By Alicia Katz Pollock | Saturday, October 25, 2014
With all the hullabaloo about Facebook and its privacy practices, I was both relieved and startled the other day when Facebook asked me to verify the apps connected to my account. The list was long, and held several surprises.
It’s a good idea to cull through your own list, since Facebook tells us that it shares “your basic info” with games, applications, and websites that you connect with on the social media platform.
Here are some pros and cons to consider when you decide which apps, site connections, and plugins you should keep.
By Garrick Chow | Thursday, September 04, 2014
As you may have heard, earlier this week several celebrities had photos of a personal nature stolen from their computers or mobile devices, which were then shared and distributed online.
The celebrity photo hack story is still unfolding, and while it’s not completely clear how their devices and cloud-based accounts were accessed in each case, we thought this would be a good time to review some basic steps you should be following to make sure your personal files—and your internet privacy—are secure.
By Willem Knibbe | Tuesday, April 15, 2014
Learn how to protect yourself and your sites from the Heartbleed vulnerability, the security flaw that can put sensitive user data at risk and affects hundreds of thousands of websites. Today lynda.com released Protecting Yourself from the Heartbleed Bug, a short course that explains what Heartbleed is and how to protect yourself from it, and offers resources for tracking the developing situation. Heartbleed Tactics for Small IT shops also released today; it provides tactics and information to help those who administer a small web server diagnose their vulnerability and fix issues.
By Jess Stratton | Monday, June 10, 2013
It’s wonderful that I can go to a public library to use a computer—but there’s an element of vulnerability about it, too. Each day, hundreds of people will use the same computer that I just used. This week on Monday Productivity Pointers, I’ll give some options for public browsing, as well as some settings to consider for the various computers you may have.
For example, I maintain entirely different browser settings for my laptop, which I travel with and could easily lose, than I do on my desktop computer, which could only be used by someone else if they broke into my house.
You can change your email preferences at any time. We will never sell your email. More info
Thanks for signing up.
We’ll send you a confirmation email shortly.
Sign up and receive emails about lynda.com and our online training library:
Keep up with news, tips, and latest courses with emails from lynda.com.
We've updated our terms and conditions (now called terms of service).Go Review and accept our updated terms of service.