Connect with us

Technology

Think twice before using public computers: Here's why

Published

on

Think twice before using public computers: Here's why

Ever found yourself in a pinch, needing to check your email or print a document while you’re out and about? Maybe you’re traveling and need to send a quick message, or perhaps you’re at a coffee shop and want to catch up on work. Public computers in libraries, hotel lobbies or internet cafes might seem like a lifesaver in these moments. But hold up. Before you start typing away, let’s discuss why you should think twice before using these shared machines.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Public computers may seem convenient, but there are hidden dangers. (Kurt “CyberGuy” Knutsson)

The sneaky dangers of public computers

1) Malware mayhem

Here’s a situation you may be confronted with. You’re checking your social media on a library, cafe or hotel lobby computer, but little do you know, there’s a digital gremlin lurking in the background. Yep, malware on public computers. These nasty programs can snatch your passwords, personal messages and even financial details faster than you can say “identity theft.”

2) Privacy? What privacy?

Using a public computer is like having a conversation in a crowded room: everyone can potentially hear (or see) what you’re up to. Browsers on these machines might be set up to remember everything you do. Your search history, saved passwords and that embarrassing social media video you watched? All are potentially up for grabs by the next user.

Advertisement

Public computers at a library (Kurt “CyberGuy” Knutsson)

11 THINGS TO ADD TO YOUR PRIVACY CHECKLIST ONLINE ASAP

3) Session hijacking

Imagine logging into your email and then grabbing a coffee while still logged in. In that brief moment, a tech-savvy criminal could hijack your active session, gaining full access to your account without needing your password. They could send emails as you, access your contacts or worse, all while you’re blissfully unaware.

4) Shoulder surfing

Public computers are often in busy areas where anyone can glance at your screen. A seemingly innocent bystander could be memorizing your passwords, credit card details or other sensitive information as you type. This low-tech but effective method of information theft is surprisingly common.

5) USB port peril

Those convenient USB ports on public computers? They might be secretly housing “USB killers,” which are devices that can fry your external drive or smartphone when plugged in. Or worse, they could be set up to automatically copy data from any device connected to them.

Advertisement

6) Fake login pages

Cybercriminals sometimes set up convincing fake login pages on public computers. You think you’re logging into your account, but you’re actually handing your credentials directly to a hacker. These phishing attempts can be incredibly sophisticated and hard to spot.

7) Screen capture software

Some public computers may have screen capture software installed, taking periodic screenshots of user activity. This means even if you’re careful about what you type, sensitive information displayed on the screen could still be captured and stored.

8) Compromised hardware

It’s not just the software you need to worry about. Hardware keyloggers – small devices that record every keystroke – can be physically attached to public computers without being easily noticeable. These devices can capture everything you type, from passwords to private messages.

By understanding these hidden risks, you can better protect yourself when using public computers. Remember, when it comes to shared machines, it’s always better to err on the side of caution.

Public computers at a library (Kurt “CyberGuy” Knutsson)

Advertisement

6 PRIVACY AND SECURITY MYTHS TO CLEAR UP ONCE AND FOR ALL

Best practices on a public computer

Alright, sometimes you just gotta use a public computer. I get it. But let’s make sure you’re not leaving digital breadcrumbs for the bad guys to follow:

  • Go incognito: Always use private browsing mode. It’s like wearing an invisibility cloak for your internet activities.
  • Log out, log out, log out: Triple-check that you’ve signed out of all accounts before you walk away.
  • Avoid sensitive stuff: Please, oh please don’t check your bank account or shop online using public computers. Save that for your secure home setup.
  • USB caution: Thinking of plugging in your USB drive? Think again. It’s an easy way to catch a digital virus.
  • Clear your tracks: Delete your browsing history, cache and any downloaded files. Leave no trace.

People working on computers at a library (Kurt “CyberGuy” Knutsson)

6 THINGS TO DO RIGHT NOW TO BOOST YOUR SECURITY AND PRIVACY BEFORE IT’S TOO LATE

How to clear your tracks after using a public computer

Here’s how to cover your digital footprints on different browsers when using a public computer. Be sure to do this before you log out:

Chrome:

  • Launch the Google Chrome browser on your computer.
  • Click the three dots in the top right corner of the browser window.
  • Tap History
  • Scroll down and click on Delete browsing data.
  • In the dialog that appears, select All time from the time range drop-down.
  • Check all boxes for the types of data you want to clear, such as Browsing history
  • Click on Delete data to complete the process

Firefox:

  • Click the menu button (three lines) in the top right
  • Choose Settings
  • Tap Privacy & Security
  • Under Cookies and Site Data, click Clear Data (Select History, Cookies and site data and temporary cached files and pages)

Safari:

  • Click Safari in the top menu
  • Select Clear History
  • Choose all history from the drop-down menu
  • Click Clear History

Edge:

  • Click the three dots in the top right
  • Go to Settings
  • Tap Privacy, Search, and Services
  • Under Delete browsing data, click Choose what to clear
  • Select all options and click Clear now

What if I use my own device on public Wi-Fi?

