NEWNow you can listen to Fox News articles!
I have to tell you this story. When my college-bound son moved to Los Angeles, he asked me for the house number of a place I rented in the area 28 years ago for two months.
I laughed because I couldn’t remember that. Then I was shocked!
About five minutes later, he texted me a link to a free people search site that showed that house number, along with every other address I’ve ever lived at, my current address, links to my relatives, their age, my age, and even my personal mobile phone number.
All this data was not behind a paywall. All it took was a search of my name and bam — privacy gone.
That’s when I launched an initiative on my site to outline the exact steps to remove your data from these creepy people search sites.
HACKERS WANT GOOGLE ACCOUNTS; GIVE YOUR THIS SECURITY CHECK NOW
These pages often hide the steps. Don’t worry – we’ve done the hard work for you.
Tap or click for a list of 13 creepy sites that likely have your phone number, addresses, age, relatives and more, along with steps to remove your information. I bet you’ll be surprised what you see on the internet about yourself, which is free for the taking.
Be sure to bookmark this page for future reference.
A safer online life is just minutes away. Follow this list — and then give yourself a pat on the back for taking care of your digital self.
Hide your home on Google Maps and Apple Maps
As convenient as Google Maps and Apple Maps are, it’s unnerving when your house number and address are visible to everyone on the internet. Here’s a secret. You can request privacy blur over images of your home.
Here’s how to submit a request to Google:
Open it google maps or Street View Gallery — and search for your address.
Tap the Street View photo you want to blur. The picture must show your face, home, license plate or other identifying information.
Click “report a problem”. You will see this in the lower right corner or by clicking on the three-dot menu in the photo.
Fill out the form, then click “send.”
For Apple Maps, you must email [email protected] and do the following:
Request your home to be fogged.
Give Apple your full address.
Include additional property details so Apple knows which house to censor.
MAP TIPS: GET MORE OUT OF GOOGLE MAPS WITH THESE 10 SMART TIPS
Check for strange behavior
Spyware is malicious software that runs quietly in the background, tracking almost everything you do. These stealthy downloads leave digital trails if you know what to look for.
Task Manager on a Windows PC and Activity Monitor on a Mac can give you an overview of everything that’s happening on your computer.
Here’s what you should do if you’re using a computer:
Open Task Manager by pressing Ctrl + Shift + Esc. In the Processes tab, you’ll see the applications and background processes running on your computer.
Look at the list. If you see a name you don’t recognize, look it up online to see what comes up. Sometimes these programs and background processes are legitimate and nothing to worry about, even if you don’t know the name at first glance.
To close an application or process, right click and guessed Complete the task. Check back later to see if it works again.
Here’s what you need to do if you’re using a Mac:
To open the Activity Monitor, press Command + Spacebar to open Spotlight Search. Then type Activity monitor and press Enter. Check the list for anything you don’t recognize.
Double-click to close the program or process, then press Stop it.
Tap or click for more signs that someone is snooping on your computer.
Lock your computer
If you leave your computer unlocked, you’re inviting anyone to come and snoop. If your laptop is stolen or lost, it could also put you in a terrible place.
Lock yours with a strong and unique password. That means no repeats! Since you have to enter this password every time you open your computer, it needs to be something you can remember.
If your computer allows you to unlock it with a biometric, like a fingerprint, that’s an even easier solution.
Otherwise, use these same password guidelines for all online accounts:
Use a combination of letters, special characters, numbers, and capital letters.
Aim for at least 12 characters.
Consider creating a passcode instead of a password. They are longer, harder to crack and easier to remember. Tap or click here and scroll to no. 3 for more details on creation.
To lock your Windows PC:
Go Start > Settings > Accounts.
Click Login options from the left pane.
Click Add in the Password section.
Enter a new password. Click The next onethen Finish it.
To lock your Mac:
When you’re setting up your Mac, you’ll be asked to create a login password. Here’s how to set a password to unlock your computer:
Click on Apple iconthen System settings.
Click Security and privacy.
Check it out Require password field on the General tab.
Set password timing to immediately to set your Mac to lock when it automatically goes to sleep or screensaver.
Know this hidden vulnerability in your browser
Extensions allow you to customize your browser and add powerful features. But not all extensions are helpful. Some track you across the Internet, eat up your computer’s resources — and worse.
How can you tell what is safe? Google Chrome awards the “Featured” badge to extensions that follow Google’s “best technical practices and meet a high standard of user experience and design.”
Hey, at least it’s something.
PRIVACY TIP: 5 WAYS YOU NEED TO STOP BEING TRAVELED NOW
A sure sign that the extension is bad news? You don’t remember downloading it, so delete it.
It’s also helpful to search the web for a phrase like, “Is (the extension you’re using) safe to use?” See what pops up – and pay close attention to any security warnings.
Here’s how to remove the extension from Chrome:
Open yours Chrome browser. Touch three vertical dots to the right of your profile icon.
Hold the mouse pointer More tools and select Extensions.
Click Remove on the extension you want to remove, then click Remove again.
Use Safari on Mac? Here’s how to remove the extension:
Choose Safari > Preferences. Click Extensions.
To uninstall an extension, select it and click Uninstall.
Don’t stop there. Tap or click for 9 more ways to make Chrome more secure.
Keep up with your technological knowledge
My popular podcast is called “Kim Commando today.” That’s a solid 30 minutes of tech news, tips and questions from callers like you from all over the country.
Look for it wherever you get your podcasts.
For your convenience, click on the link below for a recent episode.
PODCAST SELECT: Ford helps the police, another Prime Day, the crazy crimes of John McAfee
Get ready for electric police chases, thanks to Ford’s police partnership. I’ve got all the details, plus the inside scoop on leaked Amazon documents. Looks like we’re getting another Prime Day. Also, you can now wear smart scarves to keep cool. My tip: Wear it while watching Netflix’s John McAfee True Crime Story. It’s a wild ride.
Find my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify or your favorite podcast player.
Just look up my last name, “Commando”.
CLICK TO DOWNLOAD THE FOX NEWS APP
What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station.
You can listen or watch The Kim Commando Show on your phone, tablet, TV or computer. Or tap or click here for Kim’s free podcasts.
Copyright 2019, WestStar Multimedia Entertainment. All rights reserved.
Learn about all the latest technology at The Kim Commando Show, the biggest weekend radio talk show in the country. Kim takes calls and shares advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks.
For her daily tips, free newsletters and more, visit her website at Komando.com