Podcasts about 2fa

  • 682PODCASTS
  • 1,358EPISODES
  • 51mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 19, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about 2fa

Show all podcasts related to 2fa

Latest podcast episodes about 2fa

Making Money Personal
Five Ways to Keep Identity Thieves Guessing - Money Tip Tuesday

Making Money Personal

Play Episode Listen Later Aug 5, 2025 7:46


Identity thieves work extra hard to trick us into giving over our personal information. But there are ways for us to implement effective tactics to safeguard our identities and stop thieves in their tracks. In this tip, we're sharing five ways to take steps you can take to make it harder for identity thieves to steal your information.  Links: Explore the identity protecting benefits of a Better Checking account IRS Taxpayer Guide to Identity Theft Check out TCU University for financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union   Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast.   Identity theft continues to be more than just a costly headache. Fraud scams and identity theft reports continued to top the list of scams reported to the FTC in 2024. In fact, nearly 6.5 million incidents were reported to the FTC last year, and over 1 million of those incidents included an instance of identity theft. These numbers prove that while scams and identity theft continue to evolve, so do the tactics that criminals use to commit these crimes. In this tip we'll share some lesser-known steps you can take to help avoid becoming the next victim of identity theft and fraud.  Use fake answers for your security questions One simple way to add a layer of protection to your accounts is to choose wrong or nonsense answers to security questions. If at age 16, you drove a green SUV, the security answer to “What was your first car?” might be “big avocado” rather than “green Ford Explorer.” The idea is to choose an answer that only has meaning to you and cannot be easily guessed. Real answers to your security questions may have been published in the past if you have ever participated in social media quizzes, polls, and challenges. Avoid using your real information, especially information typically found in security questions, like your mother's maiden name or the name of the street you grew up on, in any situation, no matter how seemingly harmless it may seem. A moment of fun could lead to many lost hours spent repairing damage to your identity.  Opt in for multi-factor authentication When available, enable multi-factor authentication ("MFA") to your online accounts. MFA is a type of authentication that adds two or more layers of security beyond a password. If only two factors are used, it is sometimes referred to as two-factor authentication or 2FA. While passwords should always be difficult to guess, and you can work to protect the answers to your security questions, adding another step to the login process decreases the chance that a hacker can gain access to your accounts. MFA typically works by sending a verification code by SMS text, by email, or by voice to a phone number listed on your profile. You must enter the provided code before being allowed to complete the login process. MFA should always be added when available. To know whether your account provider offers MFA, you may need to investigate your online options or give the company a call to ask, as it is not always offered proactively.  File your taxes early As this IRS Taxpayer Guide to Identity Theft website states, "tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund." One simple way to avoid scammers getting a hold of your tax refund is to file before they do! Surprisingly, this type of fraud affects an estimated hundreds of thousands of Americans every year. Often, the scam isn't uncovered until an individual tries to file their own return and their refund is rejected because it has already been claimed. When tax season comes around, get everything in order ` and file early. This way you can both mark the chore off your list and avoid leaving your refund out there for someone else to claim.  Be smart and stay private on social media Two ways people put themselves at risk on social media are by disclosing their location and engaging with strangers. It's incredibly rare to truly need to share your location with a large group of friends and followers, yet location sharing is often an app's default setting. Some social media platforms keep location sharing on all of the time in the background, so you can always see another user's location. This allows ill-meaning individuals to access your home and work address, your travel routines, when you might be out of town, and your favorite vacation destination. Mobile location settings are often lifesavers when navigating in a new city or avoiding traffic jams, but allowing the social media universe to know where you are at all times is never necessary and can be detrimental to the security of both your identity and your possessions. While most people know to limit the information they share with those they meet online, there are still thousands of cases each year of people losing their money or identity information to a romantic interest or a new friend who wasn't who they claimed to be. Remember to keep your personal information private if you make connections online.  Routinely check your "in-app" privacy settings Occasionally, posts, articles, or notifications will remind us to review our privacy information, and for a time after doing a reassessment, our settings will remain locked down. However, sharing a public post from a business (to qualify for a prize, for instance) can reset your privacy preferences for future posts. Creating an intentionally public post, like when you have an item to sell or need to find a missing pet, can also change privacy settings on a future update that you intend to be more personal. On a regular basis, check your privacy settings in the apps where you are active, and take an extra second to check each social post before publishing to ensure that it is reaching only who you intend. Consider culling your friends list to those in your inner circle, or set most of your updates to only reach a select number of friends and family. Games and shopping apps are often checking your background in the same way to show you more relevant and personal ads. Locking down what you are sharing will help you protect your information while also using the internet to stay connected with friends and family in the way that you intend.  Add an annual task to your calendar to check in on these security measures and get started now. Also verify that your account passwords aren't reused or easy to guess (especially on banking, mortgage, and investment accounts).  And remember, if you suspect that your identity has been compromised, you have access to an Identity Theft Recovery Advocate as a benefit of your Triangle Better Checking account. These professionals are trained and ready to help you reverse the damage and get back on track quickly. They're experienced advocates who know how to spot identity theft and, when necessary, will support you through the process of repairing any damages.  If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts.   Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast.   Have a great day! 

