Google+ 2019 ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Monday, December 16, 2019

   Constant Contact by Carl Thorne on Scribd

Wednesday, December 11, 2019

MacBook Pro 16” first impressions: Return of the Mack by Matthew Panzarino

In poker, complacency is a quiet killer. It can steal your forward momentum bit by bit, using the warm glow of a winning hand or two to cover the bets you’re not making until it’s too late and you’re out of leverage. 
Over the past few years, Apple’s MacBook game had begun to suffer from a similar malaise. Most of the company’s product lines were booming, including newer entries like the Apple Watch, AirPods and iPad Pro. But as problems with the models started to mount — unreliable keyboards, low RAM ceilings and anemic graphics offerings — the once insurmountable advantage that the MacBook had compared to the rest of the notebook industry started to show signs of dwindling. 
The new 16” MacBook Pro Apple is announcing today is an attempt to rectify most, if not all, of the major complaints of its most loyal, and vocal, users. It’s a machine that offers a massive amount of upsides for what appears to be a handful of easily justifiable trade-offs. It’s got better graphics, a bigger display for nearly no extra overall size, a bigger battery with longer life claims and yeah, a completely new keyboard.
I’ve only had a day to use the machine so far, but I did all of my research and writing for this first-look piece on the machine, carting it around New York City, through the airport and onto a plane where I’m publishing this now. This isn’t a review, but I can take you through some of the new stuff and give you thoughts based on that chunk of time. 
This is a re-think of the larger MacBook Pro in many large ways. This is a brand new model that will completely replace the 15” MacBook Pro in Apple’s lineup, not an additional model. 
Importantly, the team working on this new MacBook started with no design constraints on weight, noise, size or battery. This is not a thinner machine, it is not a smaller machine, it is not a quieter machine. It is, however, better than the current MacBook Pro in all of the ways that actually count.
Let’s run down some of the most important new things. 

Performance and thermals

The 16” MacBook Pro comes configured with either a 2.6GHz 6-core i7 or a 2.3GHz 8-core i9 from Intel . These are the same processors as the 15” MacBook Pro came with. No advancements here is largely a function of Intel’s chip readiness. 
The i7 model of the 16” MacBook Po will run $2,399 for the base model — the same as the old 15” — and it comes with a 512GB SSD drive and 16GB of RAM. 
Both models can be ordered today and will be in stores at the end of the week.
The standard graphics configuration in the i7 is an AMD Radeon Pro 5300M with 4GB of memory and an integrated Intel UHD graphics 630 chip. The system continues to use the dynamic hand-off system that trades power for battery life on the fly.  

The i9 model will run $2,799 and comes with a 1TB drive. That’s a nice bump in storage for both models, into the range of very comfortable for most people. It rolls with an AMD Radeon Pro 5500M with 4GB of memory.
You can configure both models with an AMD Radeon Pro 5500M with 8GB of GDDR6 memory. Both models can also now get up to 8TB of SSD storage -- which Apple says is the most on a notebook ever -- and 64GB of 2666 DDR4 RAM, but I’d expect those upgrades to be pricey.
The new power supply delivers an additional 12w of power and there is a new thermal system to compensate for that. The heat pipe that carries air in and out has been redesigned; there are more fan blades on 35% larger fans that move 28% more air compared to the 15” model. 
The fans in the MacBook Pro, when active, put out the same decibel level of sound, but push way more air than before. So, not a reduction in sound, but not an increase either — and the trade is better cooling. Another area where the design process for this MacBook focused on performance gains rather than the obvious sticker copy. 
There’s also a new power brick, which is the same physical size as the 15” MacBook Pro’s adapter, but which now supplies 96w up from 87w. The brick is still as chunky as ever and feels a tad heavier, but it’s nice to get some additional power out of it. 
Though I haven’t been able to put the MacBook Pro through any video editing or rendering tests, I was able to see live demos of it handling several 8K streams concurrently. With the beefiest internal config, Apple says it can usually handle as many as four, perhaps five un-rendered Pro Res streams.

