How to Secure Your Privacy on Facebook

Facebook acts like it’s a fun social media platform for users of all ages — and it is a guise that works effectively as they continue to collect their users’ personal data. The platform already faced a settlement in 2019 due to privacy concerns. However, former Facebook employee Frances Haugen recently revealed that the company still actively chooses corporate profit over public good. In fact, research confirms that social media platforms directly expose young users to harmful content through deliberate designs and algorithms. So if you’re a social media user, here’s what you need to know about how social media platforms use your data.

What Happens to Your Data on Social Media Platforms?

Social media platforms currently have over 3.6 billion active users. Most of these individuals join these apps to connect with others, which is why no one anticipated that it would be a platform for manipulation and disinformation.

This has prompted experts, like Silicon Valley pioneer Jaron Lanier, to speak up about the dark truths behind these platforms. Lanier’s book Ten Arguments for Deleting Your Social Media Accounts Right Now revealed that social media platforms are constantly monitoring their users to collect data. Corporations then utilize this personal information to manipulate the users’ behavior through targeted social media ads. The book points out that these dangerous advertisements can twist one’s relationship with the truth, distort political views, and influence consumer behavior.

Similarly, reporters Sheera Frenkel and Cecilia Kang revealed that Facebook has also become a platform for disinformation. Their book Ugly Truth emphasized that the social media platform requires each user to surrender personal information upon signup. Unfortunately, this data can be used for targeted advertisements that contain false content. In short, the personal information you share on the platform can be utilized by different entities to manipulate your perceptions for their own benefit.

How Can You Secure Your Privacy on Facebook?

Be Vigilant with Friend Requests

Protect your privacy by being careful with friend requests. Our previously published article here on Iowa City Technology Services states that scammers can infiltrate your account and collect personal information by pretending to be people that you know. Once they gain access to your account, they can use personal information from your posts for identity theft, social engineering, and hacking purposes. Thus, accept requests only when you can verify the legitimacy of the account.

Limit the Access of Your Connected Apps

You can prevent Facebook from running targeting ads by putting a stop to the third-party apps and websites that share your personal information. CNBC states that you can do this by managing your off-Facebook activity through the privacy settings of the app. To start, click the “Settings & Privacy” button then tap on “Settings”. Under the “Your Facebook Information” heading, click on “Off-Facebook Activity” then open the portion called “Manage Your Off-Facebook Activity”. This will help you look into all the apps that are feeding your personal data to Facebook.

Use the Privacy Settings and Tools

Furthermore, you can regain control over your personal information by looking through other privacy settings and tools on your social media apps. Some important tools that you need to turn off are the app’s data trackers, your location data, and even facial recognition features. This limits the amount of data that the app can gather from your usage. You can also limit the users who can see your photos and posts by tweaking your privacy settings.

Facebook is a useful app that allows users to connect with people from all over the world. However, you need to be aware that it can access your personal data through your usage as well as through third-party platforms. However, by restricting your privacy settings, you can prevent the app from accessing your personal information and utilizing it for malicious purposes.

ABOUT — The above article was written by Isaac Burton, and then reviewed and posted by Greg Johnson.

Discover Offers Security Advice Regarding Equifax Data Breach

[Source: The following announcement from Discover was sent to customers via email on 5 Oct 2017.]

What you can do with Discover:

  1. Check your Social Security number and New Account alerts. You’ll get an alert if we find your Social Security number on any of thousands of risky websites, or if any new accounts show up on your credit report. [View Page]
  2. Track your FICO® Credit Scorecard for free. [View Page]
  3. Switch your account on or off with Freeze it® to prevent new purchases any time you misplace your card. [View Page]
  4. Keep your mobile phone number and email address up to date so we can alert you of any suspicious activity.

And remember—no matter what—you’re never held responsible for unauthorized purchases on your Discover card account.

