Karen's computer got taken over by a scammer who convinced her that he was from AOL when she was having trouble with her account. Leo says that gaining control of her computer remotely likely gave him that control and the only thing she can do is backup her data, format her hard drive, and reinstall windows from a known, good source. If one needs help from AOL, contact them directly here - https://help.aol.com/products/new-aol-desktop
There's a new attack that has been affecting ATMs around the world, and it's called "Jackpotting." It causes ATMs to dispense all of its cash. Hackers are using endoscopes to gain access to the interior of an ATM in order to connect to it and hack into the ATM's Windows XP operating system. Then, the once the malware is installed, a remote command is given to spew out 40 bills every 23 seconds.
Brad accidentally downloaded some malware, but he can't find it to remove it. Leo says downloading a file is only half the equation. He then would have to run it. Since he can't find it, even in his download log, it's likely it was a failed download. On top of that, Brad runs a Mac, so he's even more secure than Windows. But he should always make sure he keeps his computer updated, just in case.
Mike's Coinbase Bitcoin wallet has a corrupted IP address to it and he's worried his wallet has been hacked. Leo says he can't have two IP addresses on an account. Leo says that the ISP may be at fault here and Mike should log into his Coinbase wallet and make a screenshot of the error messages. Then he should contact his ISP and show them the evidence. They need to fix it. Leo also says he should change his Coinbase password just in case. It's possible something nefarious is afoot.
The website that Equifax set up to allow people to see if their personal data had been compromised by hackers has been found to be filled with more malware. Even worse, your salary history has also been compromised. Learn more about it at krebsonsecurity.com.
A new bill being proposed would allow computer users to hack back any hackers that strike them. This will give them the ability to destroy any data stolen from them, as well as giving a little digital pay back. Leo says that it's hard to know where the attack is coming from and you could make matters worse for some innocent person who was also hacked, with their computers and email addresses used as an alias for the real hacker. He also says this is asking for trouble because hackers are far more sophisticated than their victims.
Equifax was recently hacked and over 143 million people had their credit information stolen. Even worse, Equifax executives sat on the news for five weeks while many executives sold stock before it would tank. Leo says that this was insider trading plain and simple. Equifax has a higher duty to protect user credit information because we are required to have our credit monitored. They had one job: Protect the data that they gathered without our permission.
Myrna got a notification that she needed to run special software in order to get back on Facebook. Leo says that chances are good that Myrna downloaded a virus. She has to be careful when responding to popups. They're usually "phishing" scams designed to get her to run a scan or download software. It's a red flag that they're going to break into her system and use it. Since Myrna fell for it, the only safe thing to do is back up her data, format the hard drive, and reinstall Windows from a known, good source.
Carla's Google account has been hacked. She sees things in her Gmail account she doesn't recognize and her YouTube watch list has things on it she never watched. Leo says Google has a security checkup that she can use to see if she's being hacked and she can disconnect any device she doesn't recognize. Carla should also engage 2 Factor Authentication. Obviously, Carla is going to want to change her password as well.