<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Geeks for your information - Security Discussions & Tips]]></title>
		<link>https://www.geeks.fyi/</link>
		<description><![CDATA[Geeks for your information - https://www.geeks.fyi]]></description>
		<pubDate>Fri, 15 May 2026 06:59:34 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[That weird CAPTCHA could be a malware trap - here's how to protect yourself]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=20687</link>
			<pubDate>Thu, 13 Mar 2025 12:26:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=20687</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Follow the 'I'm not a robot' CAPTCHA, and you might just end up with malware on your PC. </span><br />
 <br />
A persistent <a href="https://www.zdnet.com/article/best-malware-removal-software/" target="_blank" rel="noopener" class="mycode_url">malware campaign</a> is exploiting the ubiquitous CAPTCHA process to try to steal data from unsuspecting victims.<br />
<br />
As described by security firm Malwarebytes in <a href="https://www.malwarebytes.com/blog/news/2025/03/fake-captcha-websites-hijack-your-clipboard-to-install-information-stealers" target="_blank" rel="noopener" class="mycode_url">a new report</a>, this scheme relies on the ease with which people often follow the steps in a CAPTCHA prompt without thinking.<br />
<br />
How the attack worksYou land on a website that promises movies, music, pictures, news articles, or some other interesting content. A CAPTCHA prompt pops up, asking you to prove that you're not a robot. As we're all so used to these types of requests, many of us wouldn't think twice about accepting it.<br />
<br />
<br />
But instead of the usual CAPTCHA challenge that asks you to choose certain images in a picture or identify distorted characters, this one serves up the instructions seen in the image below:<br />
<br />
<br />
<img src="https://www.zdnet.com/a/img/resize/a0086c7a2dcdc094c3bf0e3e5317f84d0c0a17f7/2025/03/12/8356c0d0-451f-4a62-a45a-a6f54cfdf72f/malwarebytes-campaign-clipboard-hijacker.jpg?auto=webp&amp;width=1280" loading="lazy"  alt="[Image: malwarebytes-campaign-clipboard-hijacker...width=1280]" class="mycode_img" /><br />
<br />
At this point, most savvy users would realize that something is off here and exit the site. But remember that cybercriminals aren't targeting savvy users; they're trying to hit people who are less knowledgeable and more easily tricked. Even sophisticated users in a rush or on autopilot could fall prey to the trap.<br />
<br />
If you follow the steps, the website copies a text string to your Windows clipboard. Normally, you'd have to grant your permission for such an action, but you already did so by checking a checkbox on the first screen of the CAPTCHA prompt.<br />
<br />
<a href="https://www.zdnet.com/article/that-weird-captcha-could-be-a-malware-trap-heres-how-to-protect-yourself/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Follow the 'I'm not a robot' CAPTCHA, and you might just end up with malware on your PC. </span><br />
 <br />
A persistent <a href="https://www.zdnet.com/article/best-malware-removal-software/" target="_blank" rel="noopener" class="mycode_url">malware campaign</a> is exploiting the ubiquitous CAPTCHA process to try to steal data from unsuspecting victims.<br />
<br />
As described by security firm Malwarebytes in <a href="https://www.malwarebytes.com/blog/news/2025/03/fake-captcha-websites-hijack-your-clipboard-to-install-information-stealers" target="_blank" rel="noopener" class="mycode_url">a new report</a>, this scheme relies on the ease with which people often follow the steps in a CAPTCHA prompt without thinking.<br />
<br />
How the attack worksYou land on a website that promises movies, music, pictures, news articles, or some other interesting content. A CAPTCHA prompt pops up, asking you to prove that you're not a robot. As we're all so used to these types of requests, many of us wouldn't think twice about accepting it.<br />
<br />
<br />
But instead of the usual CAPTCHA challenge that asks you to choose certain images in a picture or identify distorted characters, this one serves up the instructions seen in the image below:<br />
<br />
<br />
<img src="https://www.zdnet.com/a/img/resize/a0086c7a2dcdc094c3bf0e3e5317f84d0c0a17f7/2025/03/12/8356c0d0-451f-4a62-a45a-a6f54cfdf72f/malwarebytes-campaign-clipboard-hijacker.jpg?auto=webp&amp;width=1280" loading="lazy"  alt="[Image: malwarebytes-campaign-clipboard-hijacker...width=1280]" class="mycode_img" /><br />
<br />
At this point, most savvy users would realize that something is off here and exit the site. But remember that cybercriminals aren't targeting savvy users; they're trying to hit people who are less knowledgeable and more easily tricked. Even sophisticated users in a rush or on autopilot could fall prey to the trap.<br />
<br />
If you follow the steps, the website copies a text string to your Windows clipboard. Normally, you'd have to grant your permission for such an action, but you already did so by checking a checkbox on the first screen of the CAPTCHA prompt.<br />
<br />
<a href="https://www.zdnet.com/article/that-weird-captcha-could-be-a-malware-trap-heres-how-to-protect-yourself/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google ends support for less secure passwords in third-party apps (workaround)]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=19685</link>
			<pubDate>Sat, 20 Jan 2024 10:11:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=19685</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>If you use an application or service that requires a Google username and password, then you may not be able to use it anymore after September 30, 2024. This may impact third-party app access to Google, e.g. in email clients or Calendar apps.<br />
<br />
There is a Google suggested option and another that still works, so read on to find out all about the change and how to deal with it.<br />
<br />
Google <a href="https://workspaceupdates.googleblog.com/2023/09/winding-down-google-sync-and-less-secure-apps-support.html" target="_blank" rel="noopener" class="mycode_url">announced</a> that it is ending support for Less Secure Apps. This authentication method may be used by apps to integrate a Google account. Basic examples include email clients that accept the Google username and password, or Calendar apps that integrate the Google Calendar after authentication.<br />
<br />
Google planned to introduce the change in 2020 already but postponed it because of the "impact of COVID-19".<br />
<br />
The company is dropping support for Less Secure Apps, but that does not mean that third-party apps and services can't be used anymore. Google supports OAuth for authentication. If affected apps and services do support OAuth as well, users may switch to this authentication method to continue using their Google account.<br />
<br />
 The email client Thunderbird, for instance, switched to <a href="https://www.ghacks.net/2022/04/06/thunderbird-91-8-0-makes-important-changes-to-google-mail-accounts/" target="_blank" rel="noopener" class="mycode_url">Oauth authentication for Google Mail (Gmail) accounts</a> back in 2022. Users were either <a href="https://support.mozilla.org/en-US/kb/automatic-conversion-google-mail-accounts-oauth20" target="_blank" rel="noopener" class="mycode_url">migrated automatically</a> or asked to complete the authentication process to regain access to their Gmail account in the email client.<br />
<br />
One downside of using OAuth in Thunderbird is that it requires cookies to store the token on the user's device. This led to issues if cookies were not enabled in Thunderbird. Google is also ending support for Google Sync.<br />
...</blockquote>
<a href="https://www.ghacks.net/2024/01/20/google-ends-support-for-less-secure-passwords-in-third-party-apps-workaround/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>If you use an application or service that requires a Google username and password, then you may not be able to use it anymore after September 30, 2024. This may impact third-party app access to Google, e.g. in email clients or Calendar apps.<br />
<br />
There is a Google suggested option and another that still works, so read on to find out all about the change and how to deal with it.<br />
<br />
Google <a href="https://workspaceupdates.googleblog.com/2023/09/winding-down-google-sync-and-less-secure-apps-support.html" target="_blank" rel="noopener" class="mycode_url">announced</a> that it is ending support for Less Secure Apps. This authentication method may be used by apps to integrate a Google account. Basic examples include email clients that accept the Google username and password, or Calendar apps that integrate the Google Calendar after authentication.<br />
<br />
Google planned to introduce the change in 2020 already but postponed it because of the "impact of COVID-19".<br />
<br />
The company is dropping support for Less Secure Apps, but that does not mean that third-party apps and services can't be used anymore. Google supports OAuth for authentication. If affected apps and services do support OAuth as well, users may switch to this authentication method to continue using their Google account.<br />
<br />
 The email client Thunderbird, for instance, switched to <a href="https://www.ghacks.net/2022/04/06/thunderbird-91-8-0-makes-important-changes-to-google-mail-accounts/" target="_blank" rel="noopener" class="mycode_url">Oauth authentication for Google Mail (Gmail) accounts</a> back in 2022. Users were either <a href="https://support.mozilla.org/en-US/kb/automatic-conversion-google-mail-accounts-oauth20" target="_blank" rel="noopener" class="mycode_url">migrated automatically</a> or asked to complete the authentication process to regain access to their Gmail account in the email client.<br />
<br />
One downside of using OAuth in Thunderbird is that it requires cookies to store the token on the user's device. This led to issues if cookies were not enabled in Thunderbird. Google is also ending support for Google Sync.<br />
...</blockquote>
<a href="https://www.ghacks.net/2024/01/20/google-ends-support-for-less-secure-passwords-in-third-party-apps-workaround/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What is your preferred VPN application?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=19274</link>
			<pubDate>Mon, 21 Aug 2023 06:55:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1295">jasonX</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=19274</guid>
			<description><![CDATA[Been meaning to ask this here.<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">What is your preferred VPN application?</span></span></span><br />
<br />
I mean the one you have used or currently using.<br />
<br />
I myself am using AirVPN and Surfshark VPN (paid VPN). These are the two that I use almost always (slightly leaning more on Surfshark VPN due to more features offered and well I guess, popularity). For free VPN I am using ProtonVPN, Hide.me and Windiscribe VPN. <br />
<br />
What's yours?]]></description>
			<content:encoded><![CDATA[Been meaning to ask this here.<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">What is your preferred VPN application?</span></span></span><br />
<br />
I mean the one you have used or currently using.<br />
<br />
I myself am using AirVPN and Surfshark VPN (paid VPN). These are the two that I use almost always (slightly leaning more on Surfshark VPN due to more features offered and well I guess, popularity). For free VPN I am using ProtonVPN, Hide.me and Windiscribe VPN. <br />
<br />
What's yours?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Your KeePass Master Password may be at risk, but a fix is coming]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=19049</link>
			<pubDate>Thu, 18 May 2023 09:36:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=19049</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/security.jpg" loading="lazy"  alt="[Image: security.jpg]" class="mycode_img" /><br />
<br />
A recently disclosed vulnerability in the KeePass password manager may be exploited to retrieve the master password. The vulnerability, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32784" target="_blank" rel="noopener" class="mycode_url">CVE-2023-32784</a>. indicates that the master password may be recovered from system memory dumps, even if the system is not running or locked.<br />
<br />
Dominik Reichl, the developer of KeePass, will release a patch in the upcoming KeePass 2.54 release, which is scheduled for a release in the coming 2 months.<br />
<br />
The security researcher who discovered the vulnerability has published a proof of concept on <a href="https://github.com/vdohney/keepass-password-dumper" target="_blank" rel="noopener" class="mycode_url">GitHub</a>. The tool, KeePass 2.X Master Password Dumper, analyzes memory dumps, for instance pagefile.sys, hiberfil.sys, or the KeePass process dump to return the master password in clear text. To be precise, the vulnerability may return all characters of the master password except for the first one. It is trivial, however, to run tests to find the single missing character.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/keepass.png" loading="lazy"  alt="[Image: keepass.png]" class="mycode_img" /><br />
<br />
The researcher goes on to explain that the issue is caused by SecureTextBoxEx, which causes leftover strings.<br />
<br />
While the vulnerability may allow threat actors to retrieve the master password of the password manager, but it seems unlikely that it will be exploited on scale.<br />
<br />
A likely scenario is a forensic investigation of a computer, as this may return the master password of the password manager. One of the best protections against this is to use full disk encryption and a strong password. Windows users may use the open source encryption software <a href="https://www.veracrypt.fr/code/VeraCrypt/" target="_blank" rel="noopener" class="mycode_url">Vera Crypt</a> for that. A password is required during system start to decrypt the system drive and boot the operating system.<br />
<br />
The researcher suggests that users of KeePass may also delete hibernation, pagefiles and swapfiles regularly, but it is only a temporary recourse. Changing the master password helps as well, but also only temporarily.<br />
<br />
KeePass 2.54 will address the issue. While it may be a month or two away, it is possible that it will be released faster, if reporting about the vulnerability is picking up pace.<br />
<br />
Dominik Reichl <a href="https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/#37b9" target="_blank" rel="noopener" class="mycode_url">describes</a> the fix on the project's Sourceforge discussion forum. The updated version " calls Windows API functions for getting/setting the text of the text box directly, in order to avoid the creation of managed strings". This takes care of most of the leaks. To address the remaining ones, KeePass 2.54 will create dummy fragments in process memory.<br />
<br />
The researcher tested the fix and confirmed that it is no longer possible to reproduce the attack on the fixed version. While there is a development build available that includes the fix, it is not recommended to run it, as it is beta software.<br />
<br />
Certain KeePass forks, like <a href="https://www.ghacks.net/2023/04/16/keepassxc-security-audit-published-recommends-this-security-setting/" target="_blank" rel="noopener" class="mycode_url">KeePassXC</a>, are not affected by the issue.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/18/your-keepass-master-password-may-be-at-risk-but-a-fix-is-coming/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/security.jpg" loading="lazy"  alt="[Image: security.jpg]" class="mycode_img" /><br />
<br />
A recently disclosed vulnerability in the KeePass password manager may be exploited to retrieve the master password. The vulnerability, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32784" target="_blank" rel="noopener" class="mycode_url">CVE-2023-32784</a>. indicates that the master password may be recovered from system memory dumps, even if the system is not running or locked.<br />
<br />
Dominik Reichl, the developer of KeePass, will release a patch in the upcoming KeePass 2.54 release, which is scheduled for a release in the coming 2 months.<br />
<br />
The security researcher who discovered the vulnerability has published a proof of concept on <a href="https://github.com/vdohney/keepass-password-dumper" target="_blank" rel="noopener" class="mycode_url">GitHub</a>. The tool, KeePass 2.X Master Password Dumper, analyzes memory dumps, for instance pagefile.sys, hiberfil.sys, or the KeePass process dump to return the master password in clear text. To be precise, the vulnerability may return all characters of the master password except for the first one. It is trivial, however, to run tests to find the single missing character.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/keepass.png" loading="lazy"  alt="[Image: keepass.png]" class="mycode_img" /><br />
