hacking

How can I tell if my computer has been hacked?

Episode 1359

Ryan from Los Angeles, CA
hacking

Ryan wants to know how would he know if his computer had been hacked. Leo says that he can always scan his computer with antivirus software and with Microsoft's Malicious Software Removal Tool. In many cases, hackers are getting around that by moving their malware into routers and other "internet of things" devices. This is why updating the router's firmware is vital.

Pwn2Own Competition Shows What Platforms are Most Secure

Episode 1357

Hacking

Pwn2Own is an annual competition held at CanSacWest in Canada. Prizes are awarded to the hackers who can most quickly hack various operating systems and programs. This year a million dollars in prizes will be awarded, meaning it attracts the best hackers in the world. The money awarded is directly related to the difficulty in hacking the target. The most money goes to anyone who can hack an Apache web server.

Read more at blog.trendmicro.com.

Did the Russians Really Hack Us or Not?

Episode 1352

hacking

The Russian hacking story is now all over the news, especially after the joint agency report about the hacking. Many security experts aren't basing their assessment on that report, and it was most likely misdirection for public consumption having nothing to do with the actual information. In the report, they listed about a hundred IP addresses that they believe were used by Russian government hackers. The problem with those IP addresses is that a lot of them are TOR exit nodes, which could have been used by anyone.

Are Touch Screen Voting Machines a Bad Idea?

Episode 1337

Voting Machine

In this election season, Leo says that touch screen voting machines are simply a bad idea. Technology can be a great thing, but not everything needs to be high tech. Voting machines need to be highly secure, must be constantly calibrated, and are ripe for hacking. Just because we can do it, doesn't mean we should, and voting machines are a great example of that. By keeping paper ballots, there's also a paper trail, so it's harder for someone to falsify them.

President Obama Orders CIA to Develop "Proportional Response" to DNC Hacking

Episode 1332

CIA

President Obama has ordered the CIA to develop a "proportional response" to the reported Russian hacking of the DNC which exposed emails about the Clinton campaign. But Leo says what could the CIA expose by hacking the Kremlin? Putin posts bare chested pictures of himself on Instagram? The man is embarrassed by nothing! And could such a response cause an escalation? Leo says that our utility infrastructure is vulnerable to hacking and such a cyber war could devolve into crippling our electrical grid ... or worse.

Teenager Arrested for Hacking the FBI

Episode 1261

A British teenager has hacked both the FBI and the Department of Homeland Security. Using the tried and true method of social engineering, the teen managed to hack into an email account of a DOJ employee and then used that information to call in and gain access. Then he published the names and addresses of FBI and Department of Homeland Security agents online. Though the teen has been arrested, he claims to have over 300GB of more data that he plans to publish online.

What should I do after someone had unauthorized physical access to my PC?

Elizabeth from Santa Clarita, CA

Episode 1218

Elizabeth wants to undo whatever her nephew did to her PC after he came to visit. He's got mad computer skills and she caught him rummaging around her computer without her permission. Leo recommends backing up her data, formatting the hard drive and reinstalling Windows from a known good source. That way any modifications he's made will be wiped out.