Featured

Updated Safe Gadget Security Tutorials – Security Alerts 2016

The following alerts have been updated to reflect new and important security protection schemes:

5/20/2016: ID Ransomware helps you figure out which ransomware you are effected by, so you can look for remedies other than paying. Bleeping Computer has a Support forum for Ransomware

  • ESET has a decryptor for TeslaCrypt infections

2/24/2016: MouseJack is a new security vulnerability that allows a malware to be remotely downloaded onto a computer via a hijacked wireless mouse or keyboard connection. A hacker could remotely type in commands or move your mouse. Update the firmware on your wireless mouse/keyboard if possible, otherwise use a wired mouse – keyboard.

Logitech Update – Worked for us, but required several tries.

2/5/2016: Netgear Wireless routers do not automatically add passwords to hard drives that are plugged into them, leaving them accessible to anyone on the Internet. Make sure you change the default password. Hackers can use Shodan to find you quickly.

1/19/2016: The Wall Street Journal commissioned a security researcher to test 20 popular internet Wireless Routers. 10 had known security weaknesses. 4 had old firmware that when upgraded could contain undocumented security problems.  Keep your router’s software update and if it is older than 2 years, you should buy a new one. Most networking companies’ stop updating them after a year or two. How to setup a Secure Wireless Router was updated.

11/17/2015: Several tutorials have updated lists of secure instant messaging apps. Forget about using popular ones like Whatsapp, Line, Viber, WeChat, they have all been monitored.

Continue reading “Updated Safe Gadget Security Tutorials – Security Alerts 2016”

Featured

Welcome to Safegadget.com

Welcome to Safegadget.com, the one-stop website for securing your computer and gadgets. Don’t wait until you have become a victim of malware. While it is impossible to prevent all attacks, it is important that we all secure our systems so we aren’t easily hacked. This is akin to wearing a seat belt to prevent an accident.

We feature many different security tutorials.

Harden the Security of your Browser

Boost the Security of your Smartphones and Tablets

Learn how to perform the following Safely and Securely
Continue reading “Welcome to Safegadget.com”

Home Automation & Security – Internet of Things Security Protection

Last Update: February 22, 2016

More and more gadgets for the home are connected to the Internet for additional functionality. Refrigerators to Thermostats to Door Locks, the list is never ending. Do not forget about security.

A vulnerable webcam can give ANYONE on the Internet a view of your home. Secure these home gadgets as strongly as possible.

Wi-Fi Network Connection

Connect your Dropcam or Nest Smoke Detector to your Guest Wi-Fi network whenever possible.  This network should be walled off from the normal network, preventing access to all your Computers.  Malicious devices could snoop on your network and quietly send information without your knowledge.

Even better is to have 3 routers in a Y configuration. Put these devices on one of the Y routers.

Securing Wearable Technology Fitness Devices

Fitness trackers like the Fitbit, Vivosmart, Jawbone Up, Apple Watch, etc connect via Bluetooth.  Some devices use a fixed Bluetooth MAC address, allow criminals or law enforcement to identify you, wherever you go.

More secure fitness trackers like the Apple Watch protect users against tracking by switching the devices address every 10 minutes.

Look for updates from your fitness device’s website to address this issue. Garmin has issued updates to fix this issue.

Continue reading “Home Automation & Security – Internet of Things Security Protection”

iPhone Security, How to securely use your iPhone

Last Update: 3/1/2016

Apple iPhone 3GS

Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security.  Our tutorial covers the iPhone through iPhone 6S Plus and iOS through iOS 9.

1. iPhone Software Updates

Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.

iOS 5 allows updates to occur without the iPhone being connected to a computer, allowing users to stay current far easier. We recommend all owners of the iPhone 3GS and the iPhone 4, upgrade to iOS 5 immediately. iOS 5 in fact includes many security fixes.

The original iPhone and the iPhone 3G cannot be upgraded to iOS 5, and should be updated by connecting to a computer as often as possible.

If you Jailbreak your iPhone, you need to be extra careful with regards to security as iOS updates are much more difficult for you. Be careful where you obtain your Jailbroken Apps as malware is much more prevalent.

2. iPhone App Security

Continue reading “iPhone Security, How to securely use your iPhone”

Android Smartphone Security, How to securely use your Android Smartphone or Tablet

Last Updated: March 15, 2016

Android Smartphone,Samsung Galaxy 2, T-Mobile

Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S7. Most Android Smartphone users do not think very much about security.

Why is Android more susceptible to attack?

