Connect with us

Technology

10 easy ways to prevent someone from spying on you

Published

on

10 easy ways to prevent someone from spying on you

You know, one of the absolute worst feelings in the world is when you get that creepy sensation that someone is spying on you. It’s just so unsettling, whether it’s happening in real life or online. I mean, seriously, who wants to be watched without their permission, right? 

That’s why it’s important for us to be proactive and take all the necessary steps to protect ourselves. 

Here are my top 10 tips for keeping your information away from those creepy spies. 

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

1. Have good antivirus software 

Advertisement

Picture of woman with spy behind (Cyberguy.com)

You often hear me talking about this and there’s a good reason. One of the best ways to protect yourself from being spied on is to have antivirus protection installed on all your devices. Having good antivirus software allows you to be resilient against growing attacks by actively running on your devices. It’s the best to help stop and alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked.

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices.   

2. Remove yourself from the internet  

Your personal data can get exposed online in various ways, such as data breaches, data scraping, or data sharing by hackers, websites, platforms or on the dark web. This can put your privacy and security at risk. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period, and it would significantly decrease the chances of someone being able to spy on you all the time.  

Advertisement

See my tips and best picks for removing your personal information from the internet  

Temu app

Temu app on the phone (Temu)

 

3. Avoid using apps like Temu 

Certain readily available apps are made to spy on you and harvest your personal data . The Chinese-based app Temu and its sister app Pinduoduo have been found to collect sensitive information on users, including tracking locations, recording contacts, browsing history, and other personal information. 

Before you download any app, make sure you read its privacy policy or, at the very least, search the app name along with the word ‘privacy.’ Closely look at its reviews and ratings, and make sure it’s coming from a legitimate official source like the App Store or the Google Play Store.  Never link to download an app from an email or text message. Those links often lead to trouble compromising your security. 

Advertisement

MORE: EXPOSING THE SHOCKING TRUTH ABOUT POPULAR APPS WITH CHINESE TIES  

4. Use a VPN  

Consider using a VPN to protect against prying eyes from tracking you and identifying your potential location on websites that you visit. Depending on their privacy settings, many sites can read your IP address and may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. 

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android, & iOS devices 

5. Use a webcam cover 

Advertisement

You know those little cameras that you see built into all of your devices?  Or the external webcams that you plug into your computer?  If your devices become compromised, hackers can gain access to your webcam to spy on you and learn your sensitive information. Covering your webcam with a simple piece of electrical tape or using a physical camera cover is an easy and inexpensive way to take control of your privacy and get some peace of mind. 

Think of it like closing the curtains on your window. Why should anyone have the opportunity to see what you are doing in the comfort of your own home?  It is an easy suggestion for everyone that can prevent massive issues.  

MORE: IS SOMEONE SPYING ON YOU THROUGH YOUR HACKED WEBCAM? 7 RED FLAGS 

 6. Have strong passwords  

Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords instead of relying on a single password, which, if stolen, can expose you. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.  

Advertisement

Plus, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account so that you never have to remember them yourself.  The fewer passwords you remember, the less likely you will be to reuse them for your accounts.

Webcam cover

Webcam cover for your computer (Cyberguy.com)

GET MORE OF MY TECH TIPS & EASY VIDEO TUTORIALS WITH THE FREE CYBERGUY NEWSLETTER – CLICK HERE 

7. Use 2-factor authentication 

Having 2-factor authentication is just another way to keep those spies out of your accounts. If someone guesses your password, 2-factor authentication will pose another barrier for them to have to break through. This will encourage many hackers to give up on trying and will cause major setbacks for the rest who still try to get into your accounts. 

Many devices offer 2-factor authentication, and it is typically used either through an SMS-text messaging system, an authentication app, or with a fingerprint or facial scan, making it nearly impossible for a hacker to bypass it. If you don’t have 2-factor authentication on your devices already, I would highly recommend looking into it.

Advertisement

MORE: WHAT IS TWO-FACTOR AUTHENTICATION, AND SHOULD I ENABLE IT? 

 8. Double-check camera and microphone settings 

Your smartphones, tablets, and computers should have adjustable settings for both your camera and microphone. Oftentimes people don’t realize that every app on your device has its own set of permissions, so you might be giving camera and microphone access to an app that you don’t want to give access to. These settings can be easily changed, so make sure you’re only giving camera and microphone permission where absolutely necessary to avoid any snoopers from looking into your information. There are different ways to manage the camera and microphone permissions on your phone, depending on the app you are using. 

