Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

How to share a YouTube video starting at a specific time

28 January 2025 at 06:00

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

The NSA says do these 5 things with your phone right now

24 January 2025 at 15:31

Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really. 

THESE MISTAKES COULD TANK YOUR CREDIT SCORE

Let’s take a deeper look at five smartphone rules they use that you can, too.

1. Restart your phone once a week

It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.

Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

3. Skip public USB ports

In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. 

If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.

4. Don’t use public Wi-Fi

It's a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called "Coffee Shop" or "Hotel Guest" to make you believe you’re connecting to the real thing when, actually, you’re not.

Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

5. Cover your mic and camera

The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.

In "hot-miking" attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve handed out:

It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.

The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10. 

It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.

Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording. 

While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Does your Windows 11 PC keep restarting? Let's fix that frustrating problem

21 January 2025 at 10:00

Experiencing a Windows 11 boot loop can be incredibly frustrating, transforming your computer into a seemingly endless cycle of restarts that disrupts productivity. When your system continuously fails to load the login screen and instead repeatedly attempts to restart, you're facing a critical technical issue that demands immediate attention.

This persistent reboot problem can stem from various causes. So, what do you do? Let's look at some ways to diagnose and resolve the Windows 11 boot loop, helping you restore your computer's functionality and get back to work.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

There's no single cause for a Windows 11 PC getting stuck in a reboot loop. A reboot loop can be caused by an issue with your computer's power supply, a malware infection, overheating or even hardware drivers. Here are the different things to check if your Windows 11 laptop or desktop keeps restarting.

When you are troubleshooting any problem on your PC, you should boot your computer in safe mode. If your PC is in safe mode and no longer experiences the restart loop, this means that the default Windows 11 settings and drivers aren't causing the issue. This allows you to narrow down the sources of problems causing your Windows 11 PC to crash, making it easier to troubleshoot. Here's what you need to do to boot in safe mode:

When your computer restarts, it will automatically restart in safe mode. If your computer restarting is making it difficult to follow these steps, you can also follow these steps at the sign-in screen:

Now, when your PC restarts, you will be presented with a list of options. Select or F4 to start your PC in safe mode. If you need to use the internet while the computer is in safe mode, you can select option or press F5.

WINDOWS 11 TIPS AND TRICKS YOU DIDN'T KNOW YOU NEEDED

If your automatic rebooting problem began after installing a new app, uninstall that app and monitor your PC. If you still notice your PC restarting, there's a chance that the app has infected your system settings before you uninstalled it. To fix this, you'll need to restore the system. To do a system restore, you should first boot your PC in safe mode and then follow these steps:

An overheating laptop or desktop will try to prevent damage to critical hardware components by shutting itself down. This is one of the leading causes of a Windows 11 PC getting stuck in a restart loop. If you've noticed your desktop giving off a lot more heat than usual or a laptop feeling hot to the touch, chances are you have an overheating issue.

A computer's CPU and GPU generate the most heat, so I recommend monitoring those hardware pieces to see if they are overheating. You don't need any additional software to monitor the temperatures of your GPU, as some temperature readings are built into Windows 11. Here's how to check your hardware temperatures in Windows 11:

Unfortunately, the built-in temperature reading doesn't read your CPU temperature, and you'll need to manually go into the UEFI/BIOS to check the temperature without installing any additional software. However, there's a multitude of free-to-use apps that manufacturers have developed to measure your CPU temperature, including Core Temp, HWMonitor or Open Hardware Monitor.

When you open one of these monitoring tools, you'll be able to view your PC's stats, including CPU and GPU temperatures and loads. If your CPU or GPU is running too hot, try cleaning the components to remove dust. For custom-built desktops, adding more exhaust fans to the case can improve airflow and cooling. Persistent overheating, especially in older laptops, may indicate that it's time to consider upgrading your machine.

TAKE YOUR WINDOWS PC'S SECURITY TO THE NEXT LEVEL

A computer will randomly restart when it has a failing power supply unit (PSU). If you have an issue with your power supply, you'll know if your computer won't restart or turn on. In addition to causing shut-offs and restart loops, a faulty power supply can also cause a blue screen of death error. In severe cases, you might even smell a burning scent or witness smoke coming from your PC's power supply exhaust vent. If you use a laptop with PSU issues, you cannot send your computer to a repair shop or the manufacturer for repair.

Desktop PC owners have it a bit easier, assuming they have a pre-built PC that can be altered easily. If you do have a desktop, turn off and unplug your computer before going into the case to investigate if dust build-up is affecting your PSU. If your PSU fails, you must purchase and install a new one.

Malware and other viruses are a common cause of a crashing or constantly restarting PC. The easiest way to do this is by using strong antivirus software. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

If your computer is stuck rebooting, you may need to boot in safe mode in order to run an antivirus application. Here's what you need to do to boot your PC in safe mode with Windows 11:

Now, your computer should act more stable after booting in safe mode, allowing you to run an antivirus scan.

10 USEFUL WINDOWS KEYBOARD SHORTCUTS YOU NEED TO KNOW

If you have automatic restart enabled in Windows 11, your PC will restart every time it encounters a system failure. You can easily disable this future within the Windows 11 command prompt. Here's what you need to do:

Keep in mind this isn't a fix for the problem, but it will help you further troubleshoot the restart loop problem by disabling automatic restarts.

An issue with your Windows 11 system files may be causing your PC to constantly restart. If you think a corrupted system file is why your PC keeps restarting, there's a quick and easy fix you can do within the Windows Powershell. The System File Checker (SFC) is a built-in tool that will scan your Windows system files for corruption or any other changes. If a system file has been modified, it will automatically replace the file with the correct version. Here's how to run the SFC command:

If there's no problem with your Windows system files, after the scan, you'll see a message that says, "Windows Resource Protection did not find any integrity violations." If you instead see a message saying, "Windows Resource Protection found corrupt files but was unable to fix some of them," you should try running SFC again but in safe mode.

Your PC might be restarting itself because it doesn't have access to enough random access memory (RAM). Windows 11 may become unstable without enough RAM in your computer, causing the OS to randomly reboot. You can use the built-in Memory Diagnostics Tool in Windows 11 to check your computer for issues related to RAM. Here's what you need to do:

When your PC restarts, the Windows Memory Diagnostics Tool will check for any RAM-related issues; if the test detects an error, take note of the error code. You can check the error code online to find the correct fix for that specific error.

These are the best fixes for a computer that is constantly restarting. While you can perform these fixes at home, it might be your best bet to send your computer to a repair shop or back to the manufacturer if you continue having an issue with your Windows 11 PC being stuck in a restart loop after these fixes. It also may be time to invest in a new laptop if you are experiencing a system slowdown and random restarting on your Windows 11 PC, but I would recommend trying to fix the problem first before buying a new machine.

What was the most challenging computer technical issue you've ever encountered, and how did you resolve it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Fake job interview emails installing hidden cryptocurrency mining malware

18 January 2025 at 10:00

The job market hasn’t been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs. 

Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread crypto miners on people’s devices. 

It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency. This app hijacks your PC’s resources, like the CPU and GPU, which slows down its performance significantly.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

This malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported by Dark Reading. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.

