How To Disable Your Webcam When Not In Use [Windows]

Webcams come integrated in all laptops available in the market today. A laptop that doesn't have a webcam is unheard of. They're so common that operating systems include a camera app right out of the box. Of course, webcams are also a security risk. Someone can hack your webcam and use it to spy on you. The easiest way to avoid this is to tape the lens over like Mark Zukerberg does. If you don't want to use tape, there are special covers available for laptop webcams. Alternatively, you can just disable your webcam and make your system think you don't have one, period. Webcam On-Off is a free Windows utility that lets you disable your webcam in just one click. Read More

How To Block Non-Windows Store Apps In Windows 10

The Windows Store is still in its infancy stage. There are some good apps available in the Windows Store. Big names like Facebook, Twitter, and Netflix all have UWP apps that you can download from the Windows Store. The Windows Store apps are, if nothing else, safe. Users know for a fact that they are downloading the official app and no one has repackaged it with harmful or malicious code. That really is the whole benefit of a dedicated app store. The Windows 10 Creator's Update due in April this year is going to introduce a new limitation that will let users block non-Windows Store apps. The Windows smart screen already serves to protect users from installing unsigned apps. With this feature, users can block Win32 or desktop apps. Here's how it works. Read More

How To Check If A Website Is Affected By CloudBleed

CloudBleed is a new vulnerability that effects CloudFlare. CloudFare is a content delivery network and security provided that is the backbone of some very large, big name websites. This new vulnerability has made it possible for sensitive information; passwords, encrypted keys, and more. A simple Google search will not bring up this leaked information. As with any security breach, the standard protocol is to change your password immediately. The leak has bee patched but it has affected quite a few websites. Cloudbleed Indicator is a Chrome extension that alerts you when you visit a website affected by the vulnerability of the same name. CloudBleed is a Firefox add-on and Chrome Extension that can search your history and your bookmarks for affected websites. Here's how to check if a website is affected by CloudBleed. Read More

How To Enable And Disable Two-Step Verification In Whatsapp

Whatsapp has added a new security feature; two step verification. The feature was initially rolled out to select users but has now been made available to everyone using Whatsapp. Two-Step verification in Whatsapp adds a second layer of security to ensureno one can set up Whatsapp using your phone number. When you enable two-step verification in Whatsapp, any time you need to set up Whatsapp on a new device you will have to provide your passcode. Here's how you can enable and disable two-step verification in Whatsapp. Read More

How To Enable Dynamic Lock In Windows 10

Windows 10 supports multiple options for keeping your PC secure. You have three types of passwords that you can set; alphanumeric, PIN, and picture. If you have a supported device, you can set up Windows Hello and train it to recognize your face. The Creators Update for Windows 10 will introduce a new locking mechanism for your PC; Dynamic Lock. It's meant for users who forget to lock their device and it works with paired Bluetooth devices. When a paired Bluetooth device, specifically a phone, is no longer nearby, Windows locks itself after 30 seconds. Here's how to enable Dynamic Lock in Windows 10. Read More

How To Set Up Two Factor Authentication From Your iPhone

Apple introduced two factor authentication back in 2013. It was a new layer of security that users could enable but Apple never pushed the feature. Come iOS 10.3, iOS will persistently ask you to set up two factor authentication. In fact, iOS 10.3 comes with a revamped Settings app that lets you set up two factor authentication from your iPhone (or iPad). You are no longer restricted to setting it up from your desktop. Here's how you can set up two factor authentication from your iPhone. Read More

How To Remove Trusted Devices From Your iPhone

You can use your Apple ID on multiple devices. Apple introduced two-factor authentication for Apple IDs back in 2013.  With two-factor authentication enabled, you can identify trusted devices for your Apple ID. These trusted devices do not require a verification code if you have two-factor authentication set up.  You can view all trusted devices by signing into your Apple ID on the desktop. Come iOS 10.3 you will have a new, revamped, Settings app that lets you set up two-factor authentication and remove trusted devices from your iPhone. Here's how. Read More

