Tech Topics

by Glenn Dunki-Jacobs-Nolten

 BROWSER BEWARE-PASCO CAVE

 In the past few workshops, we focused on email security, but another important factor is browser security. About 65% of us use Google’s Chrome browser, but does it keep you safe? 

In this article I will do a basic review of the most frequently-used browsers: Google Chrome, Microsoft Edge, and Firefox. I did not include Apple’s Safari browser since it only works on Apple devices, while the others work on both Microsoft, Apple, Google Chromium, and Android devices.

 Overall Browser War Winner: Firefox

Edge is built on the Google Chromium, but it has an “edge” in speed and low resource consumption. Speed refers to how fast your web pages load, and resource consumption is how much memory is used. Firefox is not as fast as Chromium or Edge but has much better security options and configurations.

Security: Tie -Chrome, Edge, and Firefox

Firefox and Chrome have more frequent security updates than Edge. These security updates prevent malware (malicious software) from entering your computer. However, preventing malware from infecting your computer is more a function of the types of websites you visit. Pasco Cave (browser beware)

Privacy Winner: Firefox

Most of you may not have heard of Tor or Brave browsers, but those who do not want to be tracked by anyone will use these browsers. Because these browsers use several methods to disguise you while serving, slower loading speeds occur. For the rest of us Firefox is highly recommended to protect your privacy.

For us “average” Internet browsers, Firefox has the “edge”. In both Chrome and Edge, you have to manually clear website tracking information. Firefox allows you to configure its settings to delete all tracking and website history when you close the browser. A future workshop will be devoted to setting up browser security.

Personal Data Collection Protection Winner: Firefox

With the exception of Tor and Brave, all browsers collect personal data. This is how they target you with ads related to the websites you visited, but you can control, to some extent, what personal data is collected. Firefox is more versatile in protecting your personal data, but you do not have total control.

The above article is only a basic summary of browser security. Browser security depends on what sites you visit, what links you open, and what images you download. Your home security setup is worthless if you leave windows and doors open. The Internet is unregulated and dangerous. Pasco Cave.


Protect Your Personal and Financial Information

- Glenn Dunki-Jacobs-Nolen

Have you been getting emails and/or phone calls asking to donate money? you are not alone.  The latest FBI data shows that more than $1.7 billion is stolen through social engineering. The average person, when scammed through social media, usually loses $130,000. Senior citizens are a favorite target for scammers.

However, there is one technique that uncovers more financial and personal information that all forms of malware combined. And that is Social Engineering. Social engineering involves human-to-human interaction, and usually through your standard or smart phone.

Here is the only rule you need to know when a scammer calls: HANG UP! It is that simple. If you receive an email asking for personal and financial information, DELETE IT! Do not open the email, even though it may be tempting because you have just won the Irish Sweepstakes.

I am sure that you have heard about people getting calls from the IRS about under-reported taxes. Let’s put this one to rest right now: the IRS never contacts any via telephone regarding taxes. If you get this call, Hang Up! If you know how to block these kinds of calls on your home or smartphone, do so right away. If you are not sure how to block calls, ask a family member -or even grandchildren, they have earned their PhD (Personal Home Devices) because they grew up with smart phones.

While there are many non-profit organizations supporting community programs, DO NOT give them any financial information. Veterans, Police benevolent groups, and many other legitimate groups can use your money. Visit Charity Navigator or Charity Watch websites for a non-profit organization’s status before donating money.

My mother-in-law received the “your grandson is in jail and needs bail money” call. Luckily, she called her daughter before providing credit or debit card information.

To summarize, here are the two rules to keep you safe from social engineering scammers:

  • Hang up. You may think that this is not polite, but remember, the scammers only want your money. They will tug at your heart strings and then your wallet.

  • Delete. Do not open to read the email. Scammers have become excellent at creating enticing email subject lines to tempt you to open their messages.

Join Glenn for free online tech workshops designed to help you manage your data security and privacy. Visit www.nextstagesantacruz.org/nsp-classes for more information.