A bigger display, a thicker body

The new MacBook Pro has a larger 16” diagonal Retina display that has a 3072x1920 resolution at 226 ppi. The monitor features the same 500 nit maximum brightness, P3 color gamut and True Tone tech as the current 15”. The bezels of the screen are narrower, which makes it feel even larger when you’re sitting in front of it. This also contributes to the fact that the overall size of the new MacBook Pro is just 2% larger in width and height, with a .7mm increase in thickness. 
The overall increase in screen size far outstrips the increase in overall body size because of those thinner bezels. And this model is still around the same thickness as the 2015 15” MacBook Pro, an extremely popular model among the kinds of people who are the target market for this machine. It also weighs 4.3 lbs, heavier than the 4.02 lb current 15” model.
The display looks great, extremely crisp due to the increase in pixels and even more in your face because of the very thin bezels. This thing feels like it’s all screen in a way that matches the iPad Pro.
This thick boi also features a bigger battery, a full 100Whr, the most allowable under current FAA limits. Apple says this contributes an extra hour of normal operations in its testing regimen in comparison to the current 15” MacBook Pro. I have not been able to effectively test these claims in the time I’ve had with it so far. 
But it is encouraging that Apple has proven willing to make the iPhone 11 Pro and the new MacBook a bit thicker in order to deliver better performance and battery life. Most of these devices are pretty much thin enough. Performance, please.

Speakers and microphone

One other area where the 16” MacBook Pro has made a huge improvement is the speaker and microphone arrays. I’m not sure I ever honestly expected to give a crap about sound coming out of a laptop. Good enough until I put in a pair of headphones accurately describes my expectations for laptop sound over the years. Imagine my surprise when I first heard the sound coming out of this new MacBook and it was, no crap, incredibly good. 
The new array consists of six speakers arranged so that the subwoofers are positioned in pairs, antipodal to one another (back to back). This has the effect of cancelling out a lot of the vibration that normally contributes to that rattle-prone vibrato that has characterized small laptop speakers pretty much forever.
The speaker setup they have here has crisper highs and deeper bass than you’ve likely ever heard from a portable machine. Movies are really lovely to watch with the built-ins, a sentence I have never once felt comfortable writing about a laptop. 
Apple also vents the speakers through their own chambers, rather than letting sound float out through the keyboard holes. This keeps the sound nice and crisp, with a soundstage that’s wide enough to give the impression of a center channel for voice. One byproduct of this though is that blocking one or another speaker with your hand is definitely more noticeable than before.
The quality of sound here is really very, very good. The HomePod team’s work on sound fields apparently keeps paying dividends. 
That’s not the only audio bit that’s better now, though; Apple has also put in a 3-mic array for sound recording that it claims has a high enough signal-to-noise ratio that it can rival standalone microphones. I did some testing here comparing it to the iPhone’s mic and it’s absolutely night and day. There is remarkably little hiss present here and artists that use the MacBook as a sketch pad for vocals and other recording are going to get a really nice little surprise here.
I haven’t been able to test it against external mics myself, but I was able to listen to rigs that involved a Blue Yeti and other laptop microphones and the MacBook’s new mic array was clearly better than any of the machines and held its own against the Yeti. 
The directional nature of many podcast mics is going to keep them well in advance of the internal mic on the MacBook for the most part, but for truly mobile recording setups, the MacBook mic just went from completely not an option to a very viable fallback in one swoop. It really has to be listened to in order to get it. 
I doubt anyone is going to buy a MacBook Pro for the internal mic, but having a "pro-level" device finally come with a pro-level mic on board is super choice. 
I think that’s most of it, though I feel like I’m forgetting something…