Additional steps you can take:

1. Order and review your free annual credit reports. [View Site]
2. Update your passwords. [View Resource Page]
3. Use alerts and other security benefits on all your current accounts, not just Discover.
4. Restrict access to your credit file with the credit bureaus. [View Resource Page]
5. Learn more about identity theft and other ways to protect yourself at or the Consumer Financial Protection Bureau.

Avast Antivirus Removal


For years, Avast has been a good choice for antivirus software. In 2017, Avast began using their software to broadcast somewhat misleading pop-up messages in an attempt to scare consumers into buying computer performance cleanup software and privacy VPN services, or upgraded versions of their security software. These messages were disruptive and caused confusion for some consumers who weren’t sure if the purchases were required or not. As a result, many tech consultants began suggesting other antivirus solutions.

Also in 2017, Microsoft released numerous security updates for Windows 10, including an improved version of Windows Defender — the free built-in antivirus software included with Windows. So, many people decided just to use the Microsoft security measures.

For those wanting more security, Malwarebytes released the 3.0 version of their popular software in recent months and it’s considered to be a good solution.

Avast Removal

If you’ve removed Avast using the Add/Remove programs option in Windows, it will no longer be listed as an installed program and won’t be listed in All Programs. However, like a virus, Avast software leaves remnants of itself hidden in the computer so that many months later, you’ll see a pop-up message from Avast encouraging you to purchase their software.


There seems to be no simple way to remove this annoying message.

To remove the annoying Avast pop-up ads, you need to use the Avast removal tool found on their website

If you run this utility software, it will fully remove Avast.


Misguided Internet Privacy Concerns and Virtual Private Network (VPN) Services

What We’re Being Told

According to national news coverage, due to regulatory changes, we’re told that internet service providers can now track our personal web browsing, save it indefinitely, and sell this information to the highest bidder. As a result, increased concern about internet privacy has prompted a rise in advertising for Virtual Private Network (VPN) services. Top security firms and analysts are warning that this threat is real and consumers should be very afraid.

Common Sense

Let’s take a step back for a moment and apply some common sense here. What’s being reported in the news is that your internet activity is tracked based on the IP address of your computer, and the fact that your name is on the internet service account.

As someone in IT for over 30 years, I’m telling you this just doesn’t make sense. Watch how quickly this unravels.

First of all, if you’re like 95% of consumers, your ‘computer’ doesn’t have a public IP address. Your cable modem or DSL modem has an IP address, but not your computer. If you live in a household, apartment, dorm, or are visiting a coffee shop or hotel, in all of these situations, you’re likely sharing that same modem/router IP address with other people using computers, phones, and tablets. When guests are at your home, they are sharing your modem and router. How is an Internet service provider going to know who is who? They won’t.

Will the data they gather ‘about you’ be of any value to advertisers? No.

Even more precise cookie tracking ads only seem to be able to show you ads for products you’ve already purchased. Such ads are a waste of money. We don’t want to see ads for websites and products we already know about. That advertising is a waste of money for advertisers.

Your internet browsing isn’t all done from home, it’s spread across multiple service providers including home, work, school, public transit, free public wifi, the coffee shop wifi, using your phone as a hotspot, browsing while visiting a friend’s home. You’re not going to be tracked based on IP address.

In addition to all of the above issues, many of the websites we visit today have SSL encryption. Sites that use https rather than http, like banks, online stores, and millions more, encrypt all communications between our browser and the site, hidden from our Internet service provider and hackers. So, the information exchanged is private.

If you’re visiting a lot of anarchist websites, sites about manufacturing drugs, or websites that are primarily engaged in illegal activities, you and others sharing your modem may become ‘persons of interest’ but even then it would be difficult to discern between research done for a high school writing assignment and someone intending to break the law.

When you run all of your internet traffic through a single third-party VPN service provider, you’re handing over all your internet activity to one business — rather than anonymously to many. Why would you trust that business with your internet activity and not another?