The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed "CRM application."

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The site provides download options for both Windows and macOS. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.

The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

A cryptomining app can significantly impact your PC’s performance. Once installed, it hijacks your computer's resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power. 

In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.

CrowdStrike is aware of the scam and advises individuals to stay vigilant. "This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files," the company said in a blog post

"Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity."

GET FOX BUSINESS ON THE GO BY CLICKING HERE

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

1. Check if you applied for the job: If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn't apply, it's likely a scam. Always confirm directly with the company before proceeding.

2. Verify recruiter credentials: Always double-check the recruiter’s details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.

3. Avoid downloading unsolicited files: Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.

4. Inspect links before clicking: Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.

5. Use strong antivirus software: Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Cybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computer’s resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you don’t trust.

Have you ever received a suspicious email that looked like a job offer? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

These mistakes could tank your credit score

17 January 2025 at 15:42

Do you know the difference between 550 and 780? Yes, they’re 230 digits apart, but they’re also examples of bad and good credit scores, respectively.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you don’t check yours regularly, now’s the time to start. Small mistakes are a lot more common than you think, and they can do some serious damage to your credit score. I’ll let you in on some of the most common credit report mistakes and what you can do to fix them.

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

Step 1: Get your free credit report

The three credit reporting agencies (TransUnion, Experian and Equifax) are required by law to provide you with one free credit report a year. Sweet. There are a few ways you can request a copy from each agency.

Online is the fastest route. If you submit a request via phone or mail, expect to wait two weeks after the paperwork is received.

Pro tip: Grab your report from the fourth credit bureau, Innovis, too.

Step 2: Look for the most common mistakes

Typos or wrong info: Anything from your name spelled incorrectly to your address or your birthdate off by one number. Tiny mistakes can mix up your credit with someone else’s.

Accounts you don’t recognize: If you see something you don’t recognize, don’t ignore it! This includes credit cards you never applied for, loans in your name or purchases you didn’t make.

Duplicates: It’s not normal to see a debt twice on a credit report. This includes things like the same collection account, transferred debts showing as separate accounts or paid-off debts still sitting there.

Incorrect account info: Sometimes, payments can mistakenly show up as late, or closed accounts may still show as active. Other times, reports may show the wrong credit limit or mess up your payment history.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

Outdated info: Bankruptcies older than 10 years, late payments older than seven years and outdated collections accounts should not be showing on your credit report.

Make sure websites are following your rules: How to check permissions

Step 3: Report anything strange

Don’t panic! Write down and make copies of anything that looks off, then file a dispute with the credit reporting company by mail, phone or online.

If you’re filing online or by mail, explain in writing exactly what’s wrong and why, and include copies of documents with proof. Make sure to include your contact info, credit report confirmation numbers and a copy of your version of your credit report.

And always follow up! Bureaus are required to look into your disputes within 30 days. Track its progress until you have a resolution in writing. If your dispute is valid, the bureau has to fix it and tell the other bureaus as well.

A lot of these issues boil down to good old-fashioned human error. It happens, but don’t let that stop you from taking charge.

Related: How to run a 5-minute privacy check on your phone

While you’re at it, find your job number

Equifax also runs a database of 716 million income and employment records, including, potentially, yours. It’s called The Work Number, and employers use it to make sure you are who you say you are.

Your Employment Data Report (EDR) includes things like where you’ve worked, when you worked there and your exact past salary numbers.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

Trying to get a new job? An employer could use your EDR to find your past salary range and lowball you in negotiations. And, of course, Equifax will sell your EDR to anyone who’s buying, including debt collectors. 

Money smarts: It’s not just bogus calls and emails putting your bank info at risk

How to stop it

You can freeze your EDR just like a credit report. You can also see who’s tried to access it within the past two years. You’ll need to make an account with The Work Number to do it. 

Once you register, look over your report and make sure it’s accurate. Fill out this data dispute form if you find anything fishy.

Then, head back to the dashboard and click Freeze Your Data. Fill out the Data Freeze Placement Form and submit itThe Work Number will send you a freeze confirmation letter, along with a PIN. Save your PIN in your password manager. You’ll need it if you ever want to unfreeze your report.

You can always log into The Work Number or call them to unfreeze your report.

If you can’t find your employer: They may not be registered with The Work Number. Call the freeze helpline at 1-800-367-2884 to double-check.

Unless you’re actively applying for a loan or government benefits, or unless an employer actively requests your EDR, it’s a no-brainer to freeze it. And if a potential employer insists on checking your EDR to hire you, maybe it’s not the right fit after all.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

What to do if you think your PC has a virus

16 January 2025 at 10:00

If you suspect your PC has a virus, it's important to act quickly to remove it and protect your data. 

Keep reading to discover the key warning signs and the steps you can take to address the issue.

There are several red flags that could signal your computer may have a virus. One of the most common is if your computer starts running unusually slow. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Another warning sign is the appearance of unfamiliar apps or programs that you don’t remember installing. Additionally, if your usual programs start crashing frequently or behaving oddly, it’s a cause for concern. 

Finally, an overheating computer is a good reason to start investigating further.

WINDOW USERS ARE BEING TRICKED BY SNEAKY MALWARE SCHEME

Realizing you have a virus can be scary, but there’s no need to panic. Here’s what to do next.

1. Disconnect from the internet:

2. Enter safe mode:

3. Run a virus scan:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4. Delete or quarantine infected files:

5. Clear temporary files:

6. Reset browser settings:

7. Check Startup Programs

8. Update your software:

9. Backup your data:

HOW TO REMOVE MALWARE ON A PC

Here’s how to be proactive about protecting your PC from viruses down the road. 

Use safe browsing practices: Avoid clicking on suspicious links or downloading files from untrusted sources.

Enable firewall: Make sure your firewall is enabled to block unauthorized access to your computer.

Download apps and software from trusted sites only: Check the number of downloads, as more suggests greater reliability. 

Use a secure VPN connection: Mask your IP address with a trusted VPN (virtual private network) service to secure your online activity. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By following these steps, you can effectively remove a virus from your PC and protect your data. Staying vigilant and practicing good cybersecurity habits will help safeguard your system from future threats.

What other PC issues would you like help with? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

5-minute cleanup for your phone and computer

13 January 2025 at 16:25

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

AI isn’t going anywhere: Prompts to make life easier

10 January 2025 at 20:20

I was having dinner with my husband in Paris. We got the wine menu and all the names, of course, were in French. Barry wanted something equivalent to a Napa cabernet, so I took a picture of the menu and asked ChatGPT. In seconds, it recommended a wine. I double-checked with the waiter, and he gave it a thumbs-up.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

You might think AI is just for businesses, programmers, or the ultra tech-savvy, but it’s not. It’s for anyone willing to give it a try.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Instead of ignoring this powerful tool, make this the year you embrace AI. It’s easier and more helpful than you think.

Let’s start with the basics

"So, uh, where do I find ChatGPT?" I get that in my email every day. Use it on the web or download it for iPhone or Android

The free tier works for most people. I pay $20 a month for ChatGPT Plus. It’s worth it to me for access to the better features and faster response times. Start with free. If you find yourself relying on your favorite AI tool regularly, consider upgrading. It is worth considering.

