Connect with us

Technology

Secure your sensitive files by password-protecting your documents

Published

on

Secure your sensitive files by password-protecting your documents

One of the benefits of online file sharing and cloud storage services is the ability to share documents and files with friends, family, or colleagues easily. But with it being so easy, how do you protect your files when they are shared? 

Below are ways to password-protect your files or folders on the top cloud and file-sharing platforms, including Microsoft Word, OneDrive, Google Drive and Dropbox.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Friends sharing files on their computers (Kurt “CyberGuy” Knutsson)

How to password-protect a document in Microsoft Word

You can password-protect individual Word documents using the steps below.

Advertisement
  • Open your document by clicking your file on your computer
  • Go to and click File 

Password protect on Microsoft Word (Kurt “CyberGuy” Knutsson)

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Password protect on Microsoft Word (Kurt “CyberGuy” Knutsson)

Password protect on Microsoft Word (Kurt “CyberGuy” Knutsson)

  • Click Encrypt with Password
  • Input a password
  • Input the same password to confirm
  • Click OK
  • Save the file

BEWARE OF A SOPHISTICATED PHISHING ATTACK TARGETING MICROSOFT 365 USERS

How to password-protect a Google Drive folder

Unlike other file-sharing and cloud storage services, Google Drive doesn’t have password-protected file sharing. Instead, you can use different settings to restrict access to each Google Drive folder using the steps below:

  • Go to the Google Drive home screen on your desktop
  • Find the folder or file you want to protect, and right-click that folder or file 

How to protect Google Drive file or folder (Kurt “CyberGuy” Knutsson)

How to protect Google Drive file or folder (Kurt “CyberGuy” Knutsson)

Advertisement
  • Select Share in the subfolder

How to protect Google Drive file or folder (Kurt “CyberGuy” Knutsson)

  • Add the email address of the person you’d like to share the folder or file
  • In the drop-menu next to where you enter the email address, select the access level you’d like to grant: Viewer, Commenter or Editor

How to protect Google Drive file or folder (Kurt “CyberGuy” Knutsson)

  • You can either share a link to the folder by clicking the hyperlink icon or write a message and send an invitation to the addressee’s email by clicking Send.

How to protect Google Drive file or folder (Kurt “CyberGuy” Knutsson)

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

How to password-protect a shared folder on Dropbox

Unfortunately, you must upgrade from their free service to Dropbox Essentials to have access to link settings such as password protection. You can

  • Log in to your Dropbox account
  • Right-click on the file you want to share
  • Select Copy Link
  • Under the link, click Manage

How to password protect a shared folder on Dropbox (Kurt “CyberGuy” Knutsson)

  • Click Link settings
  • In the drop-down menu, select Only People Invited

How to password protect a shared folder on Dropbox (Kurt “CyberGuy” Knutsson)

How to password protect a shared folder on Dropbox (Kurt “CyberGuy” Knutsson)

  • Click Copy link to share or enter the email address you want to share the file with and select Share file

How to password protect a shared folder on Dropbox (Kurt “CyberGuy” Knutsson)

How to password-protect a folder in OneDrive

Unlike the other file-sharing and cloud storage services, OneDrive doesn’t have password-protected file sharing. Instead, you can use different settings to restrict access to each OneDrive folder using the steps below.

Advertisement

BEST WAYS TO SEND LARGE FILES ON ANY DEVICE

  • Log into your OneDrive account
  • Right-click on the file you want to share
  • Select Share

How to password protect a folder in OneDrive (Kurt “CyberGuy” Knutsson)

  • In the pop-up window, click the gear shift icon
  • Select People you choose
  • Under More Settings, select the level of access in the drop-down
  • Click Apply

How to password protect a folder in OneDrive (Kurt “CyberGuy” Knutsson)

  • Type in the email address of the person you want to give access and click Copy link or select Send

How to password protect a folder in OneDrive (Kurt “CyberGuy” Knutsson)

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Implement zero-knowledge encryption

One of the most robust security measures for cloud storage is implementing zero-knowledge encryption. This approach ensures that your data is encrypted before it leaves your device, and only you possess the encryption keys. Even the cloud storage provider cannot access or decrypt your files, providing an additional layer of protection against potential data breaches or unauthorized access.

Zero-knowledge encryption achieves true end-to-end encryption, where your files remain encrypted during transfer, storage, and retrieval. This eliminates the risk of your sensitive data being exposed, even if the cloud provider’s systems are compromised.

To implement zero-knowledge encryption, you can use third-party encryption tools or services that integrate with your cloud storage provider. These tools encrypt your files locally before uploading them to the cloud, ensuring that your data remains private and secure.