Presumably with a VPN, much of your activity will appear to be from a single IP address which makes you easier to track and identify.

So, the privacy concern that’s being propagated in the mainstream media is misrepresented, and the solution they are prescribing makes the problem worse.

How We’re Actually Tracked Online

The ways that our activity is tracked online doesn’t really have much to do with an IP address. Cookies track what sites we visit, and our computing devices each have a kind of fingerprint. The triangulation of operating system, screen size, browser we use, and other factors begins to narrow down our unique devices regardless of how we get to the Internet. You’ve no doubt noticed that ads appear on websites that seem relevant based on products you’ve recently shown an interest in. This isn’t based on your IP address, it’s based on cookies and other factors. You can start paying for a VPN service, but those ads are still going to appear, and you’ll still be tracked. With mobile devices, you’re also tracked based on your location. A VPN service won’t prevent cookies, GPS tracking, and other privacy invasion issues.

When AntiVirus Software Advertises

One of the promises of today’s internet security software is to remove annoying pop-up ads caused by malware. Yet, sometimes antivirus software can be the source of misleading or confusing ads. Over the years, Avast has been one of the better antivirus programs available and even their free version ranks high in reviews. However, recently they’ve been looking for more ways to get consumers to buy additional services. For example, their antivirus software will report a frequent alert and warning about system performance issues. When you respond to the alert, they suggest buying their system cleanup software. Even on a computer with a fresh installation of Windows, and no other software installed except Avast, the error about system cleanup needed will appear. This is similar to what’s referred to as “scare-ware” which is software that scares consumers into buying when perhaps no serious threat exists. Avast software alerts users to passwords saved in browsers as a way of selling their password manager.

The ad below is an example of how Avast is now pushing out pop-up ads for their SecureLine VPN service. This pop-up ad began on 6 April 2017 and has been showing up daily. So, Avast is basically using their antivirus software as a way into your computer for purposes of advertising additional products and services. Unfortunately, the Avast SecureLine VPN isn’t rated well based on the cost and features it offers.


Do VNP Services Really Offer Privacy?

The list of advantages provided in the Avast pop-up advertisement above offers an itemized list of benefits that VPN services supposedly provide. This just isn’t true. Take a look at the following claims:

  • “Surf 100% anonymously every time”
  • “Hide your online activity from hackers” 
  • “Leave no trace of your activities” 

These claims aren’t exactly true. Your searching activity will be known by the owners of websites you login to. Also, browsers save your searching history and may be storing that information in the cloud. Malware on your computer could be tracking your internet activity as well as login passwords. As explained above, there are many other ways to track a person’s browsing history that have nothing to do with a specific IP address.

Avast SecureLine VPN claims that you can “Access region-locked content easily.” That’s true. People visiting China or other restrictive countries may have trouble accessing some U.S.-based websites. VPN services can help by giving you access to content censored in some countries. However, that’s irrelevant for most consumers.

How Can We Protect Our Online Privacy?

The greater threats to privacy will come from malware, hackers, viruses, and security breaches like the 1.5 billion Yahoo accounts that were hacked, or the 11 million government military and cyber personnel files, criminal records, and health records that were recently stolen. The websites you visit are not your greatest concern.

Here are a few steps you can take to have greater privacy:

  • HTTPS Everywhere. Consider using the free HTTPS Everywhere browser plugin to encrypt your visits to websites. (Thanks to SJ for this suggestion.)
  • Limit Social Media Use. One of the problems with sharing so much personal information through social media is that hackers can use that information to guess passwords. Crooks know when you’re on vacation and plan robberies accordingly. Identity thieves can take all your online photos, and create imposter accounts, then commit fraud with your friends and family. (Thanks to NJ for the suggestion to add these cautions).
  • Mobile Hotspot. Rather than taking a chance with unsecured public networks, consider using the built-in mobile hotspot on your phone. Use your mobile device as a hotspot and stay off any networks that you don’t trust.
  • VPN. It should be pointed out that VPN services could be helpful when using unsecured public wifi hotspots at hotels or coffee shops. Using a VPN could help encrypt all your traffic to any local hackers who might be monitoring local network traffic at the packet level. Additionally, while communications is secure with SSL sites, it could be helpful to encrypt what websites you visit — at least not make it public to your internet service provider. (Thanks to Tim at for making this additional point.)