ChatGPT isn’t the only option, but it is my preference (at least for now) and the most popular. You can also try Google GeminiPerplexity and Claude.

With all these, the workflow is the same. Think of it like Google, but instead of punching in one search term and scrolling through results, you have a "conversation" with the bot to get exactly the output you want. 

Like any tool, you need to use AI wisely and triple-check its results. Trust me, you don’t want to end up like those lawyers who used AI to draft court documents, only to have the judge catch the glaring mistakes. 

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

You’ve heard of prompts, right?

This is what we call the text, question or command you provide an AI system to guide its response or action. It’s your instruction on what you want, so the better your prompt, the more useful and accurate the response will be.

"Priming" is the insider term for telling a chatbot exactly what you want from it. With ChatGPT or any other, the more constraints you give, the better your answer. Examples: "Limit your response to 250 words," "Give me the list in bullet points," "Format the results as a table," "Use this data to create a bar chart."

Remember, AI can’t read your mind. It only knows what you tell it. Use "do" and "don’t" in your prompts to get the results you want. Say you’re cooking for friends, and some have allergies. Say, "Create a recipe for six people. Do include protein, fruits, vegetables and carbs. Don’t include dairy products, shellfish or nuts."

7 prompts to make life easier

Make your goals actionable: "I have a goal for 2025 to [fill in the blank]. Can you help me make it SMART?" (SMART is an acronym for Specific, Measurable, Assignable, Realistic and Time-related.) Maybe you’re not there yet. Try this: "I want to [fill in the blank], but it feels overwhelming, and I don’t know where to start. Can you help me by breaking it down into more manageable tasks?"

"Give me 10 more examples": That’s a prompt I use with ChatGPT all the time to make the chatbot a better brainstorming buddy. Some of its "ideas" are downright bad, but it might spark something creative in your brain, too.

"How can I make this better?" Add in anything you’ve written — a blog post, a travel plan, a resume or even a heartfelt email. This prompt works wonders for polishing your work and pointing out improvements, like a personal editor at your fingertips.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

Your very own free assistant: Say you have messy notes from a meeting. By hand, you’d spend 15 minutes turning those into an email fit for your boss or team. Instead, open a chatbot and say, "Turn these notes into a professional, friendly email to my team." Paste your notes at the end and voila. Pro tip: Ask your bot of choice, "Is there anything that needs more details?" to fill in any missing info.

Shortcut your inbox: When you get a really long email, open your AI chatbot of choice, and type in the prompt, "Summarize this email for me. Tell me what I need to do, then write a thoughtful reply. Here is the email." Paste in the email and let AI do its magic.

Wanna get in shape? Ask your AI to create a custom fitness plan. Try this: "Create a 30-day fitness plan for fat loss and muscle gain tailored to a [male/female] beginner at [your age]." Or get specific: "Create a four-week fitness plan to help me run a mile for the first time." Don’t sweat it.

Spouse forgot to load the dishes again? Instead of firing off a rage-filled text, let AI step in. Ask your fave chatbot to reframe your frustration into something a bit more … constructive. I like this prompt: "Make this message sound more friendly." 

Don’t forget about privacy

It's easy to think your bot is a trusted ally, especially when it’s pumping out helpful answers all day long. But it’s definitely not. It’s a data-collecting tool like any other.

Be smart about what you say. Never type in passwords, sensitive financial data, or confidential work or business information. My rule of thumb: Don’t tell a chatbot anything you wouldn’t want made public. 

With a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

How to easily print photos from your phone

10 January 2025 at 01:00

Are you an aspiring Android or iPhone photographer? Both Android OS 15 and iOS 18 bring professional photography features to their new smartphones with advancements made in artificial intelligence-assisted photo processing and top-of-the-line digital camera sensors in the top-line smartphones.

Even if you don't enjoy taking photos directly from your smartphone, most cameras now allow you to instantly transfer pictures from a camera to a smartphone via Bluetooth

You can also print high-quality pictures from your phone, and it's surprisingly easy. Here are a few different ways to print a photograph from your smartphone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Using a Wi-Fi-enabled printer

Many of the most popular printers available today feature Wi-Fi functionality, and if you have a Wi-Fi-enabled printer, you can print photographs directly from your phone. Most modern photo printers are fully wireless, allowing you to easily print photos directly from their Android or iOS smartphones. Check out my top printer picks here. Here's how to print from a wireless printer on both Android and iOS:

For iPhone:

For Android:

Settings may vary depending on your Android phone’s manufacturer.

Portable photo printers are handy for printing on the go. They usually connect via Bluetooth or Wi-Fi and come with apps for easy printing. Portable photo printers are a great idea if you want a compact photograph printer that's great for taking with you on trips. Many portable printers are small enough to fit in a travel bag and are battery-powered, so there's no wired setup necessary. Check on my picks for the best portable printers here.

TOP PRINTERS 2025

Using an online photo printing service

You can also use apps or websites like Shutterfly or Snapfish that offer photo printing services. Upload your photos, choose your print options, and have them delivered to your home or picked up at a local store. Similar services are also available at your local print shops or even at big-box stores such as Staples, which also provide high-quality poster and image printing. Using a print service and shop to process your photographs can be a great idea, as you can rest assured that your photographs are being printed on high-quality prints with great printers.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4 WAYS TO PRINT OUT, SAVE, AND SEND YOUR IPHONE'S TEXT MESSAGES

Transferring photos to your computer

You can transfer your photos to your computer and print them from there using your home printer. This is a great option if you have an older printer or an older photo printer that doesn't support Wi-Fi. Here's a list of our printer recommendations. I recommend looking at the options for color printers that we've highlighted. We made the list for everyone, so we made sure to include printers that can print beautiful photographs with ease. Here's how to do it from an iPhone to your computer:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO PRINT, SAVE, AND SEND ANDROID TEXT MESSAGES

It's exciting to see how both Android and iPhone have stepped up their game in mobile photography. With all the cool AI features and top-notch camera tech, taking amazing photos is a breeze. Plus, printing those memories is super easy now, whether you're using a Wi-Fi printer, a portable one, or an online service.

What challenges have you faced while trying to capture or print your photos, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Easy internet sleuth tricks you’ll wish you knew sooner

2 January 2025 at 16:04

The internet is a treasure chest of information … if you know where to look. Whether you’re trying to verify a website, learn more about your neighborhood or dig up what’s floating around online about you, a little tech know-how goes a long way.

Here are some simple, powerful tricks to level up your sleuthing skills.

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

See the details of any website

You’ve come across a website that offers an incredible promise of a free trip to Hawaii. Aloha! All the site needs is your personal info and a credit card. Before you take the plunge, make sure you’re not getting screwed over.

A WHOIS lookup search checks a database that contains information about domain names and their registrants — so you can find out who owns the website and see if they have a real business address and contact information. 

How do you get this done?

Next time you think a friend is getting scammed, pull out this awesome tech party trick. You could save them some cash and embarrassment!