  • Open nature of Android system
  • Older Smartphones with old versions of Android
  • Many phones not being given latest updates
  • Multiple App stores
  • Apps are not checked

The Android Smartphone is part of Android’s open ecosystem, making viruses and malware more possible than closed platforms like the iPhone. As the Android Smartphone has grown in popularity, the smartphone has become more of a target by hackers and criminals. The DroidDream and Plankton Android malware infected over 250,000 phones before anyone discovered their malware. Google removed over 58 malicious apps from this single malware. A recent survey has shown that only 30% of Android Smartphone users installed security software on their phones. Malware can grab private data or use the phone to communicate externally.


Carrier IQ is a controversial piece of software that can show you what certain Android phones and spyware can do if the carriers allow it.

It is important that Android Smartphone users immediately become more vigilant about smartphone security. Our tutorial covers the Android Smartphones running most versions of the Android operating system.

The NSA and Android

Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”

How to Setup a Secure Wireless Network Router

Updated: 2/23/2016
Linksys wireless router, Linksys router, WRT54G

Security has become an ever more important part of using a personal computer. Increasingly, the daily headlines include news of companies and websites getting hacked. It is important to learn how to properly secure your wireless Internet as well as secure your personal computer. This article focuses on how to secure your wireless network router so that you do not become part of the statistics. The wireless router typically includes a firewall that defines the perimeter of your network. Think of this as a fence, walling off your network from the Internet. Having a vulnerable wireless network allows criminals to possibly steal your data as well as Internet access. You could also become responsible for illegal downloading if your wireless Internet was compromised.

Federal Trade Commission Makes Asus Improve Router Security

In February 2016, the Federal Trade Commission settled charges with Asus, over critical security flaws in its routers that put the home networks of hundreds of thousands of consumers at risk.

The proposed consent order will require ASUS to establish and maintain a comprehensive security program subject to independent audits for the next 20 years.

Finally!, the government is forcing these manufacturers to fix wireless routers that can be come huge security holes.

Wirless Routers are a big Security Hole

The Wall Street Journal commissioned a security researcher to test 20 popular internet Wireless Routers in late 2015. 10 had known security weaknesses. 4 had old firmware that when upgraded could contain undocumented security problems.  Keep your router’s software update and if it is older than 2 years, you should buy a new one. Few routers automatically update their software, like Windows does. Most networking companies’ stop updating them after a year or two (They have no financial incentive), resulting in a major security risk.

Continue reading “How to Setup a Secure Wireless Network Router”

Secure Google Chrome Browsing

Last Update: 4/14/2016

Google Chrome Browser

Google Chrome is one of the most popular web browser for Windows, Mac, and Linux. This makes it a large target for malware and cybercrime. We will focus on securing Google Chrome, and will significantly increase the browser’s security through add-ins and special hardening settings. We also recommend running under Windows 10 or Windows 7, so if you are running under an older version of Windows, we recommend you to upgrade or buy a new computer. Older versions of Windows like Windows XP were not built with security in mind. Continue reading “Secure Google Chrome Browsing”

Free Antivirus, Free Internet Security Software

Last Update: 3/10/2016

Windows 7 Security Software, Security Essentials

Here are some resources for free internet security software from major vendors. Most of the software is free for home users, while businesses need to purchase a license. We divide the free software into different categories including internet security suites, antivirus, antispyware, and intrusion detection and prevention.

Internet Security Software Downside – Spying on You

Any internet security program needs to watch the sites you visit for malicious activity, this includes secure sites (https://)  To watch your secure browsing activity, security suites need to replace the security certificates with their own, performing a man in the middle (MITM) attack essentially.

Hopefully this snooping is all in the name of security, not in stealing your credit card, banking information, or identity. You can read more about Avast.

Kaspersky Anti-Virus is often free after rebate.

1. ISP Provided Free Security Software

Subscribers to certain internet service providers get access to free commercial internet security software. There’s no need to pay a dime for top notch security software.

Continue reading “Free Antivirus, Free Internet Security Software”

How to: Anonymous Browsing, Internet Privacy

Last Updated: 1/17/2016

Gold Baldwin Door Lock

Why should I be concerned about Internet privacy?

  • Do you like online ads following you around from site to site?
  • Can you discuss your health problems online without fear of losing insurance?
  • Do you worry about publishing private information that could lead to stalking, surveillance, or identity theft?
  • Does your work place monitor your Facebook or Twitter? Could you be fired over a post?
  • Do you live in a country where you could be arrested or tortured based on what you post online?
  • Did you know that third-parties collect information the government is not allowed to collect? The government has purchased this information too.
  • Companies such as FinFisher are selling hacking software to countries and corporations to break into people’s computers and monitor them.
  • Visit the EFF’s Panopticlick site to see what you are telling the world right now, before using the tools below.
  • Tactical Technology Collective has tips for journalists and activists on how to increase their privacy.