We’re Already Giving Away Our Privacy

Millions of people have relinquished their right to personal privacy with social media sites like Facebook, allowing companies to know our friends, interests, and many details of our life. This has inspired movies like “The Circle” — see trailer below.

Avast AntiVirus for Mac Configuration for Apple Mail

If you’re using Avast AntiVirus for Mac and would like to use the Apple Mail program, you may notice a security certificate error when trying to access your email provider.

Avast has a 23 page document explaining how to correct this error.  The steps involve exporting a certificate from Avast and importing it into your mail client.

Alternative Option

If you don’t care about scanning inbound emails, you can enter your email server address as an exception and Avast won’t try to scan emails from that server. See the example below. To find this screen, open Avast, choose Preferences, then select settings for the Mail Shield. Press the + button to add your mail server.

STEP 1 – Open Avast





Replace the example below with your own email host. Use POP or IMAP as needed.


Firefox Browser Plugin Updates for Security

You should regularly check your Firefox plugins to make sure they aren’t susceptible to security vulnerabilities.

This link will take you to the Firefox Plugins Check page:

The link only works when using the Firefox browser.

Email Security and Encryption Interview with Fox News Affiliate

“On Monday, 25 July 2016, I was interviewed by our local Fox News affiliate on the topic of email security. The report is archived below, the original is online.” ~ Greg Johnson


Full Report

CEDAR RAPIDS, Iowa (CBS2/FOX28) — Hackers have already disrupted the Democratic Party after releasing many damaging emails from the Democratic National Committee. They were embarrassing for party leaders and will likely result in at least the party chair stepping down this week.

But IT security for political groups and organizations at many different levels often balances on human error.

Running a campaign is a lot like a small business. There’s plenty of things to spend money on. With so much technology all around us, it’s often not an area where campaigns spend a lot of extra resources.

Physical protection is generally something we think politicians and their Secret Service Agents get right, especially at the highest levels.

Online, Director Greg Johnson says even they fall short.

“There are just so many points of failure,” said Johnson.

CBS2/FOX28 spoke to local campaigns and elected officials from both major political parties about their IT security. They say, generally, campaign staff email is handled through services like Google’s Gmail and some additional security options within those programs. Rarely will even the most Congressional races have a dedicated IT team to keep it safe.

“Just using Google, or some similar service, steps it up a bit, but it’s not entirely secure,” said Johnson.

Once a candidate is elected to Congress, their staff is brought on to Federal Government systems. That’s usually a step above most security, but Greg says it still doesn’t solve human carelessness.

“All it takes is for one person to lose their computer or have one person get their password and suddenly, that person has access to all those emails that somebody was copied on, or anything they’ve ever sent or received,” said Johnson. “It would be a huge collection of emails just from one account getting breached.”

Greg says there is encryption software that would make sure emails and information is locked and can only be accessed by someone with the right password. He says that can be free, or be as expensive at $175.

Tech Q&A: Why do scammers create fake Facebook accounts?

Q: Why do scammers create fake Facebook accounts?

A: They have a few goals:

  1. To build fake personas on Facebook which can be sold on the black market for big money.
  2. To buy or use fake personas on Facebook to sell or promote things.
  3. Once trust or acceptance is garnered, they use the profiles to post links to malicious websites that will infect people’s computers and/or steal passwords.
  4. To launch social engineering campaigns via Facebook asking friends to ‘answer these ten questions about yourself’ — in order to gather personal information about people for the purpose of identity theft or hacking into people’s accounts.

There may be other reasons as well.