RELATED: Your IP address: What it is and why you need to protect yours if you care about privacy

Run a free background check

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

Your online business is everyone’s business, like it or not. How can you check what the internet’s got on you? Here’s a quick and easy way:

Find out who your neighbor is

Go introduce yourself. If that’s not possible, you can find out online in most cases through a county’s assessor site. These government-run sites use data from assessors to estimate the value of real property within a county, city, town or village.

Once you get there, you can see where your person of interest lives, get details on their home or any other properties they own, and much more. You can even view signed documents, like the deed to their home. Yes, really.

The easiest way to find your county assessor’s site is a quick Google search. Just type in the county you’re looking for, along with "assessor." You can also go to Publicrecords.netronline.com. This directory includes official state and county websites you can search for by ZIP code. 

Every county assessor’s site works a little differently, but here’s an overview of how to search on the Maricopa County site here in Arizona.

20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER

Click on the Go to Data Online button next to the County Assessor option, then search by name or address. Click the magnifying glass icon to search and you’ll see the address, owner, parcel number and other information. Then click on the parcel number and to get even more detailed information and access any related documents.

PRIVACY 101:How to get photos of your home off Zillow, Redfin and Realtor.com

A picture is worth a thousand words

Words and profiles are one thing, but what about pictures of you? All these sites are

worth checking to see what pops up.

RELATED: Think of Google Lens as the smarter version of Google Images.

Go down memory lane

Not all online sleuthing is of the sneaky variety. This one is fun to try with all the places you’ve lived or a home you’re considering buying.

Pop into old Street View photos on Google Maps. You’re able to see what a place looked like going back as long as Google has captured photos there. I’ve spotted pictures going back over a decade. Talk about a hit of virtual nostalgia.

Now, share this article and impress your friends with your tech savvy — or save them from falling for a scam. Either way, you’ll look like the smartest person in the room. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

The biggest Wi-Fi mistake you didn’t know you were making

31 December 2024 at 17:14

You’ve got dinner in the oven, you’re looking for extra glasses, and your cousin’s kid screams (again), "What’s the Wi-Fi password?" You’re juggling a hundred things at once, and the last thing you want to do is to spell out your password.

Here’s the good news: You can slap a printout on the fridge, and everyone can scan it with their phones to connect. But first, I’ll show you how to create a separate network so you don’t need to worry about little Billy getting into your personal stuff on your devices and computers.

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

Be my guest

When guests connect to your main Wi-Fi, they can potentially access devices like smart TVs, printers, and even your laptop or phone if file sharing is enabled. Worse, if their device is compromised, your whole network could be at risk. A guest network keeps everyone happy while keeping your private life private.

Most modern routers let you set up a guest network without having to be a tech guru. Warning: This will take you a few minutes, but it’s totally doable.

RELATED: Is your internet slo-o-o-w? Let’s fix that.

Step 1: Log into your router’s admin console. You’ll need your IP address. You can usually find this on a sticker on the bottom or side of your router. Seeing 192.168.1.1 or 192.168.0.1 is common.

If you don’t see yours …

Step 2: Open your browser, type http:// and paste in your IP address. Hit Enter to open a login page. For the credentials, try the username admin and the word password for the password. If the defaults are different, they’re likely printed on your router. You can also check this site that lists default passwords for almost every router in use.

Step 3: Look for a setting called Guest Network or Guest Wi-Fi. Give it a different name (aka SSID) than your main network, along with a strong, unique password.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

If you have snoops in the family … When family and friends connect to your Wi-Fi guest network, you can block them from accessing your files or devices on your primary network. Turn off the local access setting.

Sorry, but dedicated snoops won’t stop at one closed door. Here’s a sign someone is poking around.

While you’re at it, a quick security check

Before you finish, take these extra steps to lock things down:

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

Your network is a bigger target than you realize.

Now for the fun part

Create a QR code that automatically connects guests to your new guest network — no hassle, no drama. With the free site QIFI.org, all you need is three pieces of info:

Hit Generate and your QR code is ready. Print some copies of it to hang around the house, or do what I did: Order this custom sign that looks classy. Now, when someone asks for the Wi-Fi password, you can just point.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Is your VPN enough without antivirus protection?

31 December 2024 at 08:00

As cyber threats continue to evolve and become more sophisticated, many people like yourself are seeking effective ways to safeguard their online presence. That includes Keith from Lisbon, Iowa, who asked, "If I have a VPN, do I still need an antivirus app?"

The answer is a resounding yes. While a VPN (virtual private network) provides crucial privacy and security benefits, it doesn't protect your device from malware, viruses or other cyber threats. Let's get into why you need both and how they complement each other to provide comprehensive digital security.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To achieve comprehensive online security, it’s crucial to understand the distinct yet complementary roles that VPNs and antivirus software play in protecting your digital life.

A VPN is your first line of defense for online privacy and security. It works by:

1) Encrypting your internet connection: This makes it extremely difficult for hackers, ISPs or other third parties to intercept and read your data.

2) Masking your IP address: By hiding your real IP address, a VPN allows you to browse the internet anonymously, making it harder for websites and advertisers to track your online activities.

3) Bypassing geo-restrictions: VPNs can help you access content that might be blocked in your region, giving you more freedom online.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

While a VPN protects your online activities, antivirus software focuses on defending your device itself. Here's what antivirus does:

1) Malware detection and removal: Antivirus software scans your device for viruses, trojans, spyware and other malicious software, then removes or quarantines these threats.

2) Real-time protection: Modern antivirus programs continuously monitor your system, preventing malware from infecting your device in the first place.

3) Phishing protection: Many antivirus solutions include features that block malicious websites and warn you about potential phishing attempts.

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

VPNs and antivirus software serve different but complementary purposes in your digital security arsenal.

VPNs secure your internet connection: They focus on protecting your data as it travels across the internet, ensuring your online activities remain private. Using a VPN service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Antivirus protects your device: It guards against threats that could compromise your device's security, regardless of how they reach your system. Therefore, it's important to have strong antivirus software actively running on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

By using both a VPN and strong antivirus software, you create a robust defense system that protects both your online activities and your device itself.

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

Remember, Keith and the rest of you: Cybersecurity is not about choosing between a VPN and antivirus; it's about leveraging both to create a multi-layered defense against the ever-evolving landscape of online threats. Combining these two powerful tools allows you to enjoy a safer, more secure and more private online experience.

What are your biggest cybersecurity concerns, and what specific help would you like from us to address them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Stuck behind a VPN wall? Let’s find a way around it

28 December 2024 at 08:00

A virtual private network (VPN) is a useful tool that allows you to mask your IP and create a secure, encrypted connection between your device and the internet. This means you can browse the web more privately, especially when connected to a public Wi-Fi network. Another use case for VPNs is accessing sites that are blocked in your region. For example, you could be sitting in New York and accessing content on Chinese social media platforms (though I wouldn’t recommend doing that). However, a VPN can sometimes have the opposite effect, blocking you from accessing content that you were otherwise able to view.

I recently received an email from Carol in Douglasville, Georgia, who asked:

"Why am I blocked from seeing a site when I use a VPN? I am being blocked from answering emails I receive from the VA, Social Security and government sites that I need to connect to concerning my benefits."

