Credit and debit card security

An important part of your personal digital security is making sure your credit and debit cards are secure. In this episode, Liz and Geoffrey take a look at how attackers clone credit and debit cards, how newer cards resist these attacks, whether it's safer to use mobile payment apps, and how to keep an eye on your credit reports. Also, cell phone carriers continue to sell your location data, and phishing attacks against accounts with two-factor auth have become more powerful.

Credit and debit card security episode art

Continue reading for the show notes and complete transcript…

Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data

In a special holiday episode, Liz and Geoffrey take a look at some recent security stories in more detail, from surveillance databases facilitating identity theft to unexpected facial recognition at concerts to changes in the meaning of social network activity. They also discuss how to properly secure high-value apps on your phone and some of their own plans to improve their security over winter break.

Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data episode art

Continue reading for the show notes and complete transcript…

Built-in dangers: physical ports, OS defaults, and remote access

From the fancy new USB-C or Thunderbolt ports on your laptop to the software and settings that came with your operating system, there are a lot of potential security concerns with recent computers. Liz and Geoffrey finish up their series on desktop and laptop security by looking at some of the latest threats - and why computers with old-style USB ports aren't much safer. Plus, some new scams to avoid and the scoop on some juicy internal Facebook documents.

Built-in dangers: physical ports, OS defaults, and remote access episode art

Continue reading for the show notes and complete transcript…

Malware, antivirus, and safe downloads

Malware, viruses, worms, adware - whatever you call them, you don't want them on your computer. But how do you keep them away? We take a look at the surprisingly involved process of downloading software from a trustworthy source, as well as the history of why desktop OSes are so vulnerable. Also, Liz talks Geoffrey out of running for office in Japan.

Malware, antivirus, and safe downloads episode art

Continue reading for the show notes and complete transcript…

Backups

Backups are an important part of keeping your devices secure - as mentioned last episode, backups not only help with lost devices but also let you easily and confidently wipe a compromised computer and get back to work quickly. Liz and Geoffrey take a look at different types of backups, including cloud versus local backups.

Backups episode art

Continue reading for the show notes and complete transcript…