Hostageware – Part 1 What we’ve been predicting for a year now has finally come to pass. The most pernicious malware today immobilises an infected computer, encrypts its files and then demands a ransom to release them. If not paid within 12 hours or so, the computer’s content gets obliterated. To make sure the hapless victim gets the message, a bright red clock begins the count down. Being right is over-rated 🙁 So, what can you do? How can you protect yourself now and in the future? Listen in! And when you’re ready, click here for Part 2!
Hostageware – Part 2 What we’ve been predicting for a year now has finally come to pass. The most pernicious malware today immobilizes an infected computer, encrypts its files and then demands a ransom to release them. If not paid within 12 hours or so, the computer’s content gets obliterated. To make sure the hapless victim gets the message, a bright red clock begins the count down. Being right is over-rated 🙁 So, what can you do? How can you protect yourself now and in the future? Listen in! In case you missed it, you can click here for Part 1!
Windows 10, Android, and Phone OS How important are OS updates? Very! Updates add features, which is great, but they also improve security by patching holes, reinforcing different areas, etc. So, how do the various smart phones stack up against each other in that regard? The answer might surprise you, but here’s a hint: the #1 smartphone out there has the worst time getting its updates out to users because of two major roadblocks! In this hour, we talk about not only this, but Jonathan throws us a quick story on the latest scammer to call him from “Microsoft”!
First off, if you need help with making a password? Jonathan’s Patent Pending Password Algorithm™ is here to help! Take a phrase that you say a lot like “May The Force Be With You” or “The Quick Brown Fox Jumped Over The Lazy Dog.” Take the first letter off of each word, and only capitalize the first letter. So, Mtfbwy or Tqbfjotld. Add your favorite number at the end, then an exclamation point or something else. Mtfbwy1! or Tqbfjotld9!. Split it in half, and put in the initials for whatever you’re contacting in between. So, for Bank of Hawaii? You could use MtfBOHbwy1 or TqbfBOHjotld9. Using this formula, you’ll have the same password for every site you go to, but have a unique password for every site! Next, if you shop on Amazon, they have enabled a new security feature! Two-Factor Authentication means the bad guys need more than just your password to do bad stuff with your account! In addition to your password, Amazon will make use of your cell phone by either texting you a security code or letting you use an authenticator app. Want to set it up? PC World has an easy article on how to do it. http://www.pcworld.com/article/3006262/security/how-to-protect-your-amazon-account-with-two-factor-authentication.html
Need to know a little self-defense against scammers posing as charities? Arm yourself with some knowledge kung-fu to keep the scammers at bay! For a great primer about charity scams, the FTC has a great page for everyone to read! http://www.consumer.ftc.gov/articles/0074-giving-charity Find out if the charity or fundraiser must be registered in your state by contacting the National Association of State Charity Officials. http://www.nasconet.org/ Check if the charity is trustworthy by contacting the Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar. http://www.bbb.org/charity http://www.charitynavigator.org/ http://charitywatch.org/ http://www.guidestar.org/ How to report a scam: https://www.ftccomplaintassistant.gov/
SCAMS! Scamming scammers! Nefarious ne’er do-wells! They’re back once again! Listen in as Jonathan shares his latest experience, and talks about what we can do about it!
CISA! Talk about a Halloween episode! First we had scams, now we have scary legislation in the form of CISA! What is it? Will it do what its supporters claim?