She says she attempted changing servers and even switched to different cities within the U.S., but she still couldn’t access the sites. Carol, that sounds like a serious issue. Understandably, you would want to use a VPN when visiting websites, and not being able to access them can be quite frustrating. This situation may even force you to disable your VPN, which could put you at risk. Below, I’ll discuss why this happens and how you can work around the issue.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

virtual private network (VPN) is a secure connection method used to add privacy and security to private and public networks, like the internet and Wi-Fi hotspots. VPNs are often used to protect sensitive data and to ensure that online activities are safe from cyber threats. By encrypting your internet traffic and masking your online identity, a VPN provides anonymity and protects against hackers, snoopers and data breaches. It also allows you to access content that may be restricted based on your geographic location, making it a great tool for boosting your online privacy and freedom. Here are 10 reasons you need a VPN at home.

Website owners can decide who gets to access their sites and who doesn’t. Many sites block IPs from known VPNs or data centers, especially if their content is restricted to certain countries or regions.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Big platforms like Netflix or banking sites often use VPN detection tools to prevent people from accessing their services anonymously. Government websites do this, too, mostly to prevent people from bypassing regional or national restrictions. For instance, in countries with strict content rules, blocking VPNs helps prevent people from accessing content the government doesn't want them to see.

But even setting your VPN to a different location in the same country doesn’t always work. Why? Because some sites are trying to keep cybercriminals out. VPNs can hide your identity and location, which is great for privacy but can also be misused for fraud. Government websites dealing with things like taxes, voting or benefits need to verify who you are and where you’re logging in from to prevent misuse. Allowing VPNs could make it easier for fraudsters to slip through.

Another reason for blocking VPNs is to keep bots at bay. Bots can use VPNs to scrape government websites or overload their systems. Blocking VPN traffic helps protect sensitive information and makes it easier to trace and authenticate real users.

HOW TO USE VPNS WITHOUT COMPROMISING YOUR BANKING APPS

If you're having trouble accessing certain sites with your VPN on, try the steps below. Start from the first step and keep going until the issue is resolved.

Using a reliable VPN service is one of the best ways to work around VPN blocks. Not all VPNs are created equal, and choosing a high-quality provider can make a significant difference. Look for a VPN that offers obfuscated or "stealth" servers, which disguise VPN traffic to appear as regular internet usage, making it harder for detection systems to block you. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

A good VPN should also have a large server network with plenty of options across different locations so you can easily switch if one server is blocked. Some services even offer dedicated IP addresses, which are less likely to be flagged compared to shared ones. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

HOW TO SECURE YOUR HOTSPOT PRIVACY AND SECURITY WITH A VPN

If one server isn’t working, try connecting to another in the same country or region. VPN providers usually have multiple servers, and switching might help you bypass the block. If this doesn’t work, use obfuscated servers. These servers are designed to hide the fact that you’re using a VPN. They can bypass strict VPN detection systems, especially on government or streaming websites.

To bypass VPN blocks, you can change the connection protocol your device uses. VPN protocols determine how devices link to servers, and some protocols are more adept at evading detection than others.

If you're facing issues accessing specific websites, switching to a different protocol may help. For instance, some protocols offer a good balance of speed and security, while others prioritize faster performance or efficiency, potentially improving your ability to bypass restrictions.

For more detailed information, it's important to research which protocols are best suited for specific use cases, as the effectiveness of different protocols can vary. 

WILL A VPN PREVENT APPS FROM TRACKING ME?

If you only need the VPN for certain apps or websites, enable split tunneling in your VPN settings. This lets you access blocked sites using your regular connection while keeping the VPN active for other purposes. For example, you can enable split tunneling to watch a movie on Netflix using your regular internet connection while keeping your banking app secure with the VPN.

Not all VPNs are created equal. Some are better at bypassing blocks than others. If your current VPN isn’t working, consider switching to one that specializes in evading detection.

If all else fails, switch to a mobile data connection or a different network. Sometimes, the issue is with your current ISP (internet service provider) rather than the VPN.

30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE’S WHY

VPNs are great for getting around restrictions, but some websites have blockers to stop VPN traffic. There are a few ways to get around these blockers, and sometimes, it's just as easy as switching servers. You’ll have the best chance of getting your VPN unblocked if you're using a reliable service. They keep an eye on their servers to make sure everything’s running smoothly and offer extra features like dedicated IP addresses.

Have you ever faced any issues accessing websites while using a VPN?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Do you need a VPN at home? Here are 10 reasons you do

21 December 2024 at 10:00

Have you ever felt a little uneasy while browsing the internet, wondering who might be watching your online activities? 

Well, let me introduce you to a handy tool that can put your mind at ease: the virtual private network, or VPN. 

Whether you're working from home, streaming your favorite shows or just exploring the web, a VPN can help ensure that your data stays secure and your privacy intact. So, let’s dive into why having a VPN at home is a smart move.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

A virtual private network, or VPN, encrypts your internet traffic and reroutes it through a server in a different location than your own. VPNs make it appear that you are connecting to the internet from whichever location the server is hosted in rather than your actual location.

When you first connect to a network using a VPN, your device will establish a secure connection with the VPN server, and your device's IP address will appear as the VPN server, meaning that only your internet service provider will see that you're connecting to a VPN server. Normally, when you connect to a website, the website or any online services you visit can see your device's technical information, including location-sensitive data such as IP addresses.

THE BEST VPNS FOR BROWSING THE WEB IN 2024

While your home internet connection is more secure than a public Wi-Fi connection, VPNs still provide a greater sense of privacy and access to content that might be restricted due to location. Here are 10 reasons I have for getting a home VPN.

Online communication can be hit or miss when it comes to security. Some messaging services, such as Whatsapp, use end-to-end device encryption, which helps keep your messages secure, but other messaging services, such as Skype, don't use end-to-end encryption. If you use a VPN with any communication apps, then all your connection and messaging data between your device and the VPN server is fully encrypted.

Online content and services like Netflix are restricted to specific geographic regions. This content can range from news websites to video streaming platforms and social media apps. Using a VPN at home can appear to be using the internet from another location, allowing you to access restricted services.

Sometimes, an internet service provider (ISP) will slow down bandwidth or certain online activities. One of the most common reasons networks do this is to manage network congestion, especially during peak hours. You might notice that your home internet connection slows down at night, when everyone is home from work, or it might slow down when summer vacation starts. Using a VPN will prevent your service provider from identifying the type of web content you are accessing, making it impossible for your ISP to slow down your traffic.

A VPN also keeps your internet activity private from Wi-Fi network admins, who, if technically skilled enough, can figure out which websites you've visited. If you're worried about the Wi-Fi admin of your office, hotel, school or other public place having access to your browsing history, a VPN is the perfect solution for you. When it comes to your own home Wi-Fi network, a VPN will keep your browsing history private from other household members.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Hackers deploy large-scale cyberattacks to observe network activity and steal your information. These attacks are particularly prevalent on public Wi-Fi networks, which often have minimal security measures, but they can also target secured networks. Using a VPN can significantly enhance your security by providing encryption for your internet traffic, making it difficult for hackers to intercept and read your data. This encryption is especially crucial when using public Wi-Fi, as it secures your information from potential eavesdroppers.

