Updated Safe Gadget Security News – Security Alerts 2023

The following alerts have been updated to reflect new and important security protection schemes:

8/1/2020: Netgear has major issues with many of its wireless routers.  Update now. Some will never be updated, if you have one of these obsolete routers, buy a new one.

7/23/2020: C-Data networking (Cdata, OptiLink, BLIY) equipment has multiple back doors. – The company says these are counterfeit versions.

1/22/2020: SIM Swap compromises using your smartphone to get text messages to authenticate with websites. Avoid using text messages to do rescue logins.  A new paper from Princeton researchers shows how easy it is to pull off a SIM Swap against AT&T, Verizon, T-Mobile and others.  Send text messages to a VoIP number such as Google Voice  instead. Do not allow Google Voice to forwards Texts/Calls to your main number.

1/20/2020: Virtually all Cablemodems have the Cable Haunt critical vulnerability. Call you cable operator an ask them to upate your cablemodem’s software now. You cannot do it on your own.

12/10/2019: Google Smart Lock is also a great way to generate second factor authentication but using your iPhone or Android phone and their app.

10/1/2019: iOS 13 has a handy feature to stop unwanted calls.  You can set the phone to send unknown callers straight to voicemail! (Those not in your contacts) – Settings – Phone – Silence Unknown Callers

5/12/2019: Thrangrycat Attacks Cisco Switches, Firewall and routers.  Update and patch now

Continue reading “Updated Safe Gadget Security News – Security Alerts 2023”

How to Create, Store, and Use Secure Passwords

Last Update: 1/1/2020
iPad password entry screen

Passwords are one of the biggest security problems on the Internet, possibly even more so than Malware. Poorly chosen passwords and security questions are making online accounts easily hackable by cyber-criminals.

  1. Check to see if you have a compromised account
  2. See if a password you used has been hacked

Everyone knows it’s important to create and use complex passwords, ones that do not include:

  • Words from the dictionary of any language
  • Personal information such as names of your kids, pets, addresses, etc.
  • The same password for more than one site
  • Ones that are written down

Few people follow this type of policy. If you are guilty of one or more of the above, you are at risk of getting hacked. Hackers are able to use brute force attacks to test over 200,000 passwords per hour. As technology improves, they will be able to test passwords even faster. In this article we will help you create, store, and easily use secure passwords.

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

Better Usernames

Continue reading “How to Create, Store, and Use Secure Passwords”

Android Smartphone Security, How to securely use your Android Smartphone or Tablet

Last Updated: June 18, 2019

Google’s Android operating system powers many popular cellphones including the popular Samsung Galaxy S10. Most Android Smartphone users as well as most of the pubic at large do not think very much about security.

If your phone is not running the latest Android Monthly security patches or is Android 6 or older, you are open to attack. A recent Wall Street Journal article showed that only 2.8% of Android devices have the latest security patches. Compare that to 79% of iPhones, due to Apple’s more uniform eco-system.

As of February 2019 only Android 7 to 9 receive security updates now)

Most Up to Date Android Smartphones

This flagship phone runs the latest Android version and is patched regularly. Sold directly from Google or from a couple wireless carriers.

You can check this Google Support page that shows when updates will be available for Google devices and when devices stop getting updates.

Continue reading “Android Smartphone Security, How to securely use your Android Smartphone or Tablet”

How to use Wireless Networks or Wi-Fi securely in Public

Last Update: June 18, 2019

Free wireless Internet, Wi-fi, sign

Free Wi-Fi is available in many locations, from your local café or Starbucks to McDonald’s and many other restaurants. Using these mostly unsecured, public wireless networks puts your information at risk. It is important to employ several safeguards when surfing at a public hotspot. If you are using a cybercafe’s shared computer, we would only use it to view information, not to even get your e-mail. Chance are high that it is compromised.

Many public wireless networks are completely unencrypted so that users can log on to them easily. This opens up a huge security hole as any hacker or sophisticated computer user could easily see all the sensitive data being transmitted. Passwords to online stores or email accounts can be easily captured by increasingly easy to use tools. In this article, we will help you access public wireless networks safely. Settings within your operating system may need to be optimized, additional software installed, and third party services may need to be subscribed to.

McDonalds Free Wi-Fi

Finding Free Wi-Fi

  • Boingo has a Wi-Fi locator. The Starbucks and McDonald’s entries are free.
  • There are several free apps that help you find Wi-Fi – search the app stores for Wi-Fi

Secure your computer, web browser, Internet connection

Follow our guides to secure your Windows PC or secure your Macintosh by installing the right software, firewall, antivirus software, etc. Secure your mobile devices: iPhone, Android smartphone or tablet, iPad. Configure the settings and add plug-ins to you web browser so that it is more secure. Consult our tutorials for: Internet Explorer 9, Google Chrome, and Mozilla Firefox. Secure your Internet Connection: Wireless Network, Public Wi-Fi.

Continue reading “How to use Wireless Networks or Wi-Fi securely in Public”

iPhone Security, How to securely use your iPhone

Last Updated: 5/18/2018

Apple iPhone 3GS

Matthew Green, a well respected cryptographer and professor at Johns Hopkins has a great article discussing Secure Computing – Desktops vs Smartphones, iOS vs Android and more..

