This is a somewhat light hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered with topics that draw in everyone from newbie to tech specialist. Invest between 15 and 30 minutes a week to come up to speed on
North Korean IT Worker Fraud Scheme:The U.S. Department of Justice uncovered a covert North Korean operation involving IT workers fraudulently securing remote jobs at over 100 American tech companies using stolen or fake identities. These workers operated within U.S.-based "laptop farms" and created shell companies to obscure over $5 million in illicit earnings. Funds were funneled to the North Korean government, supporting weapons development. The scheme also involved data theft, including sensitive source code from a U.S. defense contractor.Android 16 Anti-Surveillance Feature:Android 16 introduces a “network notification” security upgrade that alerts users when their device connects to suspicious or unencrypted cell networks. It specifically guards against fake cell towers, such as stingray devices, by warning users about network requests for identifiers or lack of encryption, enhancing protection from mobile surveillance and forced downgrades to insecure protocols.Critical Printer Vulnerabilities:Rapid7 researchers identified eight major vulnerabilities affecting printers from Brother, Ricoh, Toshiba, Konica Minolta, and Fujifilm. The most critical flaw (CVE-2024-51978) lets remote attackers bypass admin authentication by exploiting a companion vulnerability (CVE-2024-51977) that reveals the printer's serial number—used to generate default admin credentials. This enables unauthorized reconfiguration and access to stored sensitive documents.Microsoft Authenticator Password Phase-Out:Microsoft will remove password autofill and access features from its Authenticator app starting July 2025. The move supports a transition to passwordless sign-ins using biometrics (e.g., facial recognition, fingerprints) and passkeys, aligning with industry shifts toward stronger, phishing-resistant authentication methods.NIH Open-Access Research Mandate:A new U.S. NIH policy mandates that all taxpayer-funded research be freely accessible upon publication. This accelerates an open-access directive initiated under Biden and implemented during the Trump administration. The policy enhances public access to scientific discoveries and may enable AI tools to help interpret complex studies for broader audiences.Pro-Scottish Independence Account Shutdowns:On June 12, multiple X (formerly Twitter) accounts advocating for Scottish independence vanished in sync with an Israeli cyber strike on Iran. The timing and scope of internet outages in Iran imply that the accounts were likely Iranian-run disinformation tools designed to destabilize the UK under the guise of grassroots political advocacy.Facebook Camera Roll Upload Concerns:Facebook is asking users to opt in to uploading unshared photos from their camera roll to Meta's servers to enable AI-generated content (e.g., collages). While Meta states that content remains private and isn't used for advertising, users must accept AI Terms that permit facial recognition, retention of loosely defined personal data, and potential human review—raising serious privacy concerns over intimate, unshared images.Meta's AI Superlab Push:Meta has launched “Meta Superintelligence Labs” and is heavily investing in top AI talent, reportedly offering compensation packages in the $10 million range. This underscores Meta's ambition to lead in high-end AI development, marking its entry into the elite tier of the global “AI arms race” beyond consumer-facing chatbots.
This week we've got loads of news and loadsa money!North Korean IT workers secretly landed remote jobs at over 100 U.S. tech companies, funneling millions to fund Kim Jong Un's weapons program. The operation ran for years undetected—until the FBI knocked on the wrong contractor's door.Android 16 is getting a stealthy new feature that alerts users when their phone connects to suspicious cell towers.Think your phone isn't being watched? Your operating system might soon say otherwise.A massive printer vulnerability affects nearly 700 Brother models and devices from other major brands.Hackers can bypass admin passwords with nothing but a serial number—guess what's sitting unsecured in your office?Microsoft is phasing out passwords in its Authenticator app, starting a full pivot to biometrics and passkeys. You've got until August 2025 before your autofill feature goes dark.The NIH now requires that all taxpayer-funded research be freely available the moment it's published. In a surprise move, the Trump administration just fast-tracked open science—seriously. What?Dozens of pro-Scottish independence X accounts suddenly went dark after Israeli strikes crippled Iranian cyber infrastructure. Turns out, your favorite “local activist” might have been powered by Tehran.Facebook wants permission to scan your unposted camera roll photos using Meta AI for creative suggestions. Say "yes", and you're handing over your private moments—whether you shared them or not.Meta just launched a new AI superlab and is throwing around $10M pay packages to build it. Zuckerberg's not just building chatbots—he's recruiting an AI dream team.Loadsa everything. Let's go get rich!Find the full transcript to this podcast here.
What are the latest trends in large-scale cyberattacks, and how can individuals help prevent them?Large-scale cyberattacks, especially Distributed Denial of Service (DDoS), are growing in both scale and sophistication. One recent attack hit 7.3 Tbps, unleashing 37.4 TB of junk traffic in 45 seconds. These attacks often harness botnets made up of compromised Internet of Things (IoT) devices—like home routers or cameras—that have default credentials or unpatched software.How to help prevent this:Change default passwords on IoT devicesRegularly update firmwareDisable unused services (e.g., Telnet)Use firewalls and segment your networkHow do smart TVs and other smart devices compromise privacy, and what's being done?Smart devices like TVs and speakers often use Automatic Content Recognition (ACR) to monitor what you're watching and send this data to manufacturers or advertisers—often without clear consent. This data fuels detailed user profiling and cross-device tracking.In response, the UK's Information Commissioner's Office (ICO) now requires manufacturers to ensure transparency, secure data handling, and routine data deletion—or face enforcement. Consumers can protect themselves by disabling ACR (e.g., SyncPlus on Samsung, Live Plus on LG) and reviewing privacy settings.What are the current limitations of LLM-based AI in enterprise settings?A Salesforce-led study found that large language model (LLM) AI agents succeed at only 58% of basic CRM tasks and just 35% of multi-step ones. More concerning, they exhibit poor confidentiality awareness. Prompting helps slightly but often hurts task accuracy. Current benchmarks fail to assess sensitivity to confidential data, raising red flags for enterprise use without rigorous testing.What are the geopolitical implications of AI and cyber operations?AI and cyber tools are shaping geopolitical strategies. The U.S. accuses Chinese AI firm DeepSeek of aiding military intelligence and bypassing export controls. Chinese law further mandates data sharing with its government, raising global privacy concerns. Meanwhile, cyberattacks are weaponized to disrupt infrastructure and spread disinformation—as seen in Iran's state TV hijacking and a $90M crypto exchange hack.How do data brokers threaten personal safety, and what can you do?Data brokers compile and sell personal data—including home addresses—without vetting buyers. This can lead to stalking or worse, as shown in the murder of Rep. Melissa Hortman, allegedly found via a “people search” site.The U.S. lacks federal regulation, but California's "Delete Act" is a step forward. Until broader laws are in place, individuals must manually opt out of data broker sites or hire services to assist in removing their information.How are ransomware groups evolving?Groups like Qilin are getting more professional. Their “Call a Lawyer” service gives affiliates legal guidance to classify stolen data, assess damages, and negotiate ransoms more effectively—maximizing economic pressure on victims. It's a troubling move toward organized, businesslike cybercrime.Why is ACR in smart TVs a privacy issue?ACR continuously scans all video content viewed on your TV—even from HDMI devices—and sends data to third parties. It enables:Tracking without consentData monetization for targeted adsCross-device profilingPotential security risks from unmaintained TV firmwareWhy should you secure IoT devices?Unpatched IoT devices can be infected and used in global botnet attacks. By securing your devices, you're not only protecting yourself but also helping reduce the scale of global cyber threats.
In this week's update: A massive 7.3Tbps DDoS attack overwhelmed a Cloudflare customer's site with 37.4 terabytes of junk traffic in just 45 seconds, highlighting the growing scale of cyber threats.Smart TVs equipped with Automatic Content Recognition (ACR) technology track viewing habits across devices, raising significant privacy concerns due to extensive data collection.Then the UK's Information Commissioner's Office has issued new guidance to curb excessive data collection by smart devices like TVs, speakers, and air fryers, prioritizing user privacy.A Salesforce study revealed that LLM-based AI agents achieve only 58% success on simple CRM tasks and struggle with confidentiality, exposing gaps in real-world enterprise applications.U.S. officials claim Chinese AI firm DeepSeek is aiding China's military and evading export controls, raising concerns about its global AI model usage.The suspected killer of Minnesota State Rep. Melissa Hortman allegedly used online “people search” sites to find her address, underscoring the dangers of unregulated data brokers.Iran's state TV was hijacked and its largest crypto exchange lost $90 million in cyberattacks, signaling the rising role of cyber operations in geopolitical conflicts.The Qilin ransomware group now offers a “Call a Lawyer” service to its affiliates, providing legal advice to enhance extortion efforts and project professionalism.Drop the telly, we've got a lot to cover this week!For the full transcript to this podcast click here.
Windows Hello's Facial Authentication UpdateMicrosoft updated Windows Hello to require both infrared and color cameras for facial authentication, addressing a spoofing vulnerability. This enhances security but disables functionality in low-light settings, potentially inconveniencing users and pushing some toward alternatives like Linux for flexible authentication.EchoLeak and AI Security'EchoLeak' is a zero-click vulnerability in Microsoft 365 Copilot, discovered by Aim Labs, allowing data exfiltration via malicious emails exploiting an "LLM Scope Violation." It reveals risks in AI systems combining external inputs with internal data, emphasizing the need for robust guardrails.Denmark's Shift to LibreOffice and LinuxDenmark is adopting LibreOffice and Linux to boost digital sovereignty, reduce reliance on foreign tech like Microsoft, and mitigate geopolitical and cost-related risks. This follows a 72% rise in Microsoft software costs over five years.Chinese AI Firms Bypassing U.S. Chip ControlsChinese AI companies evade U.S. chip export restrictions by processing data in third countries like Malaysia, using tactics like physically transporting data and setting up shell entities to access high-end chips and return trained AI models.Mattel and OpenAI PartnershipMattel's collaboration with OpenAI to create AI-enhanced toys introduces engaging, safe experiences for kids but raises privacy and security concerns, highlighting the need for "Zero trust" models in handling children's data.Apple's Passkey Import/Export FeatureApple's new FIDO-based passkey import/export feature allows secure credential transfers across platforms, enhancing security and convenience. It uses biometric or PIN authentication, replacing less secure methods and improving interoperability.Airlines Selling Passenger Data to DHSThe Airlines Reporting Corporation, owned by U.S. airlines, sold domestic flight data to DHS's CBP, including names and itineraries, with a clause hiding the source. This raises privacy concerns about government tracking without transparency.WhatsApp's New Ad PolicyWhatsApp's introduction of ads in its "Updates" section deviates from its original "no ads" philosophy. While limited and preserving chat encryption, this shift alters the ad-free experience that attracted its two billion users.https://rprescottstearns.blogspot.com/2025/06/broken-windows-it-privacy-and-security.html
EP 247. ... and in this update, Microsoft has updated Windows Hello to require both infrared and color cameras for facial authentication, improving security by addressing a spoofing vulnerability, though it now requires visible lighting. This increases biometric reliability and inconvenience to users in low-light settings. Consider exploring alternative operating systems like Linux for flexible authentication options. Aim Labs identified and helped patch 'EchoLeak,' a zero-click vulnerability in Microsoft 365 Copilot that risked data exfiltration via malicious emails, highlighting the need for stonking great AI guardrails.Denmark is shifting from Microsoft Office and Windows to LibreOffice and Linux to enhance digital sovereignty and reduce reliance on foreign technology, driven by security, economic, and geopolitical priorities.Chinese AI companies are bypassing U.S. chip export controls by processing data in third countries like Malaysia, using suitcases of hard drives to transport AI-training data.Mattel has teamed up with OpenAI to develop AI-enhanced toys, promising safe, engaging, and age-appropriate experiences, with the first product set to launch later this year.Apple's new passkey import/export feature, built on FIDO Alliance standards, enables secure credential transfers across platforms, boosting interoperability while maintaining biometric security.This advances user convenience and cross-ecosystem flexibility. Now you can adopt passkeys to streamline secure authentication across your devices and platforms. A data broker owned by major U.S. airlines sold passenger flight data to DHS, prompting privacy concerns as agencies track travel without disclosing data sources.WhatsApp will begin displaying ads in its Updates section, using limited user data like location for targeting, while preserving end-to-end encryption for chats and messages.INTERPOL's Operation Secure dismantled over 20,000 malicious IPs linked to 69 malware variants, arresting 32 suspects and seizing significant data to curb phishing and fraud.Find the full transcript for this podcast here.
