PCMag Security

How to fight cyberstalkers.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 10 September 2021, 1418 UTC.

Content provided by “PCMag.com.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGljlnRsrGgcDtgNsqFdqRfdqjx

Please click link or scroll down to read your selections.

Trouble viewing this email? View in a browser
 
 
PCMag Security Watch
 
Get Your Life Back From a Cyberstalker
I write about cultivating a private digital life a lot in these newsletters because it seems everyone wants a piece of your existence. It could be advertising companies using cookies to track your browsing habits, or worse, an ex-partner checking your text messages and call history via stalkerware. Those situations are bad, but this week, a reader email reminded me that total surveillance is the ultimate nightmare.

A reader contacted Neil J. Rubenking, Lead Security Analyst here at PCMag, and shared a harrowing story about a hacker who took over their relative’s digital life. The attacker did it all: read their email, changed their passwords, and altered settings to remove operating system security features. The victim felt helpless to stop them. Rubenking deduced that the attacker gained control of the system via a remote access Trojan (RAT), a type of malware.

What can you do to combat a RAT infestation? First, you need to get a new computer, smartphone, phone number, and email address. The scorched-earth policy is the best way to deal with a digital life takeover because it doesn’t give the hacker any more chances to infect your new accounts via your old devices. Use a strong password on your new computer account, sign up for an encrypted email service, enable multifactor authentication on all of your accounts, and install a password manager to keep track of all of your new, complex passwords. Of course, you’ll need a clean install of a security suite as well.

Recovering from a total account takeover can be expensive and annoying, but don’t waste any time in reclaiming your life after an identity theft catastrophe. Make privacy-first decisions and stick with them moving forward.

Stay safe,

Kim Key
PCMag Security Analyst

 
Save $50 on IPVanish VPN
 
TECH DEAL OF THE DAY
 
If you buy something from our links, we may get a commission from the sale. Learn more here.
 
 
 
PCMag Editors’ Choice 40% off with the Purchase of any new SimpliSafe Security System

 
 
GET DEAL

 
TODAY’S TOP NEWS
 
VPN Login Details Leaked for 500K Fortinet Accounts

Windows 10 Zero-Day Exploit Triggered by Visiting a Website, Opening Office Documents

US Extradites Ukrainian Man for Using Botnet to Crack Thousands of Passwords

German Police Confirmed to Use Pegasus Spyware

Howard University Cancels Classes After Ransomware Attack

   
Learn How to Stay Anonymous Online
Remember the adage, “On the internet, nobody knows you’re a dog”? You know that’s an old meme, because, currently, it’s simply not true. No matter who you are (human, dog, cat, or any other being), everyone from the government to Google knows what you’re doing online. Companies deliver targeted ads based on that information, and every day, that potentially sensitive personal data leaks in breaches and hacks.

PCMag Features Editor Eric Griffith put together a roadmap for protecting your identity online and outlined several methods for masking your activity. For example, you can use anonymous smartphone accounts to wipe away your digital fingerprints. Remember to avoid opening or clicking links in spam emails too, or, even better, mitigate spam altogether by using a fake or disposable email address to sign up for services online.

The only way to stay anonymous online is to stay offline, which is not ideal. However, using common sense and privacy-focused software can reduce spying, targeted ads, and ID theft when you browse.


Can Disposable Email Solution SimpleLogin Protect Your Privacy?

We Tested Private Internet Access VPN’s iPhone App

Would You Sell Your Own Data—and What Would You Charge?

WhatsApp Eyes Option to Hide ‘Last Seen’ Status From Specific Contacts

Twitter May Soon Let You Remove Followers Without Them Knowing

 
   
TOP TECH DEALS
Want more deals like these delivered to your inbox?
GET OUR BEST DEALS TODAY
 
 
 
All-new Fire HD 10.1″ 1080p Tablet with Hands-free Alexa

 
$149.99 $99.99  
GET DEAL

 
55″ Hisense U6G 4K Quantom Dot QLED Premium Android Smart TV (2021 Model) w/ 4x HDMI Inputs

 
$649.99 $529.99  
GET DEAL

 
Up to 50% off Dell Small Business Semi Annual Sale on Vostro Laptops & Desktops, Optiplex/Latitude Business PCs

 
 
GET DEAL

 
Gateway Intel Core i3-1005G1 14.1″ 1080p Laptop with 4GB RAM, 128GB SSD

 
$499.00 $279.00  
GET DEAL

 
Free 6-Month Trial & Then 50% off Amazon Prime Membership for Students (New Members Only)

 
 
GET DEAL

   
                                       
All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant’s terms and conditions before you buy. Publisher is not responsible for errors or omissions.
SHARE & FOLLOW US
      

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s