Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
For years, Leo has advocated using the password vault Last Pass to guard your passwords. But this week, Last Pass got bought by Log Me In, which Leo says doesn't have the best track record regarding software security. There are other options out there, so Leo isn't backing off the need for a good Password vault. But whether it will be Last Pass? Only time will tell. Meanwhile, Leo is using KeePass.
Word is that Log Me In bought Last Pass and Leo says that it casts some doubt on whether Last Pass will be able to remain the password vault he trusts. Only time will tell.
T-Mobile user data was acquired by hackers this week when credit bureau Experian was compromised. Hackers got customer names, addresses, drivers licenses, social security numbers and more. According to T-Mobile CEO John Leger, 15 million people including new applicants requiring a credit check from September 1st, 2013 through September 16th, 2015 were affected. Customers will get two years of free credit monitoring and identity resolution services from Experian.
Jordan has a website and wants to be able to change servers without having to change his email address. Leo says that's what GMail is great for. All he has to do is go into settings and setup mail forwarding to a standard Gmail account from his domain name. That way if it changes domains, his email still goes to the same place.
Elizabeth wants to undo whatever her nephew did to her PC after he came to visit. He's got mad computer skills and she caught him rummaging around her computer without her permission. Leo recommends backing up her data, formatting the hard drive and reinstalling Windows from a known good source. That way any modifications he's made will be wiped out.
John is getting phone calls about unusual activity on his computer. He was told it was from Microsoft. Leo says it's a scam, and it's usually done by actual tech support people who moonlight with phishing scams through the Microsoft Event Viewer. The idea is to get users to see the "red x's" that are actually normal events in the viewer. They fool people into to giving them their credit card, charge them $300, and then they use the remote access to install malware on the system.
John has his laptop set to auto updates, but his laptop shows that no updates have been installed. Leo says that there's no need to rush to that conclusion. If he's upgraded to service pack 1, then he has them all. Failed updates will cause updates from not being able to add anymore. So if he has a failed update, then google "microsoft troubleshooter windows update." He'll find how tos on how to remove the stuck update and then he can reinstall it. Not unusual, but he really should fix it. Blocked updates will prevent him from updating his OS, and that's a bad thing.
Anthony shares his internet access with a tenant who wants hardwire access to the modem. Leo says that makes it difficult to isolate, and he'll need a second router, or better yet, a third router. He should segment them on the network so that the tenant doesn't have access to Anthony's data. Leo recommends checking out PracticallyNetworked.com for how to do it.
Murray wants to know if he needs to install an antivirus for Windows 10. Leo says no. Windows 10 has its own antivirus that is automatically turned on called Windows Defender. But also, viruses spread so fast that antivirus software can't really keep up. It can't protect against 'zero day' exploits. Antivirus is really only a backup. The first line of defense is online behavior. The number 1 priority should be to keep the computer updated.