KIM KOMANDO

Here are 5 free downloads to make your Mac, PC more secure

Jul 7, 2020, 4:05 AM

(Pexels Photo)...

(Pexels Photo)

(Pexels Photo)

The FBI has seen a significant spike in cybercrime reports since the onset of the COVID-19 pandemic. Hackers, scammers, and snoops are having a field day. Be sure to check for any updates to your gear.

A bug has been found in 79 different popular router models that lets hackers remotely take over your devices.

Phones can be targets, too.

Although you’re frustrated over recent national events, it’s no time to let your guard down. Here a few ways to safeguard your digital life.

1. Use the internet anonymously

Are you tired of advertisers, snoops, and Big Tech tracking your every move online? One of the most popular inconspicuous tools available is The Onion Router, or TOR for short. Initially developed in the mid-1990s by the U.S. Navy to protect U.S. online communications, it is now a free global network for public use.

By rerouting your internet traffic through TOR, you can make it difficult for would-be snoops to trace your location and online activity back to you. From privacy advocates to journalists to internet denizens who are concerned about surveillance and monitoring, TOR is the go-to tool for web anonymity.

However, setting up your computer to exclusively route its traffic through TOR can be a challenge. Thankfully, there’s an easy-to-use web browser that will automatically route all its traffic through TOR even without advanced computer and networking knowledge.

2. Don’t let malware take over your system

Antimalware programs are essential for scanning and removing harmful files from your computer. Microsoft’s Windows Defender comes with your PC. It scans your computer for malware, quarantines malicious files and removes them with just a few clicks.

Make sure you have the latest version.

Although Apple does not offer built-in malware protection for Macs, you still need it. In about 30 seconds, Malwarebytes for Mac identifies and removes malicious files. There is a pay version, but the free option is sufficient for most people.

3. Let IBM control your DNS

The internet’s Domain Name System (DNS) directs you to specific websites when you enter a domain name in your browser. It’s why you can type a site’s name (for example, Archive.org) rather than the site’s cumbersome IP address (207.241.224.2). Your internet service provider automatically assigns your DNS settings, but hackers can hijack them to redirect traffic to malicious websites.

Instead, use Quad9 maintained by IBM and The Global Cyber Alliance. Once set up, the free and fast DNS Quad9 service instantly checks any site you wish to visit against IBM X-Force’s threat intelligence database of over 40 billion analyzed webpages and images.

Quad9 blocks unauthorized DNS redirects and remote hosts, too. It’s simple to set up, and there is no program to download.

4. Make sure no one is spying on you

Keyloggers collect everything that you do on your computer and share it with hackers who control them. One mistake opening an attachment, visiting a rogue website, or hitting the wrong link and you’re a victim. It’s a simple way for hackers to steal your data and account credentials.

The free Ghostpress download scans for existing keyloggers on your computer and offers real-time protection. It runs in the background while you type and also blocks background attempts to record your activities.

5. Only use encrypted connections

When shopping online, you know to look for web addresses that start with “https://”. This assures you that the website is transferring data over a secure encrypted connection. You’ll also see a lock icon in your browser’s address bar.

This encryption guards against hijacking and malicious hacking attempts, but not every site has made the switch. Take matters into your own hands. You can remember only to visit mainstream sites and look for the lock.

Alternatively, add the free HTTPS Everywhere browser extension to your security arsenal. It rewrites your web requests as secure, even if the website you visit isn’t adequately encrypted.

And one more, don’t forget your cameras.

We’ve all heard the horror stories of someone hacking into a security camera watching over a home or nursey. Take action now before you become a victim. Many security cameras offer increased security settings and two-factor authentication.

There are steps you can take to make sure the only person who has access to your security camera’s footage is you.

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to or watch The Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcasts.

Kim Komando

(Pexels File Photo)...

Kim Komando

Get a handle on your time: Google Calendar tips and tricks

Learn about the untapped potential of Google Calendar with these invaluable tips and tricks, from tech expert Kim Komando.

3 days ago

(Pexels File Photo)...

Kim Komando

Here are 11 of the best insider tricks for the tech you use every day

With all the tech we use throughout our daily lives, no one should go another day without knowing the top tech insider tricks for privacy.

4 days ago

(Pexels Photo)...

Kim Komando

Be on the lookout for new ‘ghost hackers’ trying to scam you

Families must navigate digital defenses like memorializing accounts and appointing legacy contacts to safeguard against posthumous exploitation.

10 days ago

Are you tired of autocorrect's fowl play? Here are ways you can fix the problem and reclaim your sa...

Kim Komando

Here’s how to fix autocorrect if it is driving you ducking crazy

Are you tired of autocorrect's fowl play? Here are ways you can fix the problem and reclaim your sanity, from Kim Komando.

11 days ago

Use these tech tricks to take a trip down memory lane. (Pexels photo, left, Google Maps image, righ...

Kim Komando

See what the home you grew up in looks like now and other Maps tricks

Use these tricks with Google Maps and Google Earth to find out what your childhood home looks like, keep track of shipwrecks and more.

18 days ago

(Pexels File Photo)...

Kim Komando

Can you spot election deepfakes? Here’s how not to be duped

AI deepfakes are a massive problem this election season, and it’s easy to get taken — especially when your news and social feeds are full of this junk.

25 days ago

Sponsored Articles

...

Midwestern University

Midwestern University Clinics: transforming health care in the valley

Midwestern University, long a fixture of comprehensive health care education in the West Valley, is also a recognized leader in community health care.

...

Day & Night Air Conditioning, Heating and Plumbing

Day & Night is looking for the oldest AC in the Valley

Does your air conditioner make weird noises or a burning smell when it starts? If so, you may be due for an AC unit replacement.

...

Collins Comfort Masters

Avoid a potential emergency and get your home’s heating and furnace safety checked

With the weather getting colder throughout the Valley, the best time to make sure your heating is all up to date is now. 

Here are 5 free downloads to make your Mac, PC more secure