There's a huge security flaw in WINRAR, that will enable hackers to take over your computer. So Leo advises that if you use WINRAR to zip/unzip your files, that you should update to the latest beta version. But you have to go to the WINRAR site and manually download the update. There is no automatic update.
Joey wants to know if the new Net Neutrality bill will pass. Leo says probably not. The Senate is controlled by one party that isn't in favour of Net Neutrality and the president wouldn't sign it if it did. Their view is that the government shouldn't regulate the internet. But Leo says that while that's true, it's a good idea to have a check and balance on the internet service providers.
Should you use 2-factor authentication? Leo says yes, but Leo isn't a fan of 2FA over SMS text messaging. It's too easy to spoof, but it's better than nothing.
If you're going to use antivirus software, you may want to choose something other than Kaspersky. While Leo believes Eugene Kaspersky, the CEO of Kaspersky Lab, is a great person, his company is Russian and may be prone to manipulation or seizure by the Russian government/military. In any case, Leo simply recommends excellent alternatives with less baggage. While we don't know for sure what goes on with companies like Kaspersky or Huawei, it's best to err on the side of caution.
Robert is wondering if he needs to get an Antivirus for his smartphone. Leo says it would be unnecessary since the phones' Operating Systems are already quite secure thanks to Apple and Google's efforts. An Android device, for example, will scan apps downloaded from the Play Store (which is the best a 3rd-party app can do anyway).
Ron hears that he won't be able to use Windows 7 after 2020. Does that mean he can't use his computer? Leo says no. The so-called "end of life" phase, Microsoft won't be updating the operating system with security patches. So he uses it at his own risk online. But if there's something really bad, Microsoft usually puts out a fix. And Leo has a hunch that the 2020 end of life date will be extended.
Leo also says most infections come from out-of-date browsers. So keep the browsers updated. Practice safe online computing. Update the AVS.
Neil bought a Helm email server on Leo's advice. He also bought a domain through Hover to use with it. This is a home email service, and the idea is that you put your email on a server that runs in your own house instead of trusting a service like Google to handle it. Neil is wondering how to back the device up. Leo says one of the things he gets for $99 per year is that Helm backs it up over the internet. What's cool is that the contents of the email on the local server is encrypted with a key that only Neil has access to. Helm even provides a secure USB key to decrypt the backups.
Yesterday's story about Collection #1 - a package of hacked email passwords, is actually now reported to be a few years old, so the damage is not as great as previously believed. But Leo still says that it's a wise idea to go to HaveIBeenPwned.com/passwords and see if your account has been hacked. And then change your password. In fact, it may be a good idea to change it anyway, and turn on 2 factor authentication while you're at it.
Bruce wants to know why he's being asked for his iCloud password all the time on his iPhone 8. Leo isn't sure why this happens, but it's happened to him as well. It does go away eventually. Leo thinks it's just a bug. Leo suggests going into settings, and re-entering his passwords there.
Greg wants to know if his mesh router can work with a network switch. Leo says that mesh routers prefer to handle all management on the network. He can use a switch as a hub, though, and the dumber they are, the better. TP-Link makes a 24 port switch that works great with the Eero. The key is to get an "unmanaged switch".
Carmine has 2 factor authentication on most of his systems, but some use SMS, and he thinks that's not very secure. Leo says that there will always be a trade-off between security and convenience. But SMS is far easier to crack than independent authentication through an authenticator. Leo says to contact the cellphone company and have them put their additional layer of authentication on her phone.