Oh right, the keyboard

Ah yes. I don’t really need to belabor the point on the MacBook Pro keyboards just not being up to snuff for some time. Whether you weren’t a fan of the short throw on the new butterfly keyboards or you found yourself one of the many people (yours truly included) who ran up against jammed or unresponsive keys on that design — you know there has been a problem.
The keyboard situation has been written about extensively by Casey Johnston and Joanna Stern and complained about by every writer on Twitter over the past several years. Apple has offered a succession of updates to that keyboard to attempt to make it more reliable and has extended warranty replacements to appease customers. 
But the only real solution was to ditch the design completely and start over. And that’s what this is: a completely new keyboard.
Apple is calling it the Magic Keyboard in homage to the iMac’s Magic Keyboard (but not identically designed). The new keyboard is a scissor mechanism, not butterfly. It has 1mm of key travel (more, a lot more) and an Apple-designed rubber dome under the key that delivers resistance and springback that facilitates a satisfying key action. The new keycaps lock into the keycap at the top of travel to make them more stable when at rest, correcting the MacBook Air-era wobble. 
And yes, the keycaps can be removed individually to gain access to the mechanism underneath. And yes, there is an inverted-T arrangement for the arrow keys. And yes, there is a dedicated escape key.
Apple did extensive physiological research when building out this new keyboard. One test was measuring the effect of a keypress on a human finger. Specifically, they measured the effect of a key on the pacinian corpuscles at the tips of your fingers. These are onion-esque structures in your skin that house nerve endings and they are most sensitive to mechanical and vibratory pressure. 
Apple then created this specialized plastic dome that sends a specific vibration to this receptor making your finger send a signal to your brain that says "hey, you pressed that key." This led to a design that gives off the correct vibration wavelength to return a satisfying "stroke completed" message to the brain.
There is also more space between the keys, allowing for more definitive strokes. This is because the keycaps themselves are slightly smaller. The spacing does take some adjustment, but by this point in the article I am already getting pretty proficient and am having more grief from the autocorrect feature of Catalina than anything else. 
Notably, this keyboard is not in the warranty extension program that Apple is applying to its older keyboard designs. There is a standard one-year warranty on this model, a statement by the company that they believe in the durability of this new design? Perhaps. It has to get out there and get bashed on by more violent keyboard jockeys than I for a while before we can tell whether it’s truly more resilient. 
But does this all come together to make a more usable keyboard? In short, yes. The best way to describe it in my opinion is a blend between the easy cushion of the old MacBook Air and the low-profile stability of the Magic Keyboard for iMac. It’s truly one of the best-feeling keyboards they’ve made in years, and perhaps ever in the modern era. I reserve the right to be nostalgic about deep throw mechanical keyboards in this regard, but this is the next best thing. 

Pro, or Pro

In my brief and admittedly limited testing so far, the 16” MacBook Pro ends up looking like it really delivers on the Pro premise of this kind of machine in ways that have been lacking for a while in Apple’s laptop lineup. The increased storage caps, bigger screen, bigger battery and redesigned keyboard should make this an insta-buy for anyone upgrading from a 2015 MacBook Pro, and a very tempting upgrade for even people on newer models that have just never been happy with the typing experience. 
Many of Apple’s devices with the label Pro lately have fallen into the bucket of "the best" rather than "for professionals." This isn’t strictly a new phenomenon for Apple, but more consumer-centric devices like the AirPods Pro and the iPhone Pro get the label now than ever before. 
But the 16” MacBook Pro is going to alleviate a lot of the pressure Apple has been under to provide an unabashedly Pro product for Pro Pros. It’s a real return to form for the real Mack Daddy of the laptop category. As long as this new keyboard design proves resilient and repairable I think this is going to kick off a solid new era for Apple portables.

Sunday, November 17, 2019

How to See What’s Draining Your iPhone or iPad Battery by iPhoneLife


Want to see what apps are draining the battery on your iPhone? Your iPhone's battery usage is broken down app by app in the Battery Health section of your Settings app. The data lets you see the percentage of battery life used by each app, and also how long you spent on individual apps. You'll be able to save your battery life and save your phone by picking out the apps that use more battery than they should be. 
  1. Open the Settings app.
  2. Scroll down and tap on Battery.

    battery usage
     

    Enjoying Your Tip of the Day?

    If you'd like to learn more about iPhone Life's premium paid subscription, click here
     

     
  3. Below Battery Health, you'll see a chart of your iPhone's battery charge level and activity. 
  4. There are options to view records for the Last 24 Hours or the Previous 10 Days.

    iphone battery usagebattery usage analyzer
     
  5. Scroll down, and you'll see how much of your overall battery use was due to each app.
  6. Tap on Show Activity to see how long you used each app.
  7. Tap on Battery Usage By App to go back to see the percentage of battery used by each app.

    background apps iphoneiphone battery performance
     
  8. Compare battery usage with use time. If an app isn't used much but still demands a lot of battery, consider uninstalling it.
  9. If you use an app a lot but still feel it is taking more battery than it should, then see if there is an alternative that might use less battery.
Now you know how to check which apps are eating up your battery. Hopefully you can keep your phone running a little longer!

