security

Find Out If Someone Else Has Accessed Your Gmail Account

If you suspect your Gmail account may have been hacked, there's a quick and easy way to get an activity log. When looking at your inbox, just scroll down to the bottom of the page and look in the lower right side. It will tell you when the last account activity was, and it has a link to "Details." Clicking on that link will show a log of all the recent activity on your account. It will show the IP address of the computer used for each login, as well as the physical location for where that login originated. It also will show you the browser and apps used with the account.

Why does Apple constantly bug me for my password?

Episode 1247

Steve from Nashville, TN
Apple iPhone 6s and 6s Plus

Steve has an iPhone 6s Plus and he's being driven crazy by Apple constantly asking for his password. Leo says Apple has decided to be the security company, but what bugs him is that they already have a secure method with the fingerprint reader. Isn't that enough? He talked to an Apple Genius and they say it's a bug. But Steve Gibson says there's probably a method to their madness and it's by design.

Is internet connected home automation secure?

Gary from Buffalo, NY

Episode 1241

Gary has a ton of devices attached to his network, including home automation devices. It's called the "Internet of things," where all those devices are accessible to the Internet. But is it secure? Leo says it's possible that his network can be breached through them, but that's theoretical. It hasn't happened yet. More likely, his router will be overwhelmed by all the connections. So it may be time to upgrade it.

T-Mobile User Info Acquired by Hackers in Experian Breach

Episode 1226

T-Mobile logo

T-Mobile user data was acquired by hackers this week when credit bureau Experian was compromised. Hackers got customer names, addresses, drivers licenses, social security numbers and more. According to T-Mobile CEO John Leger, 15 million people including new applicants requiring a credit check from September 1st, 2013 through September 16th, 2015 were affected. Customers will get two years of free credit monitoring and identity resolution services from Experian.

How can I find out where IP addresses are coming from?

Julie from Orange, CA

Episode 1217

Julie wants to know how she can understand the IP addresses she sees in her Gmail. Leo says that a cellphone company IP address may be attached somewhere other than where she lives, because they're located in another location. If there's an authorized app, that app can go through her Google Mail and contacts and that could have a different IP address as well.

Block JavaScript and Pop-Ups in Your Browser

Chances are good that at some point while browsing the web, you've encountered annoying pop-ups with suspicious warnings or messages. There are even some scams that pop up a message saying you've been involved in illegal activity and prompt you to pay some amount of money to "unlock" your system. Most of these scams are done through JavaScript, and disabling this would prevent this from happening.

Do I need an antivirus for Windows 10?

Murray from Tustin, CA

Episode 1214

Murray wants to know if he needs to install an antivirus for Windows 10. Leo says no. Windows 10 has its own antivirus that is automatically turned on called Windows Defender. But also, viruses spread so fast that antivirus software can't really keep up. It can't protect against 'zero day' exploits. Antivirus is really only a backup. The first line of defense is online behavior. The number 1 priority should be to keep the computer updated.

How can I get the password field on my phone to show letters instead of dots?

Laxman from Ft. Defiance, AZ

Episode 1212

Laxman is annoyed that when he logs into his phone, he gets "dots" instead of the password itself. How can he change that so he can see the password? Leo says the idea is to stop people from looking over his shoulder and seeing his password as he types it. But Leo says that he should have the option of not having that. The security merits of it are dubious. The dots also show the first letter briefly, and people could easily record the password as its typed on the keyboard. Sadly, unless his app gives him the ability to see it, he's stuck with the dots.