Advertisement

By incorporating zero-knowledge encryption into your cloud storage strategy, you can significantly enhance the security and privacy of your personal data, providing an additional layer of protection against potential threats and unauthorized access. 

Have strong antivirus software

Securing your cloud storage starts with protecting the devices you use to access it. Malware infections on your computer, smartphone, or tablet can potentially compromise your login credentials and expose your cloud data.

It’s crucial to use a reputable and up-to-date antivirus solution on all your devices. Make sure to keep your antivirus software and operating systems updated with the latest security patches to mitigate emerging threats.

Additionally, be cautious when downloading files or clicking on links, even from trusted sources, as they may contain malicious code that can infect your device and jeopardize your cloud storage security.

The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

Advertisement

Enable two-factor authentication

Most cloud storage providers offer an additional security feature called two-factor authentication (2FA). This adds an extra layer of protection by requiring a second form of verification, such as a code sent to your phone or an authenticator app, in addition to your password when logging in.

Enabling 2FA ensures that even if your password is compromised, unauthorized parties cannot access your cloud storage without the second factor. This significantly reduces the risk of account takeovers and unauthorized access to your files.

To set up 2FA, follow the instructions provided by your cloud storage provider in their security settings. It’s a simple yet effective way to enhance the security of your cloud storage accounts.

Limit sensitive data in the cloud

While cloud storage offers convenience and accessibility, it’s advisable to be selective about the type of data you store in the cloud. Avoid storing critical personal or financial information, legal documents, or proprietary business data in cloud storage services.

Instead, keep such sensitive files on secure local or offline storage solutions, such as encrypted external hard drives or secure network-attached storage devices. This minimizes the risk of exposing your most sensitive data in the event of a cloud storage breach or unauthorized access.

Advertisement

By following these additional security measures alongside the password protection methods and zero-knowledge encryption techniques outlined earlier, you can significantly enhance the overall security and privacy of your data in cloud storage services.

Kurt’s key takeaways

Sharing files and folders on Cloud and File Sharing services can make life a lot easier as you can share with others on the go. But keeping these files safe is also important since they are so accessible. While not all files can be password protected on every platform, each platform has ways to protect your files and folders by restricting access.

Have you ever experienced a security issue with your online files? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Creators and communities everywhere take a stand against ICE

Published

on

Creators and communities everywhere take a stand against ICE

It’s not surprising when the guy who’s been yelling about the horrors of late-stage capitalism on Instagram for the last five years turns his ire towards ICE. But something different has been happening over the week or so, following the most recent shootings of civilians by federal agents — even accounts that stay laser focused on golfing, chopping wood, and playing cats like bongos have started to speak out.

The tenor on social media and Reddit took an even sharper turn yesterday, following the killing of Alex Pretti by ICE. Even the moderator of normally politics-free r/catbongos (a subreddit “Where gentlemen, gentlewomen, and gentlethems of quality gather to watch cats being played like bongos”) spokeout in a post where they declared that “If you still support Trump/ICE even slightly, you’re not welcome in this sub.”

That quilters on Instagram or a Facebook account dedicated to New England gravestones have decided enough, is enough, is one thing. But, judging from the comments, it seems like the government has lost the support of r/military as well. The subreddit is filled with angry posters decrying that “this is exactly what tyranny looks like” and sharing memes mocking Secretary of Defense Pete Hegseth. One poster claiming to be an active member of the U.S. Army who has served for 21 years said, “these guys are against all we stand for as Americans. Modern day brownshirts.”

All across Reddit, subs are being inundated with anti-ICE posts. From r/Fauxmoi, to r/NFCNorthMemeWar, and r/DungeonCrawlerCarl. There’s even been some limited signs of revolt among the members of r/conservative, some of whom have taken issue with Kristi Noem’s description of Alexi Pretti as a “domestic terrorist,” and suggested that she should “just be quiet for a while.” And arguments have broken out among community members over perceived hypocrisy around the Second Amendment.

Some big names have also joined the chorus, including Joe Santagato of The Basement Yard podcast, who posted that what was occurring on the streets of Minneapolis was “legit horrifying.” And when someone told him to “Stay out of politics,” and “get back to spitting water out of your mouth and de-jumbling words with your idiot friends.” He shot back, “De-jumble this: ksuc ym slalb.”

Advertisement

Canadian wrestlers and social media influencers Chris and Patrick Vörös have spoken out previously about their anti-ICE views, but took the opportunity to remind people of the only two ICE agents they support. Educational YouTube channel Primer also took to X to say this is no longer about politics, but about the “fabric of society.”

Canadian musician bbno$ decided to break his silence, even if it risked his visa and his current U.S. tour, to throw his support behind the abolish ICE movement. Even Thoren Bradley, the Axe Man himself, whose whole schtick is being a ripped rural dude who chops wood, has decided to call out the hypocrisy of the Christian conservatives to his 10.7 million followers.