<br />
The researcher goes on to explain that the issue is caused by SecureTextBoxEx, which causes leftover strings.<br />
<br />
While the vulnerability may allow threat actors to retrieve the master password of the password manager, but it seems unlikely that it will be exploited on scale.<br />
<br />
A likely scenario is a forensic investigation of a computer, as this may return the master password of the password manager. One of the best protections against this is to use full disk encryption and a strong password. Windows users may use the open source encryption software <a href="https://www.veracrypt.fr/code/VeraCrypt/" target="_blank" rel="noopener" class="mycode_url">Vera Crypt</a> for that. A password is required during system start to decrypt the system drive and boot the operating system.<br />
<br />
The researcher suggests that users of KeePass may also delete hibernation, pagefiles and swapfiles regularly, but it is only a temporary recourse. Changing the master password helps as well, but also only temporarily.<br />
<br />
KeePass 2.54 will address the issue. While it may be a month or two away, it is possible that it will be released faster, if reporting about the vulnerability is picking up pace.<br />
<br />
Dominik Reichl <a href="https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/#37b9" target="_blank" rel="noopener" class="mycode_url">describes</a> the fix on the project's Sourceforge discussion forum. The updated version " calls Windows API functions for getting/setting the text of the text box directly, in order to avoid the creation of managed strings". This takes care of most of the leaks. To address the remaining ones, KeePass 2.54 will create dummy fragments in process memory.<br />
<br />
The researcher tested the fix and confirmed that it is no longer possible to reproduce the attack on the fixed version. While there is a development build available that includes the fix, it is not recommended to run it, as it is beta software.<br />
<br />
Certain KeePass forks, like <a href="https://www.ghacks.net/2023/04/16/keepassxc-security-audit-published-recommends-this-security-setting/" target="_blank" rel="noopener" class="mycode_url">KeePassXC</a>, are not affected by the issue.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/18/your-keepass-master-password-may-be-at-risk-but-a-fix-is-coming/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Should you protect your Google Account with a passkey instead of a password?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=19025</link>
			<pubDate>Thu, 11 May 2023 11:21:46 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=19025</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/Google-now-lets-you-create-Passkeys-for-your-accounts.jpg" loading="lazy"  alt="[Image: Google-now-lets-you-create-Passkeys-for-...counts.jpg]" class="mycode_img" /><br />
<br />
Last week, Google unlocked the ability to <a href="https://www.ghacks.net/2023/05/03/how-to-set-up-a-passkey-for-your-google-account/" target="_blank" rel="noopener" class="mycode_url">create passkeys to protect Google Accounts</a> and to switch to using passkeys instead of passwords for protection. The question that Google customers may have is whether they should take the plunge and start using passkeys instead of the account password, or if they should wait a bit longer before they consider doing so.<br />
<br />
This guide explains the benefits and disadvantages of both authentication options so that all Google customers can make an educated decisions<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Google Account with a password</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/google-password.png" loading="lazy"  alt="[Image: google-password.png]" class="mycode_img" /><br />
<br />
Passwords are the dominating authentication option today. Users are allowed to select the passwords that they want to use and while there are some limitations usually, such as a minimum length or certain character requirements, users are free when it comes to selecting a password.<br />
<br />
This freedom is one of the greatest strengths but also issues when it comes to passwords. Easy to remember passwords are not secure, usually, while hard to remember passwords are secure, but not practicable, unless a password manager is used. There is also password reuse, the reusing of passwords at multiple services, and attacks that try to steal passwords or use brute-force methods to reveal them.<br />
<br />
Passwords, or their hashes, are stored by the service, as this is the only way to verify them when they are entered by the user during the login process.<br />
Companies have started to implement two-factor authentication options to improve the security. A second code needs to be provided by the user to gain access to the account. Codes may be created using apps or may be send to users via email or messages.<br />
<br />
While two-factor authentication improves the security of accounts, it makes things complicated for the user as it adds another step to the login process.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Google Account with Passkeys</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-gmail-passkey.jpg" loading="lazy"  alt="[Image: create-a-gmail-passkey.jpg]" class="mycode_img" /><br />
<br />
Passkeys is a passwordless authentication standard. Passkeys are created automatically on the user's device during setup and some of the information never leaves the device.<br />
<br />
Sign-ins to services and apps require confirmation by the user; this is done using the device's PIN or other means, including biometrics. A password is never used, and all forms of verification happen locally.<br />
<br />
The entire process of signing-in to accounts is fast and it does not require a second verification step anymore. One of the main benefits of passkeys is that it renders attacks against passwords useless. Phishing, brute forcing or server break-ins can't be used anymore to uncover passwords, as these are not entered nor stored remotely.<br />
<br />
There are a few downsides as well. Support may be limited to certain operating system versions, web browsers or applications. Google passkeys, for example, require Windows 10 or higher, macOS Ventura, Chrome OS, iOS 16 or Android 9 on the operating system side. Browser support is limited to <a href="https://www.ghacks.net/2022/12/12/google-chrome-adds-support-for-passkeys-on-windows-macos-and-android/" target="_blank" rel="noopener" class="mycode_url">Chrome 109</a> or newer, Microsoft Edge 109 or newer, and Safari 16 or newer officially.<br />
<br />
Other browsers may work also, including Firefox, but these are not supported officially.<br />
<br />
The second issue is that passkeys are device specific. While syncing is possible in theory, most services and apps do not support this yet. Google account passkeys are device-specific, which means that you need to create them on any device that you use to totally switch from using passwords to passkeys.<br />
<br />
The Google account password is not removed, however.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords or Passkeys?</span><br />
<br />
Some Google users may not be able to use passkeys at all or only on some devices, because of the requirements.<br />
<br />
Protecting the Google account with a passkey improves security in several ways, and it is the upcoming standard that many online services will switch to.<br />
<br />
Most Google users benefit from switching to passkeys. Some may want to wait until syncing becomes available, especially if they use lots of devices.<br />
<br />
A Google password may still (need to) be used, for instance on devices that don't support passkeys or on public machines.<br />
<br />
Most Google customers may need to juggle between using password and passkeys for a while because of that.<br />
<br />
Secure passwords along with two-factor authentication, a good password manager, and the use of common sense protect the Google account sufficiently.<br />
<br />
Passkeys are an upcoming standard which promises to do even better, but it is in its early stages at this point.<br />
<br />
There is no definitive answer at this point. Google customers who use a single device are in the best position to switch to using passkeys. Those with multiple devices, browsers and maybe even accounts less so.<br />
<br />
Most password managers do not support passkeys yet, but many will introduce support in the coming months and years. <a href="https://www.ghacks.net/2023/03/18/nordpass-password-manager-adds-passkeys-support/" target="_blank" rel="noopener" class="mycode_url">NordPass</a>, <a href="https://www.ghacks.net/2023/02/27/dashlane-password-manager-braces-for-passwordless-future/" target="_blank" rel="noopener" class="mycode_url">Dashlane</a>, <a href="https://www.ghacks.net/2023/02/23/bitwardens-desktop-app-now-supports-passwordless-login-for-web-vault/" target="_blank" rel="noopener" class="mycode_url">Bitwarden</a>, <a href="https://www.ghacks.net/2023/02/10/1password-plans-to-become-the-first-password-manager-without-passwords/" target="_blank" rel="noopener" class="mycode_url">1Password</a> and even <a href="https://www.ghacks.net/2022/06/08/lastpass-introduces-passwordless-vault-access/" target="_blank" rel="noopener" class="mycode_url">LastPass</a> have added support for passwordless authentication or are about to. Support may vary, as some services added support for the password management service itself, while others plans to add options to store password data of other accounts using the password manager.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: have you switched to using passkeys already?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/11/should-you-protect-your-google-account-with-a-passkey-instead-of-a-password/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/Google-now-lets-you-create-Passkeys-for-your-accounts.jpg" loading="lazy"  alt="[Image: Google-now-lets-you-create-Passkeys-for-...counts.jpg]" class="mycode_img" /><br />
<br />
Last week, Google unlocked the ability to <a href="https://www.ghacks.net/2023/05/03/how-to-set-up-a-passkey-for-your-google-account/" target="_blank" rel="noopener" class="mycode_url">create passkeys to protect Google Accounts</a> and to switch to using passkeys instead of passwords for protection. The question that Google customers may have is whether they should take the plunge and start using passkeys instead of the account password, or if they should wait a bit longer before they consider doing so.<br />
<br />
This guide explains the benefits and disadvantages of both authentication options so that all Google customers can make an educated decisions<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Google Account with a password</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/google-password.png" loading="lazy"  alt="[Image: google-password.png]" class="mycode_img" /><br />
<br />
Passwords are the dominating authentication option today. Users are allowed to select the passwords that they want to use and while there are some limitations usually, such as a minimum length or certain character requirements, users are free when it comes to selecting a password.<br />
<br />
This freedom is one of the greatest strengths but also issues when it comes to passwords. Easy to remember passwords are not secure, usually, while hard to remember passwords are secure, but not practicable, unless a password manager is used. There is also password reuse, the reusing of passwords at multiple services, and attacks that try to steal passwords or use brute-force methods to reveal them.<br />
<br />
Passwords, or their hashes, are stored by the service, as this is the only way to verify them when they are entered by the user during the login process.<br />
Companies have started to implement two-factor authentication options to improve the security. A second code needs to be provided by the user to gain access to the account. Codes may be created using apps or may be send to users via email or messages.<br />
<br />
While two-factor authentication improves the security of accounts, it makes things complicated for the user as it adds another step to the login process.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Google Account with Passkeys</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-gmail-passkey.jpg" loading="lazy"  alt="[Image: create-a-gmail-passkey.jpg]" class="mycode_img" /><br />
<br />
Passkeys is a passwordless authentication standard. Passkeys are created automatically on the user's device during setup and some of the information never leaves the device.<br />
<br />
Sign-ins to services and apps require confirmation by the user; this is done using the device's PIN or other means, including biometrics. A password is never used, and all forms of verification happen locally.<br />
<br />
The entire process of signing-in to accounts is fast and it does not require a second verification step anymore. One of the main benefits of passkeys is that it renders attacks against passwords useless. Phishing, brute forcing or server break-ins can't be used anymore to uncover passwords, as these are not entered nor stored remotely.<br />
<br />
There are a few downsides as well. Support may be limited to certain operating system versions, web browsers or applications. Google passkeys, for example, require Windows 10 or higher, macOS Ventura, Chrome OS, iOS 16 or Android 9 on the operating system side. Browser support is limited to <a href="https://www.ghacks.net/2022/12/12/google-chrome-adds-support-for-passkeys-on-windows-macos-and-android/" target="_blank" rel="noopener" class="mycode_url">Chrome 109</a> or newer, Microsoft Edge 109 or newer, and Safari 16 or newer officially.<br />
<br />
Other browsers may work also, including Firefox, but these are not supported officially.<br />
<br />
The second issue is that passkeys are device specific. While syncing is possible in theory, most services and apps do not support this yet. Google account passkeys are device-specific, which means that you need to create them on any device that you use to totally switch from using passwords to passkeys.<br />
<br />
The Google account password is not removed, however.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords or Passkeys?</span><br />
<br />
Some Google users may not be able to use passkeys at all or only on some devices, because of the requirements.<br />
<br />
Protecting the Google account with a passkey improves security in several ways, and it is the upcoming standard that many online services will switch to.<br />
<br />
Most Google users benefit from switching to passkeys. Some may want to wait until syncing becomes available, especially if they use lots of devices.<br />
<br />
A Google password may still (need to) be used, for instance on devices that don't support passkeys or on public machines.<br />
<br />
Most Google customers may need to juggle between using password and passkeys for a while because of that.<br />
<br />
Secure passwords along with two-factor authentication, a good password manager, and the use of common sense protect the Google account sufficiently.<br />
<br />
Passkeys are an upcoming standard which promises to do even better, but it is in its early stages at this point.<br />
<br />
There is no definitive answer at this point. Google customers who use a single device are in the best position to switch to using passkeys. Those with multiple devices, browsers and maybe even accounts less so.<br />
<br />
Most password managers do not support passkeys yet, but many will introduce support in the coming months and years. <a href="https://www.ghacks.net/2023/03/18/nordpass-password-manager-adds-passkeys-support/" target="_blank" rel="noopener" class="mycode_url">NordPass</a>, <a href="https://www.ghacks.net/2023/02/27/dashlane-password-manager-braces-for-passwordless-future/" target="_blank" rel="noopener" class="mycode_url">Dashlane</a>, <a href="https://www.ghacks.net/2023/02/23/bitwardens-desktop-app-now-supports-passwordless-login-for-web-vault/" target="_blank" rel="noopener" class="mycode_url">Bitwarden</a>, <a href="https://www.ghacks.net/2023/02/10/1password-plans-to-become-the-first-password-manager-without-passwords/" target="_blank" rel="noopener" class="mycode_url">1Password</a> and even <a href="https://www.ghacks.net/2022/06/08/lastpass-introduces-passwordless-vault-access/" target="_blank" rel="noopener" class="mycode_url">LastPass</a> have added support for passwordless authentication or are about to. Support may vary, as some services added support for the password management service itself, while others plans to add options to store password data of other accounts using the password manager.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: have you switched to using passkeys already?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/11/should-you-protect-your-google-account-with-a-passkey-instead-of-a-password/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google now lets you create Passkeys for your accounts, here's how to set it up]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18989</link>
