{"id":32639,"date":"2020-01-06T16:56:41","date_gmt":"2020-01-06T16:56:41","guid":{"rendered":"http:\/\/6489c20f-9326-4e4b-86a1-8226052771a7"},"modified":"2020-01-06T16:56:41","modified_gmt":"2020-01-06T16:56:41","slug":"new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/","title":{"rendered":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2019\/09\/20\/71154639-c01a-4477-87cb-bcbf979eb012\/thumbnail\/770x578\/9c34c9fea9144a37acb1d9f3de9e6390\/istock-1061357610.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>While obtaining a new piece of tech hardware over the holidays can be exciting, it&#8217;s not without risks, because in many cases, the default delivery state of the shiny new thing offers very little in the way of cyber security.<\/p>\n<p>That means connecting your new product to the internet straight out of the box without taking security precautions could leave you open to <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\">hacking, cyber attacks and malware<\/a> &#8211; all of which could put your data and privacy at risk.<\/p>\n<p>To help users enjoy their new devices safely, the UK&#8217;s National Cyber Security Centre (NCSC) \u2013 the cyber arm of the GCHQ intelligence service \u2013 <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/staying-smart-with-your-christmas-gadgets\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">has detailed five simple steps<\/a> which can help make devices more secure.<\/p>\n<p><strong>1. Protect it with a strong password<\/strong><\/p>\n<p>People often believe that cyber criminals need to be expert sleuths to crack people&#8217;s passwords, but the reality is that people use weak passwords which are easy to guess. It could be that they&#8217;re using the default password which comes with the new device, or it could <a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-most-commonly-hacked-passwords-and-theyre-embarrassingly-weak\/\">be that they&#8217;re using common or easily guessable weak passwords<\/a> like &#8216;12345&#8217; or &#8216;password&#8217; for their email, shopping and social media accounts.<\/p>\n<p>That&#8217;s why the NCSC says that users should change simple or default passwords to a more secure one, so that it&#8217;s not so easy for cyber criminals to guess. One way the NCSC suggests doing this is by making your password <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/three-random-words-or-thinkrandom-0\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">three random words<\/a> which are memorable to you, but difficult for others to guess.<\/p>\n<p><strong>2. Turn on two-factor authentication (2FA)<\/strong><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>A strong password is a good first step to securing a device and the accounts, but it isn&#8217;t impossible for cyber criminals to use brute force attacks in an attempt to crack passwords, or <a href=\"https:\/\/www.zdnet.com\/article\/phishing-attacks-why-were-still-losing-the-battle-against-phoney-emails\/\">to use phishing attacks<\/a> to dupe users into giving up their passwords.<\/p>\n<p>That&#8217;s why the NCSC recommends <a href=\"https:\/\/www.zdnet.com\/article\/protect-yourself-how-to-choose-the-right-two-factor-authenticator-app\/\">using two-factor authentication<\/a> to ensure that there&#8217;s another barrier to attackers gaining access to accounts. Because even if attackers know your password, having to authorise the login attempt via a text message or application on your smartphone makes it harder for hackers to hijack the account.<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/?ftag=CMG-01-10aaa1b\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNet special report) |&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/a-winning-strategy-for-cybersecurity-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong>Download the report as a PDF<\/strong><\/a><strong>&nbsp;(TechRepublic)<\/strong>&nbsp;&nbsp;<\/p>\n<p>&#8220;While you&#8217;re at it, turn on 2FA for your main email account if you haven&#8217;t already. That&#8217;s the centre of your digital life because things like password resets get sent there, so it needs to be better protected than other accounts,&#8221; said&nbsp;Ian Levy, technical director at the NCSC.<\/p>\n<p><strong>3. Always accept automatic updates<\/strong><\/p>\n<p>Smartphones, tablets, computers and Internet of Things devices all now regularly receive updates from manufacturers \u2013 but users will regularly put off applying either because they see installing the updates as a waste of time or don&#8217;t understand why devices need to be updated.<\/p>\n<p>However, updates are often issued after security vulnerabilities arise as means of closing loopholes which can otherwise be exploited by hackers. Many of the most high-profile malware campaigns and cyber attacks of recent years have spread so easily because <a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-top-ten-security-vulnerabilities-most-exploited-by-hackers-to-conduct-cyber-attacks\/\">they&#8217;re taking advantage of known vulnerabilities which users haven&#8217;t applied the patches to fix<\/a>.<\/p>\n<p>Because of this, the NCSC recommends that users should configure all their smart devices to install automatic updates \u2013 and to install updates for phones, tablets and computers as soon as they get the option.<\/p>\n<p><strong>4. If you don&#8217;t want it anymore, perform a factory reset<\/strong><\/p>\n<p>Sometimes people decide that a gadget isn&#8217;t for them, or they decide that they want to trade it in for a newer model. If this is the case, the NCSC suggests that users should perform a factory reset of the device. By returning the device to its original settings like this, users will wipe all of their personal data from it, meaning that that information can&#8217;t be potentially exploited by whoever uses it next.<\/p>\n<p><strong>5. Here&#8217;s what to do if something goes wrong<\/strong><\/p>\n<p>If the worst happens and users think an outsider has control of a device inside their home, the NCSC recommends users perform a factory reset. Meanwhile, if users become aware of an incident reported in the news and think their product is affected, they should visit the manufacturer website for advice.<\/p>\n<p>There&#8217;s also the option of visiting the <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Information Commissioner&#8217;s Office (ICO) website<\/a>, or the <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">website of the NCSC.<\/a><\/p>\n<p>The five tips are simple, but they can do a long way to protecting users against the vast majority of cyber attacks.<\/p>\n<p>&#8220;Enjoy your new devices and the cool things they can do. Don&#8217;t be afraid of new technology and the internet. With some basic prevention, you&#8217;ll be as safe as houses,&#8221; Levy said.<\/p>\n<p><strong>READ MORE ON CYBER SECURITY<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/new-year-new-gadgets-heres-five-simple-tips-to-keep-your-new-devices-safe-from-hackers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Cyber Security Centre has offered advice to people on how to keep their new smartphones, laptops and Internet of Things products secure.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32640,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-32639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-06T16:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware\",\"datePublished\":\"2020-01-06T16:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/\"},\"wordCount\":817,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/\",\"name\":\"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg\",\"datePublished\":\"2020-01-06T16:56:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/","og_locale":"en_US","og_type":"article","og_title":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-06T16:56:41+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware","datePublished":"2020-01-06T16:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/"},"wordCount":817,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/","url":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/","name":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg","datePublished":"2020-01-06T16:56:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-year-new-gadgets-five-ways-to-keep-your-new-devices-safe-from-hackers-cyber-attacks-and-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32639"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32640"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}