How to adjust your microphone or camera using third-party apps on iPhone 

  • Go to Settings
  • Then scroll down to Privacy and Security and tap it
  • Then go to Microphone or Camera and toggle the switch next to the app’s name to grant or revoke access

How to adjust your microphone or camera permissions using Safari on iPhone 

  • Go to Settings
  • Then click on Safari
  • Next, scroll down to where you see Settings for Websites and then tap on either Camera or Microphone and select Ask or Deny for each option

How to adjust your microphone or Camera permissions for all apps on Android 

  • Open Settings app
  • Tap Apps
  • Look for the app you want to change the permissions for and select it
  • Tap Permissions
  • Then click Camera and Microphone and tap Don’t allow

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

How to adjust your microphone or camera preferences using Chrome on Android 

Advertisement
  • Open the Chrome app and tap the three dots in the upper right-hand of the screen
  • Go to Settings and tap it
  • Scroll down to Site Settings and tap it
  • Then go to Microphone or Camera
  • Then, toggle Off the microphone or camera off for each site

How to adjust your microphone or camera preferences using Firefox on Android 

Open the Firefox app 

  • Then tap Menu, which is the three dots in the bottom right of the screen
  • Scroll down and tap Settings
  • Then click Site permissions
  • Then you’ll want to click on either Camera or Microphone and tap to block access for each site

MORE: ARE YOUR OWN DEVICES INADVERTENTLY SPYING ON YOU?  

9. Lock your screens 

If you want to protect against a snoop physically peeking over your shoulder, which happens more often than you might think, then having a lock on your screen is the best way to protect yourself.  

You can create passcodes for your smartphones, tablets, or computers, and some devices will also allow you to enable a fingerprint or Face ID lock to prevent snoops from guessing a number passcode.  

For step-by-step instructions on how to lock up your screen devices, click here. 

Advertisement
Password protection

Two factor authentication  (Cyberguy.com)

MORE: HOW TO MAKE YOUR DEVICES IMPOSSIBLE TO SNOOP ON WITH A PRIVACY SCREEN 

10. Turn off your location 

Location settings are a key way for hackers and spies to keep tabs on you. The last thing you want is for someone you don’t know to have information on where you’ve been or where you’re going. Keeping your location services either completely off or limited, especially on your smartphone, which you take with you everywhere you go, can prevent a hacker from having that information. 

However, before you turn off location sharing to everything on your devices, you need to know the consequences of doing so.  That’s because several applications use your location services, like location-based apps, which include your map, navigation, photo, weather, and fitness apps.  Also, your browser uses your location to provide relevant search results. In addition, emergency services could be affected if you turn off location sharing. In fact, your location may not be automatically shared with emergency services, which could delay response times or make it difficult for emergency personnel to find you.

Kurt’s key takeaways 

Advertisement

We all have to be vigilant when it comes to protecting our privacy because these hackers and spies will do anything to get your information from you. I know it can seem scary; however, as long as you take the proper precautions and stay alert at all times, then you can have a safe and enjoyable experience while you’re surfing the web. 

What scares you the most when it comes to your online privacy? Are there any specific concerns you have that you’d like us to address? Let us know by writing us at Cyberguy.com/Contact 

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Answers to the most asked CyberGuy questions: 

Advertisement

What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? 

What is the best way to stay private, secure, and anonymous while browsing the web? 

How can I get rid of robocalls with apps and data removal services? 

Copyright 2023 CyberGuy.com.  All rights reserved. 

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Nearly 40 states back surgeon general’s social media warning labels

Published

on

Nearly 40 states back surgeon general’s social media warning labels

A coalition of 42 state and territory attorneys general is calling on Congress to pass regulation requiring warning labels on social media platforms. In a letter on Monday, the attorneys general wrote that the warning labels will bring attention to the “inherent risks” social platforms pose to children.

US Surgeon General Dr. Vivek Murthy first proposed the warning labels in June as part of a plan to avert the “mental health crisis” affecting young people. Attorneys general from a significant majority of states, including New York, California, Florida, Oregon, Michigan, and others, are writing in support of the measure, saying the move would help “protect future generations of Americans.” All told, the letter is signed by 39 state AGs as well as the attorneys general of American Samoa, the District of Columbia, and the US Virgin Islands.

The letter cites research linking social media use to anxiety, depression, and suicidal ideation in young people, along with studies that suggest social platforms disrupt children’s sleep with “irresistible algorithmic recommendations, infinite scrolling, and a constant stream of notifications” to keep them “relentlessly engaged on the platform.” The labels proposed by the surgeon general would be similar to the ones already used for alcohol and tobacco products.

