Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
Myrna got a notification that she needed to run special software in order to get back on Facebook. Leo says that chances are good that Myrna downloaded a virus. She has to be careful when responding to popups. They're usually "phishing" scams designed to get her to run a scan or download software. It's a red flag that they're going to break into her system and use it. Since Myrna fell for it, the only safe thing to do is back up her data, format the hard drive, and reinstall Windows from a known, good source.
Darrell worries that his laptop isn't safe on a public WiFi hotspot. Leo says that the reality is he does broadcast his web traffic via radio and it can be sniffed. But these days, most sites are encrypted and secure. If he's worried, using a VPN is a good idea. Leo likes Tiny Hardware Firewall.
The FBI has been contacting companies to tell them not to use Kaspersky AntiVirus Software because it represents a security threat, especially to power companies and other key industries vital to national security. Leo says it would have been better to just get the word out through the media and shows like the Tech Guy so that everyone could benefit from the warning. But truth be told, Leo isn't a fan of any antiVirus because it gives you a false sense of security. If you must use one, just use the one that comes with Windows. It's called Windows Defender and it does a good enough job.
Byron helps seniors with technology and he suggests getting an iPhone and using dynamic type because it will make the fonts larger. They can also FaceTime with the grand kids. Leo says that accessibility on the iPhone is the best in the business.
Wired Magazine is reporting that hackers have managed to encode a computer virus into DNA, which can then infect any computerized instrument that is used to analyze the strand. If hackers are now creating malware in our DNA, how can it be fought? Fortunately, though, it's not a very practical or widespread application. Yet.
Mike has a Swan surveillance camera with a hard drive recording option that archives for seven days before it loops around. He'd like to expand that to a month. Can he? Leo says he might be able to with a larger hard drive, but it may be specially locked down to prevent upgrading or hacking it to his liking. It largely depends on the DVR.
Seth used to work in the film industry and the backup storage that they have is up to 10 petabytes of storage and growing. A single film digitized can generate 4TB of space at 5-6K resolution. Leo says that's really not bad because storage is pretty cheap these days for maintaining archives.
Clinton's Google account was hacked, and the password recovery was changed to another email address. Leo says that's why Google and Leo recommends 2 Factor Authentication so that he would be contacted should a password change happen. He can also use a secondary email. Clinton can contact Google and they can perhaps get his account back by answering questions that only he would know about.
He should keep in mind that if he used this as a recovery email for other sites, they are vulnerable as well. So he'll have to get it back ASAP before more damage is done.
Richard's cell phone was stolen. Leo says that's usually a dumb crime because most often the phone simply can't be used anymore because they have kill switches in them. They also have the Find my iPhone option which allows the police to find them. But what about his data? Leo says that he can remote wipe the data, and if it's locked, it'll erase if the password is not properly inputted ten times. Most thieves don't really want the data, though, they want to sell the phone. But Richard should wipe the phone to be sure. For Google users, the data has been backed up to the Google account.
Security experts found a piece of malware on the Mac which could have been around for years since it was written in an old Apple language called Pearl. Apple has immediately patched the problem, but Leo says a second version may still be active. The malware affects up to 90% of Mac users.