Can someone listen through my computer
Subscribe {{#gup.welcomeName}} Hi, {{gup.welcomeName}} {{/gup.welcomeName}} {{^gup.welcomeName}} Hi, {{gup.email}} {{/gup.welcomeName}} {{#gup.welcomeName}} Hi, {{gup.welcomeName}} {{/gup.welcomeName}} {{^gup.welcomeName}} Hi, {{gup.email}} {{/gup.welcomeName}} Sign In Subscribe Now Get Your Offer
Subscribe {{#gup.welcomeName}} Hi, {{gup.welcomeName}} {{/gup.welcomeName}} {{^gup.welcomeName}} Hi, {{gup.email}} {{/gup.welcomeName}} {{#gup.welcomeName}} Hi, {{gup.welcomeName}} {{/gup.welcomeName}} {{^gup.welcomeName}} Hi, {{gup.email}} {{/gup.welcomeName}} Sign In How to find out if you partner is cheating in the digital world How to tell if someone is snooping on your computer or tabletKim Komando | Special to USA TODAY |4:44 pm EDT August 24, 2020 Two very smart entrepreneurs just learned how easily their small business could be hacked. If it can happen to them, it can happen to you, too. USA TODAY Our devices hold our digital lives. All those photos, videos, documents, messagesand emails contain some highly personal information. That's why locking down your tech the right way is essential. Have you ever wondered whether a PIN, fingerprintor face ID is the safest way to lock your smartphone?I reveal the answer here on Komando.com. When it comes to your computer or tablet, you need to make sure outsiders arent tapping in. Here are seven clear-cut signs your computer is infected with a keylogger or virus. How can you tell if someone inside your home is accessing your files and applications without your knowledge? Is someone using your computer behind your back? Thankfully, there are ways to find out. Check your PCs recent itemsA quick note before we get started: The exact steps may vary depending on which version of Windows, macOS or iPad OS you use. If you can't find an item below, use your device's search tool to look for the function by name. Sosomeones been poking around your computer or tablet, opening your files and applications left and right. There are bound to be traces of it, right? Correct. There are quick and easy ways to view recently accessed files, folders and even applications. All those photos, videos, documents, messages and emails on your digital devices contain some highly personal information. Getty Images With these tools, if you notice an item you don't remember opening, that's a sure sign someone has accessed your system without your knowledge. Here's how you view your recent items: On a PC:
On a Mac:
On an iPad:
On an Amazon Fire tablet:
Handy download:This free tool shows you what someone last searched for using Google, Yahoo, Facebook and more Check your web browsers historyAnother good place to check for unauthorized access is browsing activity. Although a savvy user can always use a web browsers Incognito or Private mode or delete browsing history, it doesnt hurt to review. Google Chrome
Mozilla Firefox:
Microsoft Edge:
Safari:
Incognito mode:Think it hides everything you search for? Not so fast. But there are a handful of reasons you should use it. Here are six you should try. Review recent loginsTo see all the login activities on your PC, use Windows Event Viewer. This tool will show you all Windows services that have been accessed and logins, errorsand warnings. To access the Windows Event Viewer, click the search icon and type in Event Viewer. Click Windows Logs, then choose Security. This will show you a list of all the login events on your PC. Under the Event ID column, look for the number 4624 for standard logons, 4672 for administrative logons and 4634 for logoffs. Click the entry for additional details and check if another user has logged in to your system while youre away. On a Mac, you can use the Console tool to check if someone attempted to wake your computer while its locked or in sleep mode. To access this tool, use Spotlight Search (command + space), then look for the word Console,then press enter. On the Console window, click All Messages. In the search field in the upper-right side of the window, type wake to see all the relevant events and their timestamps. PC smarts:I compiled my favorite Windows tips only the pros know How to stop others using your computer or tabletThe most basic security step is essential to keep others out: Lock your computer or tablet with a strong password when youre not using it. The lock screen suspends your activities and protects your work from would-be visual snoopers without completely shutting your computer down. On Windows, you can use the shortcut Windows key + L to lock your PC quickly. On a Mac, you can use the shortcut Control + Shift + Eject (Control + Shift + Power button on Macs without disk drives) or Control + Command + Q to lock it quickly. You can also click on the Apple logo on the menu bar and select Lock Screen. Note: Make sure you set your Macs security options to require the password immediately after its locked. You can set this by opening System Preferences > Security & Privacy. While you're at it, update your password to something more complex. It's easy to fall into the trap of setting an elementary password on our home desktop or laptop, and I bet at least some of you lock down your tablet with "1234" or similar. Unique, complex passwords take more time to create, but they keep your information safe from anyone who wants to snoop around. Of course, you also need an excellent way to remember them. Need password help?I bet you do. Heres a simple how-to for creating strong passwords. And then theres keyloggersKeyloggers are programs that exist solely to capture information coming from your keyboard. They're one tool hackers can use to steal your information, but companies, parents and even enterprising spouses can install them on your tech. They come in software and hardware form and are not something to take lightly. Physical keyloggers are easy to hide inside computers, and you would never know. They can also sit on wires and cables, and if you don't know what you're looking for, you can easily miss it. Fortunately, these external keyloggers are limited in what they can do. How can you spot them? Hardware keyloggers come in many forms, including a USB stick, cableor wall charger. Check your computer for anything that looks out of place or that you dont remember plugging in. Unfortunately, the software counterparts are just as hard, if not harder, to detect. Plus, they can do a lot more damage. Luckily for you, you can use software to detect keyloggers on a Mac or PC. Now that you know the tricks of the trade, you can spot someone snooping through your tech. What you do with that information is up to you. On my website, we have an active Q&A forum where you can post your tech questions and get answers you can trust from real tech pros, including me. Check it out here and let us solve your tech issues. Learn about all the latest technology on the Kim Komando Show, the nations largest weekend radio talk show. Kim takes calls and dispenses advice on todays digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com. Originally Published6:00 am EDT August 24, 2020 Updated4:44 pm EDT August 24, 2020 Subscribe Now Get Your Offer THE SHORT LIST NEWSLETTER The news everyone's talking about, delivered straight to your inbox. Sign up now HelpTerms of ServicePrivacy Notice Your California Privacy Notice Mobile AppsAd Choices Terms of ServicePrivacy Notice © Copyright Gannett 2021 |