Tag Archive for: Safely

How To Safely Open Suspicious PDFs



monticello/Shutterstock (Licensed)

Y0ur P@ssw0rd S*cks is a bi-weekly column that answers the most pressing internet security questions web_crawlr readers have to make sure they can navigate the ‘net safely. If you want to get this column a day before we publish it, subscribe to web_crawlr, where you’ll get the daily scoop of internet culture delivered straight to your inbox.


In today’s “Your Password Sucks” column for web_crawlr, Mikael answers a question you’ve likely had: What do I do with a suspicious PDF?

You’ve undoubtedly opened a PDF file before.

Given its status as the world’s most popular business document format, you’ve almost certainly dealt with PDF files at work if not at home.

But as you may be aware, PDF files can at times pose a risk. Specifically, PDFs can be used to infect your computer with malware.

If you’ve ever gotten a mysterious email before from an unknown sender that asks you to download and open a PDF, it’s entirely possible that you’ve been targeted, perhaps randomly, by such an attack.

While most internet users are familiar with antivirus software and other common tools, not as many are familiar with the potential dangers posed by PDFs.

So what do you do if you receive a suspicious PDF? Just open it? Ignore it?

If you receive a suspicious file at work, it’s probably best to alert a superior to confirm the item’s legitimacy before opening it. But the whole point of a malicious PDF, whether sent to your email at work or your personal email at home, is to trick you into opening it.

How do I safely open a suspicious PDF?

One of the simplest ways to safely open a PDF, in my humble opinion, is through the use of a tool known as Dangerzone.

Available for Windows, Mac, and Linux, Dangerzone is a completely free program that will sanitize a wide array of files including PDFs, Microsoft Office documents, and images.

Simply open Dangerzone and select your file and the program will open it in a secure container, usually through the use of a third-party program like Docker. Then, Dangerzone will make you a new copy of the file that strips away any embedded items and data.

As noted on Dangerzone’s…

Source…

EXPLAINED: How to store your crypto safely and avoid hacks  


In light of the various hacks and liquidations of crypto exchanges and Decentralise Finance (DeFi) platforms, experts advise crypto investors to not keep their crypto funds in any such places. But what other options do investors have? 

Well, investors have not just one, but several other options, based on their requirements. But let us first understand why it is not safe to store your crypto in the aforementioned places. 

Why should you not store your crypto on an exchange or on any DeFi platform? 

It is advisable to not store one’s crypto holdings on any centralised platform like exchanges or DeFi platforms. It is because the custody of the funds is with the platform itself and not the investor. Moreover, these platforms are prone to hacks.  

In the recent past, DeFi platforms, like the Celsius Network, 3 Arrows Capital, Voyager Digital, Vauld, and other faced financial strains because of which investors’ funds became inaccessible. And hence investors are advised to store their cryptos in different types of crypto wallets. 

But what are crypto wallets? 

Crypto wallets are pieces of hardware or software used to store your crypto assets. Every crypto wallet has an identity, which comprises a pair of private keys and public keys.  

What are public and private keys and what do they do? 

Public and private keys provide an alphanumeric identifier for your crypto wallet, which is called, your wallet address. 

What does a crypto wallet address do? 

The crypto wallet address specifies where the crypto tokens can be sent on the blockchain network. The private keys of a crypto wallet are never supposed to be disclosed. The public key is disclosed to sender of cryptos to identify the address. 

Crypto wallets can be divided into groups  

a) Based on how frequently they are connected to the internet and  

b) Based on their technology. 

Based on internet connectivity, they are divided into two categories 

1. Hot Wallets 

Hot wallets are regularly connected to the internet. They are more user-friendly but less secure since they are frequently connected to the Internet. Hot wallets are usually utilised for daily transactions. They offer immediate access to the…

Source…

Best VPN for BitTorrent in 2022 [Torrent Files Safely]


If you have a penchant for downloading music, movies and video games on BitTorrent, we have a word of advice for you: Never torrent without VPN protection. Otherwise, you run the risk of exposing your data and leaving yourself open to hacking, malware attacks and even legal disputes.

To sidestep these risks, always use the best VPN for BitTorrent.

Key Takeaways:

  • NordVPN is the best VPN for torrenting, followed closely by ExpressVPN.
  • A good torrenting VPN provider should offer a P2P-optimized server network, fast speeds, and excellent privacy and security.
  • Not all VPNs support torrenting, and free VPNs aren’t the best option because they often fail to protect you or come with use restrictions.

Not all VPNs support torrenting, so we did the legwork for you and narrowed the options down to six VPNs for BitTorrent. NordVPN — one of the best VPNs — is our top pick thanks to its top-notch security and excellent speeds. ExpressVPN is also an excellent option, and the other four VPNs are worth a look, too. 

  • Yes, BitTorrent works seamlessly with VPNs for torrenting.

  • Yes, you need to use a VPN with BitTorrent to conceal your digital tracks from your ISP and keep your personal information away from hackers and malicious snoopers.

  • VPNs support torrenting, though not all providers do. This list comprises the six best torrenting VPNs that work with BitTorrent.

The Top VPNs for BitTorrent

What Makes the Best VPN for BitTorrent?

A virtual private network (VPN) encrypts your internet traffic, keeping you safe, private and anonymous online. The ideal BitTorrent VPN prioritizes speed, security and privacy. However, one feature remains paramount, and that’s support for peer-to-peer (P2P) sharing. 

We’ll get into the details in a bit, but first, here’s a sneak peek at our best BitTorrent VPNs:

  1. NordVPN — Fast and secure VPN with double…

Source…

How do I safely add a new credit card to Chrome?


Like most major browsers these days, Google Chrome does offer the option to store your credit card information as one of its autofill options

Q: I would like to add a new credit card to my Chrome. In the past, this would be something I could save automatically after entering the information during a checkout, but is it possible to enter it without having to make a purchase first, so it’s there waiting for me when I need to use it? If so, how would I do this and is it safe to do so without making a transaction in the process? 

— Ingrid G., Winter Beach 

A: Like most major browsers these days, Google Chrome does offer the option to store your credit card information as one of its autofill options — which can also include items like passwords, addresses and more — prior to entering it live during an online purchase. 

Source…