Dropbox makes storing and syncing files a breeze from your Android device. However, easy access to all of your private information is not such a good thing when a nosey person is looking through your device, or worse, you lose your device out in the wild. Instead of worrying about your precious files, why not enable one or two of the security features built-in to the Dropbox app? Here's how to get started:
Step 1: Open the Dropbox app on your Android device. If you're new to Dropbox, you might have a small tutorial you can … Read more
Using the Web site, you can send-self destructing messages to friends, colleagues, or anyone else you may be sending personal information to. The messages are only accessible through a unique URL, and as soon as the URL is viewed once, it is no longer valid.
Using a service like this may seem a bit gimmicky at first, and it is to an extent, but it can come in extremely handy when you want to send personal information and don't like the thought of that information sitting in some e-mail account … Read more
Setting a lock code on your smartphone is highly recommended to protect your personal information, but sometimes a lock code can be a bit inconvenient.
What if you could do away with the device lock code, instead locking only the apps you want to keep private? An Android app named App Lock let's you do just that. That's not to say you can't use App Lock in addition to the lock code on your device, adding an extra level of security to your information.
Hello, Facebook friends, I am male, straight, often ridiculously good-looking, and this is a real message: she's not that into you.
And by she, I mean one of those hot girls on Facebook who always seems too desperate and overzealous in trying to connect to you and everyone on your friend list.
Apparently, of some 850 million active Facebook users, a lot are fake profiles created to spread spam and viruses. These are often categorized as spammers or attackers. Security firm Barracuda Networks released today the findings from its most recent study that helps distinguish attackers from real users. … Read more
Hello, world! Today it's your Backup Day. World Backup Day is a new idea promoted by a small team of Redditors, and it's a good idea. You can never be too careful when it comes to backing up.
By the way, this is about your data, and not calling your buddies over for help in a hostile situation, which is not really my area of expertise. So let's talk backups!
Basically it means putting your data in multiple places so that if something happens to one place (let's say you forget your laptop on the top of your car and subsequently back over it), that important PowerPoint presentation you've been working on isn't lost.
Backing up is much easier than you might think. For example, if you've been working on an important essay, you can just e-mail it once in a while to your mom or to yourself. Just make sure you use an online free e-mail service, such as Gmail, Yahoo Mail, Hotmail, or all of them. This goes for photos as well. If you remember to e-mail them to your mom when you have new ones (and she'll probably appreciate that very much), chances are she'll save them for you on her computer, and even if not, they are still in the Sent Items folder of your online e-mail account in case you have lost the originals.
Obviously, e-mailing can only handle a relatively small amount of data and you'll have to remember to do that manually. If you have many files that need backing up, you'll want something more robust. This is when a backup plan is necessary.
Online backup Similar to e-mailing, an online backup plan provides you with a certain amount of storage space that you can access over the Internet, aka "the cloud." And no, your data is not flying in the sky, it's stored and managed on one or multiple servers located in different parts of the world. There are many online backup services, such as Amazon S3, McAfee, Mozy, or even Comcast. … Read more
Note that the researcher only reported StarLogger on two models, a Samsung R525 and a Samsung R540--and that Samsung subsequently said that he was mistaken. CNET examined another new Samsung laptop, the Samsung Series 9, and did not find a keylogger installed.
Because it's a keylogger, most often used for spying on employees and children, StarLogger cannot be accessed from your Start menu. (Or at least, it shouldn't be accessible there. If it is, whoever installed it did a poor job.)
The easiest way to find StarLogger is to look for its Registry key, which is used to load it when Windows is started. To see if this has occurred, open a command prompt and type "Run Regedit". Then go to the Menu bar, select Edit and then Find. You want to search for "winsl", without the quotes. If it's installed, you should see a Registry key that looks like this:
You can also look for the following files on your hard drive, although keyloggers are designed to hide themselves. Open Windows Explorer, and then hit the Alt key to bring up the Menu bar. Go to Tools, Folder Options, and View. Under Advanced Settings, you'll see an option for Hidden Files and Folders. Make sure that Show is checked.
If you have StarLogger, its files will be located in your Windows root directory, in a subdirectory labeled "SL". A list of files you can expect to see is below: … Read more
Before you tweet a photo of your delicious, homemade dish, check your settings--your phone might be embedding coordinates in your photos, leaving your location open to prying eyes.
Using the built-in GPS, phone camera applications can embed the latitude and longitude of a location in photos. Coordinates aren't shown in your photo library, but if you post a geotagged pic online, someone with an evil motive can easily extract the photo's EXIF data and find out where you live, eat, or hang out.
Creepy, right? This is a big security risk, especially for parents who post photos of … Read more
Places like Starbucks, neighborhood cafes, Barnes&Noble, and universities are all jumping on the "free Wi-Fi" bandwagon--hey, it's trendy. As a result, more of us are connecting to these networks without realizing the security risks.
But did you read the fine print? Wi-Fi hot spots are unsecured networks that hackers like to take advantage of. Everything--including your data, account information and passwords, Google searches, and finances--can become available to the hacker who wants it badly enough.
So before you pay your bills or write your genius business plan at the local cafe, get to know these … Read more