Do this with your router before selling it or throwing it away

You know to wipe your devices before tossing them or giving them away. Your phone and computer contain lots of data that can be used against you. But what if you don’t have a chance to reset them? Here’s how to remotely wipe the data from your phone and computer.

Your router is not just a dumb box that connects you to a network. It stores information to manage the network, and you should take the same precautions as you would with all your connected devices.

Don’t make this mistake

Researchers at ESET purchased a bunch of used enterprise routers and were surprised to find that half of them were still intact. That is, nobody wiped the devices before putting them up for sale. 

We’re shocked that any business wouldn’t take such an essential precaution with any discarded device. 

RELATED: 5 secrets only cybersecurity pros and hackers know

What they found

The data found on the routers could be used to identify the last owners and their network configurations. 

The routers also contained a mix of the following:

  • Customer data.
  • Data that allowed third-party connections to the network.
  • Router-to-router authentication keys.
  • Credentials for connecting to other networks as a trusted party.
  • Connection details for specific applications.
  • VPN credentials.
  • Admin credentials.

The risks

Researchers named their paper “How I could’ve stolen your corporate secrets for $100.” Fitting when considering the implications here. 

Continue reading

Goodbye passwords! Google just made a huge security change - Will it stick?

Passwords might be one of the biggest tech frustrations. Make them too hard, and they’re impossible to remember. Too easy, and your accounts are practically wide open.

Maybe you use a password manager or your browser’s built-in option to remember your logins. Here’s how to find saved passwords in your browser. 

Continue reading

Airplane Wi-Fi: Read this before you use the Wi-Fi on a plane. Anyone can grab your credentials. If you’re not flying soon, hit the site and email the article to yourself to read later.

Here's what your digital life is worth

Open/download audio

What could your credentials fetch on the dark web? Here’s why they’re worth a lot. 

📩 Your inbox isn’t safe: Hackers are sending sneaky phishing emails with SVG image attachments that slip past spam detectors. They open in a fake Excel spreadsheet with a built-in login form to steal your credentials. Others pose as official documents, prompting you to download something — but it’s malware. Never click on attachments unless you’re 1,000% sure they’re legit.

Security tip: Unlink third-party apps from your Microsoft account

Connecting your Google account to multiple devices gives you access to services like Gmail and Google Maps, no matter where you are. But be careful to check this when selling your phone or giving away your laptop. Here’s how to remove devices from your Google account.

Continue reading

3 tricks to see if your passwords are being sold on the Dark Web

Hackers can make a ton of money by selling your private information on underground forums. It’s possible that your passwords are being sold on the Dark Web right now. That’s why you should run a cybersecurity check now and then.

Continue reading

🚨 Heads-up, small businesses: Hackers are breaking into WordPress-based websites and installing fake plugins packed with harmful code. When visitors come to your site, they might see a pop-up telling them to update their browser … but it’s actually info-stealing malware. They’re getting in with stolen credentials, so change yours now.

⚕️ Proceed with caution: Epic Systems, the huge health care software company that makes roughly $5 billion annually, says you’ll soon be able to import your medical records to apps of your choice using your Epic credentials. Sounds convenient, but think twice: You can’t control who these apps will sell your data to. Next thing you know, your life insurance premium skyrockets.

Major slip-up: A company TikTok, Uber and X hired to verify user identities left admin credentials exposed online for over a year. They process photos of faces and driver’s licenses, a boon for criminals. Yup, a free meal ticket for identity theft. Remember, when you give info to a company, you’re giving it to their vendors, too.

Chirp off the old block: Chirp Systems’ app controls smart locks in tons of rental homes. The app’s “hardcoded credentials” could let anyone remotely lock or unlock your door. Chirp says a fix is on the way. Swap out Chirp smart locks with this one from Amazon.

We may receive a commission when you buy through our links, but our reporting and recommendations are always independent and objective.

Easy way to find and delete forgotten accounts

Open/download audio

Your lost account credentials could get you in a world of trouble — here’s how to clean them out. Plus, hold on tight! I answer your burning questions in a new Q&A segment. 

New password rules to secure your accounts

Strong, unique passwords are your first defense against unauthorized access to your devices and personal information. The better the password, the more secure your computer or device will be from threat actors.

The thing is that a good password is not enough. It must be paired with other security practices for optimum protection. Just a few extra steps can go a long way in preventing disaster.

Continue reading

Security warning: How to spot fake ChatGPT apps hiding malware

Unless you’ve lived under a rock for a few months, you know about ChatGPT. It’s an artificial intelligence-powered chatbot that can write anything from a speech to a fictional TV episode from your favorite series. Tap or click here for everything you need to know.

Continue reading

Criminals are going after password manager logins - What to watch out for

Password managers are a great way to keep track of all your online account credentials. But they are also a treasure trove of information for cybercriminals if they gain access. And that is exactly what hackers are after.

Continue reading

400 apps caught stealing Facebook login data

Remembering your username and password for a service or app can be challenging. You should always use a complex password, but many people forgo the advice and use easily crackable ones. This can have dangerous consequences, especially if you use the same credentials for multiple accounts.

Continue reading

Malware in popular Android app steals your Facebook credentials - Delete it now

Imagine downloading a fun photo-editing app in hopes of turning yourself into a cartoon. Instead, the app doesn’t even work — and to add insult to injury, it steals your Facebook credentials. This isn’t imaginary: It’s based on a true story of about 100,000 people who recently downloaded a malicious app.

Continue reading

Fake Windows 11 installer coming after passwords, credit cards and crypto wallets

Over a billion machines run some version of Microsoft Windows. The operating systems’ reach expanded further when Windows 11 entered the market.

But not everybody is capable of upgrading to the new version. That’s because some older computers don’t have the minimum system requirements to handle Windows 11. Tap or click here to determine if your PC has the minimum requirements.

Continue reading

SIM swapping is one of the most dangerous phone hacks - And it's on the rise

You might assume that the SIM card in your mobile phone is safe. After all, it is firmly embedded into your device, and someone would need to take it out physically to access it. But that isn’t the only method. Tap or click here for an in-depth look at SIM swapping scams.

Continue reading

Windows alert: Hackers are using a 9-year-old flaw to break into PCs

Criminals and hackers will always exploit vulnerabilities, but software companies try to stay ahead of them. Tap or click here to see how malware can expose your browser passwords.

A big problem is that malware is constantly being adapted to circumvent any security efforts. Companies like Microsoft and Google can only patch what they know about, and sometimes hackers circle around to exploit old vulnerabilities.

Continue reading