hacked

Jackpotting Attack Hits US ATMs

Episode 1458

ATM

There's a new attack that has been affecting ATMs around the world, and it's called "Jackpotting." It causes ATMs to dispense all of its cash. Hackers are using endoscopes to gain access to the interior of an ATM in order to connect to it and hack into the ATM's Windows XP operating system. Then, the once the malware is installed, a remote command is given to spew out 40 bills every 23 seconds.

Read more at krebsonsecurity.com.

Is my Mac infected with malware?

Episode 1457

Brad from Wells, NV
MacBook Pro

Brad accidentally downloaded some malware, but he can't find it to remove it. Leo says downloading a file is only half the equation. He then would have to run it. Since he can't find it, even in his download log, it's likely it was a failed download. On top of that, Brad runs a Mac, so he's even more secure than Windows. But he should always make sure he keeps his computer updated, just in case.

Has my Bitcoin wallet been hacked?

Episode 1453

Mike from Bakersfield, CA
Coinbase

Mike's Coinbase Bitcoin wallet has a corrupted IP address to it and he's worried his wallet has been hacked. Leo says he can't have two IP addresses on an account. Leo says that the ISP may be at fault here and Mike should log into his Coinbase wallet and make a screenshot of the error messages. Then he should contact his ISP and show them the evidence. They need to fix it. Leo also says he should change his Coinbase password just in case. It's possible something nefarious is afoot.

New Bill Would Make it Legal to Hack Back Hackers

Episode 1430

Hacker

A new bill being proposed would allow computer users to hack back any hackers that strike them. This will give them the ability to destroy any data stolen from them, as well as giving a little digital pay back. Leo says that it's hard to know where the attack is coming from and you could make matters worse for some innocent person who was also hacked, with their computers and email addresses used as an alias for the real hacker. He also says this is asking for trouble because hackers are far more sophisticated than their victims.

Equifax Executives Profit

Episode 1421

http://www.equifax.com/about-equifax/corporate-leadership

Equifax was recently hacked and over 143 million people had their credit information stolen. Even worse, Equifax executives sat on the news for five weeks while many executives sold stock before it would tank. Leo says that this was insider trading plain and simple. Equifax has a higher duty to protect user credit information because we are required to have our credit monitored. They had one job: Protect the data that they gathered without our permission.

Was I hacked through Facebook?

Episode 1415

Myrna from Twin Peaks, CA
Facebook

Myrna got a notification that she needed to run special software in order to get back on Facebook. Leo says that chances are good that Myrna downloaded a virus. She has to be careful when responding to popups. They're usually "phishing" scams designed to get her to run a scan or download software. It's a red flag that they're going to break into her system and use it. Since Myrna fell for it, the only safe thing to do is back up her data, format the hard drive, and reinstall Windows from a known, good source.

What can I do if my Google account has been hacked?

Episode 1412

Carla from Orange County, CA
Gmail

Carla's Google account has been hacked. She sees things in her Gmail account she doesn't recognize and her YouTube watch list has things on it she never watched. Leo says Google has a security checkup that she can use to see if she's being hacked and she can disconnect any device she doesn't recognize. Carla should also engage 2 Factor Authentication. Obviously, Carla is going to want to change her password as well.

How can I get my gmail account back from a hacker?

Episode 1408

Clinton from Alberta, Canada
Code

Clinton's Google account was hacked, and the password recovery was changed to another email address. Leo says that's why Google and Leo recommends 2 Factor Authentication so that he would be contacted should a password change happen. He can also use a secondary email. Clinton can contact Google and they can perhaps get his account back by answering questions that only he would know about.

He should keep in mind that if he used this as a recovery email for other sites, they are vulnerable as well. So he'll have to get it back ASAP before more damage is done.