Why You Shouldn’t Use Your Web Browser’s Password Manager by CHRIS HOFFMAN

We recommend using a password manager like 1Password, LastPass, or Bitwarden. But modern web browsers have built-in password managers, so why install a different one? There are many good reasons to avoid your web browser’s built-in tool.

Why You Need a Password Manager

Using a password manager is crucial. The biggest risk to your accounts online is password re-use. If you use the same passwords over and over, a breach at one website means your email and password is out there. Attackers will try to use that email and password to log into other sites. This simple trick is how accounts are often “hacked” these days.
The solution is using strong, unique passwords everywhere. But who can remember hundreds or even dozens of strong passwords? A password manager can remember if for you. You remember your password manager’s master password, which unlocks your secure vault. Your password manager can randomly generate strong passwords, remember them for you, and log you into websites with them.
Signing into the Yelp website with 1Password X in Google Chrome.
1PasswordLastPassBitwarden, and Dashlane are all reliable, stand-alone password managers. The open-source KeePass is okay, too, but it doesn’t have built-in sync features.
Web browsers have been able to remember your passwords for many years, but their password managers are now getting more sophisticated. Still, we recommend skipping the password manager built into your web browser—whether that’s Chrome, Firefox, Safari, or Edge—and using a dedicated password manager.

Your Web Browser’s Password Manager Is Just Okay

Google Chrome offering to save a password.
Your web browser’s password manager is better than nothing. With no additional software, your web browser can remember all your passwords and securely sync them between your devices. They can be stored encrypted in the cloud. You can use strong, hard-to-remember passwords because your software is automatically remembering them for you. This keeps your accounts secure, as you won’t need to re-use passwords.
The account it’s synced with—like your Google account in Chrome or your Apple ID in Safari—can be protected with two-step authentication to prevent people from signing in.
But there are some problems. Built-in password managers in web browsers aren’t as powerful and useful as third-party password managers. They are catching up, but they’re not as good yet. Here’s why.

Beyond Just One Browser

Third-party password managers are cross-platform and cross-browser.  Built-in browser password managers are limited to that specific browser. Let’s say you use Google Chrome on your PC or Mac and Safari on your iPhone. If you use a third-party password manager, you can have your passwords in any browser. If you use a built-in web browser password manager, you can’t mix and match browsers.
Beyond that, password managers offer good desktop and mobile applications, making it easy to access passwords, license keys, Wi-Fi codes, and anything else you want to store everywhere.

Generating Passwords

1Password offering to generate a password for a new Facebook account.
Third-party password managers don’t just remember your existing passwords—they can automatically generate strong new ones when you’re creating an account or changing an existing account’s passwords.
Some browsers are now adding built-in password generators—Chrome and Safari now have this feature—but they don’t necessarily offer all the options found in password managers, such as the ability to control how long the password is and what type of characters it contains.

Easily Sharing Passwords

Password managers have easy password-sharing features. Want to share your Netflix password with your family members? You can do it with a password manager with a built-in sharing feature. You’ll all get access to the same password entry and, if you update the password, it’ll change for everyone else.
Browsers don’t have built-in password-sharing features. You can send a password to someone else in a text message or email, which isn’t very secure. If you do that, it also won’t be automatically updated if you ever have to change it. Password-sharing features are a great way to share household accounts.

Warnings About Password Dangers

The LastPass security challenge showing scores.
Password managers have built-in warnings like LastPass’s Security Challenge and 1Password’s WatchTower. They’ll point out weak and reused passwords to you and even tell you when a password you use has appeared in a leaked password database. This helps you stay up-to-date on protecting your digital accounts. There’s no need for a separate service to check whether your password has been stolen.
Web browsers are slowly getting features like these, too—Google has a password-checker in its password manager. Google also offers the Password Checkup extension for Chrome, which it’s building into the browser, but this isn’t as powerful as the similar features built into password managers.

Storing More Than Passwords

Password managers let you store more than just passwords. For example, you can create secure notes containing text like building entry codes and Wi-Fi passphrases. You can even add file attachments to your vault, which makes it a great place to store tax documents, scanned copies of your passport and driver’s license, and other sensitive information.
To store files like these securely, you might find yourself creating encrypted archive files and uploading them to a cloud storage service. Taking advantage of your password manager’s vault is more convenient.
This works nicely with sharing, too—you can store all sorts of sensitive information and documents and share them with anyone else who needs access.

