Reacting to the recent SolarWinds hack by Russia, the US has created a new Cybersecurity for Emerging Technologies agency. Leo says that it will largely focus on security and diplomacy.
Don's friend has a PC that got infected and scammed by someone who took control of her PC by remote access. What can she do? Leo says that all hacking attempts are designed to scare her and get her to act without thinking and call a number. Once they have her on the phone, they can use a series of tricks to get her to think she'ss infected. Then, they charge her to "fix it." Leo says that odds are, the computer wasn't infected, but certainly is now thanks to the remote access hack.
Chris bought a new HP Envy laptop a few months ago and he's not all that impressed with it. It's nice, but he is having issues with a wandering cursor that opens things up and moving around. It looks like someone has connected to it and done something. But when he steps in front of it, it stops. Leo says that it's likely the computer has a remote access trojan on it and someone is hunting around. When he steps in front of the webcam, it stops. So that tells Leo someone is playing around.
After getting a phishing scam email, Karen ran a malware scan with Windows Defender and it found a "severe threat" called a Trojan-Downloader. Windows Defender blocked it, but is she still compromised? Leo says that everyone gets those, and it's not a side effect of a virus on your system. So if Defender found one and blocked it, you're safe from it.
Leslie thinks she's been hacked after she called Apple and gave them remote desktop control. Leo says that wasn't Apple. Leo suggests backing up her data and then wipe the computer completely. Do the same to the iPhone. Then create a new iCloud account and just start over. Leo would also recommend talking to her phone company about a new phone number. Ask them for a PIN number on the account.
Matt's mom got bit by a remote access scam and he's gotta clean up her computer to make sure it's secure. Leo says it's a common scam designed to get one to launching the "event launcher" which will show "red x's", which Leo says are perfectly normal. But if she doesn't know that, it'll make her think there's something wrong with her computer. But there isn't. Then they'll try and get her to give them a credit card to pay to fix it remotely. That gives them her credit card. Once that's done, they'll tell her they need remote access.
Randy's credit cards and bank cards have been hacked and stolen. He uses different companies. Did they steal his card numbers because of shopping online? Leo says to look at the common thread. Leo says to look at the common thread. Someone clearly got to where Randy keeps all those numbers stored. So they may have hacked into his Amazon account or his Google account. Make sure those numbers are blocked. The good news is, that his credit card companies will be monitoring it and will warn him. They will then lock the card and reissue them.
This week, Twitter got hacked, compromising verified user accounts. Leo says it's a big deal, and a little weird, because the Tweets started with BitCoin accounts and spreading out to other verified users. It was all wrapped around "giving back" bitcoin to communities, buy offering a two for one deal on sending bitcoin. A complete hoax. But then, other verified users started to tweet it, including Joe Biden, Bill Gates, Apple, and Elon Musk, clearly indicating that Twitter had been hacked.
Bill noticed his cable bill was higher than it should be. So he tried to use the online chat feature to get support. About an hour later, he discovered that his password had been changed by the support people, and he also learned that his account was hacked by the support person. Leo says that Bill should report them right away. He did and has not received any reply. What's his next step? Leo says that what Bill will want to do is go to all his accounts that use that email and reset passwords. It's a hassle to be sure, but a must.
Dave says his 10-year-old Mac got hacked, and his Apple ID password was changed. But he can't use his iPad until he verifies it. So he can't use it at all. Leo suggests wiping the old Mac drive and reinstalling the macOS. Also, change the User ID password. Dave will have to call up APPLE to reclaim it.