			<pubDate>Thu, 04 May 2023 08:52:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18989</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/Google-now-lets-you-create-Passkeys-for-your-accounts.jpg" loading="lazy"  alt="[Image: Google-now-lets-you-create-Passkeys-for-...counts.jpg]" class="mycode_img" /><br />
<br />
Google has announced support for Passkeys for user accounts. You can now log in to your Gmail account, or any other Google service, without typing your password.<br />
<br />
The Mountain View company had worked with Apple, Microsoft and FIDO Alliance to co-create a platform for Passkeys. Apple <a href="https://www.ghacks.net/2023/03/28/apples-security-a-guide-to-passwords-tokens-and-keys/" target="_blank" rel="noopener" class="mycode_url">already supports</a> the feature on <a href="https://www.ghacks.net/2022/10/25/macos-13-ventura-released-heres-whats-new-in-it/" target="_blank" rel="noopener" class="mycode_url">macOS 13 Ventura</a> and iOS 16.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a passkey, and is it safe?</span><br />
<br />
A passkey allows you to sign in to your online accounts without using your password. Instead, it uses your device's screen lock, i.e. PIN or device password, or your biometric data such as a fingerprint scanner used by Windows Hello or macOS TouchID, to authenticate the ownership of the account. The same applies to your Android mobile or iPhone's screen lock methods.<br />
<br />
The passkey is created and stored locally on your device, i.e. a mobile phone or a computer. The data is encrypted to prevent unauthorized access. When you try to log in to your account, the server asks the device to verify the credentials associated with that account. The device in turn prompts you to enter your screen lock code to approve the request, and once you enter the code or use your biometric sensor, the device checks it with the data stored locally, and gives the green signal to the server to grant access to the account.<br />
<br />
Passkeys provide a quick and easy way to log in to your account, you just have to enter your username, you don't have to key in your password. The fact that it completely negates passwords is what makes it special. Passkeys will bypass authenticator apps or other 2FA methods that you may have enabled on your account. Does that mean that your Google account is no longer protected by 2-step verification? No, your account is still protected by 2FA, you may continue using your username and password along with your authenticator app to log in to your account, the Passkey is just an extra option that you can enable.<br />
<br />
You could say that a passkey acts as a combination of your password and two-factor authentication, rolled into one feature. And since the passkey never leaves your device, it is a secure way to log in to your account. Google says that passkeys are more resistant to phishing attacks, and are more secure than one-time codes that are sent over SMS text messages.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to set up a Passkey for your Google account</span><br />
<br />
1. Visit Google's Passkey creation page.<br />
2. The website will prompt you to enter the password for your Google account.<br />
3. Click on the Create a Passkey button.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/How-to-set-up-a-Passkey-for-your-Google-account.jpg" loading="lazy"  alt="[Image: How-to-set-up-a-Passkey-for-your-Google-account.jpg]" class="mycode_img" /><br />
<br />
4. Google will ask you to choose the device that you want to use for creating the Passkey. You can use your computer or mobile phone to create a passkey with your fingerprint, face, or screen lock.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-gmail-passkey.jpg" loading="lazy"  alt="[Image: create-a-gmail-passkey.jpg]" class="mycode_img" /><br />
<br />
5. Hit the continue button to proceed. Google will ask you to confirm the process by entering your device's screen lock code, or biometric data. That's it, you've set up a passkey.<br />
<br />
Try it now. Log out of the account in your browser and sign in again with your passkey. No password required, that's pretty cool.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/sign-in-to-google-by-verifying-your-passkey.jpg" loading="lazy"  alt="[Image: sign-in-to-google-by-verifying-your-passkey.jpg]" class="mycode_img" /><br />
<br />
Though the steps to set up a passkey are identical across all platforms, there are some differences in the way the feature works on computers and phones. The important thing to note here is that your passkey is not synchronized across your devices. Google doesn't support passkey sync, unlike Apple does with iCloud Keychain.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/login-to-google-with-passkey.jpg" loading="lazy"  alt="[Image: login-to-google-with-passkey.jpg]" class="mycode_img" /><br />
<br />
But when you sign in to your Google account on a secondary device, i.e. one that does not have a passkey stored on it, the web page will offer to create a passkey on that device. You may choose to add it by confirming the device's screen lock code. Adding a secondary device is optional, Google advises users not to create passkeys on shared devices.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-google-passkey-on-a-secondary-device.jpg" loading="lazy"  alt="[Image: create-a-google-passkey-on-a-secondary-device.jpg]" class="mycode_img" /><br />
<br />
Wait, how do you log in on a desktop browser if you created a passkey on a phone? Google's login page will display an option that lets you "add a new phone". Select it and the site will display a QR code on the screen. Use your mobile's camera app to scan it, and approve the login process.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">A few things to note</span><br />
<br />
Google Passkeys are supported on devices that run on Windows 10, macOS Ventura, ChromeOS 109, iOS 16, Android 9 or above. It is also compatible with hardware security key that supports the FIDO2 protocol. A support page on the company's website claims that Passkeys are only supported on the following browsers: Chrome 109 or above, Safari 16 or up, Edge 109 or later. In truth, it works perfectly fine on all modern browsers, I actually created the Passkey using Firefox. I was also able to use it on Vivaldi, so it should work fine with other Chromium-based browsers.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/verifying-a-sign-in-using-passkey-on-windows.jpg" loading="lazy"  alt="[Image: verifying-a-sign-in-using-passkey-on-windows.jpg]" class="mycode_img" /><br />
 <br />
The Passkey login page that I mentioned above displays options to sign in with an external security key (like Yubikey) or a fingerprint sensor, or to add a new Android phone. The third option can be a little confusing, as you're not adding a new device. Don't worry, it works with iPhones too, just point your camera app at the QR code on the screen and an option to "sign in with passkey" will appear on the screen. Tap on it, and it will authenticate the process using Face ID.<br />
<br />
What if you lose your device? A thief wouldn't be able to access the passkey without the device's screen lock code/biometric authentication. You can remove the passkey from the device remotely via your Google account on another device. Please refer to the <a href="https://support.google.com/accounts/answer/13548313" target="_blank" rel="noopener" class="mycode_url">official support page</a> for more details.<br />
<br />
To opt out of signing with passkeys, go to your Google Account's Security <a href="https://myaccount.google.com/security" target="_blank" rel="noopener" class="mycode_url">page</a>, and disable "Skip password when possible".<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/disable-google-passkey-sign-in-turn-off-skip-password.jpg" loading="lazy"  alt="[Image: disable-google-passkey-sign-in-turn-off-...ssword.jpg]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Note</span>: Google says that Android devices will automatically create passkeys when you sign in to your Google Account. You have to opt out of it, by removing the device from your account from the <a href="https://myaccount.google.com/u/1/device-activity" target="_blank" rel="noopener" class="mycode_url">Manage Devices</a> page.<br />
<br />
A few websites, such as <a href="https://www.ghacks.net/2023/03/24/paypal-launches-passkey-support-on-android-but-not-as-you-might-expect/" target="_blank" rel="noopener" class="mycode_url">PayPal</a> have already added support for passkeys, and so have some<a href="https://www.ghacks.net/2023/03/18/nordpass-password-manager-adds-passkeys-support/" target="_blank" rel="noopener" class="mycode_url"> password managers</a>, it is only a matter of time before more of them adopt the protocol. I guess the passwordless future is here.<br />
<br />
Have you tried Passkeys?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/03/how-to-set-up-a-passkey-for-your-google-account/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/05/Google-now-lets-you-create-Passkeys-for-your-accounts.jpg" loading="lazy"  alt="[Image: Google-now-lets-you-create-Passkeys-for-...counts.jpg]" class="mycode_img" /><br />
<br />
Google has announced support for Passkeys for user accounts. You can now log in to your Gmail account, or any other Google service, without typing your password.<br />
<br />
The Mountain View company had worked with Apple, Microsoft and FIDO Alliance to co-create a platform for Passkeys. Apple <a href="https://www.ghacks.net/2023/03/28/apples-security-a-guide-to-passwords-tokens-and-keys/" target="_blank" rel="noopener" class="mycode_url">already supports</a> the feature on <a href="https://www.ghacks.net/2022/10/25/macos-13-ventura-released-heres-whats-new-in-it/" target="_blank" rel="noopener" class="mycode_url">macOS 13 Ventura</a> and iOS 16.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a passkey, and is it safe?</span><br />
<br />
A passkey allows you to sign in to your online accounts without using your password. Instead, it uses your device's screen lock, i.e. PIN or device password, or your biometric data such as a fingerprint scanner used by Windows Hello or macOS TouchID, to authenticate the ownership of the account. The same applies to your Android mobile or iPhone's screen lock methods.<br />
<br />
The passkey is created and stored locally on your device, i.e. a mobile phone or a computer. The data is encrypted to prevent unauthorized access. When you try to log in to your account, the server asks the device to verify the credentials associated with that account. The device in turn prompts you to enter your screen lock code to approve the request, and once you enter the code or use your biometric sensor, the device checks it with the data stored locally, and gives the green signal to the server to grant access to the account.<br />
<br />
Passkeys provide a quick and easy way to log in to your account, you just have to enter your username, you don't have to key in your password. The fact that it completely negates passwords is what makes it special. Passkeys will bypass authenticator apps or other 2FA methods that you may have enabled on your account. Does that mean that your Google account is no longer protected by 2-step verification? No, your account is still protected by 2FA, you may continue using your username and password along with your authenticator app to log in to your account, the Passkey is just an extra option that you can enable.<br />
<br />
You could say that a passkey acts as a combination of your password and two-factor authentication, rolled into one feature. And since the passkey never leaves your device, it is a secure way to log in to your account. Google says that passkeys are more resistant to phishing attacks, and are more secure than one-time codes that are sent over SMS text messages.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to set up a Passkey for your Google account</span><br />
<br />
1. Visit Google's Passkey creation page.<br />
2. The website will prompt you to enter the password for your Google account.<br />
3. Click on the Create a Passkey button.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/How-to-set-up-a-Passkey-for-your-Google-account.jpg" loading="lazy"  alt="[Image: How-to-set-up-a-Passkey-for-your-Google-account.jpg]" class="mycode_img" /><br />
<br />
4. Google will ask you to choose the device that you want to use for creating the Passkey. You can use your computer or mobile phone to create a passkey with your fingerprint, face, or screen lock.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-gmail-passkey.jpg" loading="lazy"  alt="[Image: create-a-gmail-passkey.jpg]" class="mycode_img" /><br />
<br />
5. Hit the continue button to proceed. Google will ask you to confirm the process by entering your device's screen lock code, or biometric data. That's it, you've set up a passkey.<br />
<br />
Try it now. Log out of the account in your browser and sign in again with your passkey. No password required, that's pretty cool.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/sign-in-to-google-by-verifying-your-passkey.jpg" loading="lazy"  alt="[Image: sign-in-to-google-by-verifying-your-passkey.jpg]" class="mycode_img" /><br />
<br />
Though the steps to set up a passkey are identical across all platforms, there are some differences in the way the feature works on computers and phones. The important thing to note here is that your passkey is not synchronized across your devices. Google doesn't support passkey sync, unlike Apple does with iCloud Keychain.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/login-to-google-with-passkey.jpg" loading="lazy"  alt="[Image: login-to-google-with-passkey.jpg]" class="mycode_img" /><br />
<br />
But when you sign in to your Google account on a secondary device, i.e. one that does not have a passkey stored on it, the web page will offer to create a passkey on that device. You may choose to add it by confirming the device's screen lock code. Adding a secondary device is optional, Google advises users not to create passkeys on shared devices.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/create-a-google-passkey-on-a-secondary-device.jpg" loading="lazy"  alt="[Image: create-a-google-passkey-on-a-secondary-device.jpg]" class="mycode_img" /><br />
<br />
Wait, how do you log in on a desktop browser if you created a passkey on a phone? Google's login page will display an option that lets you "add a new phone". Select it and the site will display a QR code on the screen. Use your mobile's camera app to scan it, and approve the login process.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">A few things to note</span><br />
<br />
Google Passkeys are supported on devices that run on Windows 10, macOS Ventura, ChromeOS 109, iOS 16, Android 9 or above. It is also compatible with hardware security key that supports the FIDO2 protocol. A support page on the company's website claims that Passkeys are only supported on the following browsers: Chrome 109 or above, Safari 16 or up, Edge 109 or later. In truth, it works perfectly fine on all modern browsers, I actually created the Passkey using Firefox. I was also able to use it on Vivaldi, so it should work fine with other Chromium-based browsers.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/verifying-a-sign-in-using-passkey-on-windows.jpg" loading="lazy"  alt="[Image: verifying-a-sign-in-using-passkey-on-windows.jpg]" class="mycode_img" /><br />
 <br />
The Passkey login page that I mentioned above displays options to sign in with an external security key (like Yubikey) or a fingerprint sensor, or to add a new Android phone. The third option can be a little confusing, as you're not adding a new device. Don't worry, it works with iPhones too, just point your camera app at the QR code on the screen and an option to "sign in with passkey" will appear on the screen. Tap on it, and it will authenticate the process using Face ID.<br />
<br />
What if you lose your device? A thief wouldn't be able to access the passkey without the device's screen lock code/biometric authentication. You can remove the passkey from the device remotely via your Google account on another device. Please refer to the <a href="https://support.google.com/accounts/answer/13548313" target="_blank" rel="noopener" class="mycode_url">official support page</a> for more details.<br />
<br />
