How can I use an old Nook tablet to watch movies?

Episode 1459

Steve from Denver, CO
Barnes and Noble NOOK Tablet 7"

Steve was given a Barnes and Noble Nook reader. Can he watch movies on it? Leo says that the Nook had very limited space and used a proprietary format, but he may be able to hack it to give it more options, including watching the movies he wants. He should head over to XDA-Developers to see how to "root" the Nook. His real problem, though, is copy protection. The Nook only supports movies with Cinema Now DRM. But that's part of the fun of hacking old technology like a Nook.

Jackpotting Attack Hits US ATMs

Episode 1458


There's a new attack that has been affecting ATMs around the world, and it's called "Jackpotting." It causes ATMs to dispense all of its cash. Hackers are using endoscopes to gain access to the interior of an ATM in order to connect to it and hack into the ATM's Windows XP operating system. Then, the once the malware is installed, a remote command is given to spew out 40 bills every 23 seconds.

Read more at krebsonsecurity.com.

Prevent Your Accounts From Being Hacked

Securing your online accounts is vitally important. The consequences of being hacked can be great — someone could lock you out of your email account. If that account is used for password recovery for your other accounts, then a hacker could get access to all of those as well. There are a few basic things that you should make sure you do to protect your email account:

1. Provide a secondary email address for recovery.
2. Provide a phone number for password recovery.
3. Turn on 2 Factor Authentication.

Hackers Break Into Netflix, Release Orange is the New Black

Episode 1385


A hacker by the name of "The Dark Overlord" broke into Netflix' servers and released the new season of "Orange is the New Black," after demanding payment not to. According to TDA, he also has shows from ABC, IFC, and other channels. Leo says that is a childish act that probably was perpetrated by an ambitious teenager and Netflix did the right thing by refusing to pay up.

Shadow Brokers Group Release NSA Hacking Tools

Episode 1379


A year ago, a hacking group called the Shadow Brokers claimed it had a treasure trove of NSA hacking tools that they would sell to the highest bidder. They asked for $7 million in Bitcoin, but didn't get any bids. They've now released the catalog of documents, which means it's a very busy day for security researchers. While these documents are old, they're still very interesting.

Read more at techcrunch.com.

What's to stop the Turkish iCloud hackers from getting my new password?

Episode 1374

Mike from San Diego, CA
Apple iCloud

Mike is worried about the Turkish Crime Family's iCloud hack. If he changes his password, couldn't they just hack it again to get them? Leo says that Apple has said it hasn't been hacked, and even if it had been, the hackers would have to "rehack" the system to get them. If Mike has turned on two factor authentication, they can't use his password anyway.

It's annoying to use two-factor, but it's the best last line of defense to prevent his account from being compromised. Also, he can use his TouchID on a new MacBook Pro and his iOS devices to insure verification.

Vault 7 Showing How CIA Hacks for Spying

Episode 1370


Wikileaks has announced Vault 7, a massive collection of documents that show how the CIA uses malware and other hacking techniques to spy online. Some of the techniques includes using smartTVs as a spying device since they use cameras and microphones built into the TVs. Samsung warned of this in their terms of service for their TVs last year. But Leo says that the CIA doesn't really have a switch to turn on all TVs, and if they did, the data they'd receive would be so massive and 99.9% of it would be useless. It could be used for targeted eavesdropping, though.

How can I tell if my computer has been hacked?

Episode 1359

Ryan from Los Angeles, CA

Ryan wants to know how would he know if his computer had been hacked. Leo says that he can always scan his computer with antivirus software and with Microsoft's Malicious Software Removal Tool. In many cases, hackers are getting around that by moving their malware into routers and other "internet of things" devices. This is why updating the router's firmware is vital.