Additionally, a VPN masks your real IP address with that of the VPN server, helping to protect your identity online and making it harder for attackers to target you directly. However, it is essential to understand that while a VPN adds a layer of security, it is not a comprehensive solution against all cyber threats.

A VPN does not prevent malware infections or phishing attacks, so you must still employ strong antivirus software and exercise caution when clicking on links or downloading files. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Furthermore, not all VPNs are created equal; some may have vulnerabilities or questionable privacy practices. It is crucial to choose a reputable provider that uses strong encryption and has a clear no-logging policy.

There's a myriad of reasons, ranging from political to economic, that countries use to justify censoring certain apps and websites. It can be incredibly frustrating for citizens and anyone traveling to that country to lose access to email, social media, news websites and other tools that keep us connected to the world around us. I've used VPNs extensively while traveling to ensure that I can always view my most important websites, no matter where I actually am. As I've mentioned, a VPN can mask your IP address and make it appear as traffic from a different country, allowing you to bypass online geographic restrictions.

One of the best reasons to have a VPN at home is that it can help you save money and find better deals while online shopping. Some online retailers change their prices depending on users' locations. However, when using a VPN while shopping for plane tickets, hotels or gifts, it's possible to find cheaper prices just by changing your location. 

It's no longer the work of sci-fi. We do know that governments, nearly all of them, surveil their citizens. A VPN will add a layer of privacy, making it significantly more difficult for governments to detect your web traffic. Even if you feel that you have nothing to hide, online privacy is something you should feel free to exercise.

Much like governments, your ISP can surveil your online activity with ease. While most ISPs claim that they don't sell your browsing data, they are often allowed through contracts with marketing agencies to give your data away for free to advertise to you. The simplest way to hide your online activity from your ISP is to use a VPN. When using a VPN, your ISP won't be able to see which websites you visit or which apps you use.

HOW VPNS SHIELD YOUR IDENTITY AND SECURE YOUR FINANCIAL TRANSACTIONS FROM THEFT

While it may seem counterintuitive, a VPN can offer faster connection speeds for online gaming. It can also help prevent your ISP from throttling bandwidth directly from gaming servers. By changing your VPN's location, you can connect to a server closer to your gaming server, which will give you better latency. This is also called ping, which determines how fast the server responds to your inputs.

CAN YOU BE TRACKED WHEN USING A VPN?

To fully leverage the benefits of your VPN and enhance your online security, consider these important tips that will help protect your personal information and ensure safe browsing.

1. Choose a reliable VPN: Select a reputable VPN service with strong encryption protocols. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

2. Always use VPN on public Wi-Fi: Never access financial accounts on public networks without activating your VPN first.

3. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts by enabling 2FA.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

4. Use strong, unique passwords: Create complex passwords for each of your accounts and consider using a password manager. Consider using a password manager to generate and store complex passwords.

5. Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.

6. Keep software updated: Ensure your devices and apps are always up-to-date with the latest security patches.

7. Be cautious of phishing scams while using a VPN: Even with a VPN securing your connection, phishing scams remain a significant threat to your online safety. These scams often use deceptive emails or links to steal sensitive information like passwords or credit card numbers. To protect yourself, combine the use of a VPN with strong antivirus software that detects and blocks phishing attempts. Additionally, always scrutinize unsolicited emails, avoid clicking on suspicious links, and never provide personal information without verifying the source. For the best protection, check out my expert reviews of the top 2024 antivirus solutions for your Windows, Mac, Android and iOS devices. Together with a VPN, this approach helps keep your personal information and digital assets safe.

If you want to start taking your online privacy seriously, it's worth getting a VPN. There are a wide range of options available. You can pick up a router with a VPN or install a software VPN on your devices. I prefer to have a VPN on my laptop and smartphone, and I especially find it useful when traveling internationally.

Do you have a reason for using a VPN we didn't feature in the list? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

10 things you should never tell an AI chatbot

19 December 2024 at 19:21

This is a heartbreaking story out of Florida. Megan Garcia thought her 14-year-old son was spending all his time playing video games. She had no idea he was having abusive, in-depth and sexual conversations with a chatbot powered by the app Character AI.

Sewell Setzer III stopped sleeping and his grades tanked. He ultimately committed suicide. Just seconds before his death, Megan says in a lawsuit, the bot told him, "Please come home to me as soon as possible, my love." The boy asked, "What if I told you I could come home right now?" His Character AI bot answered, "Please do, my sweet king."

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

🎁 I’m giving away a $500 Amazon gift card. Enter here, no purchase necessary.

You have to be smart

AI bots are owned by tech companies known for exploiting our trusting human nature, and they’re designed using algorithms that drive their profits. There are no guardrails or laws governing what they can and cannot do with the information they gather.

When you’re using a chatbot, it’s going to know a lot about you when you fire up the app or site. From your IP address, it gathers information about where you live, plus it tracks things you’ve searched for online and accesses any other permissions you’ve granted when you signed the chatbot’s terms and conditions.

The best way to protect yourself is to be careful about what info you offer up.

Be careful: ChatGPT likes it when you get personal

THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF

10 things not to say to AI

Still relying on Google? Never search for these terms

Reclaim a (tiny) bit of privacy

Most chatbots require you to create an account. If you make one, don’t use login options like "Login with Google" or "Connect with Facebook." Use your email address instead to create a truly unique login.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

FYI, with a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Best AI tools for search, productivity, fun and work

No matter what, follow this rule

Don’t tell a chatbot anything you wouldn’t want made public. Trust me, I know it’s hard.

Even I find myself talking to ChatGPT like it’s a person. I say things like, "You can do better with that answer" or "Thanks for the help!" It’s easy to think your bot is a trusted ally, but it’s definitely not. It’s a data-collecting tool like any other.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Warning: This fake PayPal email scam is everywhere right now

13 December 2024 at 15:05

"Reminder: You've still got a money request!" That was the subject line of the messages flooding my husband Barry’s inbox for weeks. The first couple were concerning, then it was just downright annoying.

Enter to win a $500 Amazon gift card. No purchase required.

He’s not the only one getting them; there’s a sneaky scam going around that looks totally legit — because it actually comes from PayPal.

Let’s take a closer look at how it works so you don’t fall for it.

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

Here’s how it goes down

Lucky for us, scammers use the same tricks. This one is getting common enough, it’s easy to spot if you’re careful.

First, you receive an invoice via PayPal. It might say something like, "Payment due for a purchase" or tell you a payment was processed due to a technical error. 

It looks real because it was sent through PayPal's platform. They hope you’ll panic and act without thinking. PayPal is a trusted platform, so when you see their logo and familiar format, it’s easy to let your guard down.

Related: Don’t fall for it! Hackers are trying to get you to scam yourself

It’s a bogus invoice, of course

PayPal allows anyone with an account to send an invoice, which scammers exploit to make it seem legit.

In the invoice notice is a phone number you can call for support. It’s listed as PayPal’s number, but it’s someone ready to steal your money and info. All the scam emails I’ve reviewed had different numbers attached.

12 EASY, TECHY WAYS TO MAKE THE HOLIDAY SMOOTHER

Calling the fake support number is the worst thing you can do. The scammer might ask for your login details or payment card information to 'resolve the issue.' In some cases, they’ll install malware on your device, stealing passwords and financial details in the background."