To opt out of signing with passkeys, go to your Google Account's Security <a href="https://myaccount.google.com/security" target="_blank" rel="noopener" class="mycode_url">page</a>, and disable "Skip password when possible".<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/05/disable-google-passkey-sign-in-turn-off-skip-password.jpg" loading="lazy"  alt="[Image: disable-google-passkey-sign-in-turn-off-...ssword.jpg]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Note</span>: Google says that Android devices will automatically create passkeys when you sign in to your Google Account. You have to opt out of it, by removing the device from your account from the <a href="https://myaccount.google.com/u/1/device-activity" target="_blank" rel="noopener" class="mycode_url">Manage Devices</a> page.<br />
<br />
A few websites, such as <a href="https://www.ghacks.net/2023/03/24/paypal-launches-passkey-support-on-android-but-not-as-you-might-expect/" target="_blank" rel="noopener" class="mycode_url">PayPal</a> have already added support for passkeys, and so have some<a href="https://www.ghacks.net/2023/03/18/nordpass-password-manager-adds-passkeys-support/" target="_blank" rel="noopener" class="mycode_url"> password managers</a>, it is only a matter of time before more of them adopt the protocol. I guess the passwordless future is here.<br />
<br />
Have you tried Passkeys?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/05/03/how-to-set-up-a-passkey-for-your-google-account/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to secure your data in the Cloud]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18856</link>
			<pubDate>Mon, 03 Apr 2023 10:10:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18856</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-spiske-hL8slYnc-bM-unsplash.jpg" loading="lazy"  alt="[Image: markus-spiske-hL8slYnc-bM-unsplash.jpg]" class="mycode_img" /><br />
<br />
Storing data in the cloud is often useful to users: from syncing data between devices to cloud-based backups and sharing options. While local storage still dominates, the use of cloud storage has grown considerable in the past decade.<br />
<br />
It should not come as a surprise that cloud storage solutions are offered on every corner of the Internet. Companies like Google, Apple and Microsoft have created solutions that are used by millions, if not billions, of users. Even while these large players dominate the market, there are thousands of other options to choose from.<br />
<br />
While all offer free or paid storage in the cloud, what they offer next to that may differ significantly. When users select a cloud storage provider, they need to make sure that their data is safe and secure. Unauthorized access to data can lead to leaks and all kinds of troubles.<br />
<br />
The following tips help making sure that cloud data is well protected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 1: Encryption is key</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/mauro-sbicego-4hfpVsi-gSg-unsplash.jpg" loading="lazy"  alt="[Image: mauro-sbicego-4hfpVsi-gSg-unsplash.jpg]" class="mycode_img" /><br />
<br />
The cloud provider should support end-to-end encryption. Most storage providers protect data when it is transferred, but end-to-end encryption is a level up as it prevents anyone, even the cloud provider, from accessing files.<br />
<br />
<a href="https://proton.me/drive" target="_blank" rel="noopener" class="mycode_url">Proton Drive</a> and <a href="https://www.pcloud.com/eu" target="_blank" rel="noopener" class="mycode_url">pCloud</a> are two providers that support end-to-end encryption. Both offer free accounts, with 1 gigabyte and 10 gigabyte of storage, and paid plans to get more storage. There are more, and Internet searches will reveal those providers.<br />
<br />
Another option is to encrypt data right on the local device before sending it to cloud storage; this does not work with some data, e.g., browser data that is synced so that bookmarks and tabs are accessible across all devices, but it works with static files.<br />
<br />
Most file archivers, WinRAR or 7-Zip for example, support encryption, and there are dedicated applications available, like <a href="https://cryptomator.org/" target="_blank" rel="noopener" class="mycode_url">Cryptomator</a>, which automate the process for the user.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 2: Protect the account properly</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-winkler-3LVhSjCXRKc-unsplash.jpg" loading="lazy"  alt="[Image: markus-winkler-3LVhSjCXRKc-unsplash.jpg]" class="mycode_img" /><br />
<br />
Encryption is key, but the key to unlock the data is the user's account password. Users who set up accounts with weak passwords and no additional security protections may have their accounts cracked in a matter of minutes.<br />
<br />
Therefore, it is essential to select a unique strong password for the account and add additional protection to it. Most cloud providers support two-factor authentication at the very least, requiring that a second code is entered, which is generated in real-time using <a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">authentication apps</a> or other means.<br />
<br />
<a href="https://www.ghacks.net/2023/03/27/passwords-vs-passwordless-a-debate-on-online-security/" target="_blank" rel="noopener" class="mycode_url">Passwordless</a> authentication is on the rise, but many providers do not support it at the time.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 3: Consider what to upload and what to keep local</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/wesley-tingey-snNHKZ-mGfE-unsplash.jpg" loading="lazy"  alt="[Image: wesley-tingey-snNHKZ-mGfE-unsplash.jpg]" class="mycode_img" /><br />
<br />
Not all files need to be pushed to the cloud. Cloud storage may make certain operations more convenient, may act as a backup for important data, and may also help when it comes to syncing passwords, browser data or other data that is in use regularly.<br />
<br />
Whether other types of data, say the entire family photo library, a mp3 collection, or fan fiction collection, need to be placed is up for debate. Some users like the idea of having access to the data anywhere. You may want to avoid uploading sensitive data to the cloud, or use extra encryption to protect this data even more.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 4: Keep local copies of cloud files</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-spiske-hL8slYnc-bM-unsplash.jpg" loading="lazy"  alt="[Image: markus-spiske-hL8slYnc-bM-unsplash.jpg]" class="mycode_img" /><br />
<br />
Cloud access is tied to an account and if access to the account is lost, e.g., password and password recovery can't be used anymore, or if a cloud provider decides to close the account, then data access is no longer possible. A local copy of files ensures that data is still accessible in those cases.<br />
<br />
Consider buying an external hard drive for backups, if local drives are not large enough to hold regular backups.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 5: Control access to the cloud</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/viktor-forgacs-LNwIJHUtED4-unsplash.jpg" loading="lazy"  alt="[Image: viktor-forgacs-LNwIJHUtED4-unsplash.jpg]" class="mycode_img" /><br />
<br />
One of the main advantages of storing files in the cloud is that they can be accessed from anywhere. Users may use their own devices for that, but they can also log in from public computers or devices that someone else owns.<br />
<br />
While it is certainly better not to sign-in to cloud storage on public computers, it is essential to make sure that you sign-out when you do. Others may access the data if you do not sign-out, which would torpedo the entire security setup.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> do you use Cloud storage?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/04/02/how-to-secure-your-data-in-the-cloud/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-spiske-hL8slYnc-bM-unsplash.jpg" loading="lazy"  alt="[Image: markus-spiske-hL8slYnc-bM-unsplash.jpg]" class="mycode_img" /><br />
<br />
Storing data in the cloud is often useful to users: from syncing data between devices to cloud-based backups and sharing options. While local storage still dominates, the use of cloud storage has grown considerable in the past decade.<br />
<br />
It should not come as a surprise that cloud storage solutions are offered on every corner of the Internet. Companies like Google, Apple and Microsoft have created solutions that are used by millions, if not billions, of users. Even while these large players dominate the market, there are thousands of other options to choose from.<br />
<br />
While all offer free or paid storage in the cloud, what they offer next to that may differ significantly. When users select a cloud storage provider, they need to make sure that their data is safe and secure. Unauthorized access to data can lead to leaks and all kinds of troubles.<br />
<br />
The following tips help making sure that cloud data is well protected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 1: Encryption is key</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/mauro-sbicego-4hfpVsi-gSg-unsplash.jpg" loading="lazy"  alt="[Image: mauro-sbicego-4hfpVsi-gSg-unsplash.jpg]" class="mycode_img" /><br />
<br />
The cloud provider should support end-to-end encryption. Most storage providers protect data when it is transferred, but end-to-end encryption is a level up as it prevents anyone, even the cloud provider, from accessing files.<br />
<br />
<a href="https://proton.me/drive" target="_blank" rel="noopener" class="mycode_url">Proton Drive</a> and <a href="https://www.pcloud.com/eu" target="_blank" rel="noopener" class="mycode_url">pCloud</a> are two providers that support end-to-end encryption. Both offer free accounts, with 1 gigabyte and 10 gigabyte of storage, and paid plans to get more storage. There are more, and Internet searches will reveal those providers.<br />
<br />
Another option is to encrypt data right on the local device before sending it to cloud storage; this does not work with some data, e.g., browser data that is synced so that bookmarks and tabs are accessible across all devices, but it works with static files.<br />
<br />
Most file archivers, WinRAR or 7-Zip for example, support encryption, and there are dedicated applications available, like <a href="https://cryptomator.org/" target="_blank" rel="noopener" class="mycode_url">Cryptomator</a>, which automate the process for the user.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 2: Protect the account properly</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-winkler-3LVhSjCXRKc-unsplash.jpg" loading="lazy"  alt="[Image: markus-winkler-3LVhSjCXRKc-unsplash.jpg]" class="mycode_img" /><br />
<br />
Encryption is key, but the key to unlock the data is the user's account password. Users who set up accounts with weak passwords and no additional security protections may have their accounts cracked in a matter of minutes.<br />
<br />
Therefore, it is essential to select a unique strong password for the account and add additional protection to it. Most cloud providers support two-factor authentication at the very least, requiring that a second code is entered, which is generated in real-time using <a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">authentication apps</a> or other means.<br />
<br />
<a href="https://www.ghacks.net/2023/03/27/passwords-vs-passwordless-a-debate-on-online-security/" target="_blank" rel="noopener" class="mycode_url">Passwordless</a> authentication is on the rise, but many providers do not support it at the time.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 3: Consider what to upload and what to keep local</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/wesley-tingey-snNHKZ-mGfE-unsplash.jpg" loading="lazy"  alt="[Image: wesley-tingey-snNHKZ-mGfE-unsplash.jpg]" class="mycode_img" /><br />
<br />
Not all files need to be pushed to the cloud. Cloud storage may make certain operations more convenient, may act as a backup for important data, and may also help when it comes to syncing passwords, browser data or other data that is in use regularly.<br />
<br />
Whether other types of data, say the entire family photo library, a mp3 collection, or fan fiction collection, need to be placed is up for debate. Some users like the idea of having access to the data anywhere. You may want to avoid uploading sensitive data to the cloud, or use extra encryption to protect this data even more.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 4: Keep local copies of cloud files</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/markus-spiske-hL8slYnc-bM-unsplash.jpg" loading="lazy"  alt="[Image: markus-spiske-hL8slYnc-bM-unsplash.jpg]" class="mycode_img" /><br />
<br />
Cloud access is tied to an account and if access to the account is lost, e.g., password and password recovery can't be used anymore, or if a cloud provider decides to close the account, then data access is no longer possible. A local copy of files ensures that data is still accessible in those cases.<br />
<br />
Consider buying an external hard drive for backups, if local drives are not large enough to hold regular backups.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Tip 5: Control access to the cloud</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/04/viktor-forgacs-LNwIJHUtED4-unsplash.jpg" loading="lazy"  alt="[Image: viktor-forgacs-LNwIJHUtED4-unsplash.jpg]" class="mycode_img" /><br />
<br />
One of the main advantages of storing files in the cloud is that they can be accessed from anywhere. Users may use their own devices for that, but they can also log in from public computers or devices that someone else owns.<br />
<br />
While it is certainly better not to sign-in to cloud storage on public computers, it is essential to make sure that you sign-out when you do. Others may access the data if you do not sign-out, which would torpedo the entire security setup.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> do you use Cloud storage?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/04/02/how-to-secure-your-data-in-the-cloud/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to stay safe while using public Wi-Fi]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18846</link>
			<pubDate>Fri, 31 Mar 2023 08:05:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18846</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/paul-hanaoka-KRAk_61pgTo-unsplash.jpg" loading="lazy"  alt="[Image: paul-hanaoka-KRAk_61pgTo-unsplash.jpg]" class="mycode_img" /><br />
<br />
Whether you are traveling frequently or a remote worker, relying on public Wi-Fi may not be ideal, but it may be the only option to get work done sometimes. Many may not even be aware of the dangers of public wireless connections, but there are also precautions available to improve security and privacy.<br />
<br />
Public Wi-Fi is a common option in many places, including at airports, libraries, hotels, cafes or restaurants. Just connect to the wireless network and use the available Internet connection for work or leisure.<br />
<br />
The following guide helps users stay safe while their devices are connected to public wireless networks. There are several risks, including the following ones:<ul class="mycode_list"><li>Network Snooping -- Someone else is monitoring network connections and what users do on the network.<br />
</li>
<li>Infections -- Hackers may infect public Wi-Fi networks to spread malware or monitor what connected users do.<br />
</li>
</ul>
There are other forms of attacks, including session hijacking, creating rogue access points or attacking devices that are in the same network.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Use a VPN</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/vpn-google-one.png" loading="lazy"  alt="[Image: vpn-google-one.png]" class="mycode_img" /><br />
<br />
The best protection against any form of public Wi-Fi attack or risk is to use a VPN, Virtual Private Network. One of the main features of VPNs is that they encrypt your device's traffic. This prevents others, including the network operator, other connected users or hackers, from spying on your network traffic.<br />
<br />
Some browsers include <a href="https://www.ghacks.net/2023/02/21/microsoft-secure-network-reportedly-rolling-out-in-microsoft-edge-stable/" target="_blank" rel="noopener" class="mycode_url">basic free VPN</a>s, but most VPNs cost about a Starbuck Coffee per month. To name a few options: <a href="https://mullvad.net/" target="_blank" rel="noopener" class="mycode_url">Mullvad</a> or <a href="https://protonvpn.com/" target="_blank" rel="noopener" class="mycode_url">ProtonVPN</a>. Even Google has its own VPN called <a href="https://www.ghacks.net/2023/03/25/vpn-by-google-one-is-the-most-basic-vpn-that-you-can-get/" target="_blank" rel="noopener" class="mycode_url">VPN by Google One now</a>, which is available for all paying customers.<br />
