5 secrets and techniques solely cybersecurity professionals and hackers know

Angelena Iglesia

Some safety steps are frequent data. I don’t have to remind you to put in that newest replace in your laptop, proper? 

Others are much less apparent. Do you lock your laptop each time you stand up? Except you reside alone, it’s best to. Right here’s the best approach to do it if you happen to’re lazy

In your telephone, you’d in all probability by no means guess leaving your Bluetooth linked 24/7 is a mistake. Right here’s why — and what to do if you happen to can’t dwell with out your AirPods

I’ve received your again with extra secrets and techniques solely tech professionals know to maintain you protected and safe. 


1. See if somebody is secretly getting copies of your emails 

I at all times get calls to my nationwide radio present from folks involved that somebody is watching all the things they do.  

One of many first steps I like to recommend: Be certain that your inbox is locked down. Listed below are steps if you happen to discover or suspect any standard logins. 

Log in to your e mail, then go to your account or safety settings. 

You’ll discover an possibility that permits you to view your latest login exercise or login historical past. It will likely be labeled one thing like “Latest Exercise,” “Safety,” or “Login Historical past.” 

Professional tip: Use Gmail? Click on the Particulars hyperlink subsequent to the Final account exercise on the backside of any Gmail web page. 

Overview the listing of latest logins. See something that isn’t you or one in every of your units? You might even see a wierd location, too. 

For those who spot an unknown location or a tool that is not yours, act quick. Change your password, ensure two-factor authentication is turned on, and log all units out of your account

Are you in the midst of a breakup or not too long ago divorced? Learn via this information to untangling your digital lives. It’s value your time. 

2. Be certain that your printer didn’t get hacked 

Like your laptop, your printer is a goldmine for hackers. Why? Printers typically retailer copies of the docs which have been printed. Any cybercriminal might get copies of delicate info, like your monetary information. 

Listed below are three indicators your printer has been hacked: 

Your printer begins printing clean pages or a bunch of characters.  

5 secrets and techniques solely cybersecurity professionals and hackers know

An individual works at a pc in the course of the tenth Worldwide Cybersecurity Discussion board in Lille on January 23, 2018.  (Photograph by PHILIPPE HUGUEN/AFP through Getty Pictures)

You discover print jobs you didn’t provoke.  

Your printer’s settings have modified — and it wasn’t you. 

What must you do?  

Unplug the printer. Press and maintain its Reset button, normally on the printer’s again or backside.   

Whereas holding the Reset button, plug the printer again in, and switch it on. In about 20 seconds, lights will flash to point it’s carried out. 

Operating out of ink mid-print is the worst. Use these secrets and techniques to save lots of on ink prices

3. There’s a hidden location tracker in your iPhone 

I like to recommend you look via the location settings in your telephone. That can go a great distance in shutting down quite a lot of the GPS monitoring. However you may’t cease there.  

Why does your telephone inform you how lengthy it will take to get to the workplace or is aware of your ETA to the grocery retailer once you get within the automobile for Saturday morning errands? That is a part of Important Places. 

Apple says this function exists so your telephone can study locations vital to you and supply customized providers, like visitors routing and higher Pictures Recollections. 

Right here’s the best way to entry it — and shut it down. 

Open your iPhone’s settings, then faucet Privateness & Safety


Choose Location Providers

Scroll down and faucet System Providers

Scroll till you see Important Places and faucet that. 

For those who don’t need your iPhone to maintain observe of your whereabouts, slide the toggle subsequent to Important Places to the left to disable the setting. 

Need to wipe out this listing of great areas? Observe the steps right here

4. You may wipe your telephone if you happen to lose it 

The very thought of your telephone in another person’s arms is creepy. Think about a stranger rifling via your pictures, movies, apps, conversations, and browser tabs. 

So what in case your telephone goes lacking? You may take a step to guard your data, even if you happen to by no means get that telephone again. 

To remotely erase your iPhone: 

Open iCloud.com/discover and go to the Discover iPhone function. 

