Of you want to hide folder on your Windows 11 or Windows 10 computer, you probably expect to buy a security program that can do that. However, before you invest your hard earned money in such a solution, you may want to consider the available built-in methods of folder hiding that already included with Windows. If you are familiar with Windows batch files and know how to create them you may find folder locking batch file of use. Surely, the folder protection it provides it’s not as strong as that of the paid security programs, but depending on your specific situation, the protection offered by the folder locker batch file could be just enough, and it’s free! Check it out.
Usually when you use the Photos app on your Windows 11 or Windows 10 PC, it shows all photos it can find, but did you know you could hide photos from other people when they use the Photos app on your computer? You can achieve that by excluding a folder with pictures from Windows search index, and that would hide the photos you don’t want others to see from the Photos app. Read more…
Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen. While you, as an individual, can’t stop those breaches against some of the nation’s biggest retailers and financial institutions, there is something very simple that you CAN do: check your credit history.
There are three main credit reporting agencies in the U.S.: TransUnion, Experian, and Equifax. Together, they have set up a system through which you can request one free credit report each year from each of their agencies. You have the choice of getting all three at once or spreading them out over the course of the year.
To request your free reports, go to www.annualcreditreport.com.
Your report will include any names you have used, your addresses, how much you owe your creditors, whether you pay on time, whether you’ve been sued and whether you’ve filed for bankruptcy. Each report collects slightly different information from different sources, so it is important to check all three—whether at the same time or spread out over time.
Why is it important to make sure each of these reports is accurate? This may be your first indicator that someone is committing fraud in your name. In addition, these credit agencies sell this information to creditors, employers, insurance companies, and other businesses. The information in this record may make a difference in whether you get a mortgage, new car loan, new credit card, get a job or pass a rental screening.
Continue reading: FBI Tech Tuesday: Building a Digital Defense with Credit Reports — FBI
Google has recently pulled 36 fake security apps from Google Play, after they’ve been flagged by Trend Micro researchers.
Posing as legitimate security solutions, and occasionally misusing the name of well-known AV vendors like Avast, the apps seemed to be doing the job: they showed security notifications and other messages, warned users about malicious apps, and seemingly provided ways to fix security issues and vulnerabilities.
But, it was all an act: the notifications are bogus, and the apps used simple animations to trick users into believing the discovered issues were resolved.
The apps’ real goals was to bombard users with ads and entice them to click on them, as well as covertly collect information about the user, the device, the OS, the installed apps, and track the user’s location, and upload all this information to a remote server.
Because Symantec uses a filter driver to intercept all system I/O, just emailing a file to a victim or sending them a link to an exploit is enough to trigger it – the victim does not need to open the file or interact with it in anyway. Because no interaction is necessary to exploit it, this is a wormable vulnerability with potentially devastating consequences to Norton and Symantec customers.
An attacker could easily compromise an entire enterprise fleet using a vulnerability like this. Network administrators should keep scenarios like this in mind when deciding to deploy Antivirus, it’s a significant tradeoff in terms of increasing attack surface.
If you use a Symantec or Norton product, now would be a good time to update.
Lately I’ve been receiving a lot of phone calls warning me that the IRS is filing a lawsuit against me.
This would be scary, except that I know it isn’t true.
Fake IRS calls are a type of fraud that has become more common in the past few years. Fraudsters claim to be IRS agents, police officers, and other officials. They say that you owe back taxes and that if you do not pay immediately you will be subject to jail time, loss of your driver’s license, or other penalties.
Continue reading: For Better – Or What?: Is the IRS Investigating You?
Two-factor authentication is an extra layer of security for your Apple ID designed to ensure that you’re the only person who can access your account, even if someone knows your password.
With two-factor authentication, your account can only be accessed on devices you trust, like your iPhone, iPad, or Mac. When you want to sign in to a new device for the first time, you’ll need to provide two pieces of information—your password and the six-digit verification code that’s automatically displayed on your trusted devices. By entering the code, you’re verifying that you trust the new device. For example, if you have an iPhone and are signing into your account for the first time on a newly purchased Mac, you’ll be prompted to enter your password and the verification code that’s automatically displayed on your iPhone.
Because your password alone is no longer enough to access your account, two-factor authentication dramatically improves the security of your Apple ID and all the personal information you store with Apple.
Once signed in, you won’t be asked for a verification code on that device again unless you sign out completely, erase the device, or need to change your password for security reasons. When you sign in on the web, you can choose to trust your browser, so you won’t be asked for a verification code the next time you sign in from that computer.
People love to use the same password over and over again, or they invent some amazing scheme like the same single word followed by their birth year, or replacing a’s with 4’s. And no matter how many password database get hacked the idea that password security matters doesn’t seem to really sink in.
When I do get someone to listen I tell them to use diceware generated passwords and them write them down in a little book and guard the book jealously (actually, I tell them to use a password manager but most people seem to balk at using software I think for fear of losing their passwords).
But then they often ask the sensible question: “What if someone steals that book?” And so I suggest a ‘two factor’ solution.
Continue reading: Two factor paper passwords | John Graham-Cumming
Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.
FBI offers tips to protect yourself and your organization from this growing threat.
A man is held in prison for seven months after failing to decrypt two hard drives that investigators suspect contain indecent images of children.
A court order says the man will remain jailed “until such time that he fully complies” with an order to unlock the password-protected devices.
The US man, who has not been charged with possessing illegal images, is appealing against his detention.