Fake calls and emails from government agencies are the more obvious scams, but there are many more.
There are so many online scams and tricks out there. I can’t cover them all on my website and national radio shows. I make it my duty to inform you about the tricks that bad actors use to fool you.
A great podcast was the episode when I entered the mind of a hacker. Tap or click to listen to an episode of my podcast With Kim Komando Explains, an IBM Social Engineer, She uncovers secrets that hackers use to scare and mislead people.
I know you’ve seen a common trick: fake calls and emails pretending to be from government agencies. No one wants to deal with a problem with the IRS or Social Security. Tap or click for a new government scam,
Here are five more ways you’re at risk – along with easy solutions to be a little safer online.
1. You post for the whole world to see
I . read a study from pew research who blew me away Of those polled, 53 percent of Twitter users said their profiles were set to public. Pew scrutinized the profiles of everyone who submitted their account handles, and 89% were public.
Oh, is that so. Looks like we can all use Reminders to check if our profile is correct Personal.
Important Steps Amazon Buyers Should Take During the Holidays
An easy way to check what others see is to open a new browser window in private or incognito mode. Navigate to your profile, eg https://twitter.com/kimkomando, If your tweets are visible, your profile is public.
To lock your Twitter account from a computer:
- log in. on the left, click more , Settings and Privacy , Privacy & Security
- go for Viewers and Tagging >Check the box next to protect your tweets
Now only people who follow you can see your posts. It’s your job to clear that list and block anyone No want to follow you.
What’s on Facebook? Tap or click for an easy way to escape from creeps and espionage,
2. Your home network has been exposed
Weak Wi-Fi security put the lives of a British couple on hold in the middle of the pandemic. They could not work or support their children. according to bbc, someone has used their Wi-Fi connection to upload child abuse material to an online chat site. This led the police directly to their front door.
Don’t let this happen! Step 1: Create a unique password that is difficult to crack and store it in a safe place, like a password manager or notebook that you stash. Make sure your router also has a strong, secure and unique password.
After taking care of the password, you should take some other steps, Start with gathering a list of everything you’re using your network for. If you find something you don’t recognize, I’ll show you how to lock down anyone who makes your connection.
The Big Mistake You’re Making When Cleaning Your TV
Like what are you reading? Get tech news straight to your inbox and be up to date in five minutes or less. View a sample and sign up here TheCurrentNewsletter.com,
3. You are a serial reuser
I have told you time and again not to reuse your passwords made up of letters, numbers and symbols. Same goes for pin codes. If you’ve been using Same Four Digital to unlock your phone, open your PC, and make purchases with a debit card, you’re asking for trouble.
And don’t use your address, your phone number, your birthday or the birthdays of people close to you.
Maybe you’re now wondering whether you should completely ditch the code for a biometric method like Face ID or your fingerprint. Here’s a look at which method is the safest,
4. You shop with direct ads
Social media advertising can be a good way to discover new products that appeal to you. After all, they are targeted based on what you have browsed and purchased. But they are also a common way for criminals to cheat you with cash.
Creating an ad that leads to a shady site is easier than you think. You may not receive anything after placing an order, or what you receive may not be exactly what you were expecting.
It would be better if you go to your search bar and go to the brand’s website only. There, find the item in the ad. Sure, it requires a few extra steps, but it’s better to be safe than sorry. you should see the company bbb.org The name is new to you while you’re at it.
How to know if you are being stalked or you are just crazy
5. You Give Apps Unintentional Access
At Komando.com, we often write about apps you need to remove from your phone. Here’s our latest tip on what types of apps you should say goodbye to,
Sometimes these apps are just a waste of space. Others are spreading malware that can cause serious damage to your device and steal your money in the process.
Then there are all the apps in that gray area in the middle. They are not malicious, but they may be asking you to provide more information than you really need.
For example, a weather app needs access to your location in order to forecast your area. But does it require access to your camera? I say no.
Tap or click for my guide to controlling what permissions your apps actually have, It’s worth your time.
Whether you use Netflix, Hulu, Amazon Prime, Disney+ or Apple TV, chances are your favorite apps are tracking you wherever you go. In this episode, I’ll go over the secret risks you incur when cutting your umbilical cord.
Listen to podcasts here or wherever you find your podcast, Just search my last name, “komando”.
What digital lifestyle questions do you have? call kim k national radio show and Tap or click here to find it on your local radio station, You can hear or see the The Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcast.
Copyright 2022, Weststar Multimedia Entertainment. All rights reserved. By clicking on the shopping link, you are supporting my research. As an Amazon Associate, I earn a small commission from eligible purchases. I only recommend products that I trust.
The . Learn about all the latest technology on The Kim Komando Show, the biggest weekend radio talk show in the country. Kim calls and consults on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters, and more, visit her website Komando.com.