Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
Satbeer is an accountant and he uses some old programs sometimes. On his Windows 7 Ultimate system, he can still use XP mode. Is that secure? Leo says yes, because Windows 7 is still handling the backend while XP is virtual.
Tom wants to add a security camera to his home. He wants to know which one to get and how secure they are. Can they be hacked? Leo says that there's a lot of concern over the "internet of things," which includes cameras. They don't get updated very often. Foscam made cameras that were easily hackable, so Leo suggests not getting them. He won't want to get the low end, off brand stuff either. It won't be secure.
A year ago, a hacking group called the Shadow Brokers claimed it had a treasure trove of NSA hacking tools that they would sell to the highest bidder. They asked for $7 million in Bitcoin, but didn't get any bids. They've now released the catalog of documents, which means it's a very busy day for security researchers. While these documents are old, they're still very interesting.
Hackers have been stealing people's information, filing their returns, and getting the refund. Last year, the IRS noticed that the FAFSA online system could get enough personal information that it could be used by hackers. In October, the IRS sent a memo to the Department of Education saying that the system could be abused. But because up to 15 million people used the system out of convenience, they kept it online. In February, the IRS noticed a pattern of fraudulent activity, and shut it down last month.
We're familiar with DDoS attacks, which are "Distributed Denial of Service" attacks, but there's a new form of attack that's been happening online lately. It's called PDoS, or "Permanent Denial of Service," which actually bricks the device, destroying it permanently. The rationale is that if these devices weren't bricked, someone else would use it for a DDoS attack.
Lisa went to a website and she got a pop up notification that her computer was infected and to call an 800 number to Microsoft. Leo says not to ever call them -- just exit the popup and move on. It's not infected and those popups are designed to insnare users. It's called a phishing scam. Lisa did it anyway, though, and gave them control of a computer. Leo says that's bad news because she doesn't really know what the hacker's done. He can install viruses on her or turn it into a bot, a keystroke logger, and use remote access to turn on her camera.
Brian has tried several password vaults and he finds them all inconvenient. His frustration is that using his mobile device doesn't always work so well. He ended up on LastPass. Is that a good choice? Leo says yes. It's the one he uses. 1Password is another one, and it has the advantage of being able to save the vault somewhere else.
Jeff wants to do some spring cleaning by getting rid of some old computers, but is concerned about privacy and the data on the hard drives. Leo says that the easiest thing to do is to simply remove the hard drives. He could also use something like Darik's Boot and Nuke (DBAN) to completely wipe the drive. It erases everything by writing zeros across the drive, and then erases it again. If he does that several times, he'll be safe from everyone save the NSA. Solid State Drives, however, can be easier to get data off of.
It may not be an April Fool's Joke, but it sounds like one. Verizon, AT&T, and Comcast have moved to assure customers that while Congress has officially passed a law stripping privacy protections from internet users, their data will not be sold and they won't be spying on customers. This begs the question — why did they need the law passed in the first place?