoolTip.com
Cool Tech Tips for a Cooler Life!

Source: AT&T

#ATT #databreach #darkweb #cybersecurity #identitytheft #TechTips #OneCoolTip @OneCoolTip 

(c) 2024 www.OneCoolTip.com

Sunday, July 30, 2017

FBI Warns Parents About Internet Connected Toys

FBI logo
Beware of the toys.  They may be watching, listening and sharing.

That's the warning to parents from the US Federal Bureau of Investigation (FBI) about internet connected toys.

The FBI's Internet Crime Complaint Center (IC3) recently issued a statement to parents "to consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments."

The concern is that the toys could pose identity theft and exploitation threats due to microphones, cameras and geo-location data that is improperly used, shared or stored.  

The full notice is worth reading but here are a few points:

  • Only connect and use toys with trusted and secure Wi-Fin internet access.
  • Closely monitor children’s activity with the toys (such as conversations and voice recordings) through the toy’s partner parent application, if such features are available
  • Ensure the toy is turned off, particularly those with microphones and cameras, when not in use
  • Use strong and unique login passwords when creating user accounts (e.g., lower and upper case letters, numbers, and special characters)
  • Carefully read disclosures and privacy policies


Should we be concerned?  Maybe to Probably.  It can happen.

Nearly two years, we warned readers about the problem caused by one company.  

In that case, Vtech a major tech toy company, poorly stored sensitive children data on the web.

So the best thing we can do is to be cautious and knowledgeable.

Source: FBI


Tuesday, June 13, 2017

Protect Your Online Accounts with Two Factor Authentication

Gaining access to our online accounts with just a few clicks brings both benefits and drawbacks.

Two Factor Authentication
Sure, you can log into your Google, Facebook or Yahoo accounts from wherever you are. 

But so can someone else.

That's why always using secure passwords is a must.

But what else can you do to protect your accounts from nefarious hackers and data breaches?

Two Factor Authentication is the answer.

What?

Two Factor authentication provides an additional layer of protection when you log into your online accounts.

When you login with two factor authentication, you'll receive a special code sent by text to your mobile phone that also must be entered to provide access to your account.

That prevents someone who doesn't know both your password AND this special one-time code from gaining access to your account.

Many of your most popular sites such as Google, Facebook, YAHOO, Twitter and LinkedIn all provide this valuable security feature.

Here's how to enable two factor authentication for Google, Facebook and YAHOO:

Google
  • Click HERE to start the Google 2-Step Verification set-up process for your Google account.
Facebook
To start the two factor authentication for your Facebook account:
  • Go to your Security and Login Settings by clicking  in the top-right corner of Facebook and clicking Settings > Security and Login.
  • Scroll down to Use two-factor authentication and click Edit
  • Choose the authentication method you want to add and follow the on-screen instructions
  • Click Enable once you've selected and turned on an authentication method


YAHOO

To enable two factor authentication for your YAHOO account:
  • Sign in to your Yahoo Account info page.
  • Click Account Security.
  • Next to Two-step verification, click the On/Off icon click the on-Off icon in the two-step verification process. .
  • Enter your mobile number.
  • Click Send SMS to receive a text message with a code or Call me to receive a phone call.
  • Enter the verification code | click Verify.
  • The next window refers to the use of apps like iOS Mail or Outlook. Click Create app password to reconnect your apps. See the section below for more info.
  • Want to turn it off? Simply click the On/Off icon Use the on-off button. under Two-step verification.
  • Using two-step verification with apps
  • Some apps (like iOS Mail, Android Mail, Outlook, and Yahoo messenger for PC) require a specific password to connect that app with Yahoo. If you enable two-step verification, you'll need to create a third-party app password to use in apps like these.



#twofactor #authentication #Google #YAHOO #facebook #twitter #LinkedIn #security #password #hacker 

Saturday, April 16, 2016

Remove Apple QuickTime To Prevent Hacker Attack

United States Computer Emergency Readiness Team
US-CERT, the United States Computer Emergency Readiness Team has issued a warning this week for Windows PC users to remove Apple's QuickTime software from their computers.

Apple has announced that it is ending support for the software.  While the software will continue to work, it is vulnerable to malicious exploitation by hackers.

Apple has detailed instructions HERE on how to remove QuickTime.

QuickTime was Apple's proprietary multimedia software and they aggressively promoted its use for years.  Often, it was a required download with other Apple software such as iTunes software.

So you may have it installed and not even know it.

It's a quick thing to do on my Windows machines.

Uninstall at your first opportunity.

