Bob is interested in home automation, but he's concerned with security. Can it run amuck? Leo says that it's such a new thing, we don't really know all the downsides yet. Keyless entry is the challenge, especially with a car. A car uses keyless entry with the keyfob signal by proximity. You can actually buy a booster to send it out further. But that's a security flaw. Anything with a computer can have flaws and bugs in programming. So it is possible and Bob's right to pay attention to it. But we're in the very early days. Just remember that a lock is an illusion, not a security feature.
Vladimir has a BMW i3 and wonders if he can integrate his smartphone with it. On his previous car, he had to manually enter all his contacts and it was tedious. Leo says that his car copied over his contacts so it was pretty easy. Vladimir got the numbers, but not the addresses, though. Leo says that Audi's do addresses. Vladimir used a phone with KitKat and it worked just fine, so that's a workaround. Leo says that's very odd. But at least he got the data in. But it sounds like maybe a Lollipop security feature prevented it from doing addresses.
If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better secure your account:
Robin is getting those emails that seem to be bounced from her own Yahoo email account. Leo says that's likely a "spoofed" return email address, but it's always wise to change the password just in case. She should use a password vault so it can generate long passwords which can't as easily be hacked. But Leo also says there's something fundamentally wrong with Yahoo's email security and Leo advises getting off it. Go with Gmail instead.
Brad hears that you don't have to use your fingerprint for Apple's Touch ID -- you can actually use other body parts. Knuckles, palms, and even noses can work. Some guitar players or construction workers who have callouses on their fingers may not be able to use fingerprints. So for those people, they need to think outside the box.
Derek wants to know how secure cellphones are today versus 20 years ago. Leo says that they are secure because of digital networks that are encrypted. Back in the 90s, cell phones were analog, making them really easy to eavesdrop and "snarf." It was even possible to clone them. But just because you have digital security, doesn't mean you're completely secure. Law enforcement can pay a small fee and get the meta data from your wireless company via a pen register request. Also, there's GPS data, super cookies, and social interaction.
Joe just got a router and wants to know if he really needs firewalls anymore. Leo says no. Joe could turn on the Windows firewall, but any third party firewall isn't really needed because the router is essentially a "dumb box" that prevents attacks from incoming traffic.
Teri bought a Mac a few years ago and needs to know if she's subject to the recall. Leo says go into 'About This Mac', and on the fourth tab, she can click on it and check to be sure she's available for the recall.
Steve is worried he's being spied upon online. He gets a popup on his 4G data connection that says "network may be monitored by a third party." Leo says that's exactly what Superfish has been doing. Certificates get issued by various browser authorities like Google. If he doesn't like it, then he should try another browser.
Leo had talked to Mark Goodman, the author of a book called "Future Crimes," who is a former LAPD officer that got roped into computer forensics early on. This book is a good look at where we stand right now in global security and what we can do about it. One of the reasons Leo wants to recommend the website, FutureCrimesBook.com, is because there's a really good section of it called "The UPDATE Protocol." This echoes things Leo has said for a long time on the show, and it's all in one place.