🔒 Friendly reminder: Browser extensions lose support and change developers. Take a minute to review what’s installed and ditch anything you don’t use. On Chrome, tap the three dots near your profile icon, hover over Extensions, then select Manage Extensions. On Safari, go to Preferences > Extensions.
Wait, are public phone chargers dangerous?
Those charging kiosks in airports, hotels and malls are so tempting when you’re out and about with a dying phone. Their owners promise they’re safe. The government disagrees, and so do I. Groan, I know.
Welcome to the newest phase of juice jacking. The phenomenon has been around for more than 10 years. Hackers use public phone-charging stations to upload malware to your devices. Then, they ransom your device or steal your passwords. Super-duper.
Have no fear. When your batteries hit the low, low point, just follow these Koman-do’s and don’ts (never gets old).
Don’t use public USBs – just outlets
Good news: Actual cases of juice jacking are rare in the U.S. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.
Stay away from USB ports of any size, though, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.
Do go cable-free
Use wireless charging pads instead of USBs when possible. More and more public kiosks have them. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. Score.
Don’t use a data cable
If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.
Don’t choose the ‘trust’ option
Newer phones are smart enough to be wary of an unknown USB connection. (Some humans could learn a thing or two, huh?). Plug in and you’ll get a prompt to “trust this device” or “share data.”
We may receive a commission when you buy through our links, but our reporting and recommendations are always independent and objective.
It’s time to replace your old router
Most folks don’t know their wireless router — that handy dandy device alongside the modem that connects your devices to the internet — has a shelf life. Once it hits the three-year mark, you’re due for an upgrade.
Shopping scams are getting nastier: One victim in Maryland was tricked into paying a fake $0.99 “redelivery fee” and ended up losing $400. USPS and other shipping companies won’t add a shipping charge after the fact. These scams usually come via text, so watch out.
40% increase
In phishing attacks, thanks to one trick. Cybercriminals buy up super-cheap and easy-to-register domain extensions like .shop, .top, .xyz, .vip and .club. If you see one, move on.
Free VPN risk: Check this list of 9 infected apps
I’m cheap and try to save a buck wherever I can. I use all my credit card perks, always click the coupon boxes on Amazon, and, to my husband’s great annoyance, cancel streaming services the minute we stop watching them.
A New Jersey family is living a nightmare
It started back in September. Dan in Bridgewater, New Jersey, had his bank account hacked. Their first step was to withdraw money and apply for a loan. In October, he got a letter from TD Bank notifying him of an address change on his account.
Every parent should read this
This topic hits me personally, and I don’t like to discuss it at all. You never know who’s a child predator. I was molested by a trusted family friend when I was 6 years old. I told my parents, and they took immediate action — well, not the action my Dad wanted, which was to cut off the guy’s hands.
It’s not just bogus calls and emails
Imagine getting a call from what looks like your bank’s number, warning you about suspicious activity on your account. The caller knows just enough to make you trust them. It’s all a lie, and you’re screwed if you don’t realize that soon enough.
Scammers are targeting teens – Warn your Gen Zer about these tricks
I told you about the 14-year-old who committed suicide after following the advice of an AI chatbot. Another family is suing the same one — Character AI — after it told an autistic 14-year-old to kill his parents. It also exposed an 11-year-old to sexual content.
Your IP address: What it is and why you need to protect yours if you care about privacy
Using the internet is a complicated affair. It may not feel like that to you as a user. You click on your browser and get on with your day — it’s as easy as pie.
Behind the scenes, though, is a whole different story. It’s full of numbers like your Internet Protocol (IP) address, basically your digital home address. This numeric label distinguishes your phone or computer from other devices worldwide.
How to install antivirus and scan your computer
If you’re online, you’re at risk, plain and simple. There’s more out there after your info and wallet than you realize, from phishing scams to ransomware and malicious apps to malware.
That’s why it’s critical to protect your personal and business devices correctly. When it comes to your computer, tablet and phone, you need a robust security suite.
5 clever tricks holiday scammers use
JD in Dallas emailed me with a story. He and his wife were at the mall and stopped for a Christmas selfie. Two young men walking by offered to take the pic for them — and one kept wiping the phone’s lens inside his jacket.
Set up your Wi-Fi for easy sharing with guests
You’ve got a turkey in the oven, presents need to be wrapped, and your cousin’s kid screams (again), “What’s the Wi-Fi password?” You’re juggling a hundred things at once, and the last thing you want to do is to spell out your password.
Security tip: Next time you stay at a hotel, turn on your VPN
Did you know the average American spends more than 24 hours each week online? That is a considerable chunk of time.
If you’re one of many with multiple devices regularly accessing the internet, you probably know you need a secure connection to protect sensitive data. A virtual private network or VPN is the best way to do this.
Booking.com is not my typo: One man got a complete stranger’s trip details when the person shared their itinerary with a contact and made a typo. The site says it’s not a security breach; it’s how their system works. That’s pretty standard, so double-check your recipients’ email addresses when sharing any personal information.
Instagram parental controls: Review how much time your teen spends in the app (but not what they’re doing), set daily time limits and establish times to put the app in “sleep mode” so they won’t get notifications. In the Instagram app, tap your profile picture (bottom right) > the menu button (top right) > Family Center to connect to your teen.
Beware: Convincing new PayPal invoice scam
“Reminder: You’ve still got a money request!” That was the subject line of the messages flooding my husband Barry’s inbox all week. He’s not the only one; there’s a sneaky scam going around that looks totally legit … because it actually comes from PayPal.
Why you can’t access some sites while you’re on a VPN and what to do
Let’s say you’re browsing the web with a VPN. You’re protecting privacy, so you’re confident hackers and advertisers can’t track you. Then you try to go to a site, and it just won’t load.
This can throw a wrench into productivity when working. Or it can ruin your mood when trying to have fun online.
Antivirus comparison: Which option is best for your PC or Mac?
If you browse the internet regularly, you can’t get around the fact that you need antivirus software. Viruses can pop up in unexpected places, and you want your device to be able to fight one off if it appears.
Dangerous malware making the rounds is what makes having antivirus software protecting you so critical. But what’s the best antivirus software for a Mac or Windows computer? Keep reading to see the best options.