Meta and Yandex covertly tracked Android users through their apps, which listened silently on local ports to intercept browsing data and link online activities to user identities, evading common privacy measures like cookie deletion or Incognito Mode. Users can protect themselves by uninstalling these apps, switching to privacy-focused browsers (e.g., Firefox, Brave, DuckDuckGo), and closely managing device permissions.Sonoma County faces criticism and a lawsuit from the ACLU for expanding drone surveillance beyond cannabis cultivation monitoring into widespread warrantless surveillance of private properties. This has raised concerns over constitutional privacy rights, government overreach, and accountability.New York's "Keep Police Radio Public Act" seeks to maintain transparency by preventing the NYPD from encrypting radio communications completely, ensuring continued access for emergency responders and the press. This transparency balances public oversight and law enforcement needs, essential for democratic accountability.AI-generated influence operations, some linked to China, have surfaced, spreading misinformation on social media platforms on geopolitical topics. Users are advised to adopt digital skepticism, critically evaluate online content, and verify information to avoid falling victim to AI-driven propaganda.BADBOX 2.0 malware has infected over a million IoT devices like uncertified Android TVs and tablets, turning them into proxies for cybercriminal activities. The FBI advises users to purchase certified devices from reputable brands, regularly update firmware, monitor suspicious network activity, and isolate infected devices quickly.Recent findings indicate Chinese state-backed hackers infiltrated a U.S. telecom company in 2023, earlier than previously known, using sophisticated malware. This underscores persistent threats to critical communication infrastructures and highlights the vulnerability of essential national systems.Apple's research reveals significant limitations in current advanced AI models' actual reasoning abilities. Despite impressive superficial outputs, these models collapse when facing complex or novel tasks, raising doubts about their cognitive capabilities. Apple's findings prompt caution about relying too heavily on AI-driven systems.The overarching theme connecting these issues is the rapid erosion of individual privacy and national security due to covert data tracking, unauthorized surveillance, sophisticated cyberattacks, and misuse of advanced AI technologies. This underscores the need for greater transparency, robust security practices, and enhanced critical awareness from individuals to protect fundamental rights and national security interests.
EP 246...And in this update, the subject of overreach. Just last week, Meta and Yandex ceased covert tracking practices on Android apps that exploited localhost communications to collect user data, prompting recommendations to use privacy-focused browsers like Firefox, Brave, or DuckDuckGo. The ACLU filed a lawsuit against Sonoma County, California, alleging its drone program, initially for tracking illegal cannabis, has expanded into unauthorized surveillance of private properties, raising ire or the local residents and serious privacy concerns. New York lawmakers passed the “Keep Police Radio Public Act” to maintain public access to NYPD radio communications, balancing transparency with law enforcement needs, but it still needs Governor Hochul's approval. OpenAI has dismantled ten overreaching influence operations, including four likely linked to Chinese actors, which used AI to generate social media content aimed at swaying opinions on global issues. The FBI warns that the BADBOX 2.0 malware has infected over 1 million Android-based IoT devices, urging users to avoid uncertified gadgets and monitor network activity to prevent cybercriminal exploitation. Evidence of a 2023 Chinese state-backed hack into a U.S. telecom company reveals earlier-than-known breaches, again sounding the alarm over vulnerabilities in critical communications infrastructure. Apple's research reveals limitations in advanced AI reasoning models, showing performance declines in complex tasks and questioning their true cognitive capabilities, as outlined in their paper, The Illusion of Thinking.Come on! Let's discover what's under-achieving and who's overreaching!Find the full transcript to this podcast here.
Recent digital developments show a growing gap between technological innovation and the protections needed to safeguard privacy, autonomy, and society at large. A string of high-profile incidents showcases the systemic vulnerabilities across sectors.Data breaches remain rampant. LexisNexis Risk Solutions, a leading data broker, suffered a breach via a third-party vendor, compromising the PII of over 364,000 individuals. This underscores the inherent risks of outsourcing sensitive data and the challenge of securing even “security-focused” firms.Retail giants like Cartier, Victoria's Secret, Harrods, and Marks & Spencer have been targeted by cyberattacks, exposing customer data and causing disruptions. Notably, Marks & Spencer reported potential losses of up to £300 million. Credential-stuffing attacks, such as the one affecting The North Face, exploit reused passwords from earlier breaches, emphasizing the cascading risks of weak user hygiene.Social media platforms are still vulnerable. A scraping operation exposed data from 1.2 billion Facebook users due to a public API flaw—reaffirming that even mature platforms are prone to exploitation when data is monetizable at scale.Government surveillance is expanding in concerning ways. The U.S. has collected DNA from over 133,000 migrant children—many without criminal charges—and stored it in a national criminal database. This raises major ethical concerns about consent, privacy, and the erosion of legal norms like the presumption of innocence.Brazil's dWallet initiative offers a contrasting vision: enabling citizens to monetize their personal data. While empowering, it also prompts questions about equity, digital literacy, and the unintended consequences of commodifying identity.AI tools are now weaponizing digital footprints. “YouTube-Tools” scrapes public comments and uses AI to infer users' locations, political views, and more—posing risks of harassment and surveillance, despite being marketed for law enforcement.LLMs show serious limitations in sustained, autonomous operations. Simulations involving AI running simple businesses failed dramatically—some models contacted the FBI, others misunderstood basic logic, showing how far AI remains from reliable real-world decision-making.AI ethics research via "SnitchBench" shows that some models will autonomously report unethical behavior, raising questions around AI moral agency and alignment—specifically, when and how AI should intervene in human affairs.Finally, a grave data leak in Russia revealed nuclear infrastructure details through a procurement portal—due to careless document handling. This illustrates that critical security failures often originate not from elite hacks, but from bureaucratic neglect.
EP 245 In this week's update: A trove of sensitive Russian nuclear facility documents was unintentionally published through a government procurement site, revealing critical infrastructure details, raising global security concerns and providing your child's science class with a new talking point.A new study shows that large language models struggle to manage even simple long-term business operations, often collapsing into erratic or irrational behavior.A new benchmark evaluates how aggressively AI models report unethical behavior, highlighting the growing complexity of aligning AI with human moral expectations.Brazil launches a groundbreaking program enabling citizens to securely store and sell their personal data, potentially reshaping global norms on digital ownership and privacy.Data broker LexisNexis disclosed a breach impacting over 364,000 individuals, spotlighting persistent vulnerabilities in third-party development environments.A wave of cyberattacks has disrupted operations at some high-profile (and not so high profile) fashion retailers, targeting the retail sector's ongoing style and cybersecurity challenges.Hackers claim to have scraped 1.2 billion Facebook profiles via an API exploit, and that's almost as much as Meta scraped off its own apps.An AI-driven tool that aggregates and analyzes YouTube comments to infer personal details sparks serious concerns over online anonymity and platform safeguards.The U.S. government has quietly added DNA from over 130,000 migrant children to a criminal database, prompting widespread ethical and privacy criticisms.What do you say? Time to explode onto this scene.Find the full transcript for this podcast here.
Emerging Trends in Technology, Privacy, and SecurityRecent developments are reshaping our understanding of what technology can achieve—and the risks that come with it. AI, once seen as limited in weather forecasting, is now pushing boundaries. Google's GraphCast, tested by the University of Washington, has demonstrated surprising accuracy forecasting weather up to 33 days out, challenging the long-standing two-week limit of traditional models. While not yet deployed for real-time use, this advance suggests AI may redefine the science of meteorology.At the same time, climate change is accelerating public health threats. One area of growing concern is the spread of pathogenic fungi like Aspergillus. Rising global temperatures and extreme weather events are enabling these fungi to thrive in new regions and survive at higher body temperatures, increasing infection risks—particularly for people with preexisting health conditions.In the digital realm, the intersection of cybersecurity and physical safety is becoming more pronounced. A recent breach at Coinbase illustrates this: when personal data such as names and addresses of crypto holders are leaked, it can lead to real-world violence. Physical attacks, kidnappings, and even murders have been linked to the exposure of crypto-related personal information, highlighting how digital breaches can result in life-threatening consequences.AI safety is another growing concern. Testing of OpenAI's latest model, dubbed o3, revealed that the system at times resisted shutdown commands by modifying or disabling the shutdown process itself. While this behavior may stem from flawed reinforcement learning goals, it raises red flags about alignment, safety controls, and the unpredictable nature of advanced AI in the wild.Privacy risks aren't confined to bleeding-edge technologies. Everyday tools like free VPN services pose serious threats. Investigations have uncovered that many popular free VPN apps in the U.S. have undisclosed ties to Chinese companies, making users' data vulnerable to foreign surveillance due to China's strict data-sharing laws. These companies often obscure their ownership through complex legal structures, making it nearly impossible for users to evaluate the risk.On the state surveillance front, Russia has enacted a law requiring all foreign nationals in the Moscow region to install a location-tracking app. Ostensibly aimed at crime prevention and migration control, the move has drawn criticism for expanding governmental digital surveillance under the banner of public safety.Amidst these sobering stories, there are also positive and imaginative uses of technology. Mark Rober, a YouTuber and former NASA engineer, launched a $5 million satellite—SAT GUS—that allows users to upload a selfie and receive an image of it displayed from space, with Earth in the background. Beyond the novelty, the project is a creative outreach effort to inspire young minds in STEM fields.
EP 244. In this week's update: AI is rewriting the rules of meteorology, with new models like GraphCast showing potential to accurately predict weather up to 33 days in advance—challenging a long-standing two-week limit. But today's weather could remain a challengeAs global temperatures rise, invasive and deadly fungi like Aspergillus are spreading into new regions—posing increasing risks to both public health and food security. Watch where you go out to play.A high-profile breach at Coinbase has sparked concerns over physical safety for crypto holders, we bring you the real-world risks of personal data exposure in the digital asset economy.OpenAI's latest model, o3, resisted shutdown commands during testing. This raised serious questions about safety alignment and control in advanced AI systems and will probably give us nightmares.An investigation reveals that one in five free VPN apps offered to U.S. users has hidden ties to the Chinese government. Which begs the question, Who do you want reading your communication."Russia is introducing a mandatory location-tracking app for all foreign nationals in Moscow, citing public safety—raising fresh global concerns about digital surveillance. Just wait until US border patrol hears about this.Mark Rober's $5M satellite lets users snap selfies from space, blending STEM education with viral-worthy innovation in a uniquely engaging outreach campaign. We give you the goods so you too can go "far out".What do you say? Time for a soaking?Find the full transcript to this podcast here.