How To Prevent Chromecast From Being Hijacked On A Shared Network

Chromecast is a budget-friendly device that makes an ordinary TV or monitor far more useful. Because it is budget friendly, you will often find it in use in dorms and hotels where the WiFi is shared. The thing about a Chromecast is that when it's connected to a shared network, everyone on that network can cast to it. If you're in college and have your Chromecast connected to the dorm's WiFi, anyone else connected to it can easily hijack it and cast content of their choice. To prevent Chromecast from being hijacked on a shared network, you have to create a private network, turn it into a hotspot, and connect your Chromecast to it. It may sound complicated and if you Google the process you might think you need to buy an extra router. There's an easier way. Read More

This Tool Tells You Everything Your Browser Tells Websites About You

We all know websites collect information from us, either implicitly or explicitly. They get the information via the web browsers we use. You might not trust a shady looking website with your information but you will trust Chrome. The thing is, browsers are the information gateway that websites use. What every Browser knows about you is a web app that shows you the personal information stored by your browser. This information can be accessed by websites without you explicitly allowing them access to it. It also tells you what you can do about the information being freely available to websites. Read More

How To Exclude A File, Folder, Or Process From Windows Defender In Windows 10

Windows Defender is the built-in virus protection that Windows comes with. It isn't easy to turn off, and occasionally it will flag a file incorrectly. That said, it's still reasonably good protection for your system even if it is resource hungry. If you find Windows Defender is constantly flagging a file or a process as malicious when it isn't, you might be tempted to disable it. This will likely put you at serious risk. A much better way to deal with the problem is to exclude the file, folder, or process that it keeps blocking. Here's how. Read More

How To Discretely Dial An Emergency Number From Your iPhone

Apple has been receiving quite a bit of criticism for its Macbook lineup. The iPhone 7 has likewise been the target of quite a few jokes. iOS 10 is plagued with odd bugs. All this equals to a lot of people saying the end of Apple is near. It's times like this when you have to remember that Apple is still paying attention to the small things. Back when iOS 8 first debuted, it brought with it a feature called Medical ID. This put essential medical information on your lock screen. It can be accessed by anyone if you ever experience a medical emergency and be helpful for anyone trying to assist you. In iOS 10.2, Apple has added yet another awesome feature aimed towards safety; Emergency SOS dialing. The feature lets you discretely and quickly dial your local emergency number when you are unable to dial it. Here's how it works. Read More

How To Get An Alert When An App Accesses The Webcam Or Mic In macOS

Malicious websites and apps can gain access to your webcam and microphone. A lot of people might consider this to be an urban legend but there is truth to it. Unfortunately, a website or an app that does this isn't going to be easy to detect by the average user. Tech savvy users might be able to tell if their webcam or mic is being accessed but for the ordinary user, and Mark Zuckerberg, you likely have to tape a bit of paper over your webcam to be safe. Oversight is a free macOS app that makes this much easier. It monitors all connected webcams and microphones and alerts you when they are accessed. It's a very simple app that monitors current processes and can identify which app started a process to access these two devices. Read More

Is It Safe To Copy/Paste Passwords From Your Clipboard?

Passwords, whether they're for an online service or for our local Windows account, need to be guarded carefully. A leaked password can often help anyone with malicious intent guess what your other passwords might be. People who use important numbers like their birthdays in their password put themselves at even greater risk. General safety protocol says you shouldn't use the same password for multiple accounts, nor should you write it down anywhere it can be found easily. Many people resort to using password vaults i.e. services like LastPass so they don't have to write passwords down or bother to remember them. For the most part a password vault is a safe and secure way to store passwords unless of course users compromise security by copying passwords to the clipboard. The clipboard is a Windows feature that every single app on your system has access to. There is no way to filter out which apps can and cannot access content on the clipboard. If you've installed a malicious app on your system then copy/pasting passwords to/from your clipboard is a security risk. Read More

How To Find Which App Is Using Your Webcam [Windows]