<br />
With a VPN connection in place, some include options to auto-connect to the VPN whenever a connection to a public wireless network is established, risks are reduced significantly. It allows you to act freely on your devices, without having to worry about network sniffing or manipulation of Internet traffic.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Other Tips regarding public Wi-Fi connections</span><br />
<br />
If a VPN connection is not available, for whatever reason, then users may follow these suggestions to improve security and privacy:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Turn off automatic connectivity features</span>. Some devices may connect to public wireless networks automatically, especially if no other mobile connection is available. Disable this option to gain control over the feature and avoid unwanted connections.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Turn off file sharing</span>. File Sharing should also be turned off, as it may give others access to files on your devices, especially if access is not protected properly.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Don't share or use sensitive information or data.</span> It is recommended to avoid using sensitive data, e.g., logging into a bank account, making online purchases or uploading sensitive data while connected to a public Wi-fi network.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Make sure software and the operating system are up to date</span>. Keeping software up to date prevents attacks against known security issues.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
All in all, it is recommended to use a VPN all the time when connecting to public Wi-Fi networks. Skip one coffee per month and get a good VPN instead to protect your data and improve security significantly.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: do you connect your devices to public Wi-Fi networks?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/30/how-to-stay-safe-while-using-public-wi-fi/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/paul-hanaoka-KRAk_61pgTo-unsplash.jpg" loading="lazy"  alt="[Image: paul-hanaoka-KRAk_61pgTo-unsplash.jpg]" class="mycode_img" /><br />
<br />
Whether you are traveling frequently or a remote worker, relying on public Wi-Fi may not be ideal, but it may be the only option to get work done sometimes. Many may not even be aware of the dangers of public wireless connections, but there are also precautions available to improve security and privacy.<br />
<br />
Public Wi-Fi is a common option in many places, including at airports, libraries, hotels, cafes or restaurants. Just connect to the wireless network and use the available Internet connection for work or leisure.<br />
<br />
The following guide helps users stay safe while their devices are connected to public wireless networks. There are several risks, including the following ones:<ul class="mycode_list"><li>Network Snooping -- Someone else is monitoring network connections and what users do on the network.<br />
</li>
<li>Infections -- Hackers may infect public Wi-Fi networks to spread malware or monitor what connected users do.<br />
</li>
</ul>
There are other forms of attacks, including session hijacking, creating rogue access points or attacking devices that are in the same network.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Use a VPN</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/vpn-google-one.png" loading="lazy"  alt="[Image: vpn-google-one.png]" class="mycode_img" /><br />
<br />
The best protection against any form of public Wi-Fi attack or risk is to use a VPN, Virtual Private Network. One of the main features of VPNs is that they encrypt your device's traffic. This prevents others, including the network operator, other connected users or hackers, from spying on your network traffic.<br />
<br />
Some browsers include <a href="https://www.ghacks.net/2023/02/21/microsoft-secure-network-reportedly-rolling-out-in-microsoft-edge-stable/" target="_blank" rel="noopener" class="mycode_url">basic free VPN</a>s, but most VPNs cost about a Starbuck Coffee per month. To name a few options: <a href="https://mullvad.net/" target="_blank" rel="noopener" class="mycode_url">Mullvad</a> or <a href="https://protonvpn.com/" target="_blank" rel="noopener" class="mycode_url">ProtonVPN</a>. Even Google has its own VPN called <a href="https://www.ghacks.net/2023/03/25/vpn-by-google-one-is-the-most-basic-vpn-that-you-can-get/" target="_blank" rel="noopener" class="mycode_url">VPN by Google One now</a>, which is available for all paying customers.<br />
<br />
With a VPN connection in place, some include options to auto-connect to the VPN whenever a connection to a public wireless network is established, risks are reduced significantly. It allows you to act freely on your devices, without having to worry about network sniffing or manipulation of Internet traffic.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Other Tips regarding public Wi-Fi connections</span><br />
<br />
If a VPN connection is not available, for whatever reason, then users may follow these suggestions to improve security and privacy:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Turn off automatic connectivity features</span>. Some devices may connect to public wireless networks automatically, especially if no other mobile connection is available. Disable this option to gain control over the feature and avoid unwanted connections.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Turn off file sharing</span>. File Sharing should also be turned off, as it may give others access to files on your devices, especially if access is not protected properly.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Don't share or use sensitive information or data.</span> It is recommended to avoid using sensitive data, e.g., logging into a bank account, making online purchases or uploading sensitive data while connected to a public Wi-fi network.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Make sure software and the operating system are up to date</span>. Keeping software up to date prevents attacks against known security issues.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
All in all, it is recommended to use a VPN all the time when connecting to public Wi-Fi networks. Skip one coffee per month and get a good VPN instead to protect your data and improve security significantly.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: do you connect your devices to public Wi-Fi networks?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/30/how-to-stay-safe-while-using-public-wi-fi/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to protect your Windows PC from the attack that led to the Linus Tech Tips hack]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18841</link>
			<pubDate>Wed, 29 Mar 2023 08:05:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18841</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/ed-hardie-Y5PSyMm8nMk-unsplash.jpg" loading="lazy"  alt="[Image: ed-hardie-Y5PSyMm8nMk-unsplash.jpg]" class="mycode_img" /><br />
<br />
One of the world's most popular tech YouTube channels <a href="https://www.ghacks.net/2023/03/24/linus-tech-tips-hacked/" target="_blank" rel="noopener" class="mycode_url">was hacked recently</a>. <a href="https://www.youtube.com/user/linustechtips" target="_blank" rel="noopener" class="mycode_url">Linus Tech Tips</a> has over 15 million subscribers on YouTube, but all of the company's technical expertise has not prevented it from being hacked.<br />
<br />
It appears that Linus Tech Tips was not the first company that fell for the attack. It started with an email inquiry regarding sponsorship. It is unclear if there was more than one email, as a common strategy of threat actors is to send a harmless email in the beginning, wait for the potential victim to respond, and then include the malware in the next email.<br />
<br />
Linus Tech Tips received an email with a zip file, which supposedly contained a sponsorship offer. One of the company's employees extracted the zip archive, and discovered that it contained the promised PDF document.<br />
<br />
Only problem was, it was not a PDF document, but a Windows screensaver file. One of Windows' biggest issues regarding security is that it hides certain common file extensions in File Explorer. An attacker can rename the file SuperOffer.scr to SuperOffer.pdf.scr, and Windows, in all its glory, displays only the SuperOffer.pdf part by default in File Explorer. It looks like a PDF document, and since it is possible to give it a PDF icon, it makes it even more believable.<br />
<br />
Execution of the file does not load the system's PDF viewer, but runs the executable. At this stage, if no security software kicks in, the PC should be considered infected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Windows PC from this attack</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/hide-extensions-known-file-types.png" loading="lazy"  alt="[Image: hide-extensions-known-file-types.png]" class="mycode_img" /><br />
<br />
Protecting Windows PCs from this double file extension security issue is quite easy, as it takes just a few clicks. The main issue here is that Microsoft decided to favor a cleaner look of files on the system over security.<br />
<br />
The change forces Windows to always display the file extensions of files. The malicious file example from above would be displayed as SuperOffer.pdf.scr by Windows, which would increase the chance of the user to identify the file as potentially malicious.<br />
<br />
The following step-by-step instructions explain how the change is made on Windows 10 and 11 devices:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Windows 10</span><br />
<ol type="1" class="mycode_list"><li>Open a File Explorer instance, for example, by clicking on the File Explorer icon in the Windows 10 taskbar.<br />
</li>
<li>Select File &gt; Change folder and search options.<br />
</li>
<li>Switch to the View tab.<br />
</li>
<li>Scroll down until you see "Hide extensions for known file types".<br />
</li>
<li>Remove the checkmark from the setting.<br />
</li>
<li>Click on OK.<br />
</li>
</ol>
Windows 10 will display all file extensions all the time now.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Windows 11</span><br />
<ol type="1" class="mycode_list"><li>Open File Explorer on the operating system, it is pinned on the taskbar.<br />
</li>
<li>Select Menu (three-dots) and then Options.<br />
</li>
<li>Switch to the View tab in the Folder Options window.<br />
</li>
<li>Uncheck the "Hide extensions for known file types" options.<br />
</li>
<li>Select OK.<br />
</li>
</ol>
Windows 11 displays all file extensions now for all file types.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
The change improves the chance of spotting files that try to disguise their real type by adding a fake file extensions to the filename. While that does not guarantee that users do not execute the file accidentally, it does give inexperienced users a better chance at spotting that something is wrong.<br />
<br />
Another option that may work wonders is to always execute certain files, for instance all email attachments, in <a href="https://www.ghacks.net/2018/12/19/a-first-look-at-windows-sandbox/" target="_blank" rel="noopener" class="mycode_url">sandboxes</a> or virtual machines.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: have another tip on how these attacks can be prevented?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/28/how-to-protect-your-windows-pc-from-the-attack-that-led-to-the-linus-tech-tips-hack/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/ed-hardie-Y5PSyMm8nMk-unsplash.jpg" loading="lazy"  alt="[Image: ed-hardie-Y5PSyMm8nMk-unsplash.jpg]" class="mycode_img" /><br />
<br />
One of the world's most popular tech YouTube channels <a href="https://www.ghacks.net/2023/03/24/linus-tech-tips-hacked/" target="_blank" rel="noopener" class="mycode_url">was hacked recently</a>. <a href="https://www.youtube.com/user/linustechtips" target="_blank" rel="noopener" class="mycode_url">Linus Tech Tips</a> has over 15 million subscribers on YouTube, but all of the company's technical expertise has not prevented it from being hacked.<br />
<br />
It appears that Linus Tech Tips was not the first company that fell for the attack. It started with an email inquiry regarding sponsorship. It is unclear if there was more than one email, as a common strategy of threat actors is to send a harmless email in the beginning, wait for the potential victim to respond, and then include the malware in the next email.<br />
<br />
Linus Tech Tips received an email with a zip file, which supposedly contained a sponsorship offer. One of the company's employees extracted the zip archive, and discovered that it contained the promised PDF document.<br />
<br />
Only problem was, it was not a PDF document, but a Windows screensaver file. One of Windows' biggest issues regarding security is that it hides certain common file extensions in File Explorer. An attacker can rename the file SuperOffer.scr to SuperOffer.pdf.scr, and Windows, in all its glory, displays only the SuperOffer.pdf part by default in File Explorer. It looks like a PDF document, and since it is possible to give it a PDF icon, it makes it even more believable.<br />
<br />
Execution of the file does not load the system's PDF viewer, but runs the executable. At this stage, if no security software kicks in, the PC should be considered infected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Protecting your Windows PC from this attack</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/hide-extensions-known-file-types.png" loading="lazy"  alt="[Image: hide-extensions-known-file-types.png]" class="mycode_img" /><br />
<br />
Protecting Windows PCs from this double file extension security issue is quite easy, as it takes just a few clicks. The main issue here is that Microsoft decided to favor a cleaner look of files on the system over security.<br />
<br />
The change forces Windows to always display the file extensions of files. The malicious file example from above would be displayed as SuperOffer.pdf.scr by Windows, which would increase the chance of the user to identify the file as potentially malicious.<br />
<br />
The following step-by-step instructions explain how the change is made on Windows 10 and 11 devices:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Windows 10</span><br />
<ol type="1" class="mycode_list"><li>Open a File Explorer instance, for example, by clicking on the File Explorer icon in the Windows 10 taskbar.<br />
</li>
<li>Select File &gt; Change folder and search options.<br />
</li>
<li>Switch to the View tab.<br />
</li>
<li>Scroll down until you see "Hide extensions for known file types".<br />
</li>
<li>Remove the checkmark from the setting.<br />
</li>
<li>Click on OK.<br />
</li>
</ol>
Windows 10 will display all file extensions all the time now.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Windows 11</span><br />
<ol type="1" class="mycode_list"><li>Open File Explorer on the operating system, it is pinned on the taskbar.<br />
</li>
<li>Select Menu (three-dots) and then Options.<br />
</li>
<li>Switch to the View tab in the Folder Options window.<br />
</li>
<li>Uncheck the "Hide extensions for known file types" options.<br />
</li>
<li>Select OK.<br />
</li>
</ol>
Windows 11 displays all file extensions now for all file types.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
The change improves the chance of spotting files that try to disguise their real type by adding a fake file extensions to the filename. While that does not guarantee that users do not execute the file accidentally, it does give inexperienced users a better chance at spotting that something is wrong.<br />
<br />
Another option that may work wonders is to always execute certain files, for instance all email attachments, in <a href="https://www.ghacks.net/2018/12/19/a-first-look-at-windows-sandbox/" target="_blank" rel="noopener" class="mycode_url">sandboxes</a> or virtual machines.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You</span>: have another tip on how these attacks can be prevented?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/28/how-to-protect-your-windows-pc-from-the-attack-that-led-to-the-linus-tech-tips-hack/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How To Secure Your Twitter Account Without Paying for Blue]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18832</link>
			<pubDate>Sun, 26 Mar 2023 07:59:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18832</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/How-To-Secure-Your-Twitter-Account-Without-Paying-for-Blue-scaled.jpg" loading="lazy"  alt="[Image: How-To-Secure-Your-Twitter-Account-Witho...scaled.jpg]" class="mycode_img" /><br />