But some of the underlying research on the effects of social media has been disputed, and these labels would mark one of the rare times that platforms for speech and communication have been required to post warnings to their users — with the exception of state-level rules demanding adult sites add unproven health notices about pornography.

“A surgeon general’s warning on social media platforms, though not sufficient to address the full scope of the problem, would be one consequential step toward mitigating the risk of harm to youth,” the attorneys general said. “We urge Congress to consider such measures and continue the search for innovative solutions to protect our children in the face of emerging technologies.”

Advertisement
Continue Reading

Technology

Selling on the internet? Beware of sneaky tactics scammers use to trick you

Published

on

Selling on the internet? Beware of sneaky tactics scammers use to trick you

Selling stuff online can be tempting. You don’t have to go out and hunt for buyers. Instead, you can just post an ad on platforms like eBay or Facebook Marketplace and wait for people to reach out to you. But along with the ease of online selling comes the risk of getting scammed.

One of the popular scams to watch out for is the Google Voice verification scam. This scam preys on unsuspecting sellers by exploiting their trust and the convenience of online communication. Scammers pose as potential buyers and use seemingly innocent requests to gain access to your personal information. Their ultimate goal is to hijack your phone number and use it for fraudulent activities.

Here’s how it works: A scammer will send you a text with a Google Voice verification code and ask you to share it with them. If you do, they’ll use that code to create a Google Voice number linked to your phone number. Once they’ve got that, they can use your number for all sorts of shady stuff, like identity theft.

Recently, I received an email from Allen C., a resident of Island Park, New York, explaining how he almost fell prey to the Google Voice scam. Below, I share Allen’s story, discuss the impact of such scams and provide tips on how you can protect yourself.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Advertisement

A woman shopping online (Kurt “CyberGuy” Knutsson)

How scammers prey on innocent online sellers

Allen told me he was trying to sell an item on eBay when he received a message from someone saying they were interested in buying the item. The person asked for his number, saying she was at work and her husband would contact him. Allen gave his contact number, but then she asked him to share a code.

“At first I thought it was legit, but then she told me she needs to confirm I was real, so she sends me this code through Google Voice, it gave me a 6 digit code which I was supposed to send back,” Allen told me.

“After thinking about it, I was trying to figure out why she needed to know if I was real, when we didn’t even discuss the item I was selling! I did some checking and she started spelling words wrong, she said she didn’t get the return code, I know she did, she begged me to let her send another one. My research confirmed it was probably a scam.”

Allen realized it was a scam just in time, refused to give the scammer his cell number and deleted the message.

Advertisement
Selling on the internet? Beware of sneaky tactics scammers use to trick you

A woman shopping online (Kurt “CyberGuy” Knutsson)

DON’T FALL PREY TO ELECTION SEASON’S CRAFTIEST SCAMS

What happens when you give the code to scammers

Once you provide scammers with your Google Voice verification code, they can create a Google Voice number that is linked to your phone number. This gives them significant control over a virtual phone number associated with your real one, which poses serious risks.

One of the main dangers is that scammers can intercept verification codes sent by banks and financial institutions. When these institutions send a verification code to authorize a transaction, it may be redirected to the scammer’s Google Voice number instead of your phone. This allows the scammer to authorize fraudulent transactions, reset passwords and gain access to your financial accounts, effectively bypassing your security measures.

Additionally, by controlling a number linked to your identity, scammers can engage in identity theft. They may open a new credit card or loan account in your name, impersonate you to access other services that rely on phone verification and exploit your phone number as a recovery option for various accounts.

Furthermore, scammers can use the Google Voice number to conduct additional scams while appearing to have a legitimate U.S.-based number. This tactic helps them hide their true identity and makes it more challenging for authorities to trace their actions.

Advertisement

Ultimately, by gaining control of a number associated with your identity, scammers acquire a powerful tool that undermines common security measures that rely on phone verification. This can lead to financial losses, damage to your credit score and a complicated process of reclaiming your identity and securing your accounts.

TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF

Selling on the internet? Beware of sneaky tactics scammers use to trick you

A woman selling stuff online (Kurt “CyberGuy” Knutsson)

HOW TO AVOID BECOMING A MOVING SCAM VICTIM

How to reclaim your Google Voice number?