Controlling which apps can access your webcam is pretty simple in Windows 10. You can easily edit the list and revoke an app's access to your webcam if you feel it isn't safe. Windows 10 explicitly has you grant apps access to your webcam so you're safe for the most part. Of course, this is for the good, trustworthy apps that have verified publishers or that come from the Windows Store. Apps that are malicious or that you might have unknowingly downloaded when downloading other apps are an entirely different story. If you suddenly find the little light next to your webcam turned On but can't figure out which app is using it, there's a very simple way to track it down. It requires an app called Process Explorer and the built-in Device Manager. Here's what you need to do. Read More

How To Hide Widgets From The Lock Screen In iOS 10

Widgets no longer appear in the Notification Center in iOS 10. They've moved to a page of their very own. They now appear under Spotlight search when your iPhone is unlocked. When the phone is locked though, widgets appear on a dedicated screen when you swipe right. In iOS 10, the lock screen spans three screens; one for the widgets, one as the default screen that will feature the time, date, and any timer that's running etc, and the third will open the camera (you no longer swipe up to open it). There is no way to customize this and it means your widgets are going to be accessible from the lock screen. Some might consider this a security risk. A widget can reveal an upcoming event that you plan on attending or how long it takes you to get home from work. If you're concerned about widgets on the lock screen compromising security but want to continue using them, you can hide them from the lock screen but still keep using them on an unlocked device and with Touch ID on the lock screen. Here's how. Read More

How To Run An Unidentified App Without Changing Gatekeeper’s Settings

Gatekeeper is a security feature introduced in macOS in Mountain Lion that let users choose which apps can and can not run on their Macs. The feature has three options for allowing/disallowing apps; run apps from the Mac App Store only, run apps from the Mac App Store and from identified developers, and run apps from anywhere i.e. from any origin and developed by anyone. To run apps from unverified developers, you have to change Gatekeeper's settings and allow apps to run from anywhere and then you have to remember to change the setting back if you want to keep your system safe. Alternatively, macOS does let you run just the one app as an exception and keep the Gatekeeper settings unaltered. Here's how. Read More

Why Does My iPhone Ask For The Passcode When I Haven’t Restarted It?

Every time you restart your phone, even if it's after an iOS upgrade, the phone will ask you to enter the passcode. Touch ID has to be enabled again for purchases in the App Store. However, it happens at time that it will start asking for your passcode even though you haven't restarted the phone. It isn't a bug and there's actually a good reason as to why this happens; it's because you failed to unlock the phone with Touch ID. Read More

How To Unlock Your Android Phone Just By Looking At It

Security is a very serious concern for anyone using a smartphone and where it's important to keep our information safe it's also important to be able to get inside our device easily. Android users often have more than just the system based options for securing a device and with newer devices that support finger print recognition, you have yet another way to quickly and safely unlock your device. Users who have the option to pair their phones with a smartwatch can unlock a phone faster but if you don't have a device to pair with your Android phone you can use face recognition to unlock it. Here's how. Read More

Stop MS Word From Opening Documents From The Internet In Protected View

When you download an MS Word document either from a cloud drive or from an email it opens in the 'Protected' view. In the Protected view, just about all editing options are disabled and the most you can do is copy text from the document. The document of course isn't locked to the Protected view and should you wish to edit the document, you can quickly switch over to the editing mode. It's only a few extra clicks but if you would rather get right down to editing a document and this security measure is an annoyance, here's how you can turn it Off. Read More

Turn On ‘Find My Device’ To Track Your Windows 10 Laptop

Location tracking apps are a popular feature in mobile operating systems and both Android and iOS have one. The feature is meant to help if you've forgotten your phone some place or if it's been stolen but phones aren't the only devices that are portable. Tablets and laptops are used commonly by anyone who works on the go and they too can be forgotten or stolen. Windows 10 is meant for both laptops and tablets and as of build 1511, it comes with a location tracking feature for keeping track of your tablet or laptop. Here's how to turn it on. Read More