<br />
Twitter has gotten wild over the last few months. Ever since Elon Musk took over, Twitter has not been able to stay out of the news. From data leaks to bans on third-party clients, Twitter may implode at any time. Now, Twitter has introduced another controversial rule. If you don’t pay a monthly subscription service (Twitter Blue), your two-factor authentication will be turned off by the site after 20th March. This article will help you understand how to <a href="https://www.ghacks.net/2023/03/23/how-to-secure-your-twitter-account-without-sms-based-two-factor-authentication/" target="_blank" rel="noopener" class="mycode_url">secure your account</a> without paying for the Blue subscription.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/How-To-Secure-Your-Twitter-Account-Without-Paying-for-Blue-02.jpg" loading="lazy"  alt="[Image: How-To-Secure-Your-Twitter-Account-Witho...lue-02.jpg]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Is Two-Factor (2FA) Authentication?</span><br />
<br />
Most online accounts have implemented 2FA to protect users. The first factor is a password that the user must enter and the second factor is a random code sent to the user through an app or text. This is one of the best ways to <a href="https://en.softonic.com/articles/state-of-cybercrime" target="_blank" rel="noopener" class="mycode_url">keep hackers away</a>. However, Twitter is now taking away 2FA without a Blue subscription and we’re here to tell you how to protect your account.<br />
<br />
Without 2FA, there are other methods to authenticate your account. You can use authentication apps or use the Google authenticator. If you’re unsure how to use this with Twitter, continue reading.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Adding An Authenticator App To Twitter</span><br />
<br />
It’s very simple to add an authenticator app to Twitter. You can try the Google Authenticator app that is free for iOS and Android users. The app generates a random code every 30 seconds and reduces the likelihood of your account being hacked. You can add as many accounts as you want to this app. However, you should remember that this works on a desktop only and not your mobile.<br />
<br />
To begin with, sign in to Twitter and go to your Profile. Click on more that will appear on the left of the screen. On the next screen, click on Settings and Support, then on Settings and Privacy, and then Security and account access. You must then click on Security and then Two Factor Authentication. You will see the authentication app box. Check the box and you will receive a pop up. <br />
<br />
Follow the on-screen instructions and then open the authenticator app that you want. Scan the code on your screen through the app. The app will then generate a code. Enter the confirmation code in the box on the screen and then press confirm. Your Twitter account will now be added to your authenticator app. You can follow these steps for any other account you want to add to the app.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/25/how-to-secure-your-twitter-account-without-paying-for-blue/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/03/How-To-Secure-Your-Twitter-Account-Without-Paying-for-Blue-scaled.jpg" loading="lazy"  alt="[Image: How-To-Secure-Your-Twitter-Account-Witho...scaled.jpg]" class="mycode_img" /><br />
<br />
Twitter has gotten wild over the last few months. Ever since Elon Musk took over, Twitter has not been able to stay out of the news. From data leaks to bans on third-party clients, Twitter may implode at any time. Now, Twitter has introduced another controversial rule. If you don’t pay a monthly subscription service (Twitter Blue), your two-factor authentication will be turned off by the site after 20th March. This article will help you understand how to <a href="https://www.ghacks.net/2023/03/23/how-to-secure-your-twitter-account-without-sms-based-two-factor-authentication/" target="_blank" rel="noopener" class="mycode_url">secure your account</a> without paying for the Blue subscription.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/03/How-To-Secure-Your-Twitter-Account-Without-Paying-for-Blue-02.jpg" loading="lazy"  alt="[Image: How-To-Secure-Your-Twitter-Account-Witho...lue-02.jpg]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Is Two-Factor (2FA) Authentication?</span><br />
<br />
Most online accounts have implemented 2FA to protect users. The first factor is a password that the user must enter and the second factor is a random code sent to the user through an app or text. This is one of the best ways to <a href="https://en.softonic.com/articles/state-of-cybercrime" target="_blank" rel="noopener" class="mycode_url">keep hackers away</a>. However, Twitter is now taking away 2FA without a Blue subscription and we’re here to tell you how to protect your account.<br />
<br />
Without 2FA, there are other methods to authenticate your account. You can use authentication apps or use the Google authenticator. If you’re unsure how to use this with Twitter, continue reading.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Adding An Authenticator App To Twitter</span><br />
<br />
It’s very simple to add an authenticator app to Twitter. You can try the Google Authenticator app that is free for iOS and Android users. The app generates a random code every 30 seconds and reduces the likelihood of your account being hacked. You can add as many accounts as you want to this app. However, you should remember that this works on a desktop only and not your mobile.<br />
<br />
To begin with, sign in to Twitter and go to your Profile. Click on more that will appear on the left of the screen. On the next screen, click on Settings and Support, then on Settings and Privacy, and then Security and account access. You must then click on Security and then Two Factor Authentication. You will see the authentication app box. Check the box and you will receive a pop up. <br />
<br />
Follow the on-screen instructions and then open the authenticator app that you want. Scan the code on your screen through the app. The app will then generate a code. Enter the confirmation code in the box on the screen and then press confirm. Your Twitter account will now be added to your authenticator app. You can follow these steps for any other account you want to add to the app.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/25/how-to-secure-your-twitter-account-without-paying-for-blue/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Reminder: Twitter is disabling a security feature in just two weeks]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18769</link>
			<pubDate>Sun, 05 Mar 2023 08:21:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18769</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/02/twitter-protect-account.png" loading="lazy"  alt="[Image: twitter-protect-account.png]" class="mycode_img" /><br />
<br />
<a href="https://twitter.com/home" target="_blank" rel="noopener" class="mycode_url">Twitter</a> users have two weeks left to make sure that their account on the popular social messaging site remains protected with two-factor authentication (2FA).<br />
<br />
The company announced back in February that it will<a href="https://www.ghacks.net/2023/02/19/twitter-disables-sms-two-factor-authentication-for-most-users-on-march-20-2023/" target="_blank" rel="noopener" class="mycode_url"> remove the SMS-based message</a> from the available options for all free users.<br />
<br />
Two-factor authentication is a security feature that adds a second authentication step to the sign-in process. Instead of just having to enter username and password to log in, users need to supply a code before the sign-in is authorized.<br />
<br />
Twitter supported three methods: SMS, authenticator application and security key. SMS, or text message, is considered an insecure method, as the code is transferred as plain text to the user's mobile device. Certain attacks may be used to intercept these codes. Additionally, these codes are never generated on the user device, but by the service itself, in this case Twitter.<br />
<br />
While Twitter's motivation behind the change may be cost-cutting more than improved security for its users, most security experts advice against text messages for two-factor authentication.<br />
<br />
The main appeal that text messages have, regardless of whether they use SMS or Email, is that it is the easiest to set up. For SMS, all a user needs to do is add a mobile phone number to the Twitter account. Email is even easier, as most services require an email address during setup.<br />
<br />
The two-factor authentication options on TwitterFree Twitter users are left with two methods for two-factor authentication on Twitter: authenticator app or security key. Authenticator app is a secure application, which users may run on their mobile devices or desktop systems, to generate codes locally. While it requires installation of an app on devices, setup is not overly complicated and codes will be generated locally on the device, which means that any attack that tries to intercept the codes fails, as these are no longer transferred from the service to the user's device.<br />
<br />
Security key requires hardware solutions, like a <a href="https://www.yubico.com/why-yubico/for-individuals/" target="_blank" rel="noopener" class="mycode_url">Yubikey</a>, which are linked to services. The physical key needs to be present and the second verification step is usually done with a tap or touch. Codes do not need to be entered.<br />
<br />
Both options are available, but security keys do come with a cost. Authenticator apps on the other hand are freely available. You can check out Ashwin's <a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">list of the best authenticator apps</a>, or check out <a href="https://www.ghacks.net/2023/02/24/aegis-authenticator-open-source-google-authenticator-and-authy-alternative/" target="_blank" rel="noopener" class="mycode_url">Aegis Authenticator</a> as a starting point, which is an open source app that is on Ashwin's list.<br />
<br />
Switching from one verification method to another is not all that different from setting up two-factor authentication on Twitter for the first time. Twitter will disable the Text Message method for all free users on March 20, 2023 anyway.<br />
<br />
I have published a guide on <a href="https://www.ghacks.net/2023/02/19/twitter-disables-sms-two-factor-authentication-for-most-users-on-march-20-2023/" target="_blank" rel="noopener" class="mycode_url">setting up two-factor authentication using an authenticator app on Twitter</a>. It requires just a few steps and improves account security significantly, even compared to the text message method.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/04/reminder-twitter-is-disabling-a-security-feature-in-just-two-weeks/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/02/twitter-protect-account.png" loading="lazy"  alt="[Image: twitter-protect-account.png]" class="mycode_img" /><br />
<br />
<a href="https://twitter.com/home" target="_blank" rel="noopener" class="mycode_url">Twitter</a> users have two weeks left to make sure that their account on the popular social messaging site remains protected with two-factor authentication (2FA).<br />
<br />
The company announced back in February that it will<a href="https://www.ghacks.net/2023/02/19/twitter-disables-sms-two-factor-authentication-for-most-users-on-march-20-2023/" target="_blank" rel="noopener" class="mycode_url"> remove the SMS-based message</a> from the available options for all free users.<br />
<br />
Two-factor authentication is a security feature that adds a second authentication step to the sign-in process. Instead of just having to enter username and password to log in, users need to supply a code before the sign-in is authorized.<br />
<br />
Twitter supported three methods: SMS, authenticator application and security key. SMS, or text message, is considered an insecure method, as the code is transferred as plain text to the user's mobile device. Certain attacks may be used to intercept these codes. Additionally, these codes are never generated on the user device, but by the service itself, in this case Twitter.<br />
<br />
While Twitter's motivation behind the change may be cost-cutting more than improved security for its users, most security experts advice against text messages for two-factor authentication.<br />
<br />
The main appeal that text messages have, regardless of whether they use SMS or Email, is that it is the easiest to set up. For SMS, all a user needs to do is add a mobile phone number to the Twitter account. Email is even easier, as most services require an email address during setup.<br />
<br />
The two-factor authentication options on TwitterFree Twitter users are left with two methods for two-factor authentication on Twitter: authenticator app or security key. Authenticator app is a secure application, which users may run on their mobile devices or desktop systems, to generate codes locally. While it requires installation of an app on devices, setup is not overly complicated and codes will be generated locally on the device, which means that any attack that tries to intercept the codes fails, as these are no longer transferred from the service to the user's device.<br />
<br />
Security key requires hardware solutions, like a <a href="https://www.yubico.com/why-yubico/for-individuals/" target="_blank" rel="noopener" class="mycode_url">Yubikey</a>, which are linked to services. The physical key needs to be present and the second verification step is usually done with a tap or touch. Codes do not need to be entered.<br />
<br />
Both options are available, but security keys do come with a cost. Authenticator apps on the other hand are freely available. You can check out Ashwin's <a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">list of the best authenticator apps</a>, or check out <a href="https://www.ghacks.net/2023/02/24/aegis-authenticator-open-source-google-authenticator-and-authy-alternative/" target="_blank" rel="noopener" class="mycode_url">Aegis Authenticator</a> as a starting point, which is an open source app that is on Ashwin's list.<br />
<br />
Switching from one verification method to another is not all that different from setting up two-factor authentication on Twitter for the first time. Twitter will disable the Text Message method for all free users on March 20, 2023 anyway.<br />
<br />
I have published a guide on <a href="https://www.ghacks.net/2023/02/19/twitter-disables-sms-two-factor-authentication-for-most-users-on-march-20-2023/" target="_blank" rel="noopener" class="mycode_url">setting up two-factor authentication using an authenticator app on Twitter</a>. It requires just a few steps and improves account security significantly, even compared to the text message method.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/04/reminder-twitter-is-disabling-a-security-feature-in-just-two-weeks/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to use two-factor authentication without a phone]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18768</link>
			<pubDate>Sun, 05 Mar 2023 08:16:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18768</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/02/twitter-two-factor-authentication-1.png" loading="lazy"  alt="[Image: twitter-two-factor-authentication-1.png]" class="mycode_img" /><br />
<br />
Two-factor authentication is a powerful security feature that improves the security of online accounts significantly when set up. It will be replaced with passkeys eventually, but this is not going to happen overnight.<br />
<br />
Two-factor authentication adds a second security layer to the sign-in process. Users receive or generate a code, which they enter on the site or in the app.<br />
<br />
Several of the most popular two-factor authentication methods require a mobile device. There is the option to receive text messages with the code or<a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url"> authenticator apps</a>, which users need to install and set up on their mobile devices.<br />
<br />
While most Internet users do have access to a smartphone for that, there are situations where using a phone may not be an option.<ul class="mycode_list"><li>The smartphone is not available, e.g., it has been misplaced or was stolen.<br />
</li>
<li>Regulations may require "more secure" methods.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Using 2FA without a mobile device</span><br />
<br />
There are two main options when it comes to using two-factor authentication without mobile devices. Assuming that a computer is used, as two-factor authentication without a mobile device and computer would make little sense, the following two options are available:<ul class="mycode_list"><li>Installing an authenticator app directly on the desktop computer or notebook.<br />
