How to Keep Your PC Safe From Hackers
The furor may distract from more nefarious threats, though. Industry experts say that last year there were 286 million types of malware responsible for more than 3 billion attacks on computer users, while the software guarding against those attacks generally catches only 60% of what it comes up against.
Although there may be no 100% guaranteed strategy for beating hackers and stopping snoopers, there are some simple safeguards to put in place:
|There are some simple steps people can take to keep out computer hackers and snoops.|
Every day, millions of people post online pictures of their kids, vacations and family events. Most are unaware of the wealth of data that can easily be extracted. Digital photos contain an "EXIF" (Exchangeable Image File Format) data file that stores information about the image -- much of it fairly innocuous. A simple browser plug-in (or standard photo viewers) can tell what shutter speed and aperture was used, the date and time a photo was created and even if a flash was used. The danger comes from higher-end cameras and photos taken with cellphones and smartphones. These can add GPS information and geo-tagging that provides an exact longitude and latitude of where the picture was taken. A quick trip to Google (GOOG) Maps can zero in on the exact address. In some cases -- although usually intentionally by professional photographers -- a full name and phone number can be embedded. All that information is a boon to potential stalkers and a quick way to ruin the anonymity of a blogger. Combined with personal information offered on such sites as Twitter, FourSquare and Gowalla, the use of EXIF data can be an invitation to burglars and other evidoers. National security can even be compromised, as is detailed in a report issued by the Pentagon that warned personnel against inadvertently revealing troop positions. There are two basic ways to protect yourself. One is to disable the geo-tagging feature in your smartphone, a task that can be as easy or complicated as your particular manufacturer makes it. (The website ICanStalkU.com offers guides for many popular brands.) You can also strip EXIF data from photos using Microsoft's (MSFT) Picture Viewer in Windows (right-click to "properties," and click on "remove properties and personal information"). Apple's OS similarly enables the removal of data, as does the popular editing software, Adobe (ADBE) Photoshop.
Select the service that is right for you!COMPARE ALL SERVICES
Jim Cramer and Stephanie Link actively manage a real portfolio and reveal their money management tactics while giving advanced notice before every trade.
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
- Weekly roundups
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Upgrade/downgrade alerts
Jim Cramer's protege, David Peltier, identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.
- Diversified model portfolio of dividend stocks
- Alerts when market news affect the portfolio
- Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
All of Real Money, plus 15 more of Wall Street's sharpest minds delivering actionable trading ideas, a comprehensive look at the market, and fundamental and technical analysis.
- Real Money + Doug Kass Plus 15 more Wall Street Pros
- Intraday commentary & news
- Ultra-actionable trading ideas
Our options trading pros provide daily market commentary and over 100 monthly option trading ideas and strategies to help you become a well-seasoned trader.
- 100+ monthly options trading ideas
- Actionable options commentary & news
- Real-time trading community
- Options TV