Tag Archive for: snoops

Google security check — 60 seconds to kick out snoops and hackers


I’ll never forget the caller on my national radio show asking me for guidance because her brother was scammed out of $450,000.

He trusted the wrong person, and he’s far from alone. People simply don’t realize they’re being taken for a ride until it’s too late.

Then clues pop up. Maybe you sent a bunch of gift card codes, or there are emails you didn’t write in your outbox. Or worse, you get a notice about a loan in your name.

It’s the reason to check your Google account’s security. It only takes a minute and will reveal who has access to your account. Fingers crossed, it’s just you.

60-second safety check

I’m going to show you how to find digital clues a hacker got into your account, but that’s not all. This tip also works for spotting snoops. Is a friend or family member poking around your Google or Gmail account? Let’s sniff them out.

People are also reading…

Go to google.com/devices. Sign in if you aren’t already.

Here, you’ll see a list of devices — the computers, smartphones and tablets you’re signed into or have been signed into within the last 28 days.

You can click each one to see which browser was used. That might be a tip-off someone else has logged in, say you see Chrome, but you only use Safari.

Don’t panic if you see the same device multiple times. Each session (or instance you logged in) is recorded.

You may also see devices that have been inactive for a long time, like an old phone or computer you don’t use anymore. It’s wise to sign these devices out remotely.

Click the one you want, then Sign out. This will remove access to your Google account from the device entirely.

You should also take that step for any devices you once used to access your account, like a friend’s tablet or a work computer.

Here’s the red flag

What happens if you see a computer, phone, tablet, or device you don’t recognize? That might be a…

Source…

Google security check: 60 seconds to kick out snoops and hackers


I’ll never forget the caller on my national radio show asking me for guidance because her brother was scammed out of $450,000. He trusted the wrong person, and he’s far from alone. People simply don’t realize they’re being taken for a ride until it’s too late.

Then clues pop up. Maybe you sent a bunch of gift card codes, or there are emails you didn’t write in your outbox. Or worse, you get a notice about a loan in your name. Pro-tip: That’s why you need to get your free credit report every year.

It’s also the reason to check your Google account’s security. It only takes a minute and will reveal who has access to your account. Fingers crossed, it’s just you.

EXPOSED: UNCOVER THE TRACKING SECRETS OF APPLE AND MICROSOFT WHILE YOU WORK ON YOUR MAC OR PC

Join 509,000 people who get my free tech newsletter.

60-second safety check

I’m going to show you how to find digital clues a hacker got into your account, but that’s not all. This tip also works for spotting snoops. Is a friend or family member poking around your Google or Gmail account? Let’s sniff them out.

  • Go to google.com/devices. Sign in if you aren’t already.
  • Here, you’ll see a list of devices — the computers, smartphones and tablets you’re signed into or have been signed into within the last 28 days.

You can click each one to see which browser was used. That might be a tip-off someone else has logged in, say you see Chrome, but you only use Safari. 

Google headquarters in Mountain View, California

Google headquarters in Mountain View, Calif.  (Marlena Sloss/Bloomberg via Getty Images, File)

Don’t panic if you see the same device multiple times. Each session (or instance you logged in) is recorded. 

You may also see devices that have been inactive for a long time, like an old phone or computer you don’t use anymore. It’s wise to sign these devices out remotely.

  • Click the one you want, then Sign out. This will remove access to your Google account from the device entirely.

You should also take that step for any devices you once used to access your account, like a friend’s tablet or a work computer.

I sent smart security tips via email almost every day. Get my free newsletter here.

WHAT HAPPENS TO YOUR PERSONAL INFO AFTER A DATA BREACH

Here’s…

Source…

how China snoops on the US


An alleged Chinese surveillance balloon over the United States last week sparked a diplomatic furore and renewed fears over how Beijing gathers intelligence on its largest strategic rival.

FBI Director Christopher Wray said in 2020 that Chinese spying poses “the greatest long-term threat to our nation’s information and intellectual property, and to our economic vitality”.

China’s foreign ministry said in a statement to AFP that it “resolutely opposed” spying operations and that American accusations are “based on false information and sinister political aims”.

The United States also has its own ways of spying on China, deploying surveillance and interception techniques as well as networks of informants.

Former US president Barack Obama said in 2015 that his Chinese counterpart Xi Jinping had promised not to conduct commercial cyber spying.

Subsequent statements by Washington have indicated the practice has continued.

Here are some of the ways Beijing has worked to spy on the United States in recent years:

– Cyber warfare –

 

The United States warned in a major annual intelligence assessment in 2022 that the Asian giant represents “the broadest, most active, and persistent cyber espionage threat” to the government and private sector.

According to researchers and Western intelligence officials, China has become adept at hacking rival nations’ computer systems to make off with industrial and trade secrets.

In 2021, the United States, NATO and other allies said China had employed “contract hackers” to exploit a breach in Microsoft email systems, giving state security agents access to emails, corporate data and other sensitive information.

Chinese cyber spies have also hacked the US energy department, utility companies, telecommunications firms and universities, according to US government statements and media reports.

– Tech fears –

 

Fears of the threat from Beijing have seeped into the technology sector, with concerns that state-linked firms would be obliged to share intel with the Chinese government.

In 2019, the US Department of Justice charged tech giant Huawei with conspiring to steal US trade secrets, evade sanctions on Iran, and other offences.

Washington has banned the firm from supplying US…

Source…

Lock down your phone from snoops and hackers


Your phone is full of secrets, whether you think about it that way or not. Would you want just anyone to see your private conversations, swipe through your photos, or open up your emails? Of course, not.

There are digital spies to worry about, too. Tap or click for a way to see which apps are accessing your camera or microphone.

In just a few minutes, you can set up your phone the secure way.

1. Do the 2 two-step

If you don’t have two-factor authentication enabled yet, get on it. This adds another layer of security to your logins by requiring more than just your password. These codes almost always come via text or email, though you can get 2FA two-factor authentication codes through an app instead. Tap or click for steps to set up Google Authenticator.

Here’s how to enable this security must-have on your phone:

Two-factor authentication for iPhone (Apple ID)

• Go to Settings > (your name) > Password & Security and tap Turn on Two-Factor Authentication.

• Tap Continue, then enter the phone number where you want to receive the verification codes.

• Tap Next and enter the code.

Two-factor authentication for Android (Google)

• Open your Google Account and select Security.

• Select 2-Step Verification (under Signing in to Google) and then Get started.

• Now pick a method for verification: Google prompts, security keys, Google Authenticator or similar apps, or a verification code sent to your phone via text or call.

2. Verification is necessary, but make it easier on yourself

Two-factor authentication is a good security measure, but some people don’t activate it because they don’t want to deal with the extra steps involved. Autofill options make it easier to use two-factor authentication when logging into a new device or account.

When you log into a new app or site with your two-factor authentication-enabled iPhone, you no longer have to open the Messages app to get the code. Instead, the code will appear on your keyboard and you can tap it to autofill the security field.

This feature is built into iOS 12 and later and there’s no need to enable it. Handy! Tap or click here for more iPhone security tips.

For Android, open Settings and search Autofill. Tap the service…

Source…