DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation o…
Hackers speed off with Ferrari data in a #ransomware attack. See how to stop an attack before it happens, with Greg Edwards, CEO @Canauri
If you use a managed service provider (MSP) to manage your company's IT needs, learn how to hold these businesses accountable for keeping your services, and your data, secure from hackers. With Yaniv Bar-Dayan, CEO of @vulcancyber
Uber just had another data breach. Learn from their mistakes, and the mistakes of other larege corporations, to find out how to keep your data safe and secure, even if you store it in the cloud. Our guest is cybersecurity expert and CEO of Dig Security, Dan Benjamin.
Hackers are using the recent Twitter breach, combined with the other 4,100 data breaches in 2022, to steal identities. Learn about new systems like #DSPM to mitigate your company's sprawling data. With Flow Security CEO, Jonathan Roizin.
Hackers stole Samsung's customer data from a US-based facility. Were you affected? What sis Samsung disclose? What should you do? With guest Javvad Malik, Lead Security Awareness Advocate at KnowBe4.
Phishing attacks have evolved. Hackers have found new ways to use private messaging apps, personal email accounts, and personal smartphones to attack- not just you - but your employer. Keep your job, and get a FREE voucher for SlashNext, by listening to this episode.
Why do you wear a seatbelt? Is it because of protection, or the penalty for not doing it? Adopt the culture of cybersecurity for both of these reasons. Hear why from our guest, cybersecurity researcher and author, Kai Roer.
Serious vulnerabilities have just been patched in Apple products. If you own an Apple iPhone, iPad, or Macbook, listen to this episode to find out what happened, and what to do.
Preparing students for success in a digital world requires educators, administrators and parents to, directly and indirectly, educate students. With digital education expert Al Kingsley.
What is the future of education, and how does cybersecurity impact Education differently? How can student data be used to help predict the future success of a student, and how can universities keep student information private in the world of sophisticated cyber-attacks? Our guest is Dr. Punya Mishra, Associate Dean of Scholarship & Innovation and Professor in the Division of Educational Leadership & Innovation in the Mary Lou Fulton Teachers College at Arizona State University. You can learn more about him at https://punyamishra.com/ and about his current work around Learning Futures at https://learningfutures.education.asu.edu/ and Silver Lining for Learning silverliningforlearning.org
If you are a customer in Connecticut, you should to understand this. But if you sell to any customers in Connecticut, you NEED to understand this.
New report from Trend Micro details how hackers steal your money and your passwords. Learn how to stop them.
Ransomware has become a mature industry, and it is waging war on vulnerable companies with cash in the bank. Find out what you can do, with cybersecurity expert and @CybriUSA CEO, Konstantine Zuckerman.
Ransomware is increasing, and it is the worst form of data tampering. Find out new ways to understand, detect, and prevent data tampering before it impacts your home or your office.
Experienced developer and educator Bobby Davis, Jr. simplifies the process of landing your first cybersecurity job in 5 simple steps.
Learn how your small or medium-size business can be more productive and resilient using the cloud.
Learn how to Get your first cloud-security certification to start your career in Cybersecurity!
Learn how to get a job in cybersecurity from cybersecurity head-hunter Martin Burnett.
You open your laptop, and find that you have been locked out by ransomware. Do you have a plan? If not, learn how to make one in as little as 15 minutes.
A new Malware package named Silver Sparrow is infecting *all* Macbooks, not just the new 'M1 Chip' Macbooks. Find out more on episode 43 of @DIYcyberguy with Intelligence Analyst Brian Donohue from the security firm Red Canary.
The reported Clubhouse app 'hack' was not a hack at all. Find out why they were banned in China.
WordPress sites can be easily exploited by hackers. If you own one of the 455M WordPress sites worldwide, find out how to protect your site on this episode of @DIYcyberguy.
Don't let hackers steal your credit card information. Find out the latest hacker traps, and how to avoid them while shopping online with Cyber Threat Expert Steve Ginty.
The computers that we use to count votes in America are safe and secure. Hear why from cyber-warfare expert Jonathan Couch.
Backing up your data is critical, whether you are running a business or running a household. In this episode, find out how to get help - who to call and what to ask, with cybersecurity expert Mohit Tiwari, CEO of Symmetry Systems.
Understand the problem with a security code through a text message, and what to do about it.
You probably have apps on your phone that are no longer being patched for security vulnerabilities. These abandoned apps put you at risk. Find out what to do on episode #36 of @DIYcyberguy with cybersecurity expert Joe Carson, author of Cybersecurity for Dummies.
What is 'surveillance-ware?' Why is it bad, and how do you remove it from your smartphone? Find out on this episode of DIY Cyber Guy.
Software development sounds daunting, but taking the first step to learning how to code is easier than you think. Find out how on this episode of @DIYcyberguy
Hackers have never been more depraved - attacking hospitals and labs that are fighting Covid19. Learn valuable tips on how protect your home or your business with Konstantine Zuckerman, CEO of Cybri.
Images of you and your kids can be manipulated and exploited - how to remove these images from the internet.
More than 500 police departments across the USA have partnered with Ring Doorbell (an Amazon Company) to create a new kind of widespread surveillance system. What you need to know, and what to do about it.
Over 200 apps are breaking in the new mac operating system, 'Catalina.' Easiest fix: simply do NOT upgrade to Catalina until the problem is solved.
If you share reminders and to-do lists in the iPhone app called 'Reminders,' there are two important reasons why you may *not* want to upgrade to the new iOS13, yet. Also, an update on iOS13 security issues.
Finally, the beginning of a set of standards for the digital age that is as easy to use as “Common Sense Media.” The DQ Institute this week launched the DQ Global Standards Report 2019 which is the world’s first attempt to define a global standard for digital literacy, skills and readiness across the education and technology sectors. With Digital Citizenship Expert David Ryan Polgar.