Using your own device is definitely safer than a public computer, but hold your horses: Public Wi-Fi can still be a digital minefield. Here’s how to stay safe when you’re surfing on public networks:

1) Use a VPN: Using a VPN helps protect you against being tracked and helps you identify your potential location on the websites you visit. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Advertisement

2) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Avoid sensitive transactions: Still not the best place for online banking or shopping. Save that for your secure home network.

4) Keep your software updated: Those pesky update notifications? They often include important security patches. So be sure to update your software on all your devices regularly.

5) Use two-factor authentication: 2FA is like having a second lock on your digital door.

By implementing these precautions, you can greatly minimize the risks linked to using public Wi-Fi. Always opt for your personal device with the right security measures instead of a public computer when accessing open networks. If you choose to use your own device – an option I highly recommend – consider avoiding public Wi-Fi altogether in such environments. Instead, you can utilize your iPhone or Android as a mobile hot spot for a more secure connection.

Advertisement

A person using their phone as a hot spot for their laptop (Kurt “CyberGuy” Knutsson)

Perks at public libraries

While navigating the potential pitfalls of public computers can feel daunting, your local library offers a wealth of free digital resources that can enhance your online experience without the associated risks. From borrowing e-books and audiobooks with apps like Libby and Hoopla to accessing free movies and career advice through Kanopy and LinkedIn Learning, libraries are treasure troves of valuable services. Are you curious about the tech goodies your library offers? Check out our article on free perks from the library. You might be pleasantly surprised by what’s available.

Public computers at a library (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

We’ve covered a lot of ground here, from the sneaky dangers lurking on public computers to the do’s and don’ts of using public Wi-Fi. The bottom line? Be cautious, be smart and always prioritize your digital safety. Remember, while public computers and Wi-Fi can be lifesavers in a pinch, they’re not without risks. If you absolutely must use them, follow our tips to minimize your exposure. But whenever possible, stick to your own devices and secure networks.

Have you ever faced any security issues while using public computers or Wi-Fi? If so, how did you handle the situation? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

The RAM crunch could kill products and even entire companies, memory exec admits

Published

on

The RAM crunch could kill products and even entire companies, memory exec admits

Phison is one of the leading makers of controller chips for SSDs and other flash memory devices — and CEO Pua Khein-Seng has now become a leading voice for just how bad the RAM shortage might get.

Companies may need to cut back their product lines in the second half of 2026, and some companies will even die if they can’t get the components they need, he agreed, in a televised interview with Ningguan Chen of Taiwanese broadcaster Next TV.

While the interview’s entirely in Chinese, friends of The Verge stepped forward to confirm parts of a machine-translated summary that’s been making headlines. They also note, importantly, that it’s the interviewer asking whether companies might shut down or product lines might discontinue. Khein-Seng largely just agreed and clarified that it’ll happen if these companies cannot secure enough RAM.

He also adds that he expects people will start fixing products more often when they break, instead of throwing them in the trash, over the next couple years.

It’s genuinely possible that some companies won’t be able to secure enough RAM. AI data centers are gobbling up the vast majority of the world’s memory supply as part of a global buildout, creating an unprecedented imbalance in supply and demand that’s seen RAM prices triple, quadruple, or even sextuple over the past handful of months. Even Nvidia might skip shipping a gaming GPU for the first time in 30 years. Even Apple may have trouble securing enough RAM now, not to mention memory chips for SSDs, and other vital components.

Advertisement

The RAM shortage may affect everything that computing touches over the next several years, as only three companies control 93 percent of the entire DRAM market, and while those three companies are building more facilities, they don’t want to build too fast. All three have decided to prioritize profits instead of risking overproduction that could lose them money later.

Tomorrow, February 19th, I’ll have a report on The Verge about how “RAMageddon” will affect you, even if you’d never think to buy a stick of memory yourself.

Continue Reading

Technology

5 trendy tech words shaping today’s internet culture

Published

on

5 trendy tech words shaping today’s internet culture

NEWYou can now listen to Fox News articles!