</li>
<li>Using a security key.<br />
</li>
</ul>
The selection of authenticator apps for desktop operating systems is limited when compared to the abundance of authenticator apps for mobile devices. Still, there are some that users may install.<br />
<br />
There is a selection of Authenticator apps <a href="https://apps.microsoft.com/store/search/authenticator?hl=en-us&amp;gl=us" target="_blank" rel="noopener" class="mycode_url">available</a> on the Microsoft Store, and several password managers, like <a href="https://bitwarden.com/help/authenticator-keys/" target="_blank" rel="noopener" class="mycode_url">Bitwarden</a>, include authenticator support, which may be used as well.<br />
<br />
Most solutions target businesses and not individual users,  though.<br />
<br />
The second option that is available is provided via security keys.  These are physical devices that are either connected to the device directly, e.g., via USB, or via methods such as NFC or Bluetooth.<br />
<br />
Yubico's Yubikey 5 series alone comes in several different flavors, from basic options that are connected to a device using USB to devices that support multiple connection options and work on desktop and mobile devices alike. The company has a <a href="https://www.yubico.com/quiz/" target="_blank" rel="noopener" class="mycode_url">short quiz</a> on its website that suggests a product based on a few answers.<br />
<br />
Yubico is not the only manufacturer of security key solutions. Google has its <a href="https://support.google.com/titansecuritykey/answer/9115487?hl=en" target="_blank" rel="noopener" class="mycode_url">Titan Security Keys</a>, which also come in different flavors, and <a href="https://thetis.io/products/thetis-fido-u2f-security-key" target="_blank" rel="noopener" class="mycode_url">Thetis</a> maintains a range of security key solutions as well.<br />
<br />
Security keys for individuals come at a cost, while authenticator apps are free to use. Most security keys offer more options than authenticator apps, as they may support more services and protocols besides creating one-time passwords for services.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
Whether a desktop authenticator app or a security key is the right choice depends on individual requirements. It depends on the operating system, the number of devices, and several other factors.<br />
<br />
If just a desktop or notebook is used, authenticator apps may be fully sufficient when it comes to two-factor authentication. Security keys are the sophisticated solution, they may be carried around, and support additional protocols and options, including the ability to use them with smartphones.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> authenticator apps or security keys, which do you use and why?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/04/how-to-use-two-factor-authentication-without-a-phone/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><img src="https://www.ghacks.net/wp-content/uploads/2023/02/twitter-two-factor-authentication-1.png" loading="lazy"  alt="[Image: twitter-two-factor-authentication-1.png]" class="mycode_img" /><br />
<br />
Two-factor authentication is a powerful security feature that improves the security of online accounts significantly when set up. It will be replaced with passkeys eventually, but this is not going to happen overnight.<br />
<br />
Two-factor authentication adds a second security layer to the sign-in process. Users receive or generate a code, which they enter on the site or in the app.<br />
<br />
Several of the most popular two-factor authentication methods require a mobile device. There is the option to receive text messages with the code or<a href="https://www.ghacks.net/2023/02/27/best-authenticator-apps-for-android-and-ios/" target="_blank" rel="noopener" class="mycode_url"> authenticator apps</a>, which users need to install and set up on their mobile devices.<br />
<br />
While most Internet users do have access to a smartphone for that, there are situations where using a phone may not be an option.<ul class="mycode_list"><li>The smartphone is not available, e.g., it has been misplaced or was stolen.<br />
</li>
<li>Regulations may require "more secure" methods.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Using 2FA without a mobile device</span><br />
<br />
There are two main options when it comes to using two-factor authentication without mobile devices. Assuming that a computer is used, as two-factor authentication without a mobile device and computer would make little sense, the following two options are available:<ul class="mycode_list"><li>Installing an authenticator app directly on the desktop computer or notebook.<br />
</li>
<li>Using a security key.<br />
</li>
</ul>
The selection of authenticator apps for desktop operating systems is limited when compared to the abundance of authenticator apps for mobile devices. Still, there are some that users may install.<br />
<br />
There is a selection of Authenticator apps <a href="https://apps.microsoft.com/store/search/authenticator?hl=en-us&amp;gl=us" target="_blank" rel="noopener" class="mycode_url">available</a> on the Microsoft Store, and several password managers, like <a href="https://bitwarden.com/help/authenticator-keys/" target="_blank" rel="noopener" class="mycode_url">Bitwarden</a>, include authenticator support, which may be used as well.<br />
<br />
Most solutions target businesses and not individual users,  though.<br />
<br />
The second option that is available is provided via security keys.  These are physical devices that are either connected to the device directly, e.g., via USB, or via methods such as NFC or Bluetooth.<br />
<br />
Yubico's Yubikey 5 series alone comes in several different flavors, from basic options that are connected to a device using USB to devices that support multiple connection options and work on desktop and mobile devices alike. The company has a <a href="https://www.yubico.com/quiz/" target="_blank" rel="noopener" class="mycode_url">short quiz</a> on its website that suggests a product based on a few answers.<br />
<br />
Yubico is not the only manufacturer of security key solutions. Google has its <a href="https://support.google.com/titansecuritykey/answer/9115487?hl=en" target="_blank" rel="noopener" class="mycode_url">Titan Security Keys</a>, which also come in different flavors, and <a href="https://thetis.io/products/thetis-fido-u2f-security-key" target="_blank" rel="noopener" class="mycode_url">Thetis</a> maintains a range of security key solutions as well.<br />
<br />
Security keys for individuals come at a cost, while authenticator apps are free to use. Most security keys offer more options than authenticator apps, as they may support more services and protocols besides creating one-time passwords for services.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
Whether a desktop authenticator app or a security key is the right choice depends on individual requirements. It depends on the operating system, the number of devices, and several other factors.<br />
<br />
If just a desktop or notebook is used, authenticator apps may be fully sufficient when it comes to two-factor authentication. Security keys are the sophisticated solution, they may be carried around, and support additional protocols and options, including the ability to use them with smartphones.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> authenticator apps or security keys, which do you use and why?<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/03/04/how-to-use-two-factor-authentication-without-a-phone/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Should You Use Google Password Manager?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18655</link>
			<pubDate>Sat, 11 Feb 2023 07:35:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18655</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>I don't know about you, but when it comes to <a href="https://www.ghacks.net/2020/11/06/create-secure-passphrases-include-custom-characters-with-passwordgenerator/" target="_blank" rel="noopener" class="mycode_url">creating a password</a>, I like for it to be strong, secure, and unique. For years I used the same password for everything to avoid forgetting it. As tempting as it may be to use the same password for all your apps, you're always advised to have different passwords for the different apps on your devices. This is where Google password manager comes in.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/Should-You-Use-Google-Password-Manager-main.png" loading="lazy"  alt="[Image: Should-You-Use-Google-Password-Manager-main.png]" class="mycode_img" /><br />
<br />
Google password manager is a feature that is built into the Google account system and allows you to manage your passwords and securely store them on your device for different websites and applications.  With Google password manager, your password will be encrypted and stored on the Google servers, so you really don't have pressure to remember them.  When you sign into your Google account, the <a href="https://www.ghacks.net/2023/01/10/password-manager-keepass-2-53-released-with-password-history-improvements/?amp" target="_blank" rel="noopener" class="mycode_url">password manager</a> offers you to automatically fill in your login credentials for the website and applications as long as they're saved on your Google account. <br />
<br />
This means logging in is a breeze. In addition, the password manager could also assist with generating some secure passwords while storing them securely. Remember, the pressure of remembering your password is eased with Google password manager. Stick with us as we give you the 411 on whether you should use Google password manager. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to Safely Use Google Password Manager?</span><br />
<br />
Simplicity is the name of the game when it comes to using Google password manager. One of the things I love about having a Google account is that all important information can be attached to your account and easily accessed when you sign into your Google account. Well, the big question now could be, what if somebody gets a hold of my device and I'm already signed into my Google account? Don't worry; Google password manager has got you covered. <br />
<br />
For many years the one thing that kept me from using the password manager was the fear of storing all of my passwords in one place. Actually, using a password manager to manage passwords has been deemed safer than using a password that you can easily remember.  Google password manager comes well equipped with tools such as<a href="https://www.ghacks.net/2012/10/01/gauth-authenticator-use-google-2-step-authentication-without-mobile-phone/" target="_blank" rel="noopener" class="mycode_url"> two-factor authentication </a>that prevents anyone from accessing your Google account on a new device even though they have your password. <br />
<br />
If you aren't sure how to access your Google password manager here, we go: <br />
<ol type="1" class="mycode_list"><li>Sign into your Google account. <br />
</li>
<li>Access the password manager by clicking the Security tab.<br />
</li>
<li>Here you can view all the accounts with saved passwords. You’ll get access either to add a new password and edit or delete an old password. Remember you have the automatic generator to assist with that. <br />
</li>
</ol>
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/Should-You-Use-Google-Password-Manager-2.png" loading="lazy"  alt="[Image: Should-You-Use-Google-Password-Manager-2.png]" class="mycode_img" /><br />
The only negatives I drew from using Google password manager were that: <ul class="mycode_list"><li>It lacks a few features when compared with other password managers such as <a href="https://google.en.softonic.com/articles/top-5-google-chrome-extensions" target="_blank" rel="noopener" class="mycode_url">Dashlane</a> and OnePassword. <br />
</li>
<li>You also have to be careful if you leave your computer unattended. Although most password managers can be automatically set to sign out after a certain amount of time when your computer sleeps or is locked. <br />
</li>
</ul>
So to answer the golden question. Yes, you can use Google password manager. Just remember to use the security features.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/02/10/should-you-use-google-password-manager/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>I don't know about you, but when it comes to <a href="https://www.ghacks.net/2020/11/06/create-secure-passphrases-include-custom-characters-with-passwordgenerator/" target="_blank" rel="noopener" class="mycode_url">creating a password</a>, I like for it to be strong, secure, and unique. For years I used the same password for everything to avoid forgetting it. As tempting as it may be to use the same password for all your apps, you're always advised to have different passwords for the different apps on your devices. This is where Google password manager comes in.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/Should-You-Use-Google-Password-Manager-main.png" loading="lazy"  alt="[Image: Should-You-Use-Google-Password-Manager-main.png]" class="mycode_img" /><br />
<br />
Google password manager is a feature that is built into the Google account system and allows you to manage your passwords and securely store them on your device for different websites and applications.  With Google password manager, your password will be encrypted and stored on the Google servers, so you really don't have pressure to remember them.  When you sign into your Google account, the <a href="https://www.ghacks.net/2023/01/10/password-manager-keepass-2-53-released-with-password-history-improvements/?amp" target="_blank" rel="noopener" class="mycode_url">password manager</a> offers you to automatically fill in your login credentials for the website and applications as long as they're saved on your Google account. <br />
<br />
This means logging in is a breeze. In addition, the password manager could also assist with generating some secure passwords while storing them securely. Remember, the pressure of remembering your password is eased with Google password manager. Stick with us as we give you the 411 on whether you should use Google password manager. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">How to Safely Use Google Password Manager?</span><br />
<br />
Simplicity is the name of the game when it comes to using Google password manager. One of the things I love about having a Google account is that all important information can be attached to your account and easily accessed when you sign into your Google account. Well, the big question now could be, what if somebody gets a hold of my device and I'm already signed into my Google account? Don't worry; Google password manager has got you covered. <br />
<br />
For many years the one thing that kept me from using the password manager was the fear of storing all of my passwords in one place. Actually, using a password manager to manage passwords has been deemed safer than using a password that you can easily remember.  Google password manager comes well equipped with tools such as<a href="https://www.ghacks.net/2012/10/01/gauth-authenticator-use-google-2-step-authentication-without-mobile-phone/" target="_blank" rel="noopener" class="mycode_url"> two-factor authentication </a>that prevents anyone from accessing your Google account on a new device even though they have your password. <br />
<br />
If you aren't sure how to access your Google password manager here, we go: <br />
<ol type="1" class="mycode_list"><li>Sign into your Google account. <br />
</li>
<li>Access the password manager by clicking the Security tab.<br />
</li>
<li>Here you can view all the accounts with saved passwords. You’ll get access either to add a new password and edit or delete an old password. Remember you have the automatic generator to assist with that. <br />
</li>
</ol>
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/Should-You-Use-Google-Password-Manager-2.png" loading="lazy"  alt="[Image: Should-You-Use-Google-Password-Manager-2.png]" class="mycode_img" /><br />
The only negatives I drew from using Google password manager were that: <ul class="mycode_list"><li>It lacks a few features when compared with other password managers such as <a href="https://google.en.softonic.com/articles/top-5-google-chrome-extensions" target="_blank" rel="noopener" class="mycode_url">Dashlane</a> and OnePassword. <br />
</li>
<li>You also have to be careful if you leave your computer unattended. Although most password managers can be automatically set to sign out after a certain amount of time when your computer sleeps or is locked. <br />
</li>
</ul>
