Data breaches and internet security are a big concern for many individuals, and with good reason. Large companies that have had their users’ information (such as email addresses, passwords and password hints) compromised include Adobe and Snapchat.
Luckily, there is a website, Have I Been Pwned?, which searches across various domains and known breaches to see if a particular email address or username has been compromised. The site’s name comes from the gaming term “Pwned”, which is a twist on the word “owned” (defeated). The exact origin of this term is disputed.
The website also can inform you if your information has been “pasted,” which the site describes as:
A “paste” is information that has been “pasted” to a publicly facing website designed to share content such as Pastebin. These services are favored by hackers due to the ease of anonymously sharing information and they’re frequently the first place a breach appears.
This website is a valuable tool to find out if your personal information has been compromised. Check out this post for suggestions on strengthening the security of your accounts.
It’s happened to most people: you’re browsing the internet, and suddenly a window pops up informing you that you need to update your software or maybe that you have a virus or perhaps one saying you’ve won a free iPad. Even to advanced computer users, some of these popup advertisements can look legitimate. How can the average computer user avoid bothersome popups?
Luckily, makeuseof has written a helpful article with some helpful tips on how to avoid malicious popups and how to tell if they are legitimate.
The author advises computer users to always check the URL in the address bar. Most software websites have URLs that are pretty straightforward. For example, if you are attempting to download Adobe Reader, the URL will be www.adobe.com. Try to avoid websites with super long web addresses. If you want to view the URL for a website, move your mouse over the link before clicking on it and the full URL will be displayed in the status bar near the bottom of the screen. Google will display the full URL of the search result in green below the link name. In the example below, the mouse cursor is on the link for the East Greenbush Library’s Wikipedia entry. Note the highlighted area near the bottom of the screen that displays the full link.
Try to avoid pages that are full of text and advertisements. If you are still unsure if a download link is safe, check out a site like File Hippo, which is an aggregate site that contains mirror downloads of many popular programs like Adobe Reader and Java. On a related note, try to avoid the Google-ad results, which are usually the first few results that appear in a Google search and are marked with a little yellow ad banner.
If you are mindful about looking at a link before you click on it, you may notice a common trend of link shortening, for example, tiny.url or bit.ly links. How are you supposed to know if those links are legit? There is a great tool called Unshorten.It. You can copy and paste the shortened link and the site will display the full link as well as a small screenshot of the site. There are also various other sites that preform a similar function.
Some other helpful tips mentioned in the article:
Install a good anti-virus program. Many have an internet security feature that will highlight suspicious links and block popups.
Avoid searching for things like free video games and free screensavers. These are a common source of malware and shady links.
There are various browser-specific tips, such as changing your homepage to one you recognize and blocking popups directly with your browser (these options are found in the browser settings).
If you are a more advanced computer user, you may want to use a browser extension such as AdBlock Plus that will block ads from appearing on a webpage.
The article gives you instructions on what do if you accidentally click on a popup or ad and seem to be stuck.
If you are still getting unwanted popups after trying the tips discussed in the article, you may have malware installed on your computer. If this happens, there are steps you can take to remove it. Check out makeuseof’s malware removal guide for more information.
Staying current with IT news, trends, and tips is a fundamental part of my job in the library. While I get this information from a variety of resources, there is one website that keeps surprising me with helpful information on a variety of subjects of interest to me and the patrons I assist. I’d like to take this opportunity to give a shout out to MakeUseOf, a free online resource with timely articles, reviews, and help guides for all things tech. What really makes this resource shine is its ability to speak to both new and veteran users at the same time without confusing or boring either!
The home page at MakeUseOf displays headlines and teaser text for their most recent articles. I find this layout somewhat chaotic, so I prefer to sort the articles by category before browsing. Selecting “Topics” in the header menu will display the articles by category. The “Answers” section leads to a user forum where registered members can ask and answer questions from the MakeUseOf community. Check out the “Top List” section for “best of” lists for a variety of software and services on multiple platforms. For in-depth technology guides, have a look at their “E-books” area.
As a registered user of MakeUseOf, you can earn points for sharing their content on social media, as well as participating in the forum, polls, and other activities. Those points can be redeemed for rewards, such as entries in drawings for free hardware and software. My favorite benefit of membership has been receiving the newsletter. Each email has a few headlines with teaser text that can be easily scanned, with more information just a click away. I have happened upon lots of very useful information in these newsletters that I didn’t even know I needed! You can opt-in to the newsletter by selecting the social media icons at the top of any MakeUseOf page, and then selecting the blue “Email” button.
What do you think of MakeUseOf? If you have another tech info source you love, please share it in the comments.
We all know tablets, smartphones, and laptops are attractive targets for thieves. Not only is the equipment inherently valuable, but think of all the data, pictures, and account information you have saved on your phone! The time to protect yourself is before your device is stolen.
You may or may not have heard about DNSChanger malware (FBI information site or ABC news story), but if your computer is infected it will be obvious after this Sunday. This malicious software, authored by an international cyber ring, was created to reroute infected computers to fraudulent websites. Enter the FBI and Operation Ghost Click. Not only did they take down the criminals responsible, they also put clean servers in place to maintain internet access for affected users once the malicious servers were taken down.
After this Sunday, the FBI plans to shut down the servers that have been keeping infected machines online. Any machines with DNSChanger malware still active will lose internet access. As of July 4, the affected machines still numbered about 46,000 in the US. This particular malware did not discriminate between PC or Apple. Tablets and routers were also affected.
To find out if your computer is infected, visit this website: http://www.dns-ok.us on that machine. If you see a green background, you are all set. If you see a red background, your computer is infected. If you get the dreaded red background, there is good news. The DNSChanger Working Group has put together a page containing tools and a step-by-step guide to fixing your computer. Unfortunately, the fix can get complicated or take time to complete because this is an exceptionally nasty piece of malware that affects the machine’s boot sector.
I urge you to check your computer(s) ASAP, before the Sunday deadline, in case you need to implement the fix before you lose internet access. If you do lose internet access on Monday, contact your internet service provider for further instructions.