Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Input on best way to secure my computing?
Message
<blockquote data-quote="Joebrown" data-source="post: 780892" data-attributes="member: 76683"><p>Hi everyone,</p><p></p><p>This is my first thread here. Wasn't sure where to post it...but I figured this was about right. Please let me know if I should have done otherwise.</p><p></p><p>Me and my wife have been getting badly hacked for some time. Suffice it to say that it's personal against us, not because we have done anything wrong, but rather because of taking a stand to do what is right.</p><p></p><p>Anyway...I have been learning and hardening up our computing but I just got hacked badly yet again a couple of days ago. Hackers changed my Google nickname, deleted hundreds of emails, and otherwise by commandeering my smartphone.</p><p></p><p>Here is what I am doing this time on some of our computing and what I would appreciate input on.</p><p></p><p>Two smartphones. The one has a phone and data plan. The other has none (I destroyed the SIM card on it a while back.</p><p></p><p>I am installing what I need on the smartphone (the one with the plan)through direct APK download and installation (to avoid entering Google credentials on what may still be a compromised phone). I factory data reset it.</p><p></p><p>The dumb phone (the one without any plan) will connect to the internet through the smartphones hotspot capabilities and will be using a VPN.</p><p></p><p>The smartphone will only be used to provide internet to the dumb phone.</p><p></p><p>The way I figure it, the hackers will only be able to hack and do whatever to my smartphone. Which is the only phone reachable over the internet connection.</p><p></p><p>The dumb phone cannot be reached directly through it's local IP address.</p><p></p><p>Is that correct?</p><p></p><p>Any suggestions or input would be greatly appreciated.</p></blockquote><p></p>
[QUOTE="Joebrown, post: 780892, member: 76683"] Hi everyone, This is my first thread here. Wasn't sure where to post it...but I figured this was about right. Please let me know if I should have done otherwise. Me and my wife have been getting badly hacked for some time. Suffice it to say that it's personal against us, not because we have done anything wrong, but rather because of taking a stand to do what is right. Anyway...I have been learning and hardening up our computing but I just got hacked badly yet again a couple of days ago. Hackers changed my Google nickname, deleted hundreds of emails, and otherwise by commandeering my smartphone. Here is what I am doing this time on some of our computing and what I would appreciate input on. Two smartphones. The one has a phone and data plan. The other has none (I destroyed the SIM card on it a while back. I am installing what I need on the smartphone (the one with the plan)through direct APK download and installation (to avoid entering Google credentials on what may still be a compromised phone). I factory data reset it. The dumb phone (the one without any plan) will connect to the internet through the smartphones hotspot capabilities and will be using a VPN. The smartphone will only be used to provide internet to the dumb phone. The way I figure it, the hackers will only be able to hack and do whatever to my smartphone. Which is the only phone reachable over the internet connection. The dumb phone cannot be reached directly through it's local IP address. Is that correct? Any suggestions or input would be greatly appreciated. [/QUOTE]
Insert quotes…
Verification
Post reply
Top