So to answer the golden question. Yes, you can use Google password manager. Just remember to use the security features.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/02/10/should-you-use-google-password-manager/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Improve KeePass security with this simple configuration change]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=18634</link>
			<pubDate>Sun, 05 Feb 2023 09:34:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=18634</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>KeePass, like many other password managers, relies on a primary password that protects the entire database of passwords and information. If an attacker manages to obtain that single password, all other passwords and information is unlocked.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/01/keepass.jpg" loading="lazy"  alt="[Image: keepass.jpg]" class="mycode_img" /><br />
<br />
The password manager stores its database locally, which means that users do not have to worry about server breaches that steal password vaults, like the recent LastPass incident. Some KeePass users host their password files in the cloud, which opens up the possibility of the password database being copied again through server-side attacks.<br />
<br />
Brute force attacks are still very common when it comes to cracking encrypted password databases. Most attackers use dictionaries for that, which contain hundreds of thousands or even millions of common passwords. Real brute force attacks are expensive, as every combination of characters needs to be tested.<br />
<br />
Considering that passwords may consist of uppercase and lowercase letters, digits and symbols, this soon gets way to expensive in most cases.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Increasing KeePass security</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/keepass-change-password-masterkey.png" loading="lazy"  alt="[Image: keepass-change-password-masterkey.png]" class="mycode_img" /><br />
<br />
The primary key that unlocks the KeePass database is of utmost importance. If it is weak, chance is high that a potential attacker may be able to brute force or even guess it.<br />
<br />
KeePass users have two main options at their disposal to increase the security of the account. The first is the master password itself. Increasing the length of the password improves the security exponentially.<br />
<br />
While that means having to memorize a new password, it is the best option to improve the security of the password database.<br />
<br />
To do so in KeePass Password Safe, unlock the password database with the master password and select File &gt; Change Master Key using the menu at the top.<br />
Type the new primary password in the master password and repeat password field and select OK to complete the process.<br />
<br />
Note that it needs to be longer than the old to improve security. Also, using a combination of letters, digits and symbols is recommended.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Key Derivation settings</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/keepass-key-derivation.png" loading="lazy"  alt="[Image: keepass-key-derivation.png]" class="mycode_img" /><br />
<br />
The second option that KeePass users have is to change the key derivation function and make changes to its number of iterations.<br />
<br />
KeePass supports several, including Argon2d, Argon 2id and the classic AES-KDF.<br />
<br />
If AES-KDF is selected, KeePass users may either want to increase the number of iterations from the default 60,000 to a higher value, or switch the function to Argon2d instead.<br />
<br />
Higher iterations extend the time it takes to enter the password linear. While that may add a small delay to the user's own opening of the password database, it makes brute forcing attacks more expensive as it takes longer to test each password.<br />
<br />
Select File &gt; Database Setting and then Security to display the current configuration of the database that is open in KeePass.<br />
<br />
The key derivation function lists the function that is used. AES-KDF displays just the number of iterations below, which users may want to increase to 600,000.<br />
<br />
KeePass users may also switch to using Argon2d instead, which promises even better protection against brute force attacks.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/02/05/improve-keepass-security-with-this-simple-configuration-change/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>KeePass, like many other password managers, relies on a primary password that protects the entire database of passwords and information. If an attacker manages to obtain that single password, all other passwords and information is unlocked.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/01/keepass.jpg" loading="lazy"  alt="[Image: keepass.jpg]" class="mycode_img" /><br />
<br />
The password manager stores its database locally, which means that users do not have to worry about server breaches that steal password vaults, like the recent LastPass incident. Some KeePass users host their password files in the cloud, which opens up the possibility of the password database being copied again through server-side attacks.<br />
<br />
Brute force attacks are still very common when it comes to cracking encrypted password databases. Most attackers use dictionaries for that, which contain hundreds of thousands or even millions of common passwords. Real brute force attacks are expensive, as every combination of characters needs to be tested.<br />
<br />
Considering that passwords may consist of uppercase and lowercase letters, digits and symbols, this soon gets way to expensive in most cases.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Increasing KeePass security</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/keepass-change-password-masterkey.png" loading="lazy"  alt="[Image: keepass-change-password-masterkey.png]" class="mycode_img" /><br />
<br />
The primary key that unlocks the KeePass database is of utmost importance. If it is weak, chance is high that a potential attacker may be able to brute force or even guess it.<br />
<br />
KeePass users have two main options at their disposal to increase the security of the account. The first is the master password itself. Increasing the length of the password improves the security exponentially.<br />
<br />
While that means having to memorize a new password, it is the best option to improve the security of the password database.<br />
<br />
To do so in KeePass Password Safe, unlock the password database with the master password and select File &gt; Change Master Key using the menu at the top.<br />
Type the new primary password in the master password and repeat password field and select OK to complete the process.<br />
<br />
Note that it needs to be longer than the old to improve security. Also, using a combination of letters, digits and symbols is recommended.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Key Derivation settings</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2023/02/keepass-key-derivation.png" loading="lazy"  alt="[Image: keepass-key-derivation.png]" class="mycode_img" /><br />
<br />
The second option that KeePass users have is to change the key derivation function and make changes to its number of iterations.<br />
<br />
KeePass supports several, including Argon2d, Argon 2id and the classic AES-KDF.<br />
<br />
If AES-KDF is selected, KeePass users may either want to increase the number of iterations from the default 60,000 to a higher value, or switch the function to Argon2d instead.<br />
<br />
Higher iterations extend the time it takes to enter the password linear. While that may add a small delay to the user's own opening of the password database, it makes brute forcing attacks more expensive as it takes longer to test each password.<br />
<br />
Select File &gt; Database Setting and then Security to display the current configuration of the database that is open in KeePass.<br />
<br />
The key derivation function lists the function that is used. AES-KDF displays just the number of iterations below, which users may want to increase to 600,000.<br />
<br />
KeePass users may also switch to using Argon2d instead, which promises even better protection against brute force attacks.<br />
...</blockquote>
<a href="https://www.ghacks.net/2023/02/05/improve-keepass-security-with-this-simple-configuration-change/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[First look at NordVPN's Threat Protection feature]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=17235</link>
			<pubDate>Sun, 01 May 2022 17:49:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=17235</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2021/07/23/nordvpn-review-how-good-is-the-vpn-service/" target="_blank" rel="noopener" class="mycode_url">NordVPN is a popular VPN provider</a>. The company releases new features for its VPN clients regularly, and one of the latest features that it introduced is Threat Protection.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2022/04/nordvpn-threat-protection.png" loading="lazy"  alt="[Image: nordvpn-threat-protection.png]" class="mycode_img" /><br />
<br />
Threat Protection is a beta feature right now. The client may notify customers of the feature, but it is turned off by default. A click on the Shield icon in the Nord VPN client displays the available options.<br />
<br />
Threat Protection blocks "ads, trackers, malicious websites and files" according to NordVPN; this is a core difference to the previously supported CyberSec feature of the NordVPN client, which blocked ads and malicious websites only using DNS filtering.<br />
<br />
The CyberSec preference is no longer available under General in the Settings, and some customers may wonder whether it has been removed completely in favor of Threat Protection.<br />
<br />
It appears, that NordVPN moved the feature to the Threat Protection preferences page. There, users find two options that they may enable. The full Threat Protection feature, or a Lite version; the description of the Lite version sounds similar to what CyberSec offered.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2022/04/thread-protection-turn-on.png" loading="lazy"  alt="[Image: thread-protection-turn-on.png]" class="mycode_img" /><br />
<br />
The full Threat Protection feature goes beyond the blocking of resources on the DNS level. It blocks ads and tracking on the web, but also malicious websites and files:<br />
 <br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Block malware-ridden websites -- browse without a fear of accidentally catching malware.<br />
Avoid malicious ads -- elevated your browsing experience and enjoy a cleaner web.<br />
Stop web tracking -- experience a whole next level of privacy.<br />
Protect your device from infected files -- get rid of malicious files before they do damage.</blockquote>
<br />
According to NordVPN's description on its website, Threat Protection protects a user's browsers even without active VPN connections. NordVPN achieves this by installing certificates in the browsers. The current version supports Chrome, Safari, Edge and Firefox. For Firefox, it is necessary to restart the browser before it can be used after the certificate has been installed.<br />
<br />
The installation of certificates gives NordVPN a high level of control of the supported browsers and activity.<br />
<br />
Threat Protection will scan executable files that do get downloaded automatically. These may be uploaded to the cloud for checking, but only if they have a size of 20 Megabytes or less.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
Threat Protection is a beta feature at the time of writing. NordVPN needs to provide additional information on the inner workings of the feature, as the two setup pages in the client and the informational page on the NordVPN website lack details, for instance, whether it is using its own scanning capabilities for uploaded files or using third-party services.<br />
<br />
The client does not explain how Threat Protection is installed, only what it does once it is enabled. Installing certificates in browsers gives NordVPN a lot of control over data in the browser, and users should at least be aware of this before they hit the turn on button in the interface.<br />
<br />
Most NordVPN customers may want to stick with the lite mode feature, or keep everything disabled in the client and use other solutions, e.g., content blockers such as uBlock Origin and antivirus solutions, to keep their devices secure.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> Would you use Threat Protection on your devices?<br />
...</blockquote>
<a href="https://www.ghacks.net/2022/04/30/first-look-at-nordvpns-threat-protection-feature/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2021/07/23/nordvpn-review-how-good-is-the-vpn-service/" target="_blank" rel="noopener" class="mycode_url">NordVPN is a popular VPN provider</a>. The company releases new features for its VPN clients regularly, and one of the latest features that it introduced is Threat Protection.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2022/04/nordvpn-threat-protection.png" loading="lazy"  alt="[Image: nordvpn-threat-protection.png]" class="mycode_img" /><br />
<br />
Threat Protection is a beta feature right now. The client may notify customers of the feature, but it is turned off by default. A click on the Shield icon in the Nord VPN client displays the available options.<br />
<br />
Threat Protection blocks "ads, trackers, malicious websites and files" according to NordVPN; this is a core difference to the previously supported CyberSec feature of the NordVPN client, which blocked ads and malicious websites only using DNS filtering.<br />
<br />
The CyberSec preference is no longer available under General in the Settings, and some customers may wonder whether it has been removed completely in favor of Threat Protection.<br />
<br />
It appears, that NordVPN moved the feature to the Threat Protection preferences page. There, users find two options that they may enable. The full Threat Protection feature, or a Lite version; the description of the Lite version sounds similar to what CyberSec offered.<br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2022/04/thread-protection-turn-on.png" loading="lazy"  alt="[Image: thread-protection-turn-on.png]" class="mycode_img" /><br />
<br />
The full Threat Protection feature goes beyond the blocking of resources on the DNS level. It blocks ads and tracking on the web, but also malicious websites and files:<br />
 <br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Block malware-ridden websites -- browse without a fear of accidentally catching malware.<br />
Avoid malicious ads -- elevated your browsing experience and enjoy a cleaner web.<br />
Stop web tracking -- experience a whole next level of privacy.<br />
Protect your device from infected files -- get rid of malicious files before they do damage.</blockquote>
<br />
According to NordVPN's description on its website, Threat Protection protects a user's browsers even without active VPN connections. NordVPN achieves this by installing certificates in the browsers. The current version supports Chrome, Safari, Edge and Firefox. For Firefox, it is necessary to restart the browser before it can be used after the certificate has been installed.<br />
<br />
The installation of certificates gives NordVPN a high level of control of the supported browsers and activity.<br />
<br />
Threat Protection will scan executable files that do get downloaded automatically. These may be uploaded to the cloud for checking, but only if they have a size of 20 Megabytes or less.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Closing Words</span><br />
<br />
Threat Protection is a beta feature at the time of writing. NordVPN needs to provide additional information on the inner workings of the feature, as the two setup pages in the client and the informational page on the NordVPN website lack details, for instance, whether it is using its own scanning capabilities for uploaded files or using third-party services.<br />
<br />
The client does not explain how Threat Protection is installed, only what it does once it is enabled. Installing certificates in browsers gives NordVPN a lot of control over data in the browser, and users should at least be aware of this before they hit the turn on button in the interface.<br />
<br />
Most NordVPN customers may want to stick with the lite mode feature, or keep everything disabled in the client and use other solutions, e.g., content blockers such as uBlock Origin and antivirus solutions, to keep their devices secure.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Now You:</span> Would you use Threat Protection on your devices?<br />
...</blockquote>
<a href="https://www.ghacks.net/2022/04/30/first-look-at-nordvpns-threat-protection-feature/" target="_blank" rel="noopener" class="mycode_url">Continue Reading</a>]]></content:encoded>
		</item>
	</channel>
</rss>