What You Can Do

Fake users may ask to be friends with you on Facebook. Even if you have friends in common, be careful not to friend anyone until you’ve spent at least a few minutes checking their profile. You may want to send the person a message and ask them why they were wanting to connect. If you identify a fake account, click the three dots menu icon and select Report to report the user account as shown below. By spending a few minutes, you can protect hundreds of social media friends and contacts.


Identifying Fake Profiles

Here are signs of a fake profile:

  • Their profile has only a few posts on the timeline.
  • There are spammy advertising-like posts on their timeline.
  • Their About page has very little information.
  • They claim to work for Facebook on their About page.
  • Although you supposedly have friends in common, you’ve never heard of the person.
  • You’re a middle-aged man and the person you’ve never met who wants to friend you is an attractive girl in her 20s or 30s.
  • The person has only a few profile pics.
  • The profile pics are suggestive.
  • The person has multiple profile pics, but of different people.
  • Their Facebook friends have unusual or seemingly fake names.

Bitdefender Antivirus Total Security Suite 2016 Website Errors and Support Issues


The Bitdefender suite of antivirus and computer security programs recently received the rating of best product in class for Consumer Reports as well as a number one rating from other software reviewers such as articles in PC Magazine and PC World. Those using the product will enjoy its speed and simplicity. However, there are some errors and problems you’ll likely encounter when using their product and website.

Update: 7 October 2015

We received a nice response from a representative at Bitdefender regarding the concerns we’ve identified below. Hopefully we’ll see some fixes soon. Here’s their response:

7 October 2015

We apologize for any negative experience you have encountered with our products or our support. Your feedback is appreciated, and will be directed to the appropriate team for review, to enable us to improve our support and services.

If you wish to give us another chance, we would be more than happy to assist you and we will strive to provide you with the best support possible. We value all our customers thus you have all our attention if you have any other questions or need additional help.

Thank you for taking the time Greg, and please do not hesitate to contact us if you need further details from us.

Have a nice day!

Best regards,
Ionut Tacu
Bitdefender Support Team

Update: 25 September 2015

We finally received a reply from Bitdefender regarding some of our questions. Apparently the Bitdefender Central and MyBitdefender are two separate portals that do similar things. It’s possible to register with both portals. The other questions on this page remain unanswered. One of our questions was with regard to earning commissions on referrals. We did get an answer to that. So, we’re now an official Bitdefender partner and reseller, which provides some additional motivation to see that the company gets these issues resolved. However, after signing up as an affiliate, the submission confirmation page indicated that we’d receive an email with login information. That never arrived. We’re still waiting for answers to the other questions below.

Your Account Needs to be Activated Error

When you login to the My Bitdefender portal, you’ll likely see a notification stating, “Your account needs to be activated. Click here to receive an email with the activation link.” Most of the time, clicking where indicated doesn’t generate an email. If you ever get an email with an activation link, clicking the activation link never works to activate your account so the notification never goes away. Below is an example of the notification.


License Transfer Issues

Within the 2015 version of Bitdefender, when you click on the ‘days left’ link, you’d have an option to deactivate a license on a computer that you planned to discard, sell, or give away. However, as of the 2016 version, this is no longer an option. So, a crashed computer or system that you otherwise don’t have access to any longer will result in you losing one of the license installs that you paid for.

The screen shots below show how you can unregister with the 2015 version.

Click on the ‘days left’ link in the lower left shown here.


Then click on the Unregister button shown below.


The Unregister option has been removed from Bitdefender Total Security 2016. Whenever companies remove useful features, consumers generally complain and are frustrated.

Problems Installing Legitimate Programs

As of 11 October 2015, when on an Apple computer with Bitdefender 2016, an attempt to install Skype would not work. When copying the Skype program to Applications as instructed by the Skype installation, the progress bar would remain stuck at 0% complete. No indication was provided to suggest that Bitdefender was blocking the copy/install process. However, when Bitdefender Autopilot was turned off, Skype instantly copied to the Applications folder successfully.