If your social media feed feels noisier, stranger or more manipulated than it used to, you’re not alone. The internet runs on its own language now, and those buzzwords quietly shape what you see, what you don’t see and how companies target you. From viral “slop” content to shadowbans and targeted ads, these terms influence how information spreads and how platforms treat your account.

Let’s break down five key phrases so you can understand what’s really happening behind your screen and stay in control of your digital life.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

CLEAN UP YOUR SOCIAL MEDIA FEED AND CUT THE NOISE

Advertisement

If your social media feed feels louder and more chaotic, algorithm-driven trends like “slop” and shadowbanning may be shaping what you see. (Jan Woitas/picture alliance via Getty Images)

1) Slop

The flood of low-quality content that is taking over your social media feed

“Slop” refers to mass-produced, low-effort digital content, often generated quickly by AI or churned out purely for clicks and engagement. This includes spammy articles, recycled videos, misleading thumbnails and content created without real value.

While slop may seem harmless, it can crowd out reliable information, spread misinformation and overwhelm your feed with noise instead of useful content. Platforms often struggle to control it because slop is designed to game algorithms.

Why this matters:

Advertisement
  • Low-quality content can drown out trustworthy sources
  • Slop is often designed to manipulate clicks and attention
  • AI-generated misinformation can spread faster than ever
  • Curating your feed helps reduce exposure to low-value content

The good news is you can take back control by curating your feed and cutting the noise. 

2) Burner account

The hidden identity behind anonymous profiles

A burner account is a secondary or anonymous social media account used to hide a person’s real identity. Some people use burner accounts for privacy, while others use them for trolling, harassment, spying or secretly viewing content.

Because burner accounts are difficult to trace, they are often linked to online harassment, fake engagement or manipulation of public conversations. Platforms attempt to detect suspicious behavior, but many burner accounts still slip through the cracks.

Why this matters:

  • Anonymous accounts can spread misinformation or harassment
  • Burners are often used to manipulate comments and engagement
  • They make it harder to verify who is behind the content

Being cautious with unknown accounts protects your safety.

3) Shadowban

When platforms quietly decide what you don’t see

Advertisement

A shadowban doesn’t only affect creators; it can affect what you see as a user. Platforms sometimes limit the visibility of certain accounts, topics, or types of content without telling you. This means posts may be hidden, pushed lower in your feed or never shown to you at all, even if you follow the account.

This type of filtering is often driven by algorithms designed to reduce spam, harmful content or policy violations, but it can also shape what information reaches you without you realizing it. Over time, this can subtly influence your perception of what’s popular, trending or widely discussed.

Why this matters:

  • You may not see all content from accounts you follow
  • Algorithms quietly filter what appears in your feed
  • Your view of trends and conversations can be shaped
  • Platform controls influence what information reaches you

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

From burner accounts to clickbait, online buzzwords influence how information spreads and how users are targeted. (Brent Lewin/Bloomberg via Getty Images)

4) Clickbait

Headlines designed to make you click, not inform you

Advertisement

Clickbait uses exaggerated, misleading or emotionally charged headlines to attract attention and drive clicks. While some clickbait is harmless, it often leads to low-quality or misleading content that doesn’t deliver on its promise.

Clickbait works because it exploits curiosity, fear or surprise, powerful emotional triggers that drive engagement. It’s a core tactic used by low-quality publishers and viral content farms.

Why this matters

  • Clickbait can spread misinformation or distort facts
  • It’s designed to manipulate attention rather than inform
  • Recognizing it helps you avoid low-value content
  • Trustworthy sources focus on clarity, not shock value

5) Targeted ads

Why the internet seems to know what you want

Targeted ads use data about your behavior, searches, location and interests to deliver personalized advertisements. This is why you might see ads related to something you recently searched, clicked or even talked about near your phone.

Advertisers build detailed profiles based on browsing activity, app usage and online behavior to predict what you are most likely to buy or engage with.

Advertisement

What this does:

  • Shows ads based on your interests and behavior
  • Uses browsing history, location and app activity
  • Builds advertising profiles over time
  • Drives highly personalized marketing

One more thing to know: Targeted advertising relies heavily on data collection. Adjusting privacy settings, limiting ad tracking and regularly reviewing app permissions can reduce how much data advertisers use to profile you.

Pro Tip: Control the data that fuels the system

If targeted ads feel a little too accurate, it’s because data brokers are constantly collecting and selling your information. Beyond adjusting privacy settings, consider removing your personal data from broker sites to shrink the profile advertisers build around you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Stay tuned for more in this series as we decode the internet’s most talked-about terms and answer the top questions we hear from readers like you.