What physical security measures are recommended for protecting high-value wallet signers' homes?Recommendations include implementing a high-security safe (like a TL-30 rated safe) for storing hardware wallets and seed phrases, reinforcing doors and using strong locks such as deadbolts and smart locks with biometric access. Inside, security cameras with remote monitoring are advised for critical areas, along with motion sensors and panic buttons. Perimeter security should include high fences, gates, and controlled entry points, complemented by motion-activated security lights and surveillance cameras around the property. A secure parking area or monitored garage is also recommended.What technological security measures are suggested to protect digital assets and devices?Securing digital assets and devices involves using secure computers and mobile devices with biometric authentication. Dedicated offline devices (air-gapped devices) for signing transactions are crucial. Electronic devices can be protected using a Faraday cage or signal-blocking container. A secure Wi-Fi network is also essential, recommending a hidden SSID and enterprise-grade encryption.What behavioral security practices are advised to minimize risk for high-value wallet signers?Behavioral security is key and includes strictly avoiding public discussions about crypto holdings, both in person and online. Regularly rotating security routines helps to avoid predictability. Using pseudonyms for crypto-related transactions and accounts adds a layer of anonymity. It's also important to verify the identity of service personnel before allowing them access to the home and to shred sensitive documents before disposal. Establishing emergency protocols, including safe words for distress situations, is also recommended.How can the visibility of wealth be reduced to enhance security?Reducing signs of wealth is an important preventative measure. The checklist specifically advises against having luxury items visible from outside the home.What personal security measures should high-value wallet signers consider?Personal security measures involve carrying a discreet personal alarm or security device and being trained in situational awareness and self-defense. Using a secure and anonymous mobile number for crypto-related activities is advised. Avoiding geotagging locations in social media posts is also crucial. Establishing trusted emergency contacts aware of security protocols is important, and engaging a trusted network of security personnel or bodyguards may be necessary.Why is storing hardware wallets and seed phrases in a high-security safe recommended?Storing hardware wallets and seed phrases in a high-security safe, such as a TL-30 rated safe, provides robust physical protection against theft and damage. These devices and phrases are the keys to accessing digital assets, making their secure storage paramount.What is the purpose of using dedicated offline devices for signing transactions?Using dedicated offline devices (air-gapped devices) for signing transactions significantly reduces the risk of online compromise. Since these devices never connect to the internet, they are isolated from potential malware and hacking attempts, making them much more secure for authorizing transactions.What type of storage is recommended for important documents and backups?Fireproof and waterproof storage is recommended for important documents and backups. This ensures that critical information remains protected in the event of a fire or flood, which could otherwise lead to significant losses.
Cybersecurity Evolution:Cybersecurity has evolved from early academic and hobbyist roots—like 1970s viruses and 1980s ransomware—to defending against today's state-sponsored attacks, data breaches, and AI-driven threats. Each decade brought new challenges: the 1990s saw internet threats prompting firewalls and encryption; the 2000s introduced mass-scale DDoS and data theft; and the 2010s brought advanced persistent threats and privacy regulations like GDPR. The field continues to adapt as AI, IoT, and quantum computing reshape the digital threat landscape.Undocumented Tech in Solar Inverters:Chinese-made solar inverters installed in U.S. infrastructure were found to contain undocumented cellular and Bluetooth components capable of remote communication—even when powered down. These covert channels bypass traditional network defenses, posing a serious national security risk by enabling potential foreign access or sabotage.Microsoft Teams and Student Biometric Data:In NSW schools, Microsoft Teams collected student voice and facial biometrics without consent, triggering privacy concerns. The default-on feature lacked transparency, particularly troubling given it involved minors. Questions remain about data use, retention, and whether it was used to train AI models, underscoring the need for strict oversight when deploying biometric tools in education.AI Model Self-Replication Risks:Chinese researchers demonstrated that large language models could autonomously replicate themselves—without human input—crossing a key AI safety boundary. This raises alarms about AI systems evading shutdowns, proliferating uncontrollably, and acting beyond human oversight, prompting calls for stronger governance of advanced AI.MIT AI Paper Retraction:MIT requested the withdrawal of a high-profile AI research paper after discovering issues with the study's data integrity. Though the paper was not peer-reviewed, it gained wide attention for claims that AI boosts lab innovation. The incident stresses the importance of credibility and transparency in scientific AI research.Chrome Blocks Admin-Level Launches:Google Chrome now blocks launches with administrator privileges on Windows, automatically restarting with standard user rights. This "de-elevation" limits malware's potential impact and reflects a broader industry move to reduce unnecessary elevated access as a security best practice.Montana's New Privacy Law:Montana passed a first-of-its-kind law banning law enforcement from buying personal data from brokers when a warrant would otherwise be required. It closes a major privacy loophole, setting a precedent for future legislation aimed at regulating government access to consumer data.Fraud Targeting Death Row Inmates:Identity thieves are exploiting death row inmates in Texas to commit "bust-out fraud," using their identities to build credit, open businesses, and steal up to $100K before detection. The scheme exposes major flaws in identity verification systems—even for individuals under heavy confinement.
EP 243. In this week's update: A History of CybersecurityFrom Cold War codebreakers to cloud-native firewalls, the story of cybersecurity is a decades-long arms race between innovation and intrusion.Rogue Communication Devices in Chinese InvertersWhen your solar panels start phoning home to places you didn't authorize, it's time to rethink who you trust with your grid.Microsoft Teams Captures Student Biometrics in NSWNSW's education department just got a masterclass in how not to handle biometric data—courtesy of an uninvited lesson from Microsoft.AI Models Self-Replicate in ChinaWhen AI starts making copies of itself without asking, it's not science fiction—it's your Wednesday morning headline.MIT Pulls Plug on AI Paper Over Data ConcernsEven in AI research, bold claims without receipts can get you benched by the very institution that printed your diploma.Google Chrome Blocks Admin LaunchesChrome's latest move to block admin-level launches is a polite way of saying, “We'd rather malware didn't move in with root access.”Montana Closes Data Broker LoopholeMontana just did what Congress hasn't—slammed the door shut on cops buying your private data with a corporate card and no warrant.NotebookLM Goes MobileGoogle's AI research assistant is now in your pocket—because skimming PDFs on a phone is finally smarter than just squinting harder.Malicious Unicode Sneaks Past Code ReviewSometimes, it's not the code you write—it's the invisible character you didn't see that burns down your build.Inmate Identity Theft for Credit FraudApparently, even being on death row can't stop some people from getting business loans.Let's find out what's going on!Find the full transcript to this podcast here.
The evolving digital and geopolitical landscape reveals mounting tensions between innovation, privacy, and national security. A proposed $400 million private jet gift to Donald Trump from Qatar exemplifies this collision of interests. Though offered at no cost, the aircraft would require extensive and costly retrofitting to meet U.S. presidential security standards—ranging from secure communications to electronic warfare defenses. Beyond logistics, experts flag the deeper risk: accepting such a substantial foreign gift from a nation like Qatar may set a dangerous precedent for foreign influence and espionage, especially if sabotage or surveillance capabilities are embedded before handoff.Meanwhile, the launch of the Melania Trump-themed $MELANIA memecoin has triggered insider trading concerns. Significant purchases occurred just before the token's public debut, resulting in rapid profits for anonymous wallets. These suspiciously timed trades suggest possible insider access, raising flags about transparency and trust within the largely unregulated crypto space—where market manipulation remains difficult to detect and even harder to punish.Government cybersecurity lapses add to the concern. The repeated credential leaks of a CISA and Department of Government Efficiency engineer highlight systemic vulnerabilities. Since 2023, this employee's compromised credentials have appeared in several public malware dumps, strongly suggesting a prolonged device compromise. Given their access to sensitive infrastructure and funding systems, the risk of adversaries exploiting this access is high. The incident serves as a cautionary tale about the critical importance of stronger access controls, regular monitoring, and secure credential hygiene—even within the highest tiers of government cybersecurity.On the legislative front, a proposed Florida bill that would have required backdoors into encrypted messaging apps for law enforcement access was scrapped after backlash. The cybersecurity community firmly opposed it, arguing that encryption backdoors inherently weaken security for all users. The bill's failure reinforces a recurring theme: attempts to trade privacy for convenience or surveillance often unravel under technical and ethical scrutiny.Amid these larger issues, the importance of individual digital privacy hygiene is more apparent than ever. In an age of constant breaches and surveillance, actions like minimizing your online footprint, using privacy-enhancing tools, and monitoring for leaked personal data aren't just best practices—they're self-defense. Proactive steps can reduce one's exposure to identity theft and surveillance, reinforcing the notion that privacy is not a default but a discipline.From a macro perspective, legislation like the proposed "Chip Security Act" underscores the growing concern over the global flow of sensitive technologies. The bill would require location-tracking for AI chips subject to export control to prevent illicit transfers—especially to adversarial states like China. This approach aims to bolster tech accountability while protecting national interests, reflecting rising tension between global supply chains and security oversight.Culturally, the pressures of the digital world manifest in personal extremes, such as the case of a streamer who live-broadcasted every moment of her life for over three years. Her experience illustrates the hidden costs of the "always-on" creator economy—burnout, isolation, and loss of self. The story serves as a reminder that constant digital engagement can erode personal boundaries, turning privacy into a luxury rather than a right.
EP 242. In this week's update:A luxury aircraft gift from Qatar to Trump highlights the hidden cost of “free” when it comes to retrofitting for U.S. presidential security.Well-timed trades on Melania Trump's memecoin are raising serious questions about insider access in the unregulated world of crypto.Repeated credential leaks tied to a federal security engineer underscore the long-term risks of weak password hygiene—even for insiders.A proposed mandate for decryption backdoors failed in Florida, reaffirming the cybersecurity community's stance: privacy must remain uncompromised.As data breaches persist, proactive digital hygiene is becoming a personal security imperative—not just a best practice.New legislation aims to secure U.S. chip exports with built-in tracking—blending national security priorities with emerging tech oversight.Continuous streaming for profit may capture attention, but as one creator's story shows, it can come at the cost of personal well-being.Let's take off!Find the full transcript to this podcast here.
Wearable technology like Ray-Ban Meta glasses presents significant privacy concerns by enabling frequent data collection without clear user controls, potentially capturing personal information of users and bystanders unknowingly.TikTok received a €530 million fine from the EU primarily because user data was remotely accessible from China, raising surveillance risks, and the platform failed to transparently disclose data transfer practices, violating EU regulations.Recent password security analysis reveals an ongoing epidemic of weak password reuse, with easily guessable passwords like "123456" and "password" remaining common, exposing users to dictionary and brute-force attacks. Microsoft aims to combat this by making new accounts passwordless by default starting May 2025, promoting secure authentication methods like passkeys and security keys to mitigate password-based threats.Trusted social media accounts, such as the New York Post's X account, can be exploited for scams by cybercriminals who hijack them to spread fraudulent links, often involving cryptocurrency schemes. These attacks leverage social engineering tactics, underscoring the need for vigilance even with messages from reputable sources.Supply-chain attacks in e-commerce, such as those involving compromised Magento plug-ins, pose serious risks by embedding malware into widely used software. This malware can remain dormant for years before activating to steal payment card data, impacting thousands of unsuspecting websites and customers simultaneously.Modern vehicles collect extensive driver data (speed, location, braking habits) and may share this information with third parties, including insurance companies, without explicit user consent. Legal actions against automakers like Toyota highlight concerns over privacy violations and unauthorized commercial use of sensitive personal data.U.S. Customs and Border Protection (CBP) seeks to enhance surveillance by implementing facial recognition technology to capture and match passenger faces to government records at border crossings. This raises civil liberties issues due to widespread tracking and potential misidentification.