Your PC will thank you.

READ MORE

OneCoolTip.com
Cool Tech Tips for a Cooler Life!


#Apple #QuickTime #hacker #security #Windows #Microsoft


Edit: added additional information concerning QuickTime.

Monday, November 30, 2015

What to Do If You Are Affected by the Vtech Hack Attack

Vtech, a worldwide provider of electronic products, has been hacked.

Specifically, the Learning Lodge app store used for the interactive toys made by Vtech was attacked.


Millions of users are affected.  Emails, Passwords and other account information was stolen.

The Learning Lodge site is currently offline.


Vtech was quick to point out that credit card information was not involved.

But here's the real problem.  

User's emails, passwords and -- most importantly -- the questions and answers to security questions for password retrieval were stolen.

That means if users used the same email, passwords and security answers on OTHER websites, their credit card and financial information is possibly as risk. 

So what can you do?

Be sure to change the passwords and security question answers of OTHER sites that shared the Vtech password and security answers.

And going forward, do not use the same passwords and security question answers on other sites.

That's hard to do but your online identity is worth protecting.

Affected customers with questions can contact Vtech at the following emails:


Saturday, November 28, 2015

Dell's Terrible Horrible No Good Security Flaws

One Cool Tip - www.onecooltip.com
Dell Inc. has a major technical and PR crisis on its hands.  

Many Dell PCs have two applications installed that can be used by hackers to compromise the security of the PC.  

The two programs were used by Dell to assist in technical support of the PC.

The good news is that Dell has a solution for the problem.  Dell is  automatically pushing the fix out to the PCs using the "Dell Update" program that launches at startup.  You can check that you are up-to-date by clicking the Dell Update icon in the task bar near the clock 
One Cool Tip - http://www.onecooltip.com


That's the easiest fix for the issue.  If your Dell Update hasn't been updated, right mouse-click on the Dell Update application icon and select "Check for Updates" while you are online.

If you are more adventurous, you can also download the patch directly from Dell or even use the manual instructions for removing the affected security certificates from your PC.  More information is available from Dell's support page:  http://www.dell.com/support/article/us/en/19/SLN300321

You can learn more about the issue from these news sites:


READ MORE

OneCoolTip.com
Cool Tech Tips for a Cooler Life!


#Dell #Computer #PC #Certificate #eDellRoot #DSDTestProvider

Thursday, June 4, 2015

Check Out Google's New "My Account"

Google Logo
Google, long a target for its omnipresence role in people's digital lives, has just released a new tool to allow you to better control your Google life.

Or at least the information you share with Google.

The new tool, My Account, is available at : http://myaccount.google.com/

The new My Account tool provides access to your Google settings and other tools to safeguard your data and help protect your privacy.

For example, you can manage the settings and the information for popular Google services such as Search, Maps, and YouTube.

As with anything in life, it's a matter of making choices,  If you want Google to provide relevant information from its maps or Google Now service, Google needs to know your location history.  That's the key data behind providing the service.

Some people want the service while others may cringe at the thought of so much information in the hands of a large technology provider.

But that's the value of the new My Account tool.

You can make better decisions about how much information you want to share.

READ MORE

One Cool Tip.com
Daily Tips for a Cooler Life!

Tuesday, May 17, 2011

Don't Get LinkedJacked on Facebook

Are you on Facebook?  If you are, you're in good company.

Facebook says that over 500 million users world-wide are connected through its service and over 70% of the users are outside the United States.

With an online population like that, trouble is bound to happen.

While specific threats shift over time, the most recent security issue on Facebook is "Linkjacking" also known as "clickjacking".  That's when a user clicks a link posted to his or her wall by a friend, or adds javascript code to his or her browser window based on a friend's link that causes actions unknown to the user.  Like posting the same link to all of his or her friends' Facebook walls.  And so it continues, on and on and on.

So, what can you do?  When online, always play it safe.  If it's too good to be true, don't click on a link.  Even if its for a FREE iPad, or a spicy hidden video of Britney Spears. Yuk.

Facebook offers some specific advice on the subject as well:
Clickjacking
Certain malicious websites contain code that can make your browser take action without your knowledge or consent. Clicking on a link on one of these websites might cause the website to be posted to your Facebook profile, for example. Don't click on strange links, even if they're from friends, and notify the person if you see something suspicious.
It's a jungle out there in the online world.  Be smart and practice Safe Computing!

For more information about Facebook Security, visit their Security page at http://www.facebook.com/security


One Cool Tip.com
Daily Tips for a Cooler Life!