Alan is a huge Samsung fan but keeps hearing that iPhones are more secure. Is that true? Leo says that they're both very secure, though Android phones are encrypted at the software level, while iPhones use a hardware secure enclave to keep encryption keys. Apple's iTunes store is more secure than the Play store only because it has a tougher standard for approving apps. But if the Pentagon approves Android phones for use, that is a pretty good seal of approval. Having said that, users can "sideload" third-party apps if they turn off the security feature.
security and privacy
Microsoft says that a recent zero-day flaw has been patched in 92% of servers. But Leo says that doesn't mean that a bad guy hasn't gotten into the system before it was patched. So they could still be compromised.
A new study indicates that both Apple and Google phones share data with companies every four minutes, causing potential privacy concerns. According to the Irish study, Google phones dial home more often than iOS devices. However, Leo takes it with a grain of salt, as the study doesn't break down what the data really is. Location? Activity? And what else is new about smartphones? That's how they work. So Leo says that the headline is more "scare quotes," and the payoff really isn't.
Kyle is working from home and wants to beef up his home network security. Leo says that Kyle's work is probably using "endpoint security," which uses software on Kyle's computer to protect him. So he wants to be careful not to compete with that. Being on a home network with IoT devices, though, could be a weak link.
Ed rented a car recently and it came with Apple CarPlay. Is that secure? Leo says it is because Apple makes it really difficult to break encryption. You just want to be sure to remove your device after you're done with the car rental. Select "Forget Device." Or don't use the car's internal telematic systems. Just the CarPlay.
There's also a setting in Apple CarPlay that says "do not copy my contacts" to the car. Make sure you enable that so your contacts won't get transferred to the car's hands-free system.
Lori googled how to remove remote access apps on her Mac, and she was able to remove them after Apple walked her through it. But she's worried that she didn't get it all. Leo says that if Apple took them off, it's a good chance Lori is fine. It's easy to get paranoid about a computer because it does a lot of things we don't understand. The only concern is that when Lori gave the original technician remote access, that he could've installed something else she doesn't know about. If she's really worried, she can always back up her data, format her hard drive, and then reinstall macOS.
After getting a phishing scam email, Karen ran a malware scan with Windows Defender and it found a "severe threat" called a Trojan-Downloader. Windows Defender blocked it, but is she still compromised? Leo says that everyone gets those, and it's not a side effect of a virus on your system. So if Defender found one and blocked it, you're safe from it.
Glen wants to know if ransomware can happen if you unplug your backup from the network. Leo says not until he plugs it back in. But it's less likely with a home-based system than say, a commercial network. So clean up the infected computer before reconnecting the backup, otherwise, it could infect it. A lot of ransomware also has time-released capability. It may not infect right away. So if Glen has backup unplugged from the network, he should keep it that way until he's wiped the hard drive and removed the ransomware.
Dwayne wants to know more about virtual private networks. Leo says that VPNs essentially burrow an encrypted tunnel through the internet so that nobody can see what you're doing online. It's ideal when you're at a coffee shop and want to stay secure and private. People can see you're online, but not what you're doing.
Dan wants to encrypt all his data, so nobody can ever see it once he's gone. He already uses VeriCrypt and BitLocker. But he also has DVDs with image files and he wants to encrypt them. ISOs? Leo says that Dan can create ISOs of his DVD data. You import the data onto your hard drive and then destroy the DVD. Then you can encrypt the files using VeriCrypt or BitLocker the hard drive.