Choose your misplaced telephone, then choose Erase iPhone

Person holds an iPhone

To remotely erase your Android telephone: 

Go to android.com/discover and sign up to your Google account. Choose your misplaced telephone, and also you’ll get info on its location. 

When prompted, choose Allow lock & erase

Choose Erase gadget to wipe its information. 

Try my information right here for extra strategies to seek out, again up, or erase your phone

5. Apps are determined so that you can share the juicy particulars 

Social media corporations are dying to get their arms in your contacts’ birthdays, footage, full names, e mail addresses, and extra. They inform you it is a helpful instrument to seek out your folks, however your folks’ data is not yours to offer away. That is their very own to determine the place to share.  

Out of your handle e book, corporations construct so-called Shadow Profiles. They will study a ton from these you already know, even when they don’t seem to be utilizing these platforms. Sneaky stuff. 

How are you going to make a distinction? Do not give apps entry to your telephone’s contacts. Overview which apps do have entry and switch it off. And at all times listen and cease sharing data and not using a actual profit to you.  

Even your telephone quantity is highly effective within the flawed arms. This is why I exploit a burner, not my actual quantity once I want to offer it out

Maintain your tech-know going  

My fashionable podcast is known as “Kim Komando At this time.” It’s a strong half-hour of tech information, suggestions, and callers with tech questions such as you from everywhere in the nation. Seek for it wherever you get your podcasts. In your comfort, hit the hyperlink under for a latest episode. 

PODCAST CONTENT ON THE GO: Most cancers sufferers’ bare pictures leaked, TikToker steals widow’s ashes, and Florida needs blogger’s authorities registration 

NEW YORK, NEW YORK - OCTOBER 18: Telephones are seen in the recreation room during a tour of the Randall's Island Humanitarian Emergency Response and Relief Center on October 18, 2022 in New York City. The construction of the relief centers began after NYC Mayor Eric Adams, who declared a state of emergency due to continued arrivals of migrants, announced their relocation to Randall's Island from Orchard Beach in the Bronx after concerns about flooding. The tent-like structures will provide temporary housing to 500 asylum seekers that are being bused into the city by the Republican governors from border states. 

NEW YORK, NEW YORK – OCTOBER 18: Telephones are seen within the recreation room throughout a tour of the Randall’s Island Humanitarian Emergency Response and Reduction Middle on October 18, 2022 in New York Metropolis. The development of the reduction facilities started after NYC Mayor Eric Adams, who declared a state of emergency because of continued arrivals of migrants, introduced their relocation to Randall’s Island from Orchard Seashore within the Bronx after considerations about flooding. The tent-like constructions will present momentary housing to 500 asylum seekers which are being bused into town by the Republican governors from border states.  ((Photograph by Michael M. Santiago/Getty Pictures))

Plus, you will not consider which jobs are on the point of extinction because of AI. Academics, brace yourselves! Get the newest scoop on the federal government’s TikTok ban, exploding e-bikes, and the highest tax scams spreading like wildfire. Plus, I am going to spill the beans on the last word day to ship your e mail publication for max influence! 

Try my podcast “Kim Komando At this time” on Apple, Google Podcasts, Spotify, or your favourite podcast participant. 


Take heed to the podcast right here or wherever you get your podcasts. Simply seek for my final title, “Komando.” 

Sound like a tech professional, even if you happen to’re not! Award-winning fashionable host Kim Komando is your secret weapon. Pay attention on 425+ radio stations or get the podcast. And be part of over 400,000 individuals who get her free 5-minute day by day e mail publication. 

Copyright 2023, WestStar Multimedia Leisure. All rights reserved. 

Next Post

It’s not in regards to the bike!

Bike festivals are nice locations to hold in case you are a lover of artwork, for those who’re a lover of music, for those who’re a lover of historical past, and of conversations. What’s lacking in that final sentence? Two wheels! Surprisingly, the bike doesn’t have to take centre stage […]
It’s not in regards to the bike!

Subscribe US Now