60% of people polled by the WSJ.com were tremendously worried about the loss of online privacy.

The Internet appears to facilitate privacy and anonymity, but in recent years has been a battleground that pits advertisers on one side and users on the other. It has become increasingly difficult to maintain privacy on the Internet because money has gotten into the game. As online advertising has grown, companies have sprouted up, attempting to optimize Internet advertising performance by combining advertising with profiling. While individual users may not be known by name, they have become ghost profiles that are increasingly matched up with appropriate advertising. If you have found Internet ads following you from site to site, you have been profiled and are seeing the results. In this article, we will examine many methods to enhance our Internet privacy and perform operations anonymously.

One of the main goals of Internet privacy is to make that people have the ability to make informed decisions about how they act online. Users should be told ahead of time how their personal information is used and shared.

The Real Cost of Free Content

While many users assume that most content sites are free, there is a hidden price being paid, the users private information. Most online advertising companies are tracking web browsing activity across many websites in order to build profiles of users. They cross-reference and trade information to generate revenue and better target online advertising and promotions.

Internet Browser Cookies

Continue reading “How to: Anonymous Browsing, Internet Privacy”

How to: Safe and Secure E-mail

Last Update: 1/19/2016

Spam, can of spam less sodium

Every computer user uses e-mail. Security breaches make headlines almost daily. With more and more people going online, consumers are worried more than ever about keeping their e-mail safe and secure.

E-mail is the major way most malware is transmitted across the Internet. E-mail is the largest attack vector against large companies, as it is far more difficult to physically infiltrate a company. In this article, we will help you use e-mail more securely.

A recent experiment of 150,000 test emails sent by Verizon Enterprise Solutions found that 23% of recipients opened the email, 11% click on the attachment. One person clicking on the attachment would have infected the organization.  The human is the weakest link.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

The Golden rules of the Internet:

  • Do not trust anyone
  • If it is too good to be true, it probably is
  • Don’t install software from anonymous sources
  • Don’t automatically hit “yes” to any pop-up
  • If it looks suspicious, run

Secure Your Router

Continue reading “How to: Safe and Secure E-mail”

Free Software for Internet Security, Computer Protection on Windows Computers

Last Update: 4/24/2016

Optional Software from Microsoft and Other Third Party Developers is a crucial part of adding computer security to your Windows based PC. We recommend a minimal set of crucial network security software add-ons that we feel all users should install. Here are several extremely useful free security oriented software utilities from Microsoft, that are not bundled with the operating system. These programs add additional security for Windows and are free to download.

Before you make any changes to your system, always back it up.

Google Docs can replace Microsoft Word and Excel. Doing so helps prevent many of the security holes in Microsoft Office including Flash based bugs.

Windows 7 Security Software Microsoft Security Essentials

Microsoft Security Essentials – Free anti-virus software from Microsoft that is a no-brainer for everyone. Microsoft Security Essentials can also be used by small business on up to 10 PCs! It includes automatic updates and is easy to use.

Windows 7 Security Software Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer – Scans your system for security problems, missing or obsolete Windows components and patches. This is oriented towards small and medium sized businesses but can also be used by consumers.

Continue reading “Free Software for Internet Security, Computer Protection on Windows Computers”

Secure Firefox Browsing

Last Updated: 4/14/2016

firefox browser

Firefox is one of the most popular web browser for Windows and other platforms. This makes it a large target for malware and cybercrime. We will focus on securing Firefox, and will significantly increase the browser’s security through add-ins and special hardening settings. We are avoiding earlier versions of Firefox and recommend users to upgrade to the latest version of Firefox. We also recommend running under Windows 7, 8 or 10, so if you are running under an older version of Windows, we recommend you to upgrade or buy a new computer. Older versions of Windows like Windows XP were not built with security in mind.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

We recommend booting from a Linux CD or USB key when performing mission critical applications such as online banking, online trading, or online shopping.

Firefox includes the following security oriented features:

  • Instant Web ID
  • Do not Track
  • Private Browsing
  • Clear Recent History
  • Customized Security Setting

The Golden rules of the Internet: Continue reading “Secure Firefox Browsing”

How to use Wireless Networks or Wi-Fi securely in Public

Last Update: July 22, 2015

Free wireless Internet, Wi-fi, sign

Free Wi-Fi is available in many locations, from your local café or Starbucks to McDonald’s and many other restaurants. Using these mostly unsecured, public wireless networks puts your information at risk. It is important to employ several safeguards when surfing at a public hotspot. If you are using a cybercafe’s shared computer, we would only use it to view information, not to even get your e-mail. Chance are high that it is compromised.

