The Turkish Crime Family is threatening to release hundreds of millions of iCloud account names and passwords if Apple doesn't pay them a ransom of millions of dollars. To prove it, they gave ZDNet 54 samples to confirm it. Apple, however, says they have never been hacked. But Leo says it's important for iCloud users to change their passwords just in case. While you're at it, if you haven't turned on two factor authentication, it would be a good idea to do that as well.
Scott is worried about Vault 7 and the CIA's hacking. He's heard from Edward Snowden's tweets that the CIA has left a huge vulnerability in our mobile devices. Leo says that was the problem with the Feds wanting to crack Apple's iOS since once cracked, it's available to anyone. But the reality is, the hack is 3 years old and Apple has worked to close those vulnerabilities. So it's likely that unless Scott's phone hasn't been updated for three years, he's safe.
Stan is having problems opening XLS files due to an error message from the "Trust Center." It'll open the file, but he can't write back to it or save it to his hard drive. Leo says that is Microsoft's security center for excel spreadsheets because it's possible for bad actors to embed commands into an Excel file. There is a workaround for this. Stan can enable all content in the Excel Trust Center settings. But that can be risky if he's unsure of the content in the file he's opening. If he's sure about it, then he'll be OK.
Google's Security Checkup is a great way to verify the security of your account. This is great if you suspect unusual activity on your account, but it's also a good idea to do periodically as a preventative measure.
Every time Charles tries to open Gmail on his Google Nexus, it wants him to sign in. He's suspicious that someone may have hacked his account. Leo says that there's a lot of reasons to be advised of that, but it's always wise to run Google's Security Checkup just to be safe. It'll tell him what devices are connected to his account and also input a second factor authentication warning.
David tethers his computer through his mobile device, but he's wondering if it's secure. Leo says it's probably more secure because cell phones are encrypted now. Using the Wi-Fi through his phone is a different matter, if he's at a public hotspot. At that point, his traffic is out in the clear and easily grabbed. If he's going to use a hotspot, Leo advises using the Tiny Hardware Firewall and a VPN. The Tiny Hardware Firewall is like a router that then connects to his phone.
There are a lot of ways that bad actors online can compromise your computer. As their techniques become more sophisticated, it becomes more difficult to know whether or not your system has been compromised. There are some signs to look for, however, to tell if your computer is affected by malware.
You can always scan your computer with antivirus software. Microsoft includes its own antivirus utility as part of Windows 8 and above. You can also use the Malicious Software Removal Tool by pressing the Windows Key + R, typing in "MRT," and pressing enter.
Ransomware has always been a terrible plague of the internet, where bad guys inject software into your computer through phishing emails. They usually trick you by saying it's from your bank, the IRS, or even your boss asking you to open something. When you do that, it's an application that runs and scrambles all of your data and asks you to give them money to get the data back.
Bret has Windows 10 and uses Windows Defender, but it keeps telling him he's unprotected -- even if he's just run a scan. Leo says there's a little red flag in the task menu, and if he opens that up, it will tell him what's unprotected. Bret says it's just notifications that keep coming up, and Leo says he can just turn those notifications off. Leo suggests looking at the screen that tells him what's unprotected. If he doesn't have protection updates turned on, he may want to do that. If he wants to be as safe as possible, he should turn all that stuff on.