Malware, viruses, hacks, and anything else that may compromise your identity online, computer, or digital device.
Security and Privacy
Twitter sent an email to its 330 million users recommending that they change their passwords. This is because of an error that caused user passwords to be stored unencrypted and in plain text. While this was a big flaw, Twitter is being praised for disclosing the information immediately so users can take action to protect their accounts.
Bill has had a problem with a popup saying he needs to update his Flash. Leo says that's a phishing scam designed to get him to install Malware. Luckily, Windows Defender usually sees it and removes it because it's an old tactic. But if it didn't, it may be really difficult to get rid of the malware. Usually, the best thing to do is backup his data, format the hard drive, and then reinstall and update Windows. Never accept gifts from strangers. He shouldn't download from someone he doesn't know. He should always go directly to the source if he thinks he needs to update something.
Jim called in to talk about how the Department of Homeland Security is monitoring not only the free press, but also bloggers, podcasters, and vloggers. Jim wonders if he should use a VPN as a hedge against that. Leo says that while anonymizing his content is a natural reaction, and while a VPN could be a useful tool, but it's not a privacy tool. In fact, encrypting his traffic shines a light on him more than just being a part of the "background noise." Also, a VPN only encrypts the traffic along the way.
Now that pin numbers have been associated with credit cards via the chip, the major credit card companies have announced that effective today, they will no longer require a signature when using a credit card. Leo says that's not only not surprising, but merchants rarely check anyway. But those who do, can still require it for their own records.
Adam bought an iMac from a private seller. It still had Apple Care and he had it transferred to his name. He's worried that there was a keylogger on it and his credit card was compromised. Leo says that unless he wiped the computer himself, he won't know if it's compromised or not. Leo says that it's probably not the Mac, but just in case, Adam should wipe the drive himself. It's really easy to wipe an iMac drive and reinstall the OS. It could be that Adam's iCloud account has been compromised.
Julie wants to get an Echo, but her husband is worried about privacy and eavesdropping. Are they safe? Leo says it's about as safe as a smartphone. Anything that has a microphone that's connected or broadcasts with a radio can be listened to quite easily. Alexa is always listening, that's true, but it's only listening for the wake word "Alexa," and then whatever follows that for up to 2 minutes. It won't widen the scope until the magic word is uttered. Then it sends the request to the home office for an answer. Can it incidentally record?
Steve forgot the password on his all-in-one Windows 10 machine. Leo says that can be a serious problem in Windows 10. But since Steve used his Microsoft account to log in, he can change the Microsoft password and he should be able to make it work. Microsoft also has a utility called MSDaRT, which has a feature called Locksmith Wizard that will reset his Windows 10 password. Third party utilities include PC Unlocker.
Dan's computer was damaged and Acer is going to replace it, but he's worried about the data on it. How can he wipe the data? Leo says that there's a program called DBAN - Darik's Boot and Nuke that can wipe the drive pretty thoroughly. But Dan should understand that an SSD doesn't format the way a spinning hard drive does, and there can and will be some data leak, where someone could grab the data if they're really motivated.
David uses a bunch of different browsers and everyone wants to save his passwords. It seems easier, but he says that it fills in the wrong password often. Leo says that's probably because David has multiple password managers and they are fighting. It's like antivirus software. It's best to have just one. Relying on the browser saving passwords isn't safe because that's not their main business and many have security flaws. David should use one password manager like LastPass, and it will input the right password.
Leo says that Fred is right to be concerned about the security of sending emails because the contents of the messages can be read along the way. If the email is going from one Gmail address to another, however, it would be secure. Ultimately, though, Leo doesn't recommend sending attachments at all. Opening attachments is how most people end up getting infected, and it doesn't just affect that person either. It will spread to all of that person's contacts, affecting their family, business, and the internet as a whole.