Making the Switch Is Easy

We’re happy web browser password managers are getting more powerful, but they aren’t competitive with the more powerful password managers just yet.
If this has convinced you and you’re currently using your web browser’s password manager, don’t worry—you can switch to a password manager and import all your usernames and passwords from your web browser’s built-in password manager. The password manager you choose will walk you through the import process.

Are Password Managers Safe?

Storing all your passwords in a single program may seem a little odd—weren’t you supposed to remember all these things?—but we (and many other experts) argue it’s safer than the alternative. Here’s why you should trust password managers.

Friday, November 15, 2019

Apple’s new 16-inch MacBook Pro features a larger display, a new Magic Keyboard, and booming sound by Roman Loyola

Apple on Wednesday took the wraps off of its latest high-end laptop, the 16-inch MacBook Pro. Targeted for professional use, the new machine features 6- or 8-core processors, a larger display, a new Magic Keyboard, a bigger battery, and a lot more.
The new 16-inch MacBook Pro replaces the 15-inch MacBook Pro, but Apple hasn’t jacked up prices: The two standard configuration 16-inch models are the same as the 15-inch versions, $2,399 and $2,799.

Display, keyboard, and speakers

The most noticeable feature of the new laptop is its display, which, as the name implies, is bigger than the one on the MacBook it replaces. To provide more usable screen real estate, Apple reduced the bezel around the display. Specifically, Apple says the horizontal and vertical bezels have been reduced 25 and 34 percent respectively, when compared to the 15-inch MacBook Pro. The display also has a native resolution of 3072x1920, boasts 500 nits of brightness, and supports the P3 color gamut.
Right underneath the 16-inch MacBook Pro’s display is a new keyboard, which could be the laptop’s most anticipated feature. Users have been vocal about the old butterfly-mechanism keyboards that have been used in the MacBook Pro since 2016, complaining about its susceptibility to dust and other detritus, and the loud pounding noise it makes while typing.
ADVERTISING
Apple said that it performed extensive research to determine the “human factors” that make a good keyboard, and the result is what the company calls the Magic Keyboard on the 16-inch MacBook Pro. It’s based on the Magic Keyboard that ships with the iMac and iMac Pro, and uses a scissor-based mechanism. Apple says that the Magic Keyboard is now more reliable and quieter (you can check out my hands-on for my first impressions).
The mechanism isn’t the only thing that changed with the keyboard. Now there’s also a dedicated Esc key (to the delight of software developers) and a discrete Touch ID key (it’s not part of the Touch Bar anymore). Also, Apple has reverted the arrow keys back to the inverted T layout (with the half-height right and left arrow keys) that was used in older MacBooks.
Surrounding the Magic Keyboard is a speaker setup that dramatically improves the sound output quality of the MacBook Pro. Apple is now using a six speaker array with woofers and the result is a rich listening experience not typically found in a laptop. Apple also includes a three microphone array that the company says produces 40 percent less hiss that the previous microphone.

CPU, graphics, battery

Apple uses 6- and 8-core ninth-generation Intel processors in the new 16-inch MacBook Pro, and there’s a new thermal design to keep the system cool. Apple says the laptop uses a heat sink that’s 35 percent larger than before, and the design allows for 28 percent more airflow. 16GB of 2666MHz DDR4 RAM comes standard, and users can customize their order to a maximum of 64GB. Apple is also offering an 8TB SSD option for storage.
The standard configuration of the 16-inch MacBook Pro comes with a Radeon Pro 5000M series graphics card that has 4GB of GDDR6 VRAM. An option for 8GB of RAM is available.
The battery in the new laptop also gets a big boost: It’s a 100 watt-hour battery, which hits the limit allowed by the FAA. The battery is 16 watt-hours larger and last an hour longer than the previous battery used for the 15-inch model. Apple includes a 96-watt USB-C power adapter.

Stay safer online by leveling up your cybersecurity vocabulary by David Nield

With so much talk of viruses, data breaches, and ransomware, you’d be forgiven for never wanting to set virtual foot online ever again. But in today’s connected world, avoiding the internet is pretty much impossible. That’s why it’s important to know exactly what you’re facing when you connect.
Still, according to the Pew Research Center, less than a quarter of us know what incognito or private browsing means, for example. But that’s nothing a little knowledge can’t fix.
So check your anxiety at the door learning some key cybersecurity terms that will help you navigate the internet like a pro. When you’re done, you’ll be better-equipped to deal with all the threats the wilds of the web can throw at you.