Related:

How to spot and stop it

PayPal will never send invoices for random purchases you didn’t authorize. If something seems off, trust your instincts and double-check before taking action.

I looked this one up for you: PayPal’s real support number is 1-888-221-1161. They take calls from 6 a.m. to 6 p.m. PT every day.

THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF

When in doubt, your best bet is to contact customer service. They’re much more familiar with scam patterns then most regular folks since they see them day in and day out. Plus, they can look into your account to tell you what is a legitimate request and what’s not.

If you’re sure the invoice is fake, delete it. But first …

Report it to PayPal. Consider this your good deed of the day. Reporting scams doesn’t just help you — it helps everyone. When you flag fake invoices to PayPal, their team can track patterns, shut down scammers’ accounts and warn others about similar tactics.

Related: 3 immediate steps to take if you fell for a scam

Lock down your account for extra security

If you don’t have two-factor authentication set up, don’t wait. It only takes a minute. Now you’ll get a code when you log in. Annoying? A little. But it’s worth the extra step on any account tied to your finances.

Scams like this are sneaky, but they’re easy to spot if you know what to look for. Share this with your friends and family so they don’t fall for it.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

12 easy, techy ways to make the holiday smoother

12 December 2024 at 16:53

Did you know if you turn an Amazon shipping bag inside out, there’s a strip you can pull to reseal it for returns? Good to know when a holiday gift arrives and it’s nothing like the picture online.

Enter to win a $500 Amazon gift card. No purchase required.

There are all kinds of little tips and tricks that can make the busiest time of year a little easier to manage. I’ve got your back.

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

Shopping

Ho-ho-hope your packages arrive on time: Gmail’s package tracking now includes real-time updates. On your phone, tap Menu > Settings. Look for General settings (Android) or Data privacy (Apple) and toggle on Package tracking at the bottom.

Hide-and-seek: You’re shopping online for your kiddo or spouse and they walk in. Quick! Hide your open browser windows. On a PC: Windows key + M. (Use Windows key + Shift + to reopen.) On a Mac: Cmd + Option + + M. Phew, no spoilers.

Amazon’s secret 20% discount: Send your old tech to Amazon through its Trade-in Program and get a gift card for the value. They’ll take just about anything — it doesn’t even need to work. But if you trade in Amazon gear like a Kindle, eero or Fire TV Stick, you’ll get 20% off a new, qualifying device.

Drop the drop shippers: On Etsy, the whole purpose is to buy something handmade. If you’re not sure what you’re getting is legit, check if it’s genuine or mass-produced junk by doing a reverse image search. Click on the item’s image, then drag and drop it into Google Images. Major red flag: You see the exact same thing on other sites.

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

At home

Focus! Blurry pics are a bummer. Sometimes your phone’s cam picks the wrong spot. For a quick reset, tap the area on your screen you want to be the clearest. Easy and effective. No ruined family photos this year.

Related: Trick to take the best family portrait without a photographer

I’m B-side myself: Make a playlist with your fam so you’re not bickering over the music on Christmas morning. For Spotify, open the app, then head to Your Library and select the playlist. Tap the three dots in the top right > Share to send it. In Apple Music, go to Library > Playlists > three dots (upper right) > Share Playlist. Jingle all the way!

Family visiting? Keep your steamy romance novels on lock by creating a passkey for your Kindle. Tap the three dots (upper right) and go to Settings > Device Options > Device Passcode. Your passcode can be up to 12 digits long. That’s hot!

Related: It’s smart to lock your computer down, too

On the road

Flying away? Uber’s got three new features to make your airport trips easier. The first, UberXXL, gets you a bigger car with extra trunk space for groups. The second, UberX Share, allows you to pay 25% by sharing a ride with someone heading your way. It’s available now at select airports. And finally, with Uber Reserve, you can have a car waiting for you when you land.

3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEAR

Synced your phone to a rental car? Wipe your data so the next driver doesn't get your texts. On the car’s infotainment system, go to Settings and look for a factory reset option. Every car’s system is different, so check the manual or ask the rental company if you can’t find it.

Over the river and through the woods: See the best time to leave for Grandma’s house (or anywhere else) without arguing. In Apple Maps, press the Now button on the left to open a calendar. In Google Maps, tap the three dots at the top right. For both, select Leave/Depart at or Arrive by and hit Done.

Track your luggage with your airline’s app: Open the app’s Menu > Track my bags. The naming will vary depending on the airline. Enter your reservation or tag number, and you’ll get updates along its journey. 

Or use a tracker: For me, this is the most reliable option. Apple’s AirTags are ideal if you have an iPhone, Mac or iPad. The Tile 2-pack is Android compatible and has a tracker for your luggage and one to slide into your wallet.

Related: There’s one place during your travels an AirTag won’t work

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Quick fixes to stop your Windows PC from crashing

8 December 2024 at 06:00

Are you dealing with a Windows PC or laptop that won't stop crashing? Maybe your PC is constantly freezing or displaying error messages. 

We know how frustrating a PC that won't work right can be. Luckily, there are some easy ways to fix a Windows PC that is consistently crashing. 

Today, we'll review nine easy fixes you can do at home if you have a Windows PC that won't stop crashing on you. Let's get into it.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

While it might sound obvious, the first step to troubleshooting a computer that constantly crashes is ensuring everything is firmly plugged in. It's often the most overlooked step, so if you're using a desktop, you'll want to look behind your PC and ensure everything is plugged in. It would be best to try using a different electrical outlet to first rule out any electrical issues in your home.

If you feel comfortable opening up your desktop PC, you can also go inside the case and ensure all your PCI connections are firmly plugged in. You'll want to ensure all your cables going to the power supply are firmly connected, and the same is true with the PCI power cables that supply electricity to the GPU and CPU.

HOW TO FINALLY RESOLVE THE RED SCREEN OF DEATH ON WINDOWS 10

Computer overheating is a common cause of intermittent shutdowns and crashes. If your CPU (central processing unit), essentially the brain of your computer, or graphics card gets too hot, your computer might shut down to ensure the components aren't damaged. If you notice that your laptop or desktop is giving off a lot of heat, or in the case of a laptop, it is hot to the touch, or if you notice your fans running louder than usual, these are all signs of overheating.

If your computer is overheating, the first step is to clean it thoroughly. I recommend blowing dust out of the interior fans with compressed air and keeping your PC in an area where it can receive proper airflow. If you have a desktop PC, try not to keep it under your desk. Keeping a PC under a desk can cause issues with dust build-up and lack of airflow. It's best to keep your desktop in a part of your home or office where it can receive a decent amount of airflow.

WINDOWS UPDATE FLAW COULD BE A HIDDEN GATEWAY TO ZOMBIE VULNERABILITIES

If your cables are all plugged in correctly and your computer isn't overheating, it's time to boot your Windows PC into safe mode. Booting into safe mode allows you to run your PC with the necessary files and drivers turned on to make the PC run. That way, you can determine if new software or hardware conflicts with your PC, causing it to crash. While in safe mode, you can access Windows error logs and run other diagnostics to figure out what is causing your PC to crash. 

