Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data

In a special holiday episode, Liz and Geoffrey take a look at some recent security stories in more detail, from surveillance databases facilitating identity theft to unexpected facial recognition at concerts to changes in the meaning of social network activity. They also discuss how to properly secure high-value apps on your phone and some of their own plans to improve their security over winter break.

Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data episode art

Continue reading for the show notes and complete transcript...

Built-in dangers: physical ports, OS defaults, and remote access

From the fancy new USB-C or Thunderbolt ports on your laptop to the software and settings that came with your operating system, there are a lot of potential security concerns with recent computers. Liz and Geoffrey finish up their series on desktop and laptop security by looking at some of the latest threats - and why computers with old-style USB ports aren't much safer. Plus, some new scams to avoid and the scoop on some juicy internal Facebook documents.

Built-in dangers: physical ports, OS defaults, and remote access episode art

Continue reading for the show notes and complete transcript...

Malware, antivirus, and safe downloads

Malware, viruses, worms, adware - whatever you call them, you don't want them on your computer. But how do you keep them away? We take a look at the surprisingly involved process of downloading software from a trustworthy source, as well as the history of why desktop OSes are so vulnerable. Also, Liz talks Geoffrey out of running for office in Japan.

Malware, antivirus, and safe downloads episode art

Continue reading for the show notes and complete transcript...

Backups

Backups are an important part of keeping your devices secure - as mentioned last episode, backups not only help with lost devices but also let you easily and confidently wipe a compromised computer and get back to work quickly. Liz and Geoffrey take a look at different types of backups, including cloud versus local backups.

Backups episode art

Continue reading for the show notes and complete transcript...

Physical attacks to your computers and disk encryption

Liz and Geoffrey are back with a look at physical computer security - just how much trouble could someone cause if they got access to your laptop for a few minutes? - and what sorts of problems disk encryption can and cannot solve. Also, security issues at popular social media services cause trouble for 90 million Facebook users and every Google+ user.

Physical attacks to your computers and disk encryption episode art

Continue reading for the show notes and complete transcript...