Cookies

Screenshot of dialogue box cookies management
Think of cookies as Hansel and Gretel's crumb trail. Hopefully you won't have to push anybody in an oven, though.David Nield
Besides being tasty snacks, cookies are small files lodged on your computer by most websites you visit. They tell the website specific details about you, like whether you’ve visited before, how you like to have the site set up (trending topics on a news site, for example), where in the world you are (to show you local weather or prices in the proper currency), and other information.
ADVERTISEMENT / ADVERTISE WITH US
By themselves, cookies aren’t inherently dangerous or bad—they are there to make your experience easier and more seamless—and websites are only able to access the data they have gathered themselves. But that changes with so-called third party cookies, which can potentially be used to log your browsing activity over multiple sites, and more effectively target you with advertising.
But don’t worry—most browsers now come with options to block third-party cookies (sometimes known as cross-site trackers), or to block cookies completely. You should be able to find these options in the settings page for your browser—With Apple Safari on macOS, for example, choose SafariPreferences, and Privacy. From the resulting dialog box you can Prevent cross-site tracking or Block all cookies.

HTTPS

HTTP, or HyperText Transfer Protocol, is the standard for coding websites and displaying them inside browsers. HTTPS, meanwhile, is the safer version of it—with the "S" at the end standing for “secure”—and the adopted protocol of most sites that display personal information, such as your email provider and bank.
ADVERTISEMENT / ADVERTISE WITH US
On a technical level, HTTPS runs extra checks to make sure the website you’re viewing is actually the one you intended to visit. It also means that all the data sent to and from that site is encrypted, so anyone who intercepts the traffic between you and a HTTPS site won’t be able to make sense of it.
HTTPS is usually indicated by a padlock symbol on the left side of your browser’s address bar, and you should check for it when you’re visiting any kind of site where you need to log in or provide payment information. The good news is that today, most sites use this protocol to keep their users safe, so it’s highly likely you’ll run into that padlock a lot.

Incognito mode

Screenshot of incognito on google chrome
You'll feel like a spy, but logging into Facebook in incognito mode doesn't mean you're anonymous.David Nield
All browsers today offer incognito or private mode, an option where your browsing history and website cookies aren't logged. It will be as if you’re visiting a site for the first time, and your browser will have no record of you ever being there—as soon as you shut down an incognito window or tab, that browsing session never happened.
ADVERTISEMENT / ADVERTISE WITH US
However, don’t overestimate the privacy you get with incognito mode. Unless you’re using a virtual private network (VPN), your internet service provider will still be able to see where you’re going on the web. And even though your browser will have no record of it, if you log into any site, like Amazon or Facebook, that site will know you’ve visited and may have made a record of what you did.
In other words, if you log in and spend an hour browsing Amazon in an incognito window, your browser will forget all about it, but Amazon won’t, so you might see advertising related to that session in the future.

Malware

You’ll see malware used as a catch-all term for various internet nasties—viruses, wormsTrojan horses, ransomware, and many other categories of threats. Essentially, it means malicious software—anything that’s designed with the express intention of causing damage or inconvenience.
ADVERTISEMENT / ADVERTISE WITH US
As it is such a broad term, you’ll see it used extensively across the web. When you do, it’s worth trying to figure out exactly what kind of malware is being referred to, if any. It may do something as simple as change your browser’s default home page, or something as advanced as swiping sensitive financial data from your computer.
The best way to protect against malware is to keep your computer operating systems right up to date and make sure you have installed a robust set of security software tools.

Phishing

Screenshot of email phishing security
It's good practice not click on any links embedded in an email. Ever.David Nield
Phishing is a particular type of scam where the scammer will try to “fish” for your username and password. It usually happens when users click on a link on a text, instant message, or email that directs them to a compromised website designed to look like a genuine one. People who fall for phishing scams usually don’t see the difference between these sites and their bank’s site, for example, and provide their credentials thinking they’re logging into their accounts.
In times gone by, phishing emails would appear as badly formatted messages with a ton of errors and misspellings, making them easy to spot and avoid. Nowadays, they’re much more difficult to detect. Most modern browsers will detect suspect web links when you try to follow them, so it’s important to be on your guard, and keep your browser software up to date.
Most platforms have changed their protocols to avoid phishing, so now it’s rare for legitimate emails from your bank or sites like Amazon and Google to ask you to log in from a link in the message. Still, it’s good practice to be wary of any links sent to you over any platform, particularly when you don’t know the sender.
There’s more to be said about how to avoid phishing, and you can read a complete guide here.

