Cyber security chat
Chat with cyber security expert David Kennedy, co-founder of Binary Defense Systems and former National Security Agency employee.
3rd & 7 37yd
3rd & 7 37yd
B
S
O
close
close

-





-
-
-
-
I just made a big mistake with my laptop. I clicked on what I thought was a valid update but down loaded a Trojan virus. A computer friend tried to help me get rid of the malware but it didn't work. Luckily I don't think we ever used it for banking as it was my sons. I have since taken the batter out and unplugged it. I don know what to do next. We don't have to use it but I hope they didn't get any important data. Any advice? Thank you.
-
-
Greetings Michelle - my recommendation would be to reload the computer with a fresh copy of Windows on it. If it's Windows 7 or above, this is pretty easy to do by (good article here: www.pcworld.com The information on the system is likely compromised, so if there were any passwords stored there, would recommend changing them. Also limiting what your son from having administrator level rights would prohibit the attackers from gaining access to the entire computer. Once you reformat and reload the operating system, the Trojan will be safely removed =)
-
-
-
-
-
I believe they will be saving this for review lateron so you can come back. The link is: live.newsnet5.com
-
-
Drew - yep, most of them are pretty solid. I recommend not using them over public wifi or untrusted networks. If you are just using the normal Internet from Verizon/AT&T (commonly known as GSM/LTE/CDMA) that's fine as well to use it over those.
-
-
There's a few steps - hashing is good because its one way vs. two way (encryption). It takes encryption key exposures out of the equation. There are a few things to protect against when it comes to secure coding practices. First - use the Open Web Application Security Project (OWASP) as a reference guide to protect against common application flaws (like SQL injection, etc.), also minimizing customer data and it's locations decreases the footprints. Stringent access control and other methods are good practices to limit the amount of exposure from malicious insiders.
-
-
Apple Pay and Google Wallet are very solid. Apple Pay specifically uses tokenization which means your credit card is never passed that a hacker could use. I think Apple Pay will continue to be adopted more widely as time progresses. We should see a lot of adoption soon.
-
-
Android devices actually show you what permissions an application is requesting and if its excessive - allows the user to determine. Apple is a bit different because they limit what API's and permissions they have access to inherently. Doesn't mean that they aren't still excessive however there's a decent review process at Apple ahead of time before it goes into the App Store. If you are using Android, would recommend reviewing the permissions that it's asking for and determining whether its acceptable - for Apple, you are kind of at the discretion of them.
-
-
-