KIM KOMANDO

Here are 5 free downloads to make your Mac, PC more secure

Jul 7, 2020, 4:05 AM

(Pexels Photo)...

(Pexels Photo)

(Pexels Photo)

The FBI has seen a significant spike in cybercrime reports since the onset of the COVID-19 pandemic. Hackers, scammers, and snoops are having a field day. Be sure to check for any updates to your gear.

A bug has been found in 79 different popular router models that lets hackers remotely take over your devices.

Phones can be targets, too.

Although you’re frustrated over recent national events, it’s no time to let your guard down. Here a few ways to safeguard your digital life.

1. Use the internet anonymously

Are you tired of advertisers, snoops, and Big Tech tracking your every move online? One of the most popular inconspicuous tools available is The Onion Router, or TOR for short. Initially developed in the mid-1990s by the U.S. Navy to protect U.S. online communications, it is now a free global network for public use.

By rerouting your internet traffic through TOR, you can make it difficult for would-be snoops to trace your location and online activity back to you. From privacy advocates to journalists to internet denizens who are concerned about surveillance and monitoring, TOR is the go-to tool for web anonymity.

However, setting up your computer to exclusively route its traffic through TOR can be a challenge. Thankfully, there’s an easy-to-use web browser that will automatically route all its traffic through TOR even without advanced computer and networking knowledge.

2. Don’t let malware take over your system

Antimalware programs are essential for scanning and removing harmful files from your computer. Microsoft’s Windows Defender comes with your PC. It scans your computer for malware, quarantines malicious files and removes them with just a few clicks.

Make sure you have the latest version.

Although Apple does not offer built-in malware protection for Macs, you still need it. In about 30 seconds, Malwarebytes for Mac identifies and removes malicious files. There is a pay version, but the free option is sufficient for most people.

3. Let IBM control your DNS

The internet’s Domain Name System (DNS) directs you to specific websites when you enter a domain name in your browser. It’s why you can type a site’s name (for example, Archive.org) rather than the site’s cumbersome IP address (207.241.224.2). Your internet service provider automatically assigns your DNS settings, but hackers can hijack them to redirect traffic to malicious websites.

Instead, use Quad9 maintained by IBM and The Global Cyber Alliance. Once set up, the free and fast DNS Quad9 service instantly checks any site you wish to visit against IBM X-Force’s threat intelligence database of over 40 billion analyzed webpages and images.

Quad9 blocks unauthorized DNS redirects and remote hosts, too. It’s simple to set up, and there is no program to download.

4. Make sure no one is spying on you

Keyloggers collect everything that you do on your computer and share it with hackers who control them. One mistake opening an attachment, visiting a rogue website, or hitting the wrong link and you’re a victim. It’s a simple way for hackers to steal your data and account credentials.

The free Ghostpress download scans for existing keyloggers on your computer and offers real-time protection. It runs in the background while you type and also blocks background attempts to record your activities.

5. Only use encrypted connections

When shopping online, you know to look for web addresses that start with “https://”. This assures you that the website is transferring data over a secure encrypted connection. You’ll also see a lock icon in your browser’s address bar.

This encryption guards against hijacking and malicious hacking attempts, but not every site has made the switch. Take matters into your own hands. You can remember only to visit mainstream sites and look for the lock.

Alternatively, add the free HTTPS Everywhere browser extension to your security arsenal. It rewrites your web requests as secure, even if the website you visit isn’t adequately encrypted.

And one more, don’t forget your cameras.

We’ve all heard the horror stories of someone hacking into a security camera watching over a home or nursey. Take action now before you become a victim. Many security cameras offer increased security settings and two-factor authentication.

There are steps you can take to make sure the only person who has access to your security camera’s footage is you.

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to or watch The Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcasts.

Kim Komando

Use these tech tricks to take a trip down memory lane. (Pexels photo, left, Google Maps image, righ...

Kim Komando

See what the home you grew up in looks like now and other Maps tricks

Use these tricks with Google Maps and Google Earth to find out what your childhood home looks like, keep track of shipwrecks and more.

5 days ago

(Pexels File Photo)...

Kim Komando

Can you spot election deepfakes? Here’s how not to be duped

AI deepfakes are a massive problem this election season, and it’s easy to get taken — especially when your news and social feeds are full of this junk.

12 days ago

The Journal app is seen on an iPhone in this photo illustration taken on 10 November, 2023. (Photo ...

Kim Komando

Is Apple’s new Journal app a major privacy nightmare?

In this article, we debunk myths associated to Apple's Journal App. Is it safe, can our friends read our deepest darkest secrets? Read more.

19 days ago

facebook logo sign...

Kim Komando

I’m a tech expert, and you need to make these changes before it’s too late

In this article, discover crucial steps to protect your digital legacy and online security, such as adjusting privacy settings on Facebook.

25 days ago

(Pexels Photo)...

Kim Komando

Check out these 7 Mac and Windows tricks only the pros know

From closing browser tabs in a snap to troubleshooting tricks for Mac and Windows, optimize your digital life effortlessly.

26 days ago

We put three chatbots to the test to see which one came out on top. (Pexels File Photo)...

Kim Komando

AI showdown: Here’s which chatbots came out on top after a test run

We compare the free versions of ChatGPT from OpenAI, Google Gemini and Perplexity to see how well they helped with some real-life scenarios.

1 month ago

Sponsored Articles

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

...

Collins Comfort Masters

Avoid a potential emergency and get your home’s heating and furnace safety checked

With the weather getting colder throughout the Valley, the best time to make sure your heating is all up to date is now. 

(KTAR News Graphic)...

Boys & Girls Clubs

KTAR launches online holiday auction benefitting Boys & Girls Clubs of the Valley

KTAR is teaming up with The Boys & Girls Clubs of the Valley for a holiday auction benefitting thousands of Valley kids.

Here are 5 free downloads to make your Mac, PC more secure