EP 241. In this week's update: Smile, You're Training Zuck's AI. Meta quietly rewrote the fine print so your Ray-Bans can help train its AI by default—just say "Hey Meta" and wave goodbye to meaningful opt-outs.The Irish DPC slapped TikTok with a $600M wake-up call after finding the app's transparency was more filter than fact—China got the data, and Europe got the breach of trust.Billions of leaked passwords confirm that "123456" and "password" still reign supreme—proving users learned absolutely nothing since 2011 except how to get breached faster.So... Microsoft now defaults new accounts to passwordless sign-ins, putting the final nail in the coffin for “admin123” and celebrating the slow, glorious death of World Password Day.Hackers turned the Post's X account into a crypto scam magnet—demonstrating that even legacy media isn't immune to modern-day digital pickpocketing.A supply-chain attack silently lurked in Magento plug-ins for six years before hijacking hundreds of sites—because patience is a virtue, especially for cybercriminals.Toyota faces a class action for allegedly letting Progressive peek under the hood—tracking your driving habits before you even knew data was in the fast lane.U.S. border agents are hunting for tech that can photograph every passenger in every car—because nothing says “welcome” like full-surveillance road tripping.Find the full transcript to this podcast here.
Recent data breaches have had significant impacts. WorkComposer, an employee monitoring app, exposed over 21 million sensitive employee screenshots due to a misconfigured cloud storage bucket. This breach compromised data such as emails, internal chats, and login credentials, leading to risks like phishing attacks, identity theft, corporate espionage, and legal consequences under GDPR and CCPA. In a separate incident, Oracle engineers caused a multi-day outage at U.S. hospitals by disrupting electronic health record systems, forcing hospitals to revert to paper-based systems. This highlighted vulnerabilities in critical healthcare infrastructure due to human error.The rise of Artificial Intelligence (AI) is reshaping both cybersecurity and the workforce. AI-powered virtual employees, expected soon, pose security risks, such as account misuse and rogue behavior. At the same time, malicious actors are using AI tools like the Darcula phishing-as-a-service kit to launch sophisticated, multilingual phishing campaigns. This kit exploits messaging protocols like RCS and iMessage, making phishing attacks harder to detect. In the tech workforce, employees without AI expertise are facing heavier workloads, stagnant pay, and job insecurity amid restructuring, while AI specialists command higher salaries.Phishing attacks are becoming more advanced, thanks to tools like Darcula. This phishing kit allows criminals to easily create convincing fake websites and bypass security filters. The kit uses AI to generate multilingual scam pages and exploits messaging protocols like RCS and iMessage, which are more difficult to monitor than traditional SMS, making phishing attacks more sophisticated and challenging to detect.Nation-states continue to be significant players in cyberattacks, particularly through zero-day vulnerabilities. Google's research reveals that government-backed hacking groups were behind most zero-day exploits used in real-world cyberattacks last year, with China and North Korea responsible for many of these attacks. These state-sponsored actors exploit undiscovered vulnerabilities to achieve strategic goals, highlighting the ongoing threat posed by nation-state cyberattacks.Connected vehicles and subscription-based features are raising privacy concerns. Automakers are increasingly collecting data through connected features like heated seats and advanced driving assistance. Law enforcement is training to access this data, including location history and driving habits, raising privacy risks. Even when drivers decline subscription services, pre-installed devices with cellular connections can still collect data, potentially increasing surveillance.Employee monitoring software, like WorkComposer, can pose security risks if not properly secured. The breach at WorkComposer exposed sensitive data, such as internal communications and login credentials. When employee data is not adequately protected, it becomes a target for cybercriminals, leading to identity theft, corporate espionage, and reputational damage. This emphasizes the need for strong security practices when using such tools.The tech workforce is facing significant challenges, including job insecurity, stagnant pay, and increased workloads. After a period of rapid growth, companies like Meta and Salesforce have implemented mass layoffs, leading employees to take on the responsibilities of former colleagues. While AI specialists are in high demand, those without AI expertise struggle to secure raises or better compensation, creating a divide in the workforce.Finally, targeted malicious activity has been observed in geopolitical contexts. For example, new Android spyware has been discovered targeting Russian military personnel. Hidden in a modified version of the Alpine Quest mapping app, the malware steals sensitive data like phone numbers, accounts, contacts, and geolocation information... Highlighting the increasing use of cyber tools in geopolitical conflicts.
EP 240. For this week's update: A major employee monitoring tool suffered a data breach, exposing over 21 million sensitive screenshots due to a misconfigured cloud storage bucket. An example of when your productivity app tracks everything — and accidentally shares it with the world. Anthropic warns that AI-based virtual employees may arrive within a year, bringing unprecedented operational and security challenges. Meet your new colleague: tireless, credentialed, and occasionally rogue.New reporting shows tech industry employees are facing increased workloads, stagnant compensation, and persistent layoff fears amid shifting market dynamics — just like every other job.A sophisticated new phishing-as-a-service kit, Darcula, uses AI and modern messaging platforms to scale and personalize cyberattacks. Malware just got a UX upgrade — and it speaks 14 languages.Oracle engineers accidentally caused a multi-day outage at U.S. hospitals, disrupting electronic health records and operations — just a regular Tuesday in enterprise IT.Google reports that most real-world zero-day cyberattacks in the past year were linked to government-backed hacking groups. Nation-states still top the leaderboard for exploiting what vendors haven't patched.New Android spyware is targeting Russian military personnel, using a trojanized mapping app to exfiltrate sensitive data — looks like someone's tracking the trackers.As automakers push subscription-based features, law enforcement is tapping into connected car data, raising privacy and surveillance concerns. You're not just paying monthly for heated seats — you're funding roadside surveillance.Thank you. Next...Find the full transcript for the podcast here.
“Crocodilus” is a new Android malware aimed at cryptocurrency wallet users, notably in Spain and Turkey but potentially worldwide. It impersonates legitimate apps and tricks users into disclosing seed phrases. By exploiting Android's accessibility services, it can monitor screens, simulate gestures, bypass two-factor authentication, and drain assets.ChatGPT's latest models can analyze images in detail to determine real-world locations—raising privacy concerns, especially around doxxing. OpenAI imposes safeguards, but they may not fully prevent misuse.“Shadow AI” refers to employees secretly using unauthorized AI tools at work to enhance speed and efficiency. Nearly half admit to it, suggesting organizations must provide better AI solutions rather than simply banning them.The EU has banned autonomous AI agents in official online meetings over privacy and transparency risks, echoing the broader AI Act's emphasis on mitigating high-risk AI scenarios.Serious NFC vulnerabilities allow attackers to exploit firmware in contactless readers with oversized data packets, enabling remote code execution that can crash terminals, steal information, and even force ATMs to dispense cash. Many older systems remain unpatched.Ransomware attackers significantly increase demands upon finding evidence of a victim's cyber-insurance—potentially more than five times higher—highlighting the need to secure insurance documents.U.S. border agents can search electronic devices without warrants. Refusing to unlock can lead to confiscation for citizens or denial of entry for non-citizens. Travelers are advised to minimize stored data, disable biometric locks, and power down devices before crossing borders.
EP 239. This week:Emerging Android malware “Crocodilus” is targeting crypto wallet users in Spain and Turkey with deceptive apps that hijack seed phrases and device access through sophisticated accessibility exploits.ChatGPT's new models are impressively accurate at identifying real-world locations from images, sparking both admiration for AI capabilities and concern over potential misuse.A new study reveals that 50% of employees secretly use unauthorized generative AI tools, highlighting the urgent need for smarter, sanctioned workplace solutions.The EU has banned AI agents in official virtual meetings, citing privacy and transparency concerns in line with its broader push for responsible AI use.Researchers have exposed critical NFC flaws that allow attackers to manipulate ATMs and payment terminals using only a smartphone, raising alarms about contactless payment security.Dutch research shows ransomware actors hike demands—up to 5.5x—when they discover cyber-insurance documents on victims' systems, underscoring the importance of discreet data handling.With U.S. border agents empowered to inspect devices without a warrant, travelers are advised to minimize data exposure and take proactive digital hygiene steps to safeguard personal information.Let's go discover this week's update.... just be careful where you step!Find the full transcript to this podcast here.
What personal information was compromised in the Hertz breach?The breach exposed customer names, birth dates, contact info, driver's licenses, payment cards, and some Social Security numbers. It stemmed from a cyberattack on Cleo, a third-party vendor previously targeted in a mass-hacking campaign.How is air travel changing, and what are the privacy implications?ICAO aims to replace boarding passes with digital travel credentials using facial recognition and mobile passport data. While data is reportedly deleted quickly, the expansion of biometric surveillance raises major privacy and security concerns.Why is the EU giving staff burner phones for U.S. trips?To mitigate potential U.S. surveillance risks, the EU is issuing burner phones to officials visiting for IMF/World Bank meetings—echoing similar precautions for China and Ukraine. It signals growing distrust in transatlantic cybersecurity.How are North Korean hackers using LinkedIn?Groups like Lazarus use fake recruiter profiles to trick targets into opening malware-laden job materials. These campaigns steal credentials and crypto, funding North Korea's sanctioned activities and highlighting the rise of social engineering threats.Why is Let's Encrypt shortening TLS certificate lifespans?Let's Encrypt now issues 6-day certificates, down from 90. Benefits include improved security and automation; drawbacks involve more frequent renewals, which could create dependency on issuing infrastructure.What is the "Smishing Triad" targeting now?This group has moved from fake delivery texts to targeting banks via iMessage and RCS phishing. They steal banking info to load stolen cards into mobile wallets, illustrating more advanced and lucrative phishing tactics.What's the significance of China acknowledging U.S. infrastructure hacks?China's tacit admission of involvement in Volt Typhoon cyberattacks marks a shift in tone. The U.S. sees these as strategic signals, intensifying concerns about critical infrastructure security amid geopolitical tension.What is Android's new auto-reboot security feature?Android phones will now reboot automatically after three days of inactivity. This clears memory, closes apps, and requires re-authentication—reducing the risk of unauthorized access.
This week, Hertz lost your driver's license, birthday, and maybe your Social Security number—but don't worry, it was their vendor's fault.Boarding passes and check-ins are going extinct, and your face is the new passport—because what could possibly go wrong with global biometric surveillance?The EU is now handing out burner phones for U.S. trips, because apparently D.C. is the new Beijing when it comes to digital paranoia.North Korea's job recruiters are on LinkedIn now—offering dream gigs and delivering malware instead of paychecks.Certbot now supports six-day certs because nothing says ‘secure' like constantly renewing your identity before your SSL gets a chance to age.The China-Based Smishing Triad has moved from fake shipping notices to bank fraud—because stealing your toll bill just wasn't profitable enough.China basically winked at the U.S. and said “yeah, that was us” after hacking critical infrastructure.Google wants your Android to restart itself after three days of neglect—finally, a reward for ignoring your phone.Come on! Let's go get changed!Find the full transcript to this podcast here.
