Here is how Facebook accounts are being hacked and compromised? Here is what a “FAKE Facebook Login Page” looks like…

If you look at the login Facebook page below, it looks very legit (click on the screenshot below), but it is a FAKE. How can you tell it is FAKE? Look at the web address; it is obviously not Facebook. If you receive this and actually enter your login information, the criminal behind this scam captures your login information which then allows the criminal to fully access your account. Many folks are receiving in “Facebook Messenger” a message from what appears to be a legit friend that will bait you in. In this case, the legit friend sent what appears to be a “YouTube Video” titled, “look what I found” (see screenshot below) and when you click or go to the video, the FAKE Facebook login screen (that you see below) will appear. Looks real, doesn’t it? Please continue to read…

Continue reading “Here is how Facebook accounts are being hacked and compromised? Here is what a “FAKE Facebook Login Page” looks like…”

A handy PDF content protection tool prevents readers from unauthorized sharing and copying PDF documents …

PDF Unshare is a free PDF copyright protection utility that creates unshared PDF and UPDF formats to protect your PDF files from sharing, printing, editing, copying, or unauthorized access. This creative document protection tool also allows you to set an expiry date for the protected PDFs, and then all these documents would not be viewed after that date. Now entrepreneurs, book publishers, or educational institutions can easily protect their documents from unauthorized sharing to other people or publishing online with this handy application.

PDF Unshare is 100% FREE for personal / non-commercial use. Installs available for Windows (full and portable), iOS (Apple), and Android.

Source: PDF UnShare

Microsoft’s Windows Security acts like an airbag: It will protect you, regardless of whether you know it exists … Learn More!

What most folks do not realize is that Windows 10 has a security package baked into the operating system to protect you. Do you need to purchase additional protection? My thoughts on that is “NO”… I have several Windows 10 based PC’s and I do not use any additional protection. As a matter of fact, I have been doing computers for over 30 years and I have never purchased anti-virus or anti-malware protection. In the past I did rely on the FREE security protection that was available; but, today I stick what is baked into Windows 10. The browsers we use today are also better at protecting us and that factors into my thinking on this, as well. All a matter of preference; but, “this is my story and I am sticking to it”… Below is a video and source links, at PCWorld, that will give insight on how Windows Security actually performs…

You’ll learn about how Windows tries to protect your PC: preventing malware from getting on your PC in the first place, blocking pernicious attacks like rootkits, and walling off your documents to prevent them from being infected.

Learn More @ PCWorld

Microsoft Edge is getting a new password monitor that will notify users if a fraudulent activity/breach attempt is detected as long as their passwords are synced to the Microsoft account …

It only works with a Microsoft account for now, as you’ll need to sync your passwords to the Microsoft account to activate the feature. Once you do so, the next time your password is detected in breach you’ll begin receiving real-time notifications.

Windows Latest

What is Two-Factor Authentication?

Many of you have probably seen the terms “Two-Factor Authentication” and are wondering, what is this? Do not let terms such as this scare you. “Two-Factor Authentication” is another level of security that you can choose (usually as an option) to place on an online account where you are required to enter your username and password. Is this a good thing? You bet; and, I highly recommend it. Most people do not use strong passwords and most people typically do not change their passwords. With “Two-Factor Authentication”, the second level of security strengthens and makes it very difficult for someone to access your account, even if they managed to get your password. Using Facebook, as an example, I have my usual login where I enter my username and password; but, as the second level of protection, if I log into my account from another web browser, Facebook will require I enter a “code”. I have Facebook set to text me the “code”.

Oftentimes, online services that offer “Two-Factor Authentication”, will provide various options such as texting or emailing you a code; answering security questions; or using an authentication app to generate the codes. Also, with many of the online services, you can download a list of codes to hang onto in the event you don’t have your phone, etc… Don’t look at “Two-Factor Authentication”as an inconvenience; instead, look at it as “peace of mind” knowing your account and personal information is now safer.

Two-factor authentication (2FA) is a way to add additional security to your account. The first “factor” is your usual password that is standard for any account. The second “factor” is a verification code retrieved from an app on a mobile device or computer.


Learn about the “Is it you in the video?” Facebook Messenger SCAM …

There is no video, of course – the black image links to a URL shortening service, which in turn redirects to a URL that pops up what looks like a Facebook login page…

Unfortunately, putting in your username and password into the fake login page (shown below) would submit them to a server running on a low-cost web hosting service in the USA, using a vaguely legitimate-looking domain name that was registered less than a month ago.

Learn More @ Naked Security

Protect your identity and right to privacy online with these secure VPNs …

Each time you go online you broadcast your personal information to the world. Details about your device, your location, even your identity can be associated with every packet of information that leaves the computer. This data can be logged and sold by ISPs or even intercepted by hackers. There’s also mass digital surveillance by government agencies to take into account, which can be extremely aggressive when it comes to digging up personal information.

Learn more @ Addictive Tips

Best Backup Software – SyncBack

Backup and synchronize your files – with power, ease and flexibility. SyncBack is the backup software that I use here at “Tech News for You”. With the FREE version, you will have three options (backup, sync, mirror) that are good options for people at home looking for a simple backup strategy. For a more complex strategy I encourage you to try (and buy) the more professional versions.

Tech News for You

Source: 2BrightSparks – SyncBackFree

Website Powered by

Up ↑