Recently a letter signed by 50 psychologists was sent to the American Psychological Association (APA) accusing psychologists working at tech companies of using “hidden manipulation techniques” and asks the APA to take an ethical stand on behalf of kids. Is this malicious intent on the part of tech giants, or is it just a design that worked too well? Here to talk about this today is Denise Lisi DeRosa, an online safety consultant, speaker and the Founder of Cyber Sensible.
Can you imagine having to tell your customers that the product they bought from you is gone? Their account is gone? Their data is gone? Would your business survive? Exactly that happened to a a company called VFEmail this week. How can you make sure your small business - or your home - is doing the basics to prevent critical loss? Our guest is cybersecurity expert Dr. Dale Meyerrose, President of the The MeyerRose Group.
In this episode, we tell you about the rise of a new kind of credit card skimmer that can steal your credit card number at the gas pump. But this is different in two ways: it is inside the pump so you cannot see it, and the stolen cards are retrieved via Bluetooth which is easier for the thief. This hack is spreading fast because the clock is ticking on the hackers. Our guest is cybersecurity expert Scott Schober.
In this episode, we discuss the worldwide impact of blockchain from the perspective of a person who advises governments – George Goognin. George is a Board Member of the Mile Unity Foundation, which educates governments and enterprises on how to apply blockchain technologies. George is the co-founder of peer to peer loan system Karma, and he is vice chairman of the Russian Parliament Blockchain Experts Chamber. He is *not* a Russian government official, be he is an advisor to the governments of Russia, China, South Korea and others.
Spear phishing. It's when a hacker crafts an email or social media post designed to get you to click a link or open an attachment. And it is the most prevalent threat to both business and personal computers today. According to the FBI, it is also the method that hackers used to create the infamous hack of the Democratic National Committee (DNC) during the 2016 Presidential election. Find out what you can do about this and other threats with my guest, John Czupak- President and CEO of ThreatQuotient,
Another major hack is in the news; this time it is Reddit. If you have a username and password on Reddit, even if you have been using a pseudonym, listen to this episode for tips and tactics to keep yourself safe online.
Do you want to find our more about your family history by doing a DNA test, or maybe you want to give a DNA test as a gift? You need to know which testing companies protect your DNA data (and which do not)! Our special guest is Jules Polonetsky, CEO of the Future of Privacy Forum.
What's The Difference Between Cryptocurrencies and Initial Coin Offerings? The answer may surprise you. Listen to Blockchain compliance expert Diana Adachi before turning your money into ether!
Blockchain could have as great an impact on communication and culture as the Internet itself. Find out why, and what you need to know about blockchain, with technology expert Ari Zoldan.
Did you know that 60% of small businesses that get hacked go out of business in less than 6 months? It's true, and it's avoidable. Listen to expert tips from cybersecurity guru Peter Clay.
The most vulnerable part of cryptocurrency is blockchain, its the individual's private key. How do you protect yours, and how do you keep hackers from staling your funds? Listen to this episode for expert advice from blockchain expert Dr. Serhii Yelchenko.
This week on DIY Cyber Guy, my guest is cybersecurity and privacy expert Dr. Chris Pierson. We look at a recent Amazon Dot vulnerability that sent out 16-second recordings of conversations in people’s homes. Also, hackers figure out how to easily use an expired hotel room key to actually make a master key - we will tell you how to check to make sure your hotel is safe before you check in.
Ransomware. It is the virus that actually makes money for the attacker. At first, it was randomly deployed, just like the nuisance viruses of the past, indiscriminately finding victims through phishing and spoofed websites. But the game is changing, as the Georgia cities of Atlanta and Savanna found out the hard way. Special Guest, Cybersecurity expert and Mile2 Cybersecurity Trainer, Michael Kaplan.
Companies that offer free services, like Facebook and Twitter, are for-profit companies. So where is the profit if the service is free? It could be in an 'upsell' product, like LinkedIn, which means that some useful features are not available in the free version of the product and require a subscription fee to access. Another common profit model is to collect and sell your data, which is one of the ways Facebook makes money. My guest to discuss this issue, and many more, is Dan Lohrmann, Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. and an internationally recognized cybersecurity leader, technologist, keynote speaker and author. He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency.
This week, I had the privilege of interviewing a real hacker about how hackers hack. Their tools, tactics, and tricks – and we will tell you exactly how to protect yourself and your family. Our guest is Moe Sani, who has been an “ethical Hacker” for over 14 years. He began hacking at age 15, and has worked as a hacker and penetration tester for several companies around the world – and he is on DIY Cyber Guy today to talk about his experience, and how to avoid the UN-ETHICAL hackers. Also – the city of Atlanta was (literally) taken hostage buy a particularly aggressive rent somewhere attack. Lord and Taylor and Saks Fifth Avenue lost 5 million credit cards. Landlords are also getting hacked – or at least taken – by cryptominers. We also talk about tax-season hacks and how to protect yourself. We also are recommending Frozen PII (www.frozenpii.com) to anyone who wants to protect themselves from identity thieves. And much more.
This is still a terrible time to buy a new computer! Why? Uncertainty around Intel’s latest Spectre fix, plus a series of back-doors were just discovered in AMD chips. Wait to buy a computer, if you can – this episode explains why. Also, Microsoft is back-peddling on its March 13, 2018 update because it may cause your compute to crash – among other reasons. HP Printers are still being used to penetrate your network, and we will tell you how to make sure you are not at risk. And, believe it or not,even Vape Sticks are not safe from hackers (seriously). Plus, we answer lots of listener questions. Remember to send your questions to questions@diycyberguy.com