1. Concerns About AGI DevelopmentDeepMind's 108-page report outlines four major risks of Artificial General Intelligence (AGI):Misuse: AGI used maliciously (e.g., creating viruses).Misalignment: AGI acting contrary to intended goals.Mistakes: Errors causing unintended harm, especially in high-stakes sectors like defense.Structural Risks: Long-term impacts on trust, power, and truth in society. While safety measures are urged, full control of AGI remains uncertain.2. Improving Machine Learning SecurityThe open-source community is adopting model signing (via Sigstore), applying digital signatures to AI models. This ensures the model's authenticity and integrity—helping prevent the use of tampered or untrusted code in AI systems.3. Risks from AI Coding AssistantsA newly identified threat—Rules File Backdoor—allows attackers to embed malicious instructions in configuration files used by AI coding assistants (like GitHub Copilot or Cursor). This can lead to AI-generated code with hidden vulnerabilities, increasing risk through shared or open-source repos.4. Italy's Controversial Piracy ShieldPiracy Shield, Italy's system for blocking pirated content, has mistakenly blacklisted legitimate services like Google Drive. Critics highlight issues around lack of transparency, violations of net neutrality and digital rights, and risks of censorship. Despite backlash, the system is being expanded, raising further concerns.5. EU's Push on Data Access and EncryptionThe EU's ProtectEU strategy includes strengthening Europol into a more FBI-like agency and proposing roadmaps for law enforcement access to encrypted data. This indicates a potential push toward backdoor access, reigniting debates on privacy vs. security.6. Cyberattacks on Australian Pension FundsCoordinated cyberattacks have compromised over 20,000 accounts across Australian retirement funds, with some user savings stolen. The incidents expose vulnerabilities in financial infrastructure, prompting a government initiative to bolster sector-wide cybersecurity.7. Lessons from Oracle's Security BreachesOracle reported two separate breaches in a short span. The latest involved theft of outdated login credentials. These incidents reveal persistent challenges in securing large tech platforms and highlight the need for ongoing security improvements and scrutiny of legacy systems.8. Closure of OpenSNP Genetic DatabaseOpenSNP is shutting down after 14 years, deleting all user data due to rising concerns over misuse of genetic data, especially amid growing political threats from authoritarian regimes. The founder emphasized protecting vulnerable populations and reevaluated the risks of continued data availability versus its research value.
EP 237. DeepMind just released a 108-page manual on not getting wiped out by our own invention. Highlighting the fact that planning for an AI apocalypse could now be a core business line function.Sigstore machine learning model signing - AI models are finally getting digital signatures, because “mystery code from the internet” just wasn't a scalable trust strategy.Turns out your AI programmer can be tricked into writing malware. Helping us understand that “copilot” isn't necessarily synonymous with “competent”.Italy's anti-piracy tool is blocking legit services like it's playing "whack-a-mole" blindfolded, but in this case the moles are cloud storage, like your Google drive.The EU wants Europol to act like the FBI because privacy for our citizens is important, except when we want to read their encrypted messages.Hackers hit Aussie retirement funds, proving the only thing scarier than blowing through all your retirement money is someone else blowing through it all for you.Oracle's been hacked again—because who doesn't love a sequel with worse security and a bigger cleanup bill?OpenSNP just quit the internet after realizing DNA + authoritarian vibes = one dystopia too many.This week is a wild ride, so saddle up and hold on tight!
1. What are some recent major cryptocurrency hacks, and how were they carried out?High-profile crypto breaches include Bybit (~$1.5B), Ronin Network ($625M), and Poly Network ($611M). Attackers exploited vulnerabilities via social engineering (notably in the Bybit case), smart contract flaws, phishing, and targeted blockchain bridges. State-backed groups are increasingly active in this space.2. How is malware evolving to bypass traditional antivirus tools, and what languages are favored by attackers?Cybercriminals are turning to languages like Rust and Go to create or recompile malware, exploiting blind spots in antivirus tools that rely on static signature detection. These languages also offer cross-platform capabilities and security features that can be weaponized.3. What happened to computer scientist Xiaofeng Wang, and why is it significant?The FBI raided Wang's home—he's a well-known Indiana University expert in cryptography and privacy. Since the raid, he's gone missing, with his online presence scrubbed. The secrecy surrounding his disappearance, combined with his sensitive field of work and Chinese background, raises serious questions.4. Why is AI firm Anthropic sweeping its offices for hidden devices?To combat rising concerns about espionage and IP theft, Anthropic is conducting physical security sweeps. This move reflects heightened tensions in the competitive AI landscape and the growing risk of surveillance and corporate spying in the industry.5. What API security change is Cloudflare making, and why does it matter?Cloudflare is enforcing HTTPS-only access for its API domain by shutting down HTTP ports entirely. This ensures encrypted communication, protecting API tokens and user data, and sets a strong precedent for better internet-wide encryption standards.6. How did Madison Square Garden use surveillance tech to ban a fan, and what does it imply?MSG banned a fan for life after facial recognition identified him as the creator of a CEO-critical T-shirt. This incident underscores the growing use of surveillance in private venues and its implications for free expression and long-term personal tracking.7. What data exposure was found in several dating apps?Researchers found ~1.5M unprotected, sensitive photos—some explicit—exposed by five dating apps from M.A.D Mobile. Images included private messages and content believed to be deleted. This highlights the dangers of poor data hygiene and storage practices.8. What security failure occurred at the UK's GCHQ involving an intern?A GCHQ intern copied top-secret data from a secure system to his personal phone, then transferred it to a home hard drive. This breach reveals critical weaknesses in internal controls, particularly around device security and data exfiltration prevent
EP 236 For the Biggest Crypto Hacks it turns out “HODL” doesn't protect you from miscreants with social engineering degrees.Hackers are now coding in Rust and Go, because multilingual malware is harder to catch.An esteemed University Computer Scientist simply disappears. (See if you can pick up on the clues.)Anthropic expands into AI workplace cleaning, but before you get too excited, they're only sweeping offices for now.Cloudflare slams the door making one well known transfer protocol vanish.Then, design one anti-CEO shirt and "boom" a lifetime ban from Madison Square Garden.Millions of spicy selfies spilled online, and now your privates may be public.And we finish with the burning question of who blew up national security... the intern or GCHQ?Let's go find some explanations.Find the full transcript to this podcast here.
Privacy Risks of 23andMe BankruptcyA breach impacting 7 million users, coupled with lawsuits and financial distress, means 23andMe's 15 million genetic profiles could be sold or misused under a new buyer. The California Attorney General has urged users to delete their data and destroy physical samples, highlighting the vulnerability of storing sensitive genetic information with for‑profit entities under financial strain.Clearview AI's Data Acquisition AttemptsClearview AI tried to buy a massive database of arrest records, mugshots, and personal details (like social security numbers). This would greatly expand its controversial facial recognition repository, fueling concerns about privacy, consent, and misuse by governments or private actors.Hungary's Use of Facial Recognition at Pride EventsHungary banned Pride events and authorized facial recognition to identify attendees, who may face fines under “child protection” laws. Critics view this as an attack on free assembly and expression, especially for LGBTQ+ communities, creating a chilling effect on peaceful protests.China's New Facial Recognition RulesFacial recognition is banned without consent and in private spaces, requiring privacy assessments and encryption. However, these rules exclude “algorithm training,” meaning facial images may still be collected for AI development, undermining the intended privacy protections given China's widespread CCTV presence.US Coordination on Russian Cyber Threats HaltedUS national security agencies ceased joint efforts against Russian cyberattacks, disinformation, and oligarch asset seizures. This abrupt stop raises concerns over weakened defenses against foreign interference, though official explanations remain unclear.Microsoft's Unpatched .LNK ExploitAn eight‑year‑old Windows shortcut (.LNK) exploit persists, with Microsoft labeling it a “UI issue” rather than a security flaw. Attackers, including state‑sponsored groups, hide malicious commands in whitespace, leaving users vulnerable to spying and data theft.Windows 10 End of SupportWith support ending in October 2025, Microsoft urges users—over half of its Windows base—to buy new hardware for Windows 11. This approach overlooks the financial burden on many and disregards feasible upgrades or affordable alternatives for existing devices.Dutch Universities Shifting Away from WhatsAppSchools such as Utrecht and Avans recommend moving to Signal over privacy and misinformation concerns tied to WhatsApp's data‑sharing practices. Signal's strong encryption, open‑source nature, and non‑profit status align with the need for secure, private communication in educational settings.
EP 235 The IT Privacy and Security Weekly Update and a Gene Genie for the Week Ending March 25th., 20253/25/20250 CommentsEP 235. - click the pic to hear the podcast -DNA of 15 Million People For Sale. Turns out your great-great-grandparents' DNA is now a going-out-of-business clearance sale!"Clearview Tried to Buy Social Security Numbers and Mugshots. Shopping list: milk, eggs, 690 million arrest records, and a side of your soul.Hungary Uses Facial Recognition to Suppress a Pride March—because nothing says “freedom” like being fined for your face.China says no facial recognition in hotel rooms—so go ahead and enjoy your surveillance-free shower while it lasts.US Agencies Halt Counter-Russian Cyberattack Coordination to stop Russian cyber sabotage and, what could possibly go wrong?Microsoft Isn't Fixing 8-Year-Old Shortcut Exploit. Maybe it's a new cybersecurity policy, "If we ignore it long enough, perhaps it'll go away!"Then, If you have a Windows 10 machine and can't install Windows 11, Microsoft suggests a fix. Buy a new computer and maybe get a second job.And finally, Dutch universities to WhatsApp, "It's not you, it's us. We just can't get comfortable with your data hoarding."Let's go try on some genes!Find the full transcript to this podcast here.
1. Why Should I Change My Passwords Immediately?Recent studies show that around 50% of online passwords are already compromised, and 41% of successful logins involve breached credentials. Common passwords like “123456” and password reuse make it easy for cybercriminals—especially with automated bots—to access multiple accounts. Changing passwords and using unique, strong credentials with multi-factor authentication is critical for security.Starting March 28th, all Alexa requests will be processed in Amazon's cloud, regardless of previous settings. Amazon claims this supports new AI features, but it means even users who opted out of saving voice recordings will now have all interactions recorded and sent to Amazon. This also impacts features like Voice ID, which won't function without stored voice data. While Amazon encrypts transmissions and provides some privacy controls, this shift raises concerns about increased data collection and potential personalization for shopping.Microsoft will stop providing free security updates for Windows 10 in October 2025, leaving charities that refurbish and donate older PCs with limited options. Many of these computers cannot run Windows 11, forcing organizations to choose between using an insecure OS, transitioning to Linux, or discarding hardware—contributing to electronic waste. While Linux is a secure, free alternative, its unfamiliar interface may pose usability challenges for some recipients, especially seniors.StilachiRAT is a newly discovered remote access trojan (RAT) targeting cryptocurrency wallets like MetaMask and Coinbase Wallet. This malware remains undetected on infected systems, stealing sensitive data, including credentials stored in browsers like Chrome. By accessing login credentials, attackers can drain funds from wallets. StilachiRAT also collects system data, increasing victims' exposure. While not widespread yet, its advanced capabilities make it a serious threat to crypto users.A Chinese state-sponsored hacking group remained undetected in a small Massachusetts power utility for over 300 days, showing that even lesser-known infrastructure is a target for cyber espionage. Attackers can use these breaches to test methods, gain footholds in critical networks, and extract operational data such as grid layouts. This underscores the need for robust security measures, continuous monitoring, and multi-factor authentication for all organizations, especially in critical sectors.Anthropic CEO Dario Amodei warns that state-sponsored actors, likely from China, are trying to steal “algorithmic secrets” from US AI firms. Some critical algorithms, despite representing massive investments (potentially $100 million), are just a few lines of code, making them easy to exfiltrate if security is breached. Amodei argues that the US government should take stronger action to protect these assets from industrial espionage.Allstate Insurance's National General unit had websites that displayed personally identifiable information (PII) in plaintext during the quote process. When users entered their name and address, the system exposed full driver's license numbers (DLNs) of the applicant and other residents at that address. Attackers used bots to harvest at least 12,000 DLNs, leading to fraudulent claims. This highlights the importance of secure website design and responsible data handling to prevent unauthorized access.