Most iPhone users do not think very much about security. The iPhone is part of Apple’s closed ecosystem, helping to prevent viruses and malware from wreaking havoc. As the iPhone has grown in popularity, the smartphone has become more of a target by hackers and criminals. It is important that iPhone users immediately become more vigilant about smartphone security.  Our tutorial covers the iPhone through iPhone 7 Plus and iOS through iOS 11.

0. Obsolete Hardware

If you have an iPhone or iPad that no longer gets updates, we would recycle it and buy a new one RIGHT away. Keep in mind that iOS 10.3.3 is the first version that fixed a Huge Broadcom Wi-Fi bug. Without that fix, you can get hacked by just having a Wi-Fi signal nearby.

1. iPhone Software Updates

Apple upgrades the iOS software for the iPhone from time to time. Updates include additional functionality as well as security bug fixes. It is important that users apply updates immediately. Before iOS 5 users needed to connect their iPhones to a computer in order to update the smartphone’s software. Needless to say, this was inconvenient and led to many iPhones with obsolete software.

Always update to the latest iOS software available as soon as possible.

Continue reading “iPhone Security, How to securely use your iPhone”

How to International Travel and Maintaining Computer Security Tips

Last Update: 5/4/2017

Apple iPhone 3GS

The International Travel Security Problem

Many of us travel internationally but few realize how important computer security can be when we visit other countries. People doing business in countries like China and Russia (or any other country for that matter) need to pay strict attention to their technology security protocols to prevent the real and growing threat of high tech espionage. There have been instances of people returning from abroad and having their laptops or smartphones compromised. A mobile device used internationally and later hooked up to the Company’s network provides an excellent infection vector. The folks intent on stealing information could be government or corporate based.

Learn how to use your iPhone or Android Smartphone in China

How to Protect Yourself When Traveling

Some people might find the following list a bit paranoid, but you never can be too safe. People that work for major corporations, government, or security firms need maximum protection from attackers. There are tools that can detect the location of a mobile device to within 100 feet and can target phones by the phone number, IMEI (International Mobile Equipment Identity) number and intercept all communications from the mobile device.

  • Leave your cell phone and laptop at home
  • Buy a phone and SIM card in the other country
  • Beware of any SMS message especially if they have links
  • Do not bring any sensitive data or passwords
  • Use temporary or loaner cell phones and laptops which will be erased when you get home
  • Make sure all gadgets are fully up to date and have security software enabled. The best encryption should be utilized
  • Never let your electronics out of your site
  • If your device gets inspected at the border, it should never be connected to the Company’s network again
  • Turn off Bluetooth and Wi-Fi
  • Avoid public Wi-Fi altogether
  • Do not use a public phone charging cable, it could be capturing video while you charge
  • Disable microphones and cameras
  • During meetings, turn off your devices and remove their batteries. (Prevents possible recording)
  • Use a VPN with heavy encryption to connect to the Internet
  • Use Google Voice to create a “throw away” voice accounts
  • Do not connect to your Company’s or government’s network while abroad
  • Use coded language when discussing sensitive matters
  • Cut and paste passwords to prevent keylogging
  • Change any and all passwords you used on the trip, immediately
  • Enable two factor authentication for services that support this; Facebook, Gmail, eBay, etc.
  • Two factor authentication system using SMS text messages is not secure, due to the weak SS7 routing system. We suggest only using two factor when you can use a token or a time based authenticator like Googles.

Continue reading “How to International Travel and Maintaining Computer Security Tips”

Welcome to Safegadget.com

Welcome to Safegadget.com, the one-stop website for securing your computer and gadgets. Don’t wait until you have become a victim of malware. While it is impossible to prevent all attacks, it is important that we all secure our systems so we aren’t easily hacked. This is akin to wearing a seat belt to prevent an accident.

We feature many different security tutorials.

Harden the Security of your Browser

Boost the Security of your Smartphones and Tablets

Learn how to perform the following Safely and Securely
Continue reading “Welcome to Safegadget.com”

BuyVia – Your Smart Shopping Concierge for Tech Gear

Our sister site has launch, BuyVia!

The BuyVia iOS app and website bring together the strongest smart shopping arsenal available, making it easy to find the best products/deals possible across all of the devices people own – including smartphones, laptops/desktops and tablets – without tedious and time-consuming research.

BuyVia’s iPhone & Android (coming soon) app allow users to scan barcodes, compare prices, set up alerts, and more.

How to Prevent Spam Text Messages

Apple iPhone 3GS

The only thing worse than spam in your email box is a spam text message on your cell phone or smartphone. For the last 20 years spam has been clogging up our email, and now it is in full bloom on our phones. Spam Texting needs to stop.

How do Spammers get Phone Numbers?

There are several sources of phone numbers for text message spamming.

  • Internet postings
  • Random phone number generation
  • Auto dialing robo calling

The Dangers in Spam Text Messages

Just like email spam, offers made in unsolicited text messages are full of bogus offers like free iPads, prizes, or gift cards, etc. Clicking on any link or calling a phone number listed in the text message can result in the following:

  • Malware being installed on your phone
  • Unauthorized charges billed to your phone
  • Recurring items added to your phone bill
  • Private information being transmitted to cyber criminals

Continue reading “How to Prevent Spam Text Messages”

By using our site you agree to our: Privacy PolicyTerms of Use.