Security and Privacy

Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.

Does antivirus software keep PCs safe?

Episode 1450

Alan from West LA, CA
Antivirus symbol

Alan wants to know if an antivirus utility is any good anymore for malware. How about on a mobile device? Leo says that all too often, an antivirus leaves people more vulnerable because most malware is a zero day exploit. Antivirus can't stop users from themselves, either. All antivirus utilities have to hook themselves into the OS at a very low level and the virus can actually use that as a door to more exploits. So at the end of the day, an antivirus really is only of limited benefit.

Processor Flaws Give Hackers Access to Your Data

Episode 1452

Processor

2018 brought about the news that every processor built in the last ten years have a flaw in them that could give hackers access to sensitive data. Initially believed to affect just Intel processors, the latest is that this affects every single processor made, regardless of platform.

The flaws utilizes a technique called "processor speculation," which enables the processor to speculate what the user will do next in order to accelerate performance. But the feature also gives hackers access to sensitive L2 cache data like passwords. It's especially true for networks.

Processor Hack Affects All Computers Made in Last Ten Years

Episode 1451

Processor

The latest exploit "Spectre" affects every single chip made in the last ten years. At first, security researchers thought that the exploit only affected Intel processors, but it turns out this hack also effects ARM, AMD, and any other processor that uses speculative prediction. The white hat hackers who found the flaw discovered that you can use it to access valuable data including passwords and other information. Leo says that Microsoft has already pushed out a fix, and Apple's High Sierra has patched the vulnerability with a recent fix. Apple has also patched the iPhone and iPad.

15% Report Email or Social Media Account Have Been Taken Over

Episode 1443

Hacker

According to a recent study funded by Google, 15% of users have reported that their email or social media account was taken over due to phishing scams. Leo says that over 25 million users were bit by an email phishing scam, while about 35,000 were victim to keystroke loggers. Leo says that this is the season for scams and that users may get emails from the "IRS" or even phone calls demanding personal information. It's always a scam and users shouldn't fall for it.

Reaper Botnet Has Been Growing and we Don't Know What It's For

Episode 1440

Computer

There's a botnet called "Reaper" that has been growing at an alarming rate. It's a network of compromised devices, mostly routers, that is likely in the millions. We don't know who is doing this, or who's controlling it, and we can't stop them from doing it. It's sophisticated enough that it could be a nation and not just an individual. We still have no idea what it could be used for, either.

Read more at wired.com.

Why can't I remove Norton?

Dean from Thousand Oaks, CA

Episode 1441

Dean installed Norton but he's having trouble with it. Leo says that Windows 10 has Defender built in and it's probably running. Antivirus software won't work well when there's more than one antivirus installed. So Dean should remove the Norton one with the Norton Remove tool. If he has trouble using the removal tool, he should run in Safe Mode with Networking. That will prevent additional drivers from loading and should make it easier to remove it. He should also make sure he uses the right removal tool. Norton has several different ones depending on the utility it is.

Are YubiKeys accessible for the blind?

Episode 1433

Tom from New Hampshire
YubiKey

Tom wants to know where he can find a YubiKey, and whether or not it's accessible for the blind. Leo says they are accessible, and he can get it at yubico.com. This is a little USB device that plugs into a USB port, and the computer sees it as a keyboard. The YubiKey will light up, and then press the button on the key. Just make sure the cursor is in the correct field that it will need to fill, and it will fill in the password. This doesn't work for an iPhone, however, because it doesn't have a USB port.

How can I be safe using a Wi-Fi hotspot?

Episode 1430

Joe from New Jersey
Tiny Hardware Firewall

Joe wants to know about the Tiny Hardware Firewall. Leo says it's a clever solution for those who want to use open Wi-Fi hotspots safely. Tiny Hardware Firewall will give him an additional layer of protection by encrypting all of his Wi-Fi traffic with a virtual private network. Leo adds that it also adds another layer called the Black Hole Cloud service which gives users their own cloud server. This makes it lightning fast. The Tiny Hardware Firewall is about $35, plus a fee for their VPN, which could be about $100 a year.