If you’ve given a scammer the verification, your linked number has been claimed, and someone else is using that number with another Voice account. If you still own the linked number, you can reclaim it by following these steps:

  • On your computer, go to voice.google.com.
  • Click Settings in the upper right corner.
  • Under Linked numbers, click New linked number, then enter the phone number to link
  • To verify your number, Google will provide a six-digit code. For a mobile number, click Send Code to review the code in a text message. If it’s a landline, click verify by phone link and then Call.
  • Enter the code and click Verify, then Claim

4 other ways to protect yourself from such scams

Scammers don’t only use Google Voice to scam you. They have plenty of other tactics, such as making you install malware to steal your data and passwords. Below are some tips to avoid getting scammed.

1) Check the email address: When you’re trying to sell something online, scammers might reach out to you via email and try to get you to click on malicious links. These links may look harmless, but they can give scammers access to your device and important data. Do not click on any links or attachments in the email and do not reply to it. Remember, you don’t need to click any links to sell an item online.

Advertisement

The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Avoid the sense of urgency: Many online selling scams create a sense of urgency or panic to trick you. Scammers might tell you that there’s a problem with your account, claim that you owe money, suggest that there’s an issue with your listing or even offer you a prize.

They may pressure you to act quickly, asking you to send money, provide personal information or buy gift cards. Don’t let them rush or pressure you. Take a moment to think carefully before you respond. If you’re unsure, consult someone you trust, such as a friend, family member or financial adviser. Remember, legitimate buyers or platforms will never ask you to pay with gift cards, wire transfers or cryptocurrency.

3) Verify buyer or seller’s identity: If you receive a message or call from someone claiming to be a buyer, a platform representative or an organization related to your online sale, don’t trust them blindly. Scammers may use fake names, phone numbers or email addresses to deceive you. They might also have some information about you, such as your name or listing details, which doesn’t mean they are legitimate. This information could be obtained from public sources or previous scams.

Do not provide any additional personal information, such as your bank details, password or Social Security number. Avoid agreeing to any unusual requests, like sending money, buying gift cards or sharing codes. Instead, verify their identity by contacting the organization or platform directly using a known, official contact method. You can also check the organization’s website for any alerts or warnings about scams.

Advertisement

4) Invest in personal data removal services: Removing yourself from the internet is an important step in protecting your personal information from scammers and cybercriminals. Even if you’re not selling anything online, removing your personal information from the web is crucial. This prevents scammers from obtaining your data to make fraudulent calls or create convincing scams. By limiting your online presence, you reduce the chances of scammers finding and exploiting your personal details. Additionally, deleting yourself from the internet ensures that scammers cannot access your personal information to call you or make you believe they have some of your credentials, making their scams seem legitimate.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

ALERT: 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

Kurt’s key takeaway

Selling items online can be easy, but it comes with risks, such as the Google Voice scam. If someone asks you for a verification code or personal details during a sale, be extra cautious. Always verify their legitimacy and use official channels for communication. Only use trusted platforms to sell anything online and take steps to protect yourself from identity theft, which can impact your finances for years.

Have you ever fallen victim to an online scam? What did you learn from the experience? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

 Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Huawei’s new tri-fold phone costs more than a 16-inch MacBook Pro

Published

on

Huawei’s new tri-fold phone costs more than a 16-inch MacBook Pro

After weeks of teasing, Huawei has officially launched the world’s first dual-hinged, triple-screen foldable phone and it’s just as expensive as we feared. In China, prices for the Mate XT Ultimate Design start at 19,999 yuan (about $2,809) for the 256GB storage model — that’s roughly $300 more than a brand-new 16-inch MacBook Pro.

All models are equipped with 16GB of RAM, and two additional storage variants are available that cost 21,999 yuan (about $3,089) for 512GB and 23,999 yuan (about $3,370) for 1TB. Chinese retailer Vmall reported 3.7 million preorders before pricing was announced.

The Mate XT features an inverse dual-hinge design that folds in a “Z” shape, allowing it to be used in a variety of formats. The OLED display measures 6.4-inches when fully collapsed as a traditional single-screen device. When fully unfolded, that display increases to 10.2-inches (2,232 x 3,184) and can still be used when partially unfurled in a smaller 7.9-inch configuration.

The device comes with a 5,600mAh battery and supports 66W of wired charging or 50W wirelessly. There’s a triple camera setup located on the rear that consists of a 50-megapixel main camera, a 12-megapixel ultrawide, and a 12-megapixel periscope camera. The hole-punch selfie camera on the front is 8 megapixels, and located on the left-most screen when the device is fully unfolded.

We’ve reached out to Huawei to ask about availability outside of China, but we’re not holding out hope.

Advertisement
Continue Reading

Trending