newYou can now listen to Fox News articles!
I have to tell you this story. When my college-bound son moved to Los Angeles, he asked me for the house number of the house I rented in the area for two months 28 years ago.
I laughed because I don’t remember. And then – I was shocked!
About five minutes later, he sent me a link to a free people search site that showed the house number, and all the other addresses I’ve ever lived in, my current address, links to my relatives, their ages, My age, even my personal cell phone number.
All this data is not behind a paywall. Just search my name and bam – privacy is gone.
That’s when I launched a program on my website outlining the exact steps to have your data removed from these creepy person-searching sites.
Hackers Want Google Accounts; Do This Security Check Now
These sites often hide steps. Don’t worry – we’ve done the heavy lifting for you.
Tap or click to see a list of 13 creepy websites that may contain your phone number, address, age, relatives, and more, along with steps to remove your information. I bet you’ll be amazed at the free information you see online about you.
Be sure to bookmark this page so you can refer to it later as well.
A safer online life is just minutes away. Follow this list – and pat yourself on the back to take care of your digital self.
Hide your home on Google Maps and Apple Maps
As convenient as Google Maps and Apple Maps are, you can feel uneasy when anyone on the internet can see your house and address number. There is a secret here. You can request a privacy blur for photos of your home.
Here’s how to submit a request to Google:
Tap the Street View photo you want to blur. The image must show your face, family, license plate or other identifying information.
Click “Report a Problem”. You will see this in the bottom right corner or by clicking the three-dot menu on the photo.
Fill out the form and click Submit.
For Apple Maps, you must email MapsImageCollection@apple.com and do the following:
Ask to blur your home.
Provide Apple with your full address.
Include additional property details so Apple knows which house to review.
Moreover to know more about Cybersecurity for beginners our blog can help you.
Check for any strange behavior
Spyware is malware that runs quietly in the background and can track almost everything you do. These sneaky downloads leave digital clues if you know what to look for.
Task Manager on a Windows PC and Activity Monitor on a Mac can give you an overview of everything going on on your computer.
If you are using a PC, do the following:
Open Task Manager by clicking Ctrl + Shift + Esc. Under the Processes tab you will see the applications and background processes running on your PC.
Browse the list. If you see a name you don’t recognize, search online to see what comes up. Sometimes these programs and background processes are legitimate and irrelevant, even if you don’t know the name at first glance.
To close an application or process, right click and hit end task. Check back later to see if it works again.
If you use a Mac, do the following:
To open Activity Monitor, click Command + Spacebar Open Spotlight Search.Then, enter activity monitor and press Enter. Check the list for anything you don’t recognize.
Double-click to close the program or process, and then click quit.
lock your computer
Leaving your computer unlocked invites anyone to snoop. It can also get you into trouble if your laptop is stolen or lost.
Lock your password with a strong and unique password. This means no repetitions! Since you need to enter this password every time you turn on your computer, it must be something you can remember.
It would be an easier solution if your computer allowed you to unlock it using biometrics like your fingerprint.
Otherwise, use these same password guidelines for any online account:
Use a combination of letters, special characters, numbers, and capital letters.
Aim for at least 12 characters.
Consider creating passphrases instead of passwords. These are longer, harder to crack, and easier to remember. Click or click here and scroll to number 3 for more details on creating.
To lock your Windows PC:
go start > set up > account.
click Login options from the left pane.
click Add to under the password section.
Enter a new password.click NextThen Finish.
To lock your Mac:
When setting up your Mac, you will be prompted to create a login password. Here’s how to set a password to unlock your computer:
click apple iconThen System Preferences.
click Security and Privacy.
an examination password required Box in the General tab.
Set the time of the password to Instantly Set your Mac to lock when it automatically goes into sleep or screensaver mode.
Learn About This Hidden Vulnerability in Your Browser
Extensions allow you to customize your browser and add powerful features. But not all extensions help. Some people stalk you on the internet and eat up your computer’s resources – or worse.
How do you know what is safe? Google Chrome assigns a “Featured” badge to extensions that follow Google’s “technical best practices and meet high standards of user experience and design.”
Hey, at least it’s something.
Privacy Tip: 5 Ways You’re Being Tracked You Must Stop Now
Are you sure the extension is bad news? You don’t remember to download it, so delete it.
It’s also helpful to search the web for phrases like “Is (the extension you’re using) safe to use?” Check out what pops up – and pay special attention to any security warnings or get services by SD-WAN vendor with a great security reputation.
Here’s how to remove extensions from Chrome:
open your chrome browser. Click three vertical dots to the right of your profile icon.
hover over more tools and select expand.
click eliminate on the extension you want to remove, then click eliminate again.
Using Safari on Mac? Here’s how to remove the extension:
choose safari > like. Click expand.
To uninstall an extension, select it and click uninstall.
Don’t stop there. 9 ways to tap or click to make Chrome more secure.
Keep your technical knowledge going
My popular podcast is called “Kim Comando today.” Here’s a solid 30-minute feed of tech news, tips, and tips and questions from callers across the country.
No matter where you get your podcast, you can search for it.
For your convenience, click the link below to view the most recent episode.
Get ready for an electric police chase thanks to Ford’s police partnership. I’ve got all the details, plus the inside scoop on the leaked Amazon filing. Looks like we have Prime Day again. Plus, you can now wear a smart scarf to keep cool. My advice: Wear it while watching Netflix’s true crime story about John McAfee. It’s been a crazy ride.
Find my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify, or your favorite podcast player.
Just search for my last name “Komando”.
What digital lifestyle questions do you have?Call Kim’s national radio program and Click or click here to find it on your local radio station.
Copyright 2019, West Star Multimedia Entertainment. all rights reserved.
Learn about all the latest technologies The Kim Comando Show, the nation’s largest weekend radio talk show. Kim takes calls and advises on today’s digital lifestyle, from smartphones and tablets to Online Privacy and Data Hacking.
For her daily tips, free newsletter, and more, visit her website: Komando.com