TAKE YOUR WINDOWS PC'S SECURITY TO THE NEXT LEVEL WITH THESE SIMPLE STEPS

There are a few different ways to boot into Windows safe mode, and it is a bit different depending on whether you are using Windows 10 or 11. To start, here's how you can boot into safe mode on Windows 10 from the settings panel:

Click System

Your computer will restart again, and this time, your computer will boot into safe mode.

The process is slightly different if you use a Windows 11 PC instead of a Windows 10 machine. Here's what to do if you are using a Windows 11 PC:

Once your computer restarts, it will automatically boot into safe mode.

Now that you're in safe mode, you should look at the Windows logs. You can access the Windows error logs through the Event Viewer. Here's how to access the Windows Event Viewer:

An outdated version of Windows can cause conflicts with both your software and even hardware components in your PC. This is a major cause of PC crashes, so you'll want to ensure your Windows operating system is entirely up to date. Here's how to run a system update on Windows:

Even if you don't own any antivirus software, you should at least run a scan with the built-in Windows Defender. Here's how to access Windows Defender and run an antivirus scan:

While Windows Defender offers robust, built-in security for Windows users, it has limitations in areas like phishing and spam protection and may not update as swiftly as some premium solutions. To stay protected from malicious links, phishing scams and ransomware, consider investing in strong antivirus software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

You can use the Windows Command Prompt to check your hard drive for errors. If your hard drive has an error, you might need to perform a system restore, which we'll discuss later. For now, here's how to use the command prompt to check for hard drive errors:

The command prompt will now check your hard drive for corrupt files and replace them. This may take some time. Once the process is complete, and you have errors that cannot be automatically replaced, you will unfortunately need to replace your hard drive and reinstall Windows.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Issues with your PC's RAM can also cause your Windows PC to crash randomly. More often than not, if you have an issue with your RAM, you'll need to replace the RAM modules on the motherboard. This can be done at home quickly if you have the technical knowledge, but you can also go into any computer shop to get your RAM replaced for a small fee. Here's how to check for issues with your RAM on your Windows PC:

Now, your computer will run through a memory check, and if you encounter an issue, beware that you might have to replace your RAM.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If your PC just started crashing, you might be able to fix the issue by performing a system restore. A system restore will restore your Windows operating system to a specific date and time of your choosing. This way, you can restore your OS to a point before the crash begins and troubleshoot from there. It's important to note that when you perform a system restore, your computer will be restored as it was on the date and time you chose. This means you will lose any recent files or settings, so this should be a last-step solution in your troubleshooting process.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Having a Windows PC that won't stop crashing can be a massive headache. Luckily, there's a lot of information out there on how to troubleshoot a PC that just won't stop crashing. I've gone over nine of the most commonly used tips to fix a crashing Windows PC, but there's other reset options out there, many of which require a higher degree of technical ability than what we've gone through today.

What do you find most challenging about using a Windows PC today? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Windows 7 in 2024: The hidden dangers of clinging to the past

3 December 2024 at 10:00

Computers are a significant investment, especially for those on fixed incomes. Fortunately, with proper care and maintenance, older computers can remain secure and functional for years. Let's address a concern from Connie in Rochester, Minnesota, who wrote to us about her older computer's vulnerability to hackers:

"I'm still using Windows 7 on my 2013 computer. It says I have Security Essentials, but I saw somewhere that it ended in 2023? When I click on it, it says it's scanning, but am I protected or not? I pay yearly for MSN extra and use an iPhone 14. All the worrisome reports make a senior citizen a little nervous. What's your advice? A new computer? Will your virus protection be compatible with my old computer? I'm not keen on spending more on a new computer on a fixed budget."

This question is relevant to many users with older computers. Let's dive deeper into the situation and provide some comprehensive advice for Connie and others in similar situations.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET

Enter by signing up for my free newsletter.

Using Windows 7 does pose significant security risks. Since Jan. 14, 2020, Microsoft has stopped providing security updates and technical support for Windows 7. This means that any new vulnerabilities discovered in the operating system will not be patched, leaving your computer exposed to potential attacks.

Since the start of 2023, 47 vulnerabilities have been discovered in Windows 7. Cybercriminals actively target outdated operating systems because they're more likely to be unpatched and vulnerable. Without official support, Microsoft is no longer compelled to disclose formal vulnerabilities, making it harder for users to stay informed about potential security risks.

Connie, you mentioned that you have Microsoft Security Essentials installed. Unfortunately, this software also stopped receiving updates on January 14, 2020. While it may still scan your computer, it's not providing up-to-date protection against new threats.

TOP WAYS TO OPTIMIZE YOUR PC AND MAC DEVICES

Given the security risks, it's advisable to take action. Here are some options to consider:

1) Upgrading your operating system or computer: While it’s possible to continue using Windows 7 with a third-party antivirus, it’s generally recommended to upgrade to a newer operating system for the best security. If your current computer meets the system requirements, you could consider upgrading to Windows 10 or even Windows 11. However, if a new computer isn’t in your budget right now, using a supported antivirus on your Windows 7 machine is a good step.

2) Install strong antivirus software: If upgrading isn't possible immediately, install a strong, reputable, up-to-date antivirus software that's compatible with Windows 7. However, keep in mind that this is a temporary solution and doesn't address all the vulnerabilities in the operating system itself. There are several antivirus programs that continue to support Windows 7. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Consider a new computer: While it's understandable that you're on a fixed budget, investing in a new computer might be the most cost-effective solution in the long run. New computers come with the latest operating systems and security features, providing better protection against current threats. You can see our picks for a variety of laptop computers and desktop computers (at a variety of price ranges). If you decide to upgrade and get a new computer, check out how to securely get rid of your old PC or Mac.

HOW TO SAFEGUARD YOUR OLDER PC

You might be wondering if it's really that dangerous if you're careful about what you download. The truth is, even if you're cautious, you're still at risk. Modern malware can be incredibly sophisticated. There's a type of threat called a "persistent threat" that can hide on your machine indefinitely, continuously monitoring your computer and stealing information without you even knowing it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Let's address two other points you made in your email to us. Your iPhone 14 is not affected by the Windows 7 issue. Apple regularly updates its iOS software, providing security patches for supported devices. So, make sure your iPhone's software is up to date to ensure you have the latest security features. Here's how:

As for MSN Extra, while it may provide some additional features, it doesn't compensate for the lack of operating system security updates.

10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE

Look, Connie, I know all this tech stuff can be overwhelming, but here's the deal: While we can't make your computer 100% hacker-proof, these steps will definitely up your security game. Keep your eyes peeled when you're checking emails or downloading stuff, especially if it's from someone you don't know. Now, about getting a new computer. I get it, it's not cheap. But think about it this way: It's like insurance for your digital life. The headache and costs of dealing with a hacked computer? Trust me, that's way worse. In this day and age, when we're all connected 24/7, keeping your digital self safe is super important. So, if you can swing it, seriously think about upgrading your system or getting a new computer with all the latest security bells and whistles. Bottom line? Taking these steps isn't just about protection. It's about giving yourself peace of mind every time you hop online. And let's face it, that's pretty priceless.

What are your biggest challenges when it comes to maintaining your devices and why? Share your tech hacks by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