That creators like Hank Green are speaking out is no surprise. But when fitness influencers, duck-painting TikTokers, football subreddits, and even Second Amendment rights activists have finally broken their silence, it seems like the government has lost control of the narrative. No matter how hard they try to spin it.

Let us know in the comments what other creators and communities have begun to speakout in the comments.

Updated January 25th: Added additional information about Reddit communities.

Advertisement
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Google Fast Pair flaw lets hackers hijack headphones

Published

on

Google Fast Pair flaw lets hackers hijack headphones

NEWYou can now listen to Fox News articles!

Google designed Fast Pair to make Bluetooth connections fast and effortless. One tap replaces menus, codes and manual pairing. That convenience now comes with serious risk. Security researchers at KU Leuven uncovered flaws in Google’s Fast Pair protocol that allows silent device takeovers. They named the attack method WhisperPair. An attacker nearby can connect to headphones, earbuds or speakers without the owner knowing. In some cases, the attacker can also track the user’s location. Even more concerning, victims do not need to use Android or own any Google products. iPhone users are also affected.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK

Advertisement

Fast Pair makes connecting Bluetooth headphones quick, but researchers found that some devices accept new pairings without proper authorization.       (Kurt “CyberGuy” Knutsson)

What WhisperPair is and how it hijacks Bluetooth devices

Fast Pair works by broadcasting a device’s identity to nearby phones and computers. That shortcut speeds up pairing. Researchers found that many devices ignore a key rule. They still accept new pairings while already connected. That opens the door to abuse.

Within Bluetooth range, an attacker can silently pair with a device in about 10 to 15 seconds. Once connected, they can interrupt calls, inject audio or activate microphones. The attack does not require specialized hardware and can be carried out using a standard phone, laptop, or low-cost device like a Raspberry Pi. According to the researchers, the attacker effectively becomes the device owner.

Audio brands affected by the Fast Pair vulnerability

The researchers tested 17 Fast Pair compatible devices from major brands, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech and Google. Most of these products passed Google certification testing. That detail raises uncomfortable questions about how security checks are performed.

How headphones can become tracking devices

Some affected models create an even bigger privacy issue. Certain Google and Sony devices integrate with Find Hub, which uses nearby devices to estimate location. If a headset has never been linked to a Google account, an attacker can claim it first. That allows continuous tracking of the user’s movements. If the victim later receives a tracking alert, it may appear to reference their own device. That makes the warning easy to dismiss as an error.

Advertisement

GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS

Attacker’s dashboard with location from the Find Hub network. (KU Leuven)

Why many Fast Pair devices may stay vulnerable

There is another problem most users never consider. Headphones and speakers require firmware updates. Those updates usually arrive through brand-specific apps that many people never install. If you never download the app, you never see the update. That means vulnerable devices could remain exposed for months or even years.

The only way to fix this vulnerability is by installing a software update issued by the device manufacturer. While many companies have released patches, updates may not yet be available for every affected model. Users should check directly with the manufacturer to confirm whether a security update exists for their specific device.

Why convenience keeps creating security gaps

Bluetooth itself was not the problem. The flaw lives in the convenience layer built on top of it. Fast Pair prioritized speed over strict ownership enforcement. Researchers argue that pairing should require cryptographic proof of ownership. Without it, convenience features become attack surfaces. Security and ease of use do not have to conflict. But they must be designed together.

Advertisement

Google responds to the Fast Pair WhisperPair security flaws

Google says it has been working with researchers to address the WhisperPair vulnerabilities and began sending recommended patches to headphone manufacturers in early September. Google also confirmed that its own Pixel headphones are now patched.

In a statement to CyberGuy, a Google spokesperson said, “We appreciate collaborating with security researchers through our Vulnerability Rewards Program, which helps keep our users safe. We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting. As a best security practice, we recommend users check their headphones for the latest firmware updates. We are constantly evaluating and enhancing Fast Pair and Find Hub security.”

Google says the core issue stemmed from some accessory makers not fully following the Fast Pair specification. That specification requires accessories to accept pairing requests only when a user has intentionally placed the device into pairing mode. According to Google, failures to enforce that rule contributed to the audio and microphone risks identified by the researchers.

To reduce the risk going forward, Google says it updated its Fast Pair Validator and certification requirements to explicitly test whether devices properly enforce pairing mode checks. Google also says it provided accessory partners with fixes intended to fully resolve all related issues once applied.

On the location tracking side, Google says it rolled out a server-side fix that prevents accessories from being silently enrolled into the Find Hub network if they have never been paired with an Android device. According to the company, this change addresses the Find Hub tracking risk in that specific scenario across all devices, including Google’s own accessories.

