We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
2,808 Tutorials

How to beat 22 latest web threats

Defeat the latest scams, tricks and swindles

Forewarned is forearmed. PC Advisor investigates the latest and most deadly tech dangers, and explains how to fight back.

2. Internet privacy II: history

You may have nothing to hide, but that doesn't mean your browsing history won't get you in trouble. Out of context, entries in a list of sites you've visited recently could easily be misconstrued.

The fix

Once again, your browser's private-browsing feature is a useful option here - but don't depend on it. Private browsing lets you surf the web without leaving a trail of website addresses behind.

This feature has long been a part of Apple's Safari browser, and add-ons for Firefox offer Windows users the same benefits. Distrust gives Firefox 2.x and 3.x users a way to manage their browsing history, although some files that Firefox temporarily writes to disk don't get erased until the browsing session ends.

Firefox 3.5 (currently in beta) is likely to add comprehensive private-browsing features. Two add-ons - Private Browsing and Toggle Private Browsing - provide fine control over the settings.

In recent testing by a security firm to discover which browsers' tools do the best job of protecting against tracking by websites, Safari's private-browsing capabilities came in last place; Firefox, Google Chrome and IE 8.0 beta also fared poorly.

But no browser can completely prevent inquisitive sites from tracking your visit. For maximum anonymity, use a service such as Anonymizer or the free Tor.

3. Crackable passwords

As Alaska governor and US vice-presidential candidate Sarah Palin discovered when someone broke into her Yahoo mail account last summer, having a strong password isn't enough. If the answers you provide in the ‘secret questions' section of your online profile are easy to find, a hacker may be able to convince the webmail service's password-recovery mechanism to hand over the password on a platter.

These days, many of us have a LinkedIn account, a Facebook profile and a Twitter feed, each of which is studded with answers to commonly used security questions such as your secondary school or your dog's name.

Conveniently, the general chit-chat you engage in at some of these sites, along with your contacts lists, can supply fraudsters with the gems of information they need to crack your passwords and security questions.

The fix

Use a password manager and be sure to back up your password files. Password Safe and PortableApps.com's version of KeePass Password Safe are good places to start.

Once you've created a random and unguessable password, generate a second password with the password-management utility to use as the answer to the inevitable ‘mother's maiden name' question. Mum may not appreciate being identified in some password bank as Miss 7#BrE_r, but no one will guess that that's how you listed her in your ‘secret questions'.

NEXT PAGE: malware-ridden public PCs

Quick links:

  1. Defeat the latest and most deadly web threats
  2. Internet privacy I: cache
  3. Internet privacy II: history
  4. Malware-ridden public PCs
  5. Social-networking dangers
  6. Your privacy in Google's hands
  7. Mobile-phone data loss
  8. Hidden data
  9. Mac malware
  10. Phishing without email
  11. Five common Facebook scams
  12. PHACEBOOK PHISHING

Security news and reviews

IDG UK Sites

Nokia Lumia 930 review: The flagship Windows Phone 8.1 smartphone

IDG UK Sites

Live Blog: Apple financial results, record June quarter, 35.2m iPhones sold, $37.4b revenue

IDG UK Sites

Welcome to the upgrade cycle - you'll never leave

IDG UK Sites

Why smartphone screens are getting bigger