That used to be true, but that is no longer true. Google announced in January 2020 that they were extending support for Chromebooks for 8 years for new devices (as of January 2020) instead of the previous 5-6 years.Be careful with Chromebooks. After 5 years Google no longer updates them for security or anything else.
I don't think this is true. You do not have to engage in fraud in order for a bank to not be responsible... you could simply be negligent in failing to keep your operating system up to date, or failing to keep your email secure, or failing to review your statements and reporting unauthorized activity, or failing to keep your username and password secure (i.e. sharing with someone else). These are just examples, the point is you have an obligation to take reasonable measures to avoid unauthorized access to your account and if you fail to do so you may be liable for losses even in the absence of fraud on your part.If I am mistaken, the banking institution is responsible for the system security and I believe they will be required to make you whole if there is a loss. This assumes no fraud on your part.
Vanguard 2FA requires a text message. I am out of cell phone range while at home so they set my accounts up to not use 2FA. Hopefully, this is temporary. My cell company keeps saying they will have phone over internet any day now.
I strictly use my home PC. I use one Excel file with all of my accounts. It has separate columns for: username, password, organization/company it applies to, hyperlink to the website, notes, and answers to the security questions.
I use the built in encryption capability of Excel. This way I only have to remember one password to unlock the file of passwords. I don't trust using an online password app. Also, I don't have to worry about mistyping the website. I just click on the hyperlink in the Excel file and always can trust it is correct.
I also use bogus answers to security questions, but such that I can tell which answer goes to which question. I'm sure its not hard to dig up answers to most of those security questions. E.g., What is you mother's maiden name? mommydearest
I use cut-and-paste to copy the password from the Excel file to the website entry. This way I can use the most complex and long passwords possible. What do I care, since it is cut-and-paste. My son says my passwords look more like nuclear launch codes. Every year I change the passwords.
I have security freezes in place. My favorite 2FA is what E*Trade offers as an option. It is called VIP Access, by Symantec. It generates a unique code right on your smart phone that changes every 30 seconds. That 6 digit code gets added to the end of your password.
I don't worry about it too much. I typically log into financial websites from my secured home wi-fi network using Chrome on my laptop or tablet, or via bank apps on my phone.
When traveling I try to avoid loging onto any financial websites, but if I need to I'll use my cellphone data plan. Never with any device connected to the internet via a public wi-fi or even hotel wi-fi.
Interesting.Just so you know, in the past I had an excel spreadsheet encrypted, and then forgot the password.
I downloaded a hacker program and ran it on my excel spreasheet.
It took around 20-25 hours to crack my password.
I use my regular computer and phone. It's convenient and secure enough. I just keep OS and browsers updated. I use nonsense generated passwords and a password manager. SMS as a second factor is weak (crooks can hijack your phone, then use the automated password reset), so I'm not first in line for that, but they force it on you. Nonsense answers to security questions go into the password manager.
Yes to:Just wondering what members on here use for online banking security.
Just so you know, in the past I had an excel spreadsheet encrypted, and then forgot the password.
I downloaded a hacker program and ran it on my excel spreasheet.
It took around 20-25 hours to crack my password.
My password was only 10 characters long, if yours is longer it would be more secure.
+1 That is what I found when researching the use of encrypted Excel. My research stopped when it turned into discovering that the weakest part of the latest Excel encryption is the "hashing" and that is when my brain gave up. I use Excel 2019 encryption to maintain passwords.That is no longer the case. Office 97–2003 used a 40-bit key with RC4 encryption, which is no longer secure. Office 2016 uses 256-bit key AES encryption, which is very secure. At some point in the future 256-bit AES will also no longer be secure. This will most likely be due to advances with quantum computers.
That is no longer the case. Office 97–2003 used a 40-bit key with RC4 encryption, which is no longer secure. Office 2016 uses 256-bit key AES encryption, which is very secure. At some point in the future 256-bit AES will also no longer be secure. This will most likely be due to advances with quantum computers.
Very good point about old encryption. What's your guess/estimate of when 256-bit AES will be broken?
Just a "fun" question for now. I think the comments when this happens wil be along the lines of, "We thought it would last longer."
looks like best in class is dedicated computer, vpn, avast, with login/password injection from pass mgt software, 2FA via Symantec or Authy/Twilio dynamic code generation, YubiKey
I might add Ransomware and keylogger installation detector on the hardware you use.
That is no longer the case. Office 97–2003 used a 40-bit key with RC4 encryption, which is no longer secure. Office 2016 uses 256-bit key AES encryption, which is very secure. At some point in the future 256-bit AES will also no longer be secure. This will most likely be due to advances with quantum computers.
I wouldn't use a VPN that required adding anything to my machine's trust cert list.