Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
The FBI has been contacting companies to tell them not to use Kaspersky AntiVirus Software because it represents a security threat, especially to power companies and other key industries vital to national security. Leo says it would have been better to just get the word out through the media and shows like the Tech Guy so that everyone could benefit from the warning. But truth be told, Leo isn't a fan of any antiVirus because it gives you a false sense of security. If you must use one, just use the one that comes with Windows. It's called Windows Defender and it does a good enough job.
Byron helps seniors with technology and he suggests getting an iPhone and using dynamic type because it will make the fonts larger. They can also FaceTime with the grand kids. Leo says that accessibility on the iPhone is the best in the business.
Wired Magazine is reporting that hackers have managed to encode a computer virus into DNA, which can then infect any computerized instrument that is used to analyze the strand. If hackers are now creating malware in our DNA, how can it be fought? Fortunately, though, it's not a very practical or widespread application. Yet.
Mike has a Swan surveillance camera with a hard drive recording option that archives for seven days before it loops around. He'd like to expand that to a month. Can he? Leo says he might be able to with a larger hard drive, but it may be specially locked down to prevent upgrading or hacking it to his liking. It largely depends on the DVR.
Seth used to work in the film industry and the backup storage that they have is up to 10 petabytes of storage and growing. A single film digitized can generate 4TB of space at 5-6K resolution. Leo says that's really not bad because storage is pretty cheap these days for maintaining archives.
Clinton's Google account was hacked, and the password recovery was changed to another email address. Leo says that's why Google and Leo recommends 2 Factor Authentication so that he would be contacted should a password change happen. He can also use a secondary email. Clinton can contact Google and they can perhaps get his account back by answering questions that only he would know about.
He should keep in mind that if he used this as a recovery email for other sites, they are vulnerable as well. So he'll have to get it back ASAP before more damage is done.
Richard's cell phone was stolen. Leo says that's usually a dumb crime because most often the phone simply can't be used anymore because they have kill switches in them. They also have the Find my iPhone option which allows the police to find them. But what about his data? Leo says that he can remote wipe the data, and if it's locked, it'll erase if the password is not properly inputted ten times. Most thieves don't really want the data, though, they want to sell the phone. But Richard should wipe the phone to be sure. For Google users, the data has been backed up to the Google account.
Security experts found a piece of malware on the Mac which could have been around for years since it was written in an old Apple language called Pearl. Apple has immediately patched the problem, but Leo says a second version may still be active. The malware affects up to 90% of Mac users.
The news came out this week that Kaspersky AntiVirus may be linked to Russian spying of both the Russian Government and the FSB. Kaspersky has responded by offering free antivirus in the hope that people will see that as a legitimate solution. Leo wants to know if anyone will use it. It could contain time released malware that could wreak havoc.
Mike has written an ebook and he wants to know if he should copy protect it. He's going to be giving it away for students to see if they like it. The LA Sparks want him to copy protect it. Leo says he's not a fan of DRM because it simply doesn't work. He needs to figure out a way for a limited amount of students to be able to access his book as part of a 'beta test.' Leo says he'll need to have an authentication server to verify it. Lock Lizard is one option that uses an open source DRM scheme.