Our devices keep our lives digital. All these photos, videos, documents, messages and emails contain very personal information.
That's why it's essential to secure your technology the right way. Have you ever wondered if a PIN, fingerprint or face ID is the most secure way to lock your smartphone?I reveal the answer here on Komando.com.
When it comes to your computer or tablet, you need to make sure that strangers don't get in touch.Here are seven clear signs that your computer is infected with a keylogger or virus.
How can you tell if someone inside your home is accessing your files and apps without your knowledge? Is someone using your computer behind your back? Fortunately, there are ways to find out.
Check recent items on your PC
A quick note before you begin: The exact steps may vary depending on which version of Windows, macOS, or iPad OS you're using. If you don't see an item below, use your device's search tool to find the feature by name.
So someone is snooping around your computer or tablet, opening your files and apps from left to right. There must be traces of that, right? Correct. There are quick and easy ways to view recently accessed files, folders, and even apps.
With these tools, if you notice an item that you don't remember opening, that's a sure sign that someone has accessed your system without your knowledge. This is how you see your recent items:
In a computer:
- Press Windows + R. Type "recent" and press enter. This step will display a list of files that have been recently opened. If you see something in this list that you don't remember opening, someone might be snooping around your computer.
On a Mac:
- To view recent items, click the Apple logo on the left side of the menu bar. Hover over Recent Items. You'll see the 10 most recently accessed items in three categories: Applications, Documents, and Servers.
- To see recent folders, open a Finder window. While the window is active, click Go on the menu bar. Hover over Recent Folders. Like Recent Items, you'll see the 10 most recently accessed folders.
In an iPad:
- Open the Files app. Tap Recents at the bottom of the screen.
On an Amazon Fire tablet:
- Touch the Documents button on the home screen to open the document library. Browse by Recent.
Practical download:This free tool shows you what someone last searched for using Google, Yahoo, Facebook and more.
Check your web browser history
Another good place to check for unauthorized access is browsing activity. While a savvy user can always use a web browser's private or incognito mode or delete browsing history, it doesn't hurt to check it out.
Google Chrome
- Click on the three vertical dots in the upper right corner of the Chrome window. Hover over History to see the most recently visited sites. Click History to see a complete list.
Mozilla Firefox:
- Click the View History, Saved Bookmarks, and More icon on the menu bar. (It looks like a row of books.) Click History.
Microsoft Advantage:
- Select the three-dot menu for Settings and more. Choose History and Manage history.
Safari:
- Open Safari. On the Apple menu bar, click History > Show All History.
Review recent logins
To view all login activity on your PC, use Windows Event Viewer. This tool will display all accessed Windows services and logins, errors and warnings.
To access the Windows Event Viewer, click the search icon and typeEvents viewer.Cliquewindows registries,so chooseSafety.
This will display a list of all login events on your PC. In the Event ID column, look for the number 4624 for standard logins, 4672 for administrative logins, and 4634 for logouts. Click on the entry for additional details and see if another user logged into your system while you were away.
On a Mac, you can use the Console tool to see if someone tried to wake your computer while it was locked or in sleep mode.
To access this tool, use Spotlight Search (command + space) and search for the wordConsole,then press enter. In the Console window, clickAll messages.In the search field in the upper right corner of the window, type "wake up" to see all relevant events and their timestamps.
Smart PC:I've compiled my favorite Windows tips that only the pros know about.
How to prevent others from using your computer or tablet
The most basic security step is essential to keep others out: lock your computer or tablet with a strong password when not in use.
The lock screen suspends your activities and protects your work from potential snoopers without completely shutting down your computer. On Windows, you can use the shortcutWindows key + Lto lock down your PC quickly.
On a Mac, you can use the shortcutControl + Shift + Eject (Control + Shift + Powerbutton on Mac without disk drives) orCtrl + Command + Qto quickly block it. You can also click the Apple logo in the menu bar and selectlock screen.
Note: Be sure to set your Mac's security options to require the password immediately after locking. You can set this up by openingSystem Preferences > Security & Privacy.
While you're at it, update your password to something more complex. It's easy to fall into the trap of setting a crude password on our home desktop or laptop, and I bet at least some of you lock your tablet with "1234" or something similar.
Unique and complex passwords take longer to create, but keep your information safe from prying eyes. Of course, you also need a great way to remind them.
Need help with the password?I bet you do. Here is a simple tutorial to create strong passwords.
And then there are the keyloggers
Keyloggers are programs that exist solely to capture information coming from your keyboard. They're a tool hackers can use to steal your information, but businesses, parents, and even entrepreneurial spouses can install them on their technology.
They come in the form of software and hardware and are not something to be taken lightly. Physical keyloggers are easy to hide inside computers, and you would never know it. They can also hang over wires and cables, and if you don't know what you're looking for, you can easily miss it. Fortunately, these external keyloggers are limited in what they can do.
How can you identify them? Hardware keyloggers come in many forms, including a USB stick, cable, or wall charger. Check your computer for anything that seems out of place or that you don't remember plugging in.
Unfortunately, the software counterparts are just as, if not harder, to spot. Also, they can do a lot more damage. Fortunately for you, you can use software to detect keyloggers on a Mac or PC.
Now that you know the tricks of the trade, you can spot someone snooping around your technology. What you do with that information is up to you.
On my website, we have an active Q&A forum where you can post your tech questions and get trusted answers from real tech professionals, including myself.Check it out here and let us fix your technical issues.
Get to know all the latest technologies inKim Komando show,the biggest weekend talk show in the country. Kim takes calls and provides advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacking. For daily tips, free newsletters and more, visit Komando.com.