Many public wireless networks are completely unencrypted so that users can log on to them easily. This opens up a huge security hole as any hacker or sophisticated computer user could easily see all the sensitive data being transmitted. Passwords to online stores or email accounts can be easily captured by increasingly easy to use tools. In this article, we will help you access public wireless networks safely. Settings within your operating system may need to be optimized, additional software installed, and third party services may need to be subscribed to.

McDonalds Free Wi-Fi

Finding Free Wi-Fi

  • Boingo has a Wi-Fi locator. The Starbucks and McDonald’s entries are free.
  • jiwire has a Wi-Fi hot spot locator
  • There are several free apps that help you find Wi-Fi (Free Wi-Fi Finder on iPhones and WiFi Finder for Android)

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

Continue reading “How to use Wireless Networks or Wi-Fi securely in Public”

How to Create, Store, and Use Secure Passwords

Last Update: 7/14/2015
iPad password entry screen

Passwords are one of the biggest security problems on the Internet, possibly even more so than Malware. Poorly chosen passwords and security questions are making online accounts easily hackable by cyber-criminals.

Everyone knows it’s important to create and use complex passwords, ones that do not include:

  • Words from the dictionary of any language
  • Personal information such as names of your kids, pets, addresses, etc.
  • The same password for more than one site
  • Ones that are written down

Few people follow this type of policy. If you are guilty of one or more of the above, you are at risk of getting hacked. Hackers are able to use brute force attacks to test over 200,000 passwords per hour. As technology improves, they will be able to test passwords even faster. In this article we will help you create, store, and easily use secure passwords.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

Better Usernames

We suggest users first start with a non-obvious username. Don’t use your first name or first name + last name as your username throughout your online accounts. Make up a name or alias. Include numbers and/or upper and lowercase letters. Better yet, use a different username on every site. The password managers recommended below will automatically remember all your logins.

Continue reading “How to Create, Store, and Use Secure Passwords”

How to use Wi-Fi securely in Hotels, Airports, and Beyond

Last Update: June 22, 2015

Free wireless Internet, Wi-fi, sign

While SafeGadget has several tutorials geared towards using Wi-Fi securely, we still realize that this is a major problem area. On our recent trip, we encountered insecure Wi-Fi at several airports, hotels, and restaurants. This tutorial is designed to help all users utilize Wi-Fi safely and securely.

Free Wi-Fi is available in many locations, from airports, hotels, local café, Starbucks to McDonald’s and many other restaurants. Using these mostly unsecured, public wireless networks puts your information at risk. It is important to employ several safeguards when surfing at a public hotspot. If you are using a cybercafe’s shared computer, we would only use it to view information, not to even get your e-mail. Chance are high that it is compromised.

Many public wireless networks are completely unencrypted so that users can log on to them easily. Anytime you login to a free Wi-Fi hotspot that does not require a password, assume that a hacker can ease drop and see all information that is being sent and received.

Some Wi-Fi hotspots from vendors like AT&T and Comcast require you to log in with your username and password before you can get access. You need to understand that this is just access restriction and will not create a secure wireless connection.

This opens up a huge security hole as any hacker or sophisticated computer user could easily see all the sensitive data being transmitted. Passwords to online stores or email accounts can be easily captured by increasingly easy to use tools. In this article, we will help you access public wireless networks safely. Settings within your operating system may need to be optimized, additional software installed, and third party services may need to be subscribed to.

McDonalds Free Wi-Fi

Finding Free Wi-Fi Continue reading “How to use Wi-Fi securely in Hotels, Airports, and Beyond”

How to Safely use Twitter

Last update 1/9/2015

Twitter Logo

Twitter is becoming more popular everyday. With millions of people to be targeted, Twitter is definitely a battleground for security and privacy. This website has become a worldwide hit and consequently has become a target for those intent on spamming, spreading worms, and stealing private information. In this article, we will cover many techniques to allow you to safely use Twitter.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

It is important that you follow the tips above to ensure your computer is secure. There have been Twitter Spam Attacks caused when malware infects a computer and gives control of the user’s Twitter account to a spammer. The spammer then posts messages on Twitter offering everything from Free items to pictures of celebrities, all appearing to be posted by the infected user. If one of your friends clicks on the offer, they instantly get infected, repeating the cycle of malware propagation.

Access the Real Twitter

Always make sure you are at a real Twitter log in page when you access their site. Do not count on Twitter links in email or on web pages to access the real Twitter website.