Privacy policy

If you have any doubts about what a privacy policy is, know that it’s a contract between websites (or apps) and users that sets out how those platforms will use users’ data. Before you sign up for any new service, you should read through its privacy policy. For example, check out Google’s privacy policyApple’s, and Microsoft’s.
In these documents, you should find details about what types of data the platforms collect from you, and how that data is used—whether it’s shared with third parties, securely encrypted, stored in the cloud, or something else.
Unfortunately, privacy policies aren’t particularly easy to read (they’re usually long) or understand (they commonly use intricate legal terms), and their terms are generally as vague as possible to give tech companies and app developers room to maneuver. However, we’d still recommend scanning them for red flags (like unwarranted data collection), particularly when you’re signing up for new and lesser-known apps and sites.

Ransomware

Screenshot of a ransomware
Maybe that shady app you downloaded from your browser was not the best idea.Public Domain
Ransomware is a particular type of malware, one where systems get locked down and can't be unlocked again until the victim has paid a ransom. This type of attack is difficult to get around, and can prove to be very lucrative for hackers.
Ransomware usually hits systems running old, badly protected software, so you can minimize the risk of getting hit by it by keeping your system software up to date. Also, be very cautious about anything you install on your smartphone or computer—it’s a good practice to only stick to the official Microsoft, Google and Apple app stores whenever possible.
Ransomware is another reason to make sure your important files and data are backed up somewhere else. If your system does get locked down by hackers, you'll still be able to access your files without having to pay the specified ransom.

Two-factor authentication

Two-factor authentication is an extra layer of security for your online accounts, like Twitter or Google—it means you’ll need something else besides your username and password to log into a platform.
That something else is usually a code generated by an app on your phone, or sent to you via text message. Even if hackers get hold of your usernames and passwords, they won’t be able to log in without the codes on your phone. It doesn’t offer a 100 percent guarantee that you won’t be hacked, but it goes a long way to minimizing the risk.
You should enable on two-factor authentication (2FA) everywhere it’s offered, and most online accounts now support it: Facebook, Twitter, Instagram, Google, Apple, Microsoft, Dropbox, and more.
If you want to know more about two-factor authentication, we’ve also got a detailed guide for you.

Virtual Private Network or VPN

Screenshot of NordVPN for mac
Having a VPN is like traveling... only not.David Nield
A VPN is a piece of software that sits between your device (computer, tablet or mobile phone) and the internet. It places all your communications with the web inside an encrypted tunnel, which makes it much harder for anyone else to see what’s going on—whether that is your internet service provider or a coffee shop hacker.
Most VPN providers promise to delete browsing logs after they’ve disconnected you, but you still have to trust them to do so, since there are no guarantees. If you want to browse securely with a VPN, we’d recommend paying for a reputable service, particularly if you spend a lot of time on public Wi-Fi networks. If you’re considering getting one, That One Privacy Site is a good resource for starting your search.
But VPNs are not only about privacy. Because they connect you to an encrypted server somewhere in the world before you reach your final destination, another use of the software is to fool platforms into believing you're in a different country—and that means being able to access geographically limited content, like the Netflix catalogue in France or even watch foreign TV at home.

Virus

Like a virus passed between humans, a computer virus can do some serious damage to systems, and jumps from host to host to spread its infection. The term is widely known, and is sometimes used interchangeably with malware—though to be precise, a virus is a particular type of malware.
A typical virus takes root on a system by tricking users into running malicious code, whether that's via an email attachment, a pop-up in a web browser, or something else. Once in place, viruses can delete user data, replicate themselves and jump to other systems (usually via the installed email client), and open up back doors in systems for hackers to gain remote access.
Besides being extremely careful about what you download and install on your computer, you should keep macOS or Windows up to date. The Apple and Microsoft operating systems provide basic but effective antivirus protection, though there’s no harm in buying extra third-party software to batten down the hatches even further.