With all of the apps available online, it can be difficult to distinguish the trustworthy developers from rogue developers. If you happen to download a malicious app, that is the most dangerous thing you can do because you're giving that rogue developer permission to install software to access your system. There are precautions you can take to make sure you only get trusted apps, however.
If you suspect your Gmail account may have been hacked, there's a quick and easy way to get an activity log. When looking at your inbox, just scroll down to the bottom of the page and look in the lower right side. It will tell you when the last account activity was, and it has a link to "Details." Clicking on that link will show a log of all the recent activity on your account. It will show the IP address of the computer used for each login, as well as the physical location for where that login originated. It also will show you the browser and apps used with the account.
Steve has an iPhone 6s Plus and he's being driven crazy by Apple constantly asking for his password. Leo says Apple has decided to be the security company, but what bugs him is that they already have a secure method with the fingerprint reader. Isn't that enough? He talked to an Apple Genius and they say it's a bug. But Steve Gibson says there's probably a method to their madness and it's by design.
Michele bought a Motorola mobile phone and she's worried about the security of it, with Stagefright and other exploits. She wants to return it. But they're resisting the return unless there's a hardware or software issue. Leo says that an opinion that it isn't secure is not a provable fact, even if it comes from an expert.
Gary has a ton of devices attached to his network, including home automation devices. It's called the "Internet of things," where all those devices are accessible to the Internet. But is it secure? Leo says it's possible that his network can be breached through them, but that's theoretical. It hasn't happened yet. More likely, his router will be overwhelmed by all the connections. So it may be time to upgrade it.
T-Mobile user data was acquired by hackers this week when credit bureau Experian was compromised. Hackers got customer names, addresses, drivers licenses, social security numbers and more. According to T-Mobile CEO John Leger, 15 million people including new applicants requiring a credit check from September 1st, 2013 through September 16th, 2015 were affected. Customers will get two years of free credit monitoring and identity resolution services from Experian.
Julie wants to know how she can understand the IP addresses she sees in her Gmail. Leo says that a cellphone company IP address may be attached somewhere other than where she lives, because they're located in another location. If there's an authorized app, that app can go through her Google Mail and contacts and that could have a different IP address as well.
Murray wants to know if he needs to install an antivirus for Windows 10. Leo says no. Windows 10 has its own antivirus that is automatically turned on called Windows Defender. But also, viruses spread so fast that antivirus software can't really keep up. It can't protect against 'zero day' exploits. Antivirus is really only a backup. The first line of defense is online behavior. The number 1 priority should be to keep the computer updated.
Laxman is annoyed that when he logs into his phone, he gets "dots" instead of the password itself. How can he change that so he can see the password? Leo says the idea is to stop people from looking over his shoulder and seeing his password as he types it. But Leo says that he should have the option of not having that. The security merits of it are dubious. The dots also show the first letter briefly, and people could easily record the password as its typed on the keyboard. Sadly, unless his app gives him the ability to see it, he's stuck with the dots.