Advertisement

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

Understanding digital terms like “slop” and clickbait can help users take back control of their feeds. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

Kurt’s key takeaways

The modern internet runs on more than just technology; it runs on attention, algorithms and influence. Understanding terms like slop, shadowban and targeted ads helps you recognize how platforms shape your experience and how companies compete for your clicks. The more you understand these trends, the easier it becomes to filter noise, protect your privacy and stay in control of what you see online.

Advertisement

Confused by a trending internet term or want something explained? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Mark Zuckerberg is taking the stand as social media goes on trial

Published

on

Mark Zuckerberg is taking the stand as social media goes on trial

Lori Schott didn’t care what it took to haul her way from her small town in Eastern Colorado to show up to a Los Angeles courtroom where Meta CEO Mark Zuckerberg is set to testify Wednesday. “I don’t care if I had to hire a pack mule to get me here, I was going to be here,” she told The Verge outside the courthouse Tuesday.

Schott’s daughter Annalee died by suicide at age 18 in 2020, after struggling with body image issues that her mother says were heightened by social media. After her death, Schott found journal entries where Annalee disparaged her own looks and compared herself to other girls’ profiles. “I was so worried about what my child was putting out online, I didn’t realize what she was receiving,” Schott said.

The way that Meta and Google-owned YouTube designed their products — allegedly luring users into a nonstop loop of taps and scrolling — is at the heart of this month’s bellwether social media trial, which sets the stage for thousands of similar lawsuits. The companies have generally denied the claims. Schott and several other self-described survivor parents have made it their mission to be in the courtroom during the several-week trial in downtown LA.

“I was so worried about what my child was putting out online, I didn’t realize what she was receiving.”

Last week, the parents heard from Instagram CEO Adam Mosseri, who used his time to carve a distinction between clinical addiction to social media and what he called “problematic use.” On the stand, Mosseri testified that using Instagram “too much” is a relative thing that can vary person-to-person, and he wouldn’t use the term addiction for using social media up to 16 hours a day. Mosseri explained why Meta had modified a prior ban on image filters that altered users’ appearance, after previously discussing their potential negative mental health effects. While the plaintiff has argued Meta is motivated by profits and engagement at the expense of users’ safety, Mosseri said that the two are aligned. “In general, we should be focused on the protection of minors, but I believe protecting minors over the long run is good for business and for profit,” he said, according to CNBC.

Advertisement

Several parents camped out overnight in the rain to make sure that they would get spots behind Mosseri while he took the stand. One of them was Julianna Arnold, whose daughter Coco died of fentanyl poisoning at 17 after allegedly meeting a dealer on Instagram she believed had sold her Percocet. The parents wore rain ponchos, played cards, drank coffee, and told stories throughout the night. “Everyone was like, you’re crazy,” she said. “But it didn’t feel like we were crazy, because we were so determined to have survivor parents in the courtroom.”

For Schott, who also stayed overnight to see Mosseri’s testimony, the reality of being in the room quickly became overwhelming. “I really hoped in my heart that it wasn’t as bad as it was,” said Schott, who left the testimony early after hearing the Instagram CEO discuss documents about engagement, profits, and internal research about girls’ mental health. “It is that bad.”

“I want him to see my face, because my face is Anna’s face.”

On Wednesday, Zuckerberg will likely expand on Mosseri’s testimony and explain the company’s choices. While Mosseri is in charge of the product at the center of the trial, Zuckerberg’s role as founder and CEO means that the plaintiff’s lawyers will likely ask him to account for choices they allege harmed young users. Zuckerberg will likely be asked about how and why his company made various design decisions, and research it conducted on user safety. But at least as important as what Zuckerberg will say, for many, is that he’ll get to see their faces. “I’d love to look him in the eye,” Schott says. “I want him to see my face, because my face is Anna’s face.”

Zuckerberg’s testimony will likely be referenced at future trials and legislative hearings. Thousands of social media cases behind this one similarly argue that products like Instagram caused various personal injuries, and that companies should be made to pay damages and change their products to make them safer.

Advertisement

Arnold isn’t sure whether she’ll get one of the limited, lottery-assigned seats inside the courthouse. Either way, “I want to see a row of survivor parents in the front row. That he has to testify to our faces, to parents of kids that died because of his lack of care and lack of accountability — that’s why it’s really important that we’re here.”

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Trending