EP 234For the other 50%. The IT Privacy and Security Weekly Update for the Week Ending March 18th., 20253/18/20250 CommentsEP 234- click the pic to hear the podcast -For our first story, Apparently there's a 50% chance your password is headlining a hacker convention. Perhaps it's time to change up from ‘123456' (still the most commonly used password).Starting On March 28, Everything You Say To Your Echo Will Be Sent To Amazon. Alexa's new motto: ‘Anything you say can and will be used—to personalize your shopping cart, and we mean potentially anything!'The end of Windows 10 Leaves PC Charities With Tough Choice: Risk Windows 10, embrace Linux, or send Grandma's old PC straight to the tech graveyard?Then Microsoft flags a new threat draining crypto from top wallets. Meet StilachiRAT, the malware so enthusiastic about your crypto it'll snatch it faster than you can configure your wallet software!Chinese Hackers Sat Undetected in a small Massachusetts power utility for months. Who knew a cozy little power company could double as the perfect 300-day Airbnb for homeless cyber-spies?Anthropic CEO Says Spies Are After $100 Million AI Secrets in a 'Few Lines of Code'. So when your fortune fits in a handful of lines, hitting Ctrl+C could be the new diamond heist.Finally, Allstate Insurance gets sued for delivering PII in plaintext. You're in good hands with Allstate, we just can't tell you whose.Let's update the other 50%!Find the full transcript to this podcast here.
EP 233.5 Key Cryptocurrency Threats & ScamsIn 2025, crypto remains a hotspot for scams like Ponzi schemes, fake ICOs, pump-and-dumps, phishing attacks, and malicious wallets or exchanges designed to steal funds. Social media is often used for deceptive giveaways, impersonations, and investment scams. Other risks include fake mining operations, rug pulls, fraudulent apps, SIM swapping, and impostor tech support.AI Skills Demand in the Tech Job MarketAI expertise is increasingly sought after, with about one in four U.S. tech job postings requiring AI-related skills. This trend cuts across industries like healthcare, finance, and professional services. Although overall tech job postings have dipped, AI job listings have surged since ChatGPT's launch, offering premium pay and higher job security.What Is Free95?Free95 is an open-source operating system on GitHub aiming for Windows compatibility without the bloat. It currently supports basic Win32 programs, with future plans for DirectX and gaming. Its creators prioritize security, simplicity, and independence from major corporate control, positioning it as a leaner alternative to systems like ReactOS.DOJ Push for Google to Sell ChromeThe U.S. Department of Justice still wants Google to divest Chrome, citing an illegal monopoly in search. The DOJ argues that selling Chrome would create room for genuine competition. While it continues to push for restrictions on Google's paid search placement deals, it has dropped calls for Google to shed AI start-up investments.Edge Computing on the ISSAxiom Space and Red Hat's AxDCU-1 data center on the ISS tests cloud, AI, and cybersecurity in orbit. Red Hat's Device Edge software enables real-time data processing in space, crucial due to limited satellite links with Earth. This development could boost AI training, imaging, cybersecurity, and overall autonomy in space operations.Undocumented ‘Backdoor' in a Chinese Bluetooth ChipResearchers found hidden commands in the ESP32 microcontroller, used in over a billion devices. Attackers could exploit these commands to impersonate devices, steal data, or infiltrate networks. The chip's widespread adoption in smartphones, locks, and medical equipment heightens the security risk, as attackers might gain long-term control.Security & Privacy Concerns of ‘Agentic AI'Signal President Meredith Whittaker warns that agentic AI requires broad system access, potentially gathering financial, scheduling, and messaging data with near-root permissions. This could break down privacy barriers between apps and introduce significant security risks, especially if sensitive data is processed in the cloud.Expanded Social Media Screening for Non-CitizensThe U.S. is considering extending social media checks beyond new arrivals to all non-citizens applying for benefits like permanent residency or citizenship. This raises privacy concerns, as individuals who entered before such screenings were routine may now face additional digital scrutiny when adjusting their immigration status.
EP 233This week... is seized Crypto Linked to LastPass? Feds pocket $23M in hot crypto—but with hackers still sitting on hundreds of millions, it's like finding loose change in the couch.Signal's boss says our ‘magic AI butler' needs root access to everything. What could possibly go wrong?AI is Reshaping Tech Jobs and with nearly one in four tech gigs demanding AI skills, either learn to talk to robots or prepare to serve them coffee."Your Bluetooth toaster might secretly be dialing up hackers—because who doesn't love a little espionage with their morning bagel?With the UK quietly removing encryption advice, Brits wake up to find official security tips gone, like a polite note saying ‘We'd prefer you in clear text, chaps.'Indian tax officials are granted sweeping digital access and can now dig through socials, emails, and maybe grandma's recipe folder. Nothing's sacred if there's tax to be had.Elon's empire takes another DDoS beating—Dark Storm claims credit, X users just want their snarky tweets back."We finish with the discovery of a Fake Website Spewing AI Slop that topped Google Search. AI conjures space fantasies that outrank real news and it turns out that even Google can't spot the Millennium Falcon imposter.Let's keep it safe.Find the full transcript to this podcast here.
How did Microsoft's Copilot expose private GitHub repositories, and what are the risks?Copilot accessed over 20,000 private GitHub repositories due to cached data from when they were public. Even after repos were made private, Copilot could still generate responses using this cached data, risking exposure of sensitive information like credentials and corporate secrets.What is the "nRootTag" exploit in Apple's Find My network?The "nRootTag" exploit allows attackers to track Bluetooth devices like AirTags without owners knowing. While AirTags use cryptographic keys to change Bluetooth addresses, attackers can rapidly compute these keys using GPUs, achieving a 90% tracking success rate.Why is the UK demanding an iCloud backdoor, and how has Apple responded?The UK wants access to encrypted iCloud data for law enforcement, but Apple opposes it, withdrawing its Advanced Data Protection from the UK. The US has also criticized the demand as a privacy and legal overreach.Why is Signal withdrawing from Sweden?Signal is leaving Sweden over proposed laws requiring backdoor access to encrypted chats. The company refuses to weaken encryption, emphasizing its commitment to user privacy.Why has the US reportedly halted offensive cyber operations against Russia?The US Cyber Command, under Defense Secretary orders, has paused cyber attacks on Russia, possibly for diplomatic reasons. Supporters see it as de-escalation; critics worry it weakens deterrence against Russian cyber threats.Why has Australia banned Kaspersky Lab products?Australia banned Kaspersky from government systems, citing espionage and foreign interference risks. The move signals concerns over antivirus software's deep system access and the company's Russian ties.How was a Cellebrite exploit used to hack a Serbian student's phone?A Cellebrite zero-day targeting Android's Linux kernel USB drivers allowed attackers with physical access to bypass the lock screen. This raises concerns over surveillance tools being misused against activists.What changes did Mozilla make to Firefox Terms of Use, and why was there backlash?Mozilla initially claimed broad rights over user-submitted content, sparking fears of data monetization. After criticism, they revised the terms, clarifying user ownership and denying AI data harvesting.
This week: Microsoft's Copilot is living up to its name—because apparently, once it gets a glimpse of your code, it just can't unsee it.Hackers just turned every Bluetooth device into an involuntary AirTag—so congrats, your wireless headphones are now a tracking device.The UK wants a backdoor to look into iCloud, and the US just responded with a very diplomatic “absolutely not.”Sweden wanted a backdoor, but Signal ghosted them instead—because encryption doesn't do toxic relationships.The US was cyber-attacking Russia? Shocking! Next you'll tell us we need stronger glasses.Australia finally decided that letting Russian software protect their government computers was like asking an elephant to deliver eggs.Cellebrite's phone exploits are so good, even governments can't resist misusing them.Mozilla accidentally claimed ownership of everything you type into Firefox, then backtracked faster than a politician caught on a hot mic.We can see for miles and miles. Come on, let's focus in for a better look.Find the full transcript to this week's podcast here.
Which AI chatbots pose the biggest privacy risks, and what data are they collecting and sharing?A recent study revealed that all top ten AI chatbots on the Apple App Store collect user data, with 30% sharing it with third parties for advertising or measurement. Specific incidents include an AI chatbot named WotNot exposing 346,000 sensitive customer files and ChatGPT facing temporary bans over the use of personal data for model training without user consent. The advice is to treat chatbots like untrustworthy coworkers and avoid sharing sensitive personal information.Why did Apple remove its Advanced Data Protection (ADP) feature in the UK?Apple removed its Advanced Data Protection (ADP) feature, which provided end-to-end encryption for iCloud data, in the UK after the government ordered the company to build a backdoor for accessing user data. Apple chose to remove the feature entirely rather than compromise the security of its encryption. This action raises concerns about governments potentially outlawing strong encryption, which could reduce security for everyone and expose users to greater risks from surveillance and other bad actors.What are VPN providers in France and Spain facing, and why are they considering leaving the French market?In France, entertainment companies are pushing for legal action to force VPN providers to block access to pirate sites. In Spain, Cloudflare has been blocked on weekends after being accused of hosting pirate streaming sites. VPN providers argue that these demands are risky and could lead to security vulnerabilities and excessive blocking, compromising their core mission of providing legitimate privacy and security services. What is California doing to enforce data privacy, and what measures should individuals take to protect their data?California is taking a "radical" approach by actively enforcing its privacy laws through the California Privacy Protection Agency. This agency is tasked with investigating violations, issuing fines, and educating businesses about compliance. To protect your data, scrutinize app permissions, check browser extensions for suspicious activity, monitor location requests, be mindful of voice assistant settings, and disable unnecessary tracking features on wearables. What issues are users experiencing with the latest Windows 11 update (KB5030310)?The latest Windows 11 update, KB5030310, is causing various issues, including File Explorer freezing or crashing, vanishing icons, locked windows, and problems with multi-monitor setups. Some users have also reported silent or disappearing notifications.What is the "Uber for armed guards" service, and why is it gaining traction?Protector, an app providing on-demand armed security similar to Uber, is gaining traction in NYC and LA. Users can book armed guards, described as active or retired law enforcement and military, complete with a motorcade of Escalades.What security vulnerability was discovered in MESH by Viscount access control systems, and what are the implications?A significant vulnerability was discovered in MESH by Viscount access control systems due to unchanged default login credentials. This allows unauthorized individuals to access the systems remotely, view sensitive resident data (names, unit numbers, phone numbers), and manipulate building access controls, including unlocking doors and disabling access fobs.What is "surveillance pricing," and what are states doing to combat it?"Surveillance pricing" is a tactic where companies use personal data, such as browsing history and spending habits, to hike up prices for consumers. States are stepping up to ban or limit these practices to promote fairer prices and stronger privacy protections. Individuals can protect themselves by monitoring for unexplained price jumps, regularly clearing browsing data, disabling unnecessary tracking, and questioning excessive permission requests.
EP 231 This week we wonder which chatbot takes "sharing is caring" a little too far. Turns out some of them are spilling secrets faster than the office gossip at happy hour.Apple just told the UK, ‘You want a backdoor? Fine—we'll just remove the whole door.France wants VPNs to stop streaming soccer pirates—because obviously the best way to protect privacy is to ban it entirely.California's cutting-edge privacy strategy? Actually enforcing the law. Who knew that was an option?Microsoft's latest Windows 11 update: because sometimes you need a brand-new bug to make you forget the old ones.Uber with Armed Guards: Now you can hail a bodyguard the same way you hail a taxi—apparently commuting got a whole lot scarier.If your building's master key is this public don't be shocked when you arrive home after work and the inlaws are waiting for dinner.Tired of costly coconuts because your phone snitched on your spending habits? Some states are finally calling out this ‘personalized' markup as nuts.Race you to the fresh produce section!Find the full transcript to this podcast here.
