RULES OF THE ROAD
TOPICS BELOW
Most Important, Other Rules,
Scam School, Companies to Avoid,
And Again
This website is huge, so if you read nothing else here, always remember these most basic rules of the road.
ACT ACCORDINGLY. In other words: Always be skeptical. Always. Always. Always.
In March 2022, Russia invaded Ukraine, which prompted this article: Here’s how to avoid Ukraine charity scams in the Washington Post. Quoting: "To avoid a scam using the conflict in Ukraine ... start with the premise that every direct message, link, email or text is fake and work from there. This should be your default response to any contact you did not initiate".
Don't advertise to the world (Facebook, Instagram,etc) when your home will be empty (such as going on vacation).
If you are prompted to install software, don't do it. This advice comes from Brian Krebs. Non techies can be easily scammed into installing malicious software because they don't know what software is really needed to perform any given task. In October 2023, Krebs wrote that "One of the oldest malware tricks in the book - hacked websites claiming visitors need to update their Web browser before they can view any content - has roared back to life in the past few months." The article is about a new wrinkle in the scam, hosting malware on a blockchain, but this is not important for Defensive Computing. The important point is that without detailed technical knowledge of the software, the safest thing to do is to say no.
Non-technical computer users should use a Chromebook. Compared to all other mainstream operating systems, ChromeOS (the name of the operating system on a Chromebook) is much more secure and requires no care and feeding. Also, no viruses. Only computer nerds should use Windows.
Do not re-use passwords. I know this is hard as it requires a system for managing the dozens of passwords we all need to keep track of. At the least, use different passwords for the most important accounts. Which accounts are the most important is up to you but certainly financial and email. I wrote a long article on passwords, The worlds best password advice where I introduce the concept of a password formula. It can provide reasonably secure, reasonably unique passwords that are easy to remember and safe to write down on paper.
The price of free software and free services is no technical support. And, probably being spied on.
SECURE EMAIL
WEBSITES
WEB BROWSERS
Another way to block ads and trackers is with DNS, the system that translates computer and website names into their underlying numbers (IP addresses). Some services translate anything and everything, while other services will not translate known trackers or ads or porn. Different DNS services offer different options. I am a big fan of NextDNS, but setting it up may be too much for someone without a technical background. It is worth the effort, however. NextDNS can be configured on either the operating system level or just for one web browser. A good starting point is the DNS Tester Page on my Router Security website.
You are safer, when away from home, if the Wi-Fi is turned off on your phone. This is a great example of how increased security always requires an increased hassle. The problem with this rule, is that if you fail to turn the Wi-Fi on when at home, your phone will use 4G/5G/LTE and the increased data usage may cost you money.
Hidden information inside a photograph can give away the location of where the picture was taken. The hidden/non-visible information is called either metadata or EXIF data. There are two approaches for not revealing metadata. One is to turn off location data when sharing a picture. The other option is turn off location tagging in the camera app on your phone. To see all the hidden data attached to an image, upload it to the Online EXIF viewer. You may see nothing (no metadata found), you may see a location given in both longitude and lattitude or you may see technical details of the photo and the camera that took the photo.
Advice from the mainstream media, such as the New York Times, the Washington Post and the Wall Street Journal is frequently bad. For whatever reason, they hire reporters, not nerds. You should not take technical computer advice from anyone without a technical computer background. No one writing for the mainstream media has a technical computer background. They may mean well, but they are rarely qualified to offer an opinion.
Avoid the cheapest Android devices. That includes phones, streaming TV devices and tablets. Especially avoid devices without a name brand. These things have often come with malicious software pre-installed. Another potential problem is the battery. I purchased an onn Android tablet from Walmart. Big mistake. The battery swelled up which is quite dangerous. I suspect that hardware or software that prevents this sort of thing costs money and a low end tablet will cut every corner it can.
When installing Android apps, be very careful that you have the real app, not a scam copy. Google does a very poor job in this regard, so it falls on you. You need to verify not only the name of the app, but the developer too. And the name must be an exact match for what you are looking for.
If you mother tweets something, don't believe it. Twitter is full of lies and liars.
Your Internet Service Provider (ISP) can see much of what you do. Not everything, but enough to learn quite a lot about you. Thanks to HTTPS secure websites they can not see the contents of every web page you view, but they can identify every website you visit and when you visit it. The solution to this is to use a VPN (Virtual Private Network).
If you depend on a VPN for privacy, do not use iOS devices. Apple sends data to their own servers outside of the established VPN tunnel. This has been ongoing for a long time and Apple can not be shamed into doing the right thing.
Avoid crypto currencies (aka crypto) and NFTs.
VPNs are a good thing, but finding a trustworthy one is the difficult part. The VPN page here addresses this and its h-u-g-e. The first rule of VPNs, however, is to avoid the free ones.
Good news: You can safely ignore Passkeys, they are nothing more than a password that you are not allowed to know. It is a fad and like all fads, will fade away.
What goes up, must come down. OK, that was a joke.
Many credit cards can send you an email for every charge when the credit card was not physically present. In my experience, this has been a free service. It is a great way to immediately learn if a bad guy is charging stuff to your credit card.
To prevent a bad guy, armed with all your personal information from opening a new credit card in your name, freeze your credit reports.
Anyone with Apple devices, should read this: What to expect when in contact with Apple Support from Apple September 16, 2024.
If you receive an unprompted two factor code (typically via a text message) it probably means that bad guys have the password to whatever site/system sent the 2FA code. You should log into that site/system and change the password ASAP. From: What to do when receiving unprompted MFA OTP codes by Lawrence Abrams for Bleeping Computer. December 17, 2023.
Employees: Maintain a work cellphone and a personal cellphone. Do not use employer-supplied devices for anything personal. Do not let your employer or their IT department install anything on your personal devices. Here is a worst-case scenario of what can happen from Chris Patti (September 2025).
Don't buy cheap Lithium Ion batteries. From: X-ray scans reveal the hidden risks of cheap batteriesby Andrew Liszewski for The Verge. September 24, 2025
Avoid very cheap USB flash drives. The storage capacity that they claim to have can be faked. The faking extends to your operating system which reports the scam capacity. In fact, your operating system is likely to show nothing wrong because the flash drives lie to the operating system about the success of writing data, always reporting that it worked. Even formatting the thing reports no errors. This situation prompted Steve Gibson to create his ValiDrive program (only works on Windows) in September 2023.
SEARCH ENGINES
April 26, 2026: This topic has been moved to its own page. See Scam School.
Some headaches/hassles can be avoided by not dealing with companies that have done assorted bad things. The list of companies to avoid has been moved to its own page.
Act accordingly.
| This page: 13 views per day (over 1,362 days) Total views: 17,324 Created: August 16, 2022 |
| This Page Last Updated April 26, 2026 | Site Page Views TOTAL 1,706,571 | Site Page Views TODAY 998 |
Website by Michael Horowitz |
top |