Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
Michele has a gaming computer and she has been having trouble with it ever since she upgraded to Windows 10. Microsoft now automatically installs updates without her permission. Leo says she can defer the updates for a limited amount of time, but ultimately for security purposes, she'll have to do them.
Val is interested in LifeLock and wants to know if it's safe. Is it? Leo says yes. They were a bit over confident in the early days, but they are dedicated to getting in between you and identity thieves by putting fraud alerts on your credit history. But now they can't do that because of lawsuits. So now they own companies that are built to target fraudulent credit activity so that if anything unauthorized occurs, you get wind of it and they can shut it down. They will also help you fix your credit record should you be a victim of credit card fraud.
Melinda says that after she turns on her computer and goes into her browser, it takes a really long time to get to Gmail, and it goes to her eBay and other accounts. She wonders if she got hacked. Leo says perhaps. That kind of behavior points to being hacked. Maybe someone has gotten physical access to the computer. Did she make an enemy?
Satbeer is an accountant and he uses some old programs sometimes. On his Windows 7 Ultimate system, he can still use XP mode. Is that secure? Leo says yes, because Windows 7 is still handling the backend while XP is virtual.
Tom wants to add a security camera to his home. He wants to know which one to get and how secure they are. Can they be hacked? Leo says that there's a lot of concern over the "internet of things," which includes cameras. They don't get updated very often. Foscam made cameras that were easily hackable, so Leo suggests not getting them. He won't want to get the low end, off brand stuff either. It won't be secure.
A year ago, a hacking group called the Shadow Brokers claimed it had a treasure trove of NSA hacking tools that they would sell to the highest bidder. They asked for $7 million in Bitcoin, but didn't get any bids. They've now released the catalog of documents, which means it's a very busy day for security researchers. While these documents are old, they're still very interesting.
Hackers have been stealing people's information, filing their returns, and getting the refund. Last year, the IRS noticed that the FAFSA online system could get enough personal information that it could be used by hackers. In October, the IRS sent a memo to the Department of Education saying that the system could be abused. But because up to 15 million people used the system out of convenience, they kept it online. In February, the IRS noticed a pattern of fraudulent activity, and shut it down last month.
We're familiar with DDoS attacks, which are "Distributed Denial of Service" attacks, but there's a new form of attack that's been happening online lately. It's called PDoS, or "Permanent Denial of Service," which actually bricks the device, destroying it permanently. The rationale is that if these devices weren't bricked, someone else would use it for a DDoS attack.
Lisa went to a website and she got a pop up notification that her computer was infected and to call an 800 number to Microsoft. Leo says not to ever call them -- just exit the popup and move on. It's not infected and those popups are designed to insnare users. It's called a phishing scam. Lisa did it anyway, though, and gave them control of a computer. Leo says that's bad news because she doesn't really know what the hacker's done. He can install viruses on her or turn it into a bot, a keystroke logger, and use remote access to turn on her camera.