Think before Clicking on Links

Continue reading “How to Safely use Twitter”

Major Wireless Network Security Breach – Wi-Fi Protected Setup (WPS Bug) PIN Brute Force Vulnerability – Reaver

Linksys wireless router, Linksys router, WRT54G

Updated January 2014 to cover a new TCP 32764 Wireless router Vulnerability.

A major security hole known as WiFi Protected Setup (WPS Bug) PIN brute force vulnerability (US-CERT VU#723755) has been recently found in virtually all modern Wireless Routers used in the home, resulting in a vulnerability that allows hackers to extract your WPA wireless security password in a matter of hours. Wi-Fi Protected Setup (WPS) is a protocol that allows users to press a button on their Wireless Router and connect to their computers without typing in a long cryptic password. A hole in this protocol has been recently found and exploited, allowing hackers easy access to cracking most wireless networks.

Why is this a major security problem?

  • Virtually all wireless routers have this problem
  • Many wireless routers (Qwest Actiontec, etc) use the same unchangeable PIN 12345670, hackable in seconds
  • WPS is turn on by default to get certified by Wi-Fi Alliance
  • Wireless routers do not automatically update their software to get a fix
  • The number of PIN codes to test is only 11,000 instead of 100 million
  • Attack software is available

The biggest issue is that virtually all wireless routers sold in the last 4 of years are hackable. The manufacturers need to update their firmware for these devices in order to fix the security breach. Virtually all wireless routers do not automatically update their firmware. As of January 16th, 2012, no manufacturers have issued updates, leaving millions of wireless networks vulnerable. Adding insult to injury, options to disable Wi-Fi Protected Setup (WPS) have been found to not do anything.

Why is getting your wireless password bad?

There are many reasons why you do not want your wireless password hacked.

  • Others could use your Internet Connection Freely
  • Spam or other illegal activities could be sent
  • Everything you do on your network could be captured and read
  • Your online banking and trading would no longer be secure

Continue reading “Major Wireless Network Security Breach – Wi-Fi Protected Setup (WPS Bug) PIN Brute Force Vulnerability – Reaver”

NSA PRISM Program – How to Protect Your Privacy

Last updated: 11/7/2015

In June 2013, Edward Snowden revealed to the world that the US Government was spying on Internet traffic and other communication networks. The Government’s PRISM program run by the highly secretive NSA conducted all this work in an effort to prevent terrorism and crime.

The NSA apparently has direct connections through major Internet service providers such AT&T, Comcast, Verizon to copy all traffic passing through and can save it to its huge multi-billion dollar data warehouse in Utah. This has been going on for years and thanks to organizations like the EFF, we have learned about these invasions of privacy. The Government has stated it is using this information mainly on foreigners, but is the FBI using this data domestically?

The UK’s GCHQ is apparently doing the same type of snooping and even sharing information with the NSA.

The Government can see all your Facebook posts, read your email, see who you have called, among other privacy invading tasks.

Other services that are being watched: AOL, Apple, Skype, Microsoft, Paltalk, Yahoo, Youtube.

Specific areas:

  • Email
  • Chat- Video
  • voice
  • Videos
  • Photos
  • Stored Data
  • VOIP
  • File transfers
  • Video conferencing
  • logins
  • online social networking

Continue reading “NSA PRISM Program – How to Protect Your Privacy”

Updated Safe Gadget Internet Security Tutorials – Security Alerts 2013

The following articles have been updated in 2013 to reflect new and important security protection schemes:

6/17/2013: Microsoft Azure, Linkedin, Twitter, Evernote have now added 2 factor authentication. Be sure to take advantage of this.

4/15/2013: ID Thieves are using the IRS and filing fake tax returns.

3/24/2013: Vudu got hacked. Again, if you use the same password elsewhere, change it. Each site’s login password should be unique, so if one site gets hacked, hackers won’t be able to access all your other accounts.

3/21/2013: Apple introduced two-step verification for Apple IDs.  You need 2 forms of proof to access Apple. Please turn this on right away.

3/4/2013: Evernote got hacked and reset everyone’s password. Again, if you use the same password elsewhere, change it. Each site’s login password should be unique, so if one site gets hacked, hackers won’t be able to access all your other accounts.

3/1/2013: Mobile payments systems lead to privacy issues and major concerns. The systems are becoming more sophisticated with the ability to collect more information about the user transactions and shared with more people.

3/1/2013: Determine if a website is safe or not before visiting it with sites like:

2/28/2013: Microsoft has been running advertisements educating people that Google’s Gmail reads your email to generate ads, eliminating your privacy. You can read more about it at scroogled.com.

Continue reading “Updated Safe Gadget Internet Security Tutorials – Security Alerts 2013”