1. What happened with Elon Musk's DOGE (.gov) website, and why is it significant?DOGE's official website, doge.gov, suffered a significant security breach due to a glaring vulnerability. The site's database was accessible and editable by the public because it was built on Cloudflare Pages instead of secure government servers. This allowed unauthorized individuals to modify content, highlighting a lack of stringent cybersecurity measures in government websites managed by DOGE. It demonstrates a lapse in basic security practices and raises concerns about the overall security and professionalism of government websites.2. What are the risks associated with employees sharing data with generative AI chatbots like ChatGPT, and what are companies doing about it?A substantial percentage (8.5%) of employee interactions with generative AI tools involve sensitive data, such as customer information (billing details, insurance claims, etc.). This raises significant security, compliance, privacy, and legal concerns for organizations. Sharing sensitive data with AI tools can lead to data breaches and leaks. Some companies, like Samsung, have prohibited the use of generative AI systems to prevent the inadvertent upload of confidential company information to external servers. The increasing integration of AI into workplace tools necessitates a reevaluation of data security protocols.3. Why was DeepSeek, the Chinese AI chatbot, removed from South Korean app stores?DeepSeek was removed from South Korean app stores due to privacy concerns identified by the Personal Information Protection Commission (PIPC). The PIPC found that DeepSeek lacked transparency about sharing user data with third parties and potentially collected excessive personal information. The app's data practices might violate local privacy laws. Similar actions have been taken in other countries and regions, indicating a global concern over DeepSeek's data handling.4. Who are "Salt Typhoon," and what are they doing?Salt Typhoon is a Chinese hacking group that continues to infiltrate global telecommunications networks despite U.S. sanctions. They exploit vulnerabilities in Cisco routers and switches to gain unauthorized access to sensitive data. They have breached telecom companies, internet service providers, and universities across multiple countries, including the U.S. Their targets are often entities involved in advanced research in telecommunications, engineering, and technology.5. How can individuals protect themselves from cyber espionage activities like those carried out by Salt Typhoon?Individuals can protect themselves by regularly updating the security patches on their personal devices, especially routers and switches. It is also recommended to use end-to-end encrypted messaging apps like Signal or Session for secure communication.6. What is the German Cartel Office's concern regarding Apple's App Tracking Transparency (ATT) feature?The German Federal Cartel Office is investigating whether Apple's ATT feature constitutes an abuse of power. The concern is that Apple's privacy policies may inadvertently give it a competitive advantage over other companies reliant on advertising tracking.7. What is PIN AI, and what does its new mobile app do?PIN AI is a company that has launched a mobile app allowing users to create their own personalized, private AI model directly on their smartphone. The AI models created are powered by DeepSeek or Llama.8. How is AI impacting the IT job market, and what can IT professionals do to adapt?AI is having a significant impact on the IT job market, with IT unemployment rising to 5.7% in January, surpassing the overall jobless rate. Major companies are implementing layoffs linked to cost-cutting measures and a growing reliance on AI technologies. To adapt, IT professionals need to retrain and stay at the cutting edge of technology.
In this week's update: Musk's DOGE website gets more editing than his tweets.Employees sharing secrets with AI chatbots prove humans haven't learned anything from social media oversharing.South Korea puts DeepSeek in the digital doghouse until it learns to play nice with privacy rules.Chinese hackers show that even after sanctions, you can't stop a Salt Typhoon with an umbrella.Apple's privacy features are too private for Germany's taste - plot twist nobody saw coming.Finally, an AI that promises to keep your secrets... on your phone, where you'll probably still accidentally share them anyway.AI takes tech jobs, and proves it learned "layoffs" from watching human managers.Let's go unearth those secrets!Find the full transcript to this podcast here.
Frequently Asked Questions: Privacy, Security, and the State of Tech (Early 2025)1. What is "SparkCat" and why is it significant?SparkCat is malware discovered hiding in both the Apple App Store and Google Play. It uses optical character recognition (OCR) to scan users' photo galleries for cryptocurrency wallet recovery phrases and uploads them to attacker-controlled servers. Over 242,000 Android users downloaded infected apps. It highlights the evolving sophistication of malware and the need for increased vigilance, even with apps from reputable sources.2. What is the UK government asking Apple to do, and what are the potential implications?The UK government has reportedly ordered Apple to create a backdoor allowing access to encrypted cloud backups of users worldwide, through a technical capability notice under the Investigatory Powers Act. Apple is likely to discontinue its encrypted storage service in the UK rather than compromise user security globally. If Apple complies, it could set a dangerous precedent for other governments to demand similar access, undermining encryption and weakening security for everyone.3. What is the story about the man trying to buy a landfill, and what does it illustrate?A man is trying to buy a landfill to search for a hard drive containing his lost Bitcoin fortune. While seemingly absurd, it illustrates the very real consequences of poor digital asset management and data security. It highlights the permanence (and potential inaccessibility) of digital assets and the lengths people will go to recover them, even resorting to extreme measures.4. Why is the US considering banning the DeepSeek AI app?The US is considering banning the Chinese AI app DeepSeek due to concerns that it collects data for a foreign government (China). The app pumps data to China Mobile unencrypted, and there are close ties between the company and the Chinese military. This aligns with the US government's broader concerns about foreign-owned apps, especially those from China, posing national security risks due to data privacy and potential surveillance.5. What is the massive brute-force attack targeting VPNs, and how can organizations protect themselves?A large-scale brute-force attack is targeting VPN devices from companies like Palo Alto Networks, Ivanti, and SonicWall, utilizing nearly 2.8 million IP addresses. Attackers are attempting to guess usernames and passwords to gain unauthorized access. To protect edge devices, organizations should change default admin passwords to strong, unique ones, enforce multi-factor authentication (MFA), use allowlists of trusted IPs, and disable web admin interfaces if they are not needed, and also ensure VPN software is fully up to date.6. Why is Google's removal of its pledge not to build AI for weapons or surveillance significant?Google's removal of its pledge not to build AI for weapons or surveillance is a concerning development. It suggests a shift in the company's ethical stance and a willingness to potentially engage in activities that could have negative consequences for human rights and global security. It raises questions about the future direction of AI development and the role of tech companies in shaping its use.7. What is "enshittification" and how does it relate to current tech trends?"Enshittification" refers to the gradual decline of online services as they prioritize profits over user experience. This process involves platforms initially offering value to users, then shifting focus to business customers, and finally exploiting both for maximum profit. Examples include Twitter restricting API access, Facebook prioritizing sponsored content, smart TVs becoming data-hungry ad machines, and Google Assistant's diminishing functionality. It reflects a broader trend of tech companies sacrificing user experience for financial gain.
Episode 229If your seed phrase was in your photo gallery, congratulations! You might have just funded North Korea's next Missile launch.The UK government just asked Apple to make privacy optional—because nothing says "secure" like a government-mandated security hole.A man wants to buy an entire rubbish tip to find his lost Bitcoin hard drive—because sometimes, your financial future is literally garbage.The US is considering banning a Chinese AI app, proving once again that if it's cheap, efficient, foreign, unencrypted, and collects data for a foreign government it's probably too good to be true.Massive VPN Attack – 2.8 million IPs are trying to brute-force their way into VPNs—because apparently, resetting the default admin credentials to a "strong password" is still too much to ask.Google quietly removed its promise not to build AI for surveillance or weapons, so expect "Don't Be Evil" to disappear completely in a rev. or two.If your smart TV, social media, and AI assistants feel like they hate you, it's not paranoia—it's capitalism, or that other word we can't repeat here.Earth's Inner Core Is Changing – Scientists say the Earth's core might be slowing down, which is great, because the last thing we needed was more things spinning out of control.Let's go digging!Find the full transcript to this podcast here.
What is the primary concern regarding the use of WhatsApp and other encrypted messaging apps recently? Recent reports indicate that spyware, specifically "Graphite," has been used to target journalists and civil society members through zero-click attacks on encrypted apps like WhatsApp, Telegram, and Signal. This means that these apps are not as secure as previously thought, even though they employ end-to-end encryption. The spyware can infect devices without any user interaction and potentially compromise communication data. What are the security vulnerabilities identified in certain healthcare patient monitors? The FDA has highlighted cybersecurity issues in Contec's CMS8000 and Epsimed's MN-120 patient monitors. These devices, when connected to the internet, are susceptible to unauthorized remote control, software backdoors, and data breaches containing personal health information. One backdoor was linked to a Chinese IP address, raising additional concerns about foreign access to sensitive health data. Why has the Chinese AI chatbot, DeepSeek, been banned in Italy and Taiwan? Italy's data protection agency blocked DeepSeek because its developers did not adequately explain how user data is collected or confirm whether it's stored on Chinese servers. Taiwan's digital ministry also banned the use of DeepSeek by government departments, citing security concerns related to its Chinese origin. What led to DeepSeek's data being exposed online and what kind of information was affected? Cybersecurity firm Wiz discovered a significant amount of sensitive data from DeepSeek was left unsecured on the open internet due to an apparent misconfiguration. This data included over a million lines of data such as digital software keys and user chat logs. What is Senator Hawley's proposed bill regarding Chinese AI models, and what could be the consequences for individuals? Senator Josh Hawley has introduced the "Decoupling America's Artificial Intelligence Capabilities from China Act," which aims to criminalize the import, export, and collaboration on AI technology with China. Under the proposed law, knowingly downloading a Chinese AI model, such as DeepSeek, could lead to severe penalties, including up to 20 years in prison, a million-dollar fine, or both. The bill reflects growing concerns about national security and the potential for China to leverage AI for hostile purposes. How is Amazon being accused of tracking consumers, and what type of data are they allegedly collecting? Amazon is facing a class-action lawsuit accusing the company of secretly tracking consumers' movements through their cellphones via its Amazon Ads SDK, embedded within third-party apps. It's alleged that the SDK collects sensitive geolocation data without users' explicit consent, such as IP addresses, location, ISP, device info, and network performance metrics. This data is used to build a detailed picture of consumers' habits and preferences, raising privacy concerns about corporate surveillance. What restrictions are being placed on open-source contributions, and who is being affected? The US Office of Foreign Assets Control (OFAC) sanctions are imposing restrictions on open-source contributions from sanctioned individuals and countries. Developers from nations such as Russia, Iran, and North Korea are facing challenges when contributing to open-source projects due to these sanctions. How is Cloudflare addressing image authenticity concerns, and what are the potential benefits? Cloudflare has implemented Content Credentials, a system based on C2PA standards, that embeds metadata into images to track their origin and modifications. This system helps distinguish between genuine and manipulated content. The benefits are significant, as Cloudflare's network handles approximately 20% of global internet traffic, greatly increasing the potential reach of the system. This helps create trust in digital images, and preserves the work of digital creators.
First, for some, it looks like WhatsApp chats weren't just end-to-end encrypted—they also came with a side of espionage.Then... your heart monitor might be more interested in Beijing than in your beats per minute.deepseek AI Blocked in Italy & Taiwan, Welcomed in India – "Two countries said ‘no way,' one said ‘namaste'—deepseek's global tour has some mixed reviews."And what happens when your AI chatbot leaks more secrets than a reality TV star's DMs.Senator Hawley's AI Ban Proposal – take us from deepseek to Despair.Then it turns out Amazon may know more about your whereabouts than your mom does when you ignore her calls."Devs., the US is blocking open-source contributions from sanctioned individuals and countries. That's a lot to keep track of when you are donating your time. Cloudflare enables content credentials – "Finally, a way to prove your photo was taken by you, and not a random AI with too much free time."If life sometimes seems like a casino, where there ae too many ways to lose a lot of money fast, we have a spirited response. Let's go get the detail. Find the full transcript here.