Subscription Days Remaining Error

The screenshot below is from a Bitdefender installation on an Apple computer that has 266 days remaining in the subscription. However, in the lower right corner it’s reported that there are zero days left in the subscription. Some people might think they need to purchase a new subscription, so they will click on the Buy button and mistakenly purchase another subscription.


Bitdefender Central, as shown below, confirms that there are 266 days remaining for the above installation. Bitdefender Central maintains a real-time connection with the Bitdefender client software installed on the computer, so if there were any issues, they should showup in the Bitdefender Central display.


Support Request Page Failure

If you attempt to submit a support request ticket on the Bitdefender contact page you’ll likely be frustrated by the fact that their submit button doesn’t work. The Java code fails. This can be a problem for those wanting support. We’ve tested this on Windows and Apple computers running multiple operating system variations and using different browsers. With some browsers the CAPTCHA authentication works, and a photo-based quiz shows up to confirm you’re not a robot, but on others the CAPTCHA doesn’t work. Even when the CAPTCHA works, the Submit button still doesn’t work. This may happen after you’ve submitted one request successfully and a second request isn’t permitted. However, no message indicates why the submit isn’t working.

Affiliate, Reseller, Partner Program

Bitdefender has an affiliate / reseller / partner program. When you’re approved, you have access to a partner portal. However, the software available through the portal is last year’s software, and there doesn’t seem to be an easy way to generate simple advertisements and links (as with other affiliate programs). On October 5, an email sent to received an out-of-office auto reply stating, “Thank you for your message, please note that I will be out of office until 12th October. I will have limited access to my emails and they will not be forwarded.” So, apparently the one person in charge of the partner program is on vacation.

Update: It seems that Bitdefender has a partner program for support and separate affiliate programs for those wanting commissions on sales. At least of the affiliate networks is where you can signup and then get advertising links to Bitdefender and other programs.

Password Reset Emails Never Received

If you attempt to login to one of the portals such as and click the reset password link, you’ll be told that an email is going to be sent, but it never gets sent. This was documented on 22 September 2015.

Missing Operating Systems

Some of the glaring errors and oversights with the Bitdefender website make one a bit concerned about whether or not they have sufficient staffing. For example, on the contact page, the dropdown lists of operating systems are about a year old with Apple at 10.9 and Windows at version 8.1 the latest operating systems are missing. This is something that most companies would update as soon as they become available. Below is a screenshot of the operating system dropdown menu.


404 Error – Page Not Found

After uninstalling Bitdefender Total Security 2016 in Windows, your browser will launch attempting to take you to a landing page with an uninstall survey for those who’ve uninstalled. However, the landing page isn’t there, so you’ll get an error similar to the one below. Click the image for a larger view.


My Bitdefender or Bitdefender Central Confusion

It’s not clear whether or not a person should be using the My Bitdefender web portal or the Bitdefender Central web portal to manage their account. The Login button on the website currently takes users to Bitdefender Central. However, if you had previously paid for a subscription, it won’t automatically show up there. You’ll be asked to provide a previously purchased license number, but you won’t find any in order confirmation emails or invoices from Bitdefender. The only way to activate the Bitdefender Central portal is to install a copy of Bitdefender on a computer and use your account email and password already on file for the My Bitdefender account.

Bitdefender Central is very simplistic compared to the My Bitdefender dashboard. While the My Bitdefender dashboard gives you the option to remove a licensed computer, the Bitdefender Central portal does not have such a feature. So, old computers you’re disposing of will count against your license and (until they get this fixed) you’ll never get those licenses back. They become non-transferable.

Below are some screen shots for comparison. Click any image for a larger view.

Bitdefender Central
Bitdefender Central

My Bitdefender Dashboard
My Bitdefender Dashboard

My Bitdefender Device Controls
My Bitdefender Device Controls