A young woman reacts in horror to a sms-message sms-message or e-mail on mobile phone as she stands in the open air, in a silent street, close-up of the head and the shoulders
Hidden teen sexting
Q: I am worried my son is sexting. I looked on his phone and does not see anything. But maybe I not looking in the right place. Can you help?
A: Your teen probably knows how to manipulate his smartphone in ways you can only imagine. Parents struggle to find the content buried deeply in their children Galaxys and iPhones. Meanwhile, the hiding of illicit photos of classmates is not only inappropriate; it can be a criminal offence. Click here to find out where teens hide their nude photos.
More about this…
3 smart scams spreading on Facebook now
Alert! How can you find the hidden within spy cameras
10 covert hidden cameras that will fool you, what can you spot?
Q: I’m getting rid of an old printer. Has the memory of a computer?
A: People often forget that a printer saves data just like any other device. One of the most common uses of a printer to create hard copies of important documents that often contain the names, addresses and social security numbers. We think nothing of these Pdfs through our printers, but what happens with the data after it is used? It is good to take precautions, and there are ways to clear the last print job before you leave of your machine. Click here for an important precaution.
The hacking of smart devices
Q: I don’t understand how my smart fridge or my smart light bulbs can be hacked. Can you explain why I would?
A: Smart devices are still new, and the fact that someone can actually hack they have to care enough. But hackers do not want the devices as much as the network are connected. This type of invasion, a so-called DDoS-attack, can lead to serious problems for your router, the devices and the server, and it might even shut down parts of the internet.
Click here to learn how the criminals hack your house and use your household items against you.
Put the right VPN
Q: I’ve heard that I should use a VPN on public Wi-Fi. Why? And can you tell me which is the best?
A: The operative word in “virtual private network” is “private”. You can use your computer with a local Wi-Fi, and fortify yourself against unwanted guests. Companies are often a matter of Vpns to their employees, especially when they need to laptops at the office. I also know of many people who travel to countries where the internet is limited, and a VPN to access prohibited websites like Google and Facebook. Most Vpn’s are an effective and reasonably priced, but, as you suggest, some are better than others.
Click here for the best VPN services of 2017.
Avoid Facebook quizzes
Q: I really like taking the fun quizzes on Facebook. I heard you say that we should not do. Can you elaborate?
A: It is fun to share our 93 percent score with the world, but most of us never suspected that, if we test our geography skills and knowledge of game show trivia, that we are actually handing over access to our Facebook accounts. This was forgivable in the early days of social media, when we were still adjusting to the platform, but the user of today need to be more careful. Click here for the skinny on Facebook quizzes.
What questions do you have? Call my radio show and click here to find it on your local radio station. You can listen to the Kim Komando Show on your phone, tablet or computer. Of the buy of an opinion to the digital world problems, click here for my free podcasts.
Copyright 2017, WestStar Multimedia Entertainment. All rights reserved.
Learn about the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and provides advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, newsletters and more, visit her website at Komando.com.