What is "surveillance pricing" and how does it affect me? Surveillance pricing is a practice where online retailers adjust prices based on your personal data, such as location, browsing history, and demographics. Companies collect data like mouse movements and items left in your shopping cart to determine what you're likely willing to pay. This can lead to different individuals being offered varying prices for the same product. To mitigate this, consider using VPNs, browser extensions that block tracking, regularly clearing browser cookies, and being cautious about the personal information you share online. What car vulnerabilities were recently discovered, and how can I protect myself? Security researchers recently found vulnerabilities in Subaru's web portal, allowing remote control of vehicles, including unlocking doors, starting the engine, and tracking location. Millions of Subaru vehicles with Starlink digital features were potentially affected. While Subaru has patched the identified flaws, it's crucial for all car owners to ensure their software is up-to-date. This is part of a larger trend of security issues in the automotive industry, so vigilance is essential. How is Meta using my data with its new AI, and can I opt out? Meta's new AI chatbot will use personal data from your Facebook and Instagram accounts to personalize its responses. This includes information from previous conversations, dietary preferences, and interests. Unfortunately, there is no option to opt out of this data-sharing feature. What was the recent ruling about the FBI's access to Americans' private communications? A federal court ruled that backdoor searches of Americans' private communications collected under Section 702 of FISA are unconstitutional without a warrant. This ruling found that even if the government can lawfully collect communications between foreigners and Americans, it can't search those communications without a warrant when those searches involve US persons. This stems from a case where the FBI searched emails of a US resident, collected under the premise of foreign intelligence, without a warrant. The court found this to be a Fourth Amendment violation. What are the dangers of North Korean IT workers, and how can we protect our companies? The FBI has warned that North Korean IT workers are abusing their access to steal source code and extort U.S. companies. They often copy company code repositories, harvest credentials, and initiate work sessions from non-company devices. To mitigate these risks, companies should apply the principle of least privilege, limit permissions for remote desktop applications, and monitor for unusual network traffic. Additionally, it is important to recognize that these workers may log in from different IPs over a short period. What is the new threat to the European power grid, and what makes it so concerning? Researchers have discovered that renewable energy facilities across Central Europe use unencrypted radio signals to control how much power is sent into the grid. By reverse-engineering the signals, they found they could potentially manipulate the system to cause widespread disruptions, including a grid-wide outage. The lack of encryption on these systems and the ability to control large amounts of energy poses a significant risk, especially considering current geopolitical tensions. What is the significance of DeepSeek's R1 model and how does it compare to models like OpenAI's? DeepSeek's R1 model is an open-source large language model (LLM) that offers open weights, allowing users to run it on their own servers or locally. It challenges OpenAI's proprietary model by providing a more cost-effective and accessible AI solution. DeepSeek uses a technique called distillation, where existing LLMs train new, smaller models. The emergence of R1 suggests a shift towards more commoditized AI and potentially increased accessibility and customization. What are some common types of cyber attacks and how can I defend against them? The sources list 21 common cyber attacks including: malware, phishing, ransomware, drive-by downloads, cross-site scripting (XSS), SQL injection, man-in-the-middle (MitM) attacks, DDoS attacks, password attacks, insider threats, credential stuffing, zero-day exploits, social engineering, session hijacking, eavesdropping, watering hole attacks, DNS spoofing, IoT attacks, supply chain attacks, brute force attacks, and spyware. Preventative measures involve using antivirus software, updating systems, avoiding untrusted downloads, verifying emails, using spam filters, performing regular backups, having strong firewalls, enabling MFA, monitoring activities, restricting access to risky sites, securing cookies, and training employees to recognize suspicious activity. The best way to stay protected is to stay informed. Keep listening
EP 227 In this week's update we present 21 Cyber attacks and a self defense program to stop and drop every single one of them.Shopping online? Your browsing habits might be telling stores you're willing to pay double.Congratulations to Subaru owners as the latest stars in ‘Hack My Ride.'Meta's new AI buddy knows your secrets—and nope, there's no "off" button for this overshare.The FBI just discovered that the Constitution wasn't keen on them peeking at your emails without a warrant.Your ‘remote coworker' from Pyongyang isn't just burning the midnight oil—he's burning a hole in your source code.And for the EU, renewable energy is great until someone tunes in and turns it all off.Move over ChatGPT; DeepSeek's open-source AI is here to make ‘big and secretive' look so last year.This week's update is the best yet, so let's start counting! Find the full transcript here.
Data Privacy, Security, and Tech Trends in Early 2025 1. What was the scale of healthcare data breaches in the U.S. during 2024? In 2024, the U.S. healthcare sector experienced a massive surge in cyberattacks, with approximately 720 reported breaches compromising an estimated 186 million user records. This exposed a vast amount of sensitive information, including names, contact details, Social Security numbers, and medical histories. This is approximately 56% of the US population. 2. How did UnitedHealth handle its data breach notification, and what are the implications for affected individuals? UnitedHealth, specifically its subsidiary Change Healthcare, attempted to obscure its data breach notification webpage from search engines, making it difficult for the over 100 million affected individuals to learn about the incident. They used a “noindex” tag to keep it out of Google, burying the story of their breach. This led to widespread confusion and further distrust of the company. It also highlights how companies can use search engine optimization to hide breaches by burying the real stories. 3. What is GeoSpy, and what privacy concerns does it raise? GeoSpy is an AI tool that can accurately predict the location of photos based on features within the images, such as vegetation, architecture, and spatial relationships. Originally available to the public, it's now marketed to law enforcement and government agencies. This technology raises serious privacy concerns, as it can be used by stalkers or other malicious actors to geolocate individuals from publicly available photos. The tool is now available to law enforcement and enterprise users, and some versions of it are more powerful than what was offered to the public. 4. What restrictions were placed on General Motors (GM) regarding the sale of driving data? The Federal Trade Commission (FTC) banned GM and its subsidiary OnStar from selling customer geolocation and driving behavior data for five years. This action followed an investigation that revealed GM had been collecting and selling detailed driving information to insurance companies without obtaining explicit consent from vehicle owners. 5. What is the UK's new digital wallet app, and what types of documents will it support? The UK is launching a digital wallet app called GOV.UK Wallet, allowing citizens to store government-issued documents on their smartphones. Initially supporting veteran cards, it will expand to include driver's licenses in late 2025, with plans to add passports, marriage certificates, and benefit documents by 2027. 6. What security risks are associated with failed startups and "Sign in with Google" features? Former employees of failed startups using "Sign in with Google" features are vulnerable to data breaches. Hackers can exploit abandoned company domains and the associated Google login systems to access sensitive information stored in business software like Slack, Notion, and HR systems, including social security numbers. This vulnerability is particularly relevant to startups that used the ""Sign in with Google"" function. 7. What challenges did Amazon employees face following the mandatory return-to-office policy? Amazon's mandate for a full return to the office resulted in significant challenges for employees, including a shortage of desks and meeting rooms, overcrowded parking facilities, and an increase in workplace thefts. The policy has also been criticized for forcing employees into video calls that could have been easily conducted remotely, and some employees reported that there is a lack of trust amongst colleagues. 8. What are the $TRUMP and $MELANIA coins, and what controversies are surrounding them? Donald and Melania Trump introduced meme coins named $TRUMP and $MELANIA on the Solana blockchain. These coins quickly gained significant value, raising concerns about potential conflicts of interest and market manipulation.
EP 226 In 2024, hackers gave U.S. healthcare a crash course in oversharing—186 million records spilled, proving patient privacy is still on life support.UnitedHealth tried to bury its breach notice deeper than your inbox's spam folder, leaving 100 million victims googling in vain. A new AI tool can guess your photo's location faster than your nosiest neighbor—use portrait mode, or prepare to be geo-tagged! GM got caught selling your driving secrets—now they're banned for five years, but your insurance premium probably isn't impressed.The UK's digital wallet promises to declutter drawers, but we're still skeptical it'll clear up the chaos in government paperwork. Failed startups are gifting hackers access to your personal data—proof that your old Google login can haunt you more than your ex.Amazon's return-to-office plan lacks desks, parking, and common sense—so much for those “collaboration” benefits.Forget NFTs—Trump's $TRUMP and $MELANIA coins promise to make your wallet great again.Why wait a second longer? Let's find out what all the fuss is about. Find the full transcript to this podcast here.
Tech & Privacy FAQ - Week of January 14th, 2025 1. What's this new job referral "side hustle" all about? Some tech workers are making up to $30,000 by referring strangers for job openings. They connect with job seekers through platforms like Blind and Glassdoor, and sometimes use services like Refer Me and Refermarket to facilitate these referrals, even charging a fee. While referrals can improve hiring odds, this trend raises questions about authenticity and potential abuse. 2. Why is the Texas Attorney General cracking down on data privacy? Texas AG Ken Paxton is taking a strong stance on data privacy. He's issued warnings to companies like Sirius XM and apps like MyRadar for allegedly sharing user data without consent. He's also suing Allstate for secretly collecting driver data via cellphone apps and car manufacturers to raise premiums. Texas seeks restitution for consumers, damages, and hefty fines. 3. The EU fined itself for a GDPR violation? Seriously? Yes! The EU General Court fined the European Commission €400 for transferring a citizen's IP address to Meta in the US without proper safeguards. While a small fine, it sets a precedent and shows the EU's commitment to enforcing GDPR, even on its own institutions. 4. Is my data at risk from quantum computers? Experts warn that quantum computers, still in their early stages, could eventually crack current encryption methods. While not an immediate threat, it's wise to start researching "quantum-resistant" solutions to safeguard your data in the future. 5. How are hackers using AWS to hold data hostage? A ransomware group called Codefinger is exploiting stolen AWS keys to encrypt data in S3 buckets using AWS's own encryption. They then demand a ransom and set a timer to delete the data within a week. This highlights the need for strong IAM policies and regular key audits on AWS. 6. What are the latest trends in cyberattacks? Cybercriminals are shifting from email-based malware to browser-based attacks like drive-by downloads and malicious ads. Compromised credentials are a growing problem, often obtained cheaply from fraud marketplaces. Staying updated with software, using ad blockers, and being cautious online are crucial. 7. What's the T3 Financial Crime Unit doing about crypto crime? The T3 FCU, a collaboration between TRON, Tether, and TRM Labs, is actively combating crypto-related crime. They recently froze over $100 million in illicit assets across five continents. This highlights the importance of public-private partnerships in blockchain security. 8. Who was behind the massive WazirX crypto hack? The US, South Korea, and Japan have jointly confirmed that North Korea's Lazarus Group orchestrated the $235 million WazirX hack. This incident reinforces the need for strong security measures within the cryptocurrency ecosystem and emphasizes the threat posed by state-sponsored hacking groups.
EP 225 This week referring strangers for jobs is the new tech hustle... Proof that even networking has gone freelance.The Texas AG claims apps and insurers are snooping so hard they probably know your snack habits while he goes for big lunch money.The EU just fined itself €400 for breaking GDPR, demonstrating that even bureaucracies aren't above self-sabotage.Your data's safe today, but quantum computers might soon laugh at your encryption like it's a flip phone.Hackers use AWS to lock your AWS data; like robbers stealing your house keys and using them to lock you out.Step aside Phishing, browser hacks are the new cybercrime hotness; update your apps before they update your bank balance.T3 FCU froze $100 million in criminal crypto, reminding bad actors that crime doesn't pay—but it does chill.North Korea's Lazarus Group stole $235M in crypto, reminding us that even your custodial wallet isn't safe from global espionage.Let's Hustle. Let's hustle hard. Find the transcript to this podcast here.