A Practical Guide to Identifying Phishing Emails
Follow along as we examine three real-world phishing emails and explain how you can tell that they’re fake.
Read moreFollow along as we examine three real-world phishing emails and explain how you can tell that they’re fake.
Read moreIn the wake of LastPass’ security incident in December 2022, clients have asked me how vulnerable their 1Password password vaults would be, if the vault were stolen. The short answer is that the vault would be very secure. For more details please check out 1Password’s recent blog post about how 1Password protects your data. Additionally, … Read more
Password management company LastPass suffered a breach in which encrypted customer passwords were stolen. We explain what happened, how LastPass users should react, and what lessons other organizations can learn.
Read moreDo you use Google Chrome on your Mac? Do you let Chrome save some of your web site passwords? Did you know that you can view a list of all saved passwords as well as the passwords themselves? Use these instructions to learn how to view web site login passwords saved by Chrome.
Read moreDo you use Firefox on your Mac? Do you let Firefox save some of your web site passwords? Did you know that you can view a list of all saved passwords as well as the passwords themselves? Use these instructions to learn how to view web site login passwords saved by Firefox.
Read moreDo you use Safari on your Mac? Do you let Safari save some of your web site passwords? Did you know that you can view a list of all saved passwords as well as the passwords themselves? Use these instructions to learn how to view web site login passwords saved by Safari in your Mac’s … Read more
Have you ever need to share your password with somebody else? Have you ever sent a password via email? QuickForget is a good way to share sensitive information such as a password.
Read moreDo you want to know if some of your passwords have been compromised? A good place to start is the Have I Been Pwned? web site. No, that’s not a typo. I meant to type pwned. It’s a derivative of owned. If you’re still scratching your head, then please read this definition of pwned.
Read moreI strongly recommend that you configure your Mac to require a password when it is awoken from sleep or screen saver. It’ll take a minute or two to setup this feature and it’ll slow down a thief if your Mac ever gets stolen.
Read moreDo you use Safari as your web browser? Do you ask it to save the passwords you use to login to various websites? If so, did you know that you can view a list of these passwords? This is a handy way to look-up or retrieve some of your passwords.
Read moreHave you received an email which starts off by listing one of your passwords and then goes on to indicate that a video recording of you watching an adult content video which will be sent to your friends unless you pay a few thousand dollars in bitcoin? Please don’t believe everything you read. Emails like … Read more
iOS 11, released in October, 2017, adds an Emergency SOS feature, which also gives you a way to disable your TouchID feature. Disabling TouchID could be desired in the event of a mugging or an arrest.
Read moreHave you forgotten or misplaced your Airport or Time Capsule passwords? If so, you should consider using the Soft Reset feature that Apple builds into Airports and Time Capsules. You could also review my previous Tech Tip about retrieving your Airport password from your Keychain which could save you from having to perform a Soft Reset. I should … Read more
I know you subscribe to my Tech Tips to get pearls of wisdom and nuggets of knowledge. Not this week. This Tech Tip is just for fun. Hope you enjoy it. I know we can all relate to this scenario. Computer: Please enter your new password. Person: cabbage
Read moreWould you like to improve the security of your online accounts such as your AppleID, Gmail, FaceBook, PayPal and Dropbox accounts? If so, you should consider turning on two-step authentication for these accounts. Two-step authentication is also called two-factor authentication. Typically, two-factor authentication requires you to enter your password as well as a code sent … Read more
Make your passwords longer and more complex and make a written list to track your passwords. Or, use a password manager or an encrypted disk image to store your passwords.
Read moreThe purpose of this article is to help you assess the strength and security of your password and to encourage you to start using more secure passwords. As a consequence of the fact that we all need to keep track of many passwords, many people use just one or two passwords over and over again. … Read more
Here’s an easy way to determine the default password for many routers. You might need to know your router’s default password if you forget or don’t have a record of your router’s current password or if you end up resetting the router to its factory defaults.
Read moreYou can use these instructions to retrieve any saved password from your keychain, such as the password to your wireless network. The keychain is a secure place to store passwords.
Read moreDid you know that you can remotely find and/or erase your iPhone? You can if you have a free AppleID account, have signed into iCloud and have enabled the Find My iPhone feature.
Read more