Advertisement

Researchers, however, have raised questions about how quickly patches reach users and how much visibility Google has into real-world abuse that does not involve Google hardware. They also argue that weaknesses in certification allowed flawed implementations to reach the market at scale, suggesting broader systemic issues.

For now, both Google and the researchers agree on one key point. Users must install manufacturer firmware updates to be protected, and availability may vary by device and brand.

SMART HOME HACKING FEARS: WHAT’S REAL AND WHAT’S HYPE

Unwanted tracking notification showing the victim’s own device. (KU Leuven)

How to reduce your risk right now

You cannot disable Fast Pair entirely, but you can lower your exposure.

Advertisement

1) Check if your device is affected

If you use a Bluetooth accessory that supports Google Fast Pair, including wireless earbuds, headphones or speakers, you may be affected. The researchers created a public lookup tool that lets you search for your specific device model and see whether it is vulnerable. Checking your device is a simple first step before deciding what actions to take. Visit whisperpair.eu/vulnerable-devices to see if your device is on the list.

2) Update your audio devices

Install the official app from your headphone or speaker manufacturer. Check for firmware updates and apply them promptly.

3) Avoid pairing in public places

Pair new devices in private spaces. Avoid pairing in airports, cafés or gyms where strangers are nearby.

4) Factory reset if something feels off

Unexpected audio interruptions, strange sounds or dropped connections are warning signs.  A factory reset can remove unauthorized pairings, but it does not fix the underlying vulnerability. A firmware update is still required.

5) Turn off Bluetooth when not needed

Bluetooth only needs to be on during active use. Turning off Bluetooth when not in use limits exposure, but it does not eliminate the underlying risk if the device remains unpatched.

Advertisement

6) Reset secondhand devices

Always factory reset used headphones or speakers before pairing them. This removes hidden links and account associations.

7) Take tracking alerts seriously

Investigate Find Hub or Apple tracking alerts, even if they appear to reference your own device.

8) Keep your phone updated

Install operating system updates promptly. Platform patches can block exploit paths even when accessories lag behind.

Kurt’s key takeaways

WhisperPair shows how small shortcuts can lead to large privacy failures. Headphones feel harmless. Yet, they contain microphones, radios and software that need care and updates. Ignoring them leaves a blind spot that attackers are happy to exploit. Staying secure now means paying attention to the devices you once took for granted.

Should companies be allowed to prioritize fast pairing over cryptographic proof of device ownership? Let us know by writing to us at Cyberguy.com

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

On the ground in Minneapolis after the killing of Alex Pretti

Published

on

On the ground in Minneapolis after the killing of Alex Pretti

Steven Garcia, as told to Gaby Del Valle:

I was in the middle of a frozen lake when I got the notification from the Minnesota Star Tribune that there had been a shooting. I was on assignment at a pond hockey event, and someone who was supposed to play later that evening said he probably wouldn’t be able to make it — they knew there would be protests and demonstrations happening.

I arrived a little over three hours later. Federal officers had already cleared the scene — the FBI had been there investigating — so the only law enforcement present were state and local officials: the Minneapolis Police Department, their SWAT team, the Hennepin County Sheriff’s Office, and the Minnesota State Patrol.

There were protesters at multiple intersections. People had blocked off the streets with trash cans and dumpsters, and there were mattresses on the ground. Protesters were heckling officers, but there were no physical altercations. Eventually law enforcement retreated by a block and started throwing tear gas. They drove their trucks over the mattresses as they left.

When those tear gas canisters go off, they pop and bang, kind of like a firework. Dozens of canisters were going off. Even initially, there were four, five, six canisters at a time that they were throwing. I had to duck in an alley for a little bit because it got through my mask. It’s not a fun experience, even in very small amounts. You have to keep your eyes closed. It burns your eyes, it burns your mouth. For some people, it causes nausea and burning on the skin. Another local reporter told me his neck was burning and he had to use a decon wipe.

Advertisement

I think because of George Floyd in 2020, people knew how to respond. Gregory Bovino, the head of the US Border Patrol who has been here the whole time, has said community members in Minneapolis are really prepared. A lot of people I’ve talked to have said, “I had my respirator ready from 2020,” and they just restocked on safety supplies, decon wipes, and first aid kits. Even if they weren’t immediately prepared, they could rapidly respond to these kinds of events. At all the events I’ve been to, people will set a table to hand out food and water and hand warmers. It was especially cold today — it wasn’t supposed to get above 0 degrees.

After the officers cleared the scene, everyone convened at the intersection of 26th and Nicolette, just a couple hundred feet from where Alex Pretti was shot. Some community members started a makeshift vigil for him at the location where he was killed. People were spelling his name out with pinecones and starting to leave flowers.

Continue Reading

Trending