MP3 – mintCast
465 – “Won’t Someone Think Of The Children!”

MP3 – mintCast

Play Episode Listen Later Aug 3, 2025 105:01


First up in the news: Mint 22.2 betas now in testing, Arch AUR Under Fire Once More as Malware Resurfaces, Debian 13 Trixie Release Date is Officially Confirmed, and Hyprland Hyprperks have been launched. In Security and Privacy, Introducing Proton Authenticator – secure 2FA, your way and Microsoft Recall issues In Check This Out, Ignition allows you to manage startup apps and scripts And finally, Vibrations From the Ether

Daily Inspiration – The Steve Harvey Morning Show
Uplift: He helps churches and nonprofits leverage technology to spread the gospel.

Daily Inspiration – The Steve Harvey Morning Show

Play Episode Listen Later Aug 2, 2025 34:27 Transcription Available


Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.

The Steve Harvey Morning Show
Uplift: He helps churches and nonprofits leverage technology to spread the gospel.

The Steve Harvey Morning Show

Play Episode Listen Later Aug 2, 2025 34:27 Transcription Available


Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.

Strawberry Letter
Uplift: He helps churches and nonprofits leverage technology to spread the gospel.

Strawberry Letter

Play Episode Listen Later Aug 2, 2025 34:27 Transcription Available


Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.

Center Stage
How to Safeguard Your Firm Against Cybercrimes feat. Steven Kennen

Center Stage

Play Episode Listen Later Jul 30, 2025 26:52


MoneyWise on Oneplace.com
Do Your Finances Need Scam-Proofing?

MoneyWise on Oneplace.com

Play Episode Listen Later Jul 15, 2025 24:57


“The simple believe everything, but the prudent give thought to their steps.” — Proverbs 14:15In an age where scams are becoming more sophisticated by the day, Scripture reminds us that discernment isn't optional—it's essential. As believers, protecting the resources God has entrusted to us is more than a practical concern—it's an act of stewardship. Here's how you can guard your finances with wisdom, not fear.Scams Are Everywhere—But So Is WisdomFraudsters use every channel available: phone calls, text messages, emails, and even impersonations of people you trust. But as followers of Christ, we're not called to panic. We're called to walk in wisdom (Ephesians 5:15). That begins with slowing down and thinking critically.Pause before you respond. Scammers rely on urgency. If someone pressures you to act immediately—whether claiming your account is locked or your money is at risk—take a step back. Hang up. Verify the source independently. Urgency is often a red flag. Avoid untraceable payments. No legitimate organization will ask for payment via wire transfer or gift cards. These are the preferred tools of scammers because they're nearly impossible to recover.Practical Steps for Digital ProtectionFinancial stewardship now includes digital awareness. Here are practical ways to protect yourself and your family:Use credit cards, not debit cards, for online purchases. Credit cards usually come with stronger fraud protection. Enable two-factor authentication (2FA) on all your financial accounts. Even if a scammer gets your password, they can't access your account without a second form of verification. Don't reuse passwords. Use a secure password manager, such as Bitwarden or NordPass, to create and store strong, unique passwords. Set up account alerts. Most banks allow you to monitor activity in real-time, giving you a heads-up if something unusual occurs. Freeze your credit. It's free to do and offers one of the best defenses against identity theft. You can always unfreeze it temporarily when needed. Avoid public Wi-Fi for financial transactions. Wait until you're on a secure network or at home to check your bank accounts or make purchases. Limit what you share on social media. Personal details, such as birthdays or family names, can be used to guess passwords or security questions. Adjust your privacy settings and post wisely. Shred sensitive documents before discarding them. Even in the digital age, identity thieves still dig through trash. Don't click on unfamiliar links, even if they appear to come from someone you know. When in doubt, contact the person or organization directly for clarification.Stewarding Wisdom in CommunityScammers often target the vulnerable, particularly older adults and teenagers. So make this a shared effort. Discuss online fraud with your family. Equip them with knowledge. If you receive a letter or email about identity protection following a data breach, verify it by contacting the company directly, rather than through the provided link or number.Financial faithfulness today includes digital vigilance. But there's no need for fear. By taking these simple steps, you can walk confidently, knowing you're stewarding God's resources with care.A Tool for Wise Stewardship: The FaithFi AppLooking for a practical way to manage your money with wisdom and peace of mind? The FaithFi app is a secure tool that helps you track your spending, plan your giving, and align your finances with biblical values. With 256-bit encryption, your data is protected, and your login credentials are never stored. FaithFi Pro users also receive exclusive articles, digital devotionals, and daily encouragement.Visit FaithFi.com and click “App” or search “FaithFi” in your app store to get started today.Steward your finances wisely. Protect what God has entrusted to you. And walk in peace, not panic.On Today's Program, Rob Answers Listener Questions:My 14-year-old son just started his first full-time summer job, working around 37 to 40 hours a week. I'd like to help him get started with investing and am considering opening a Roth IRA in his name. What's the best way to set that up, and where should we go to open the account?We're debt-free and recently bought a home. Our current vehicle is paid off, but we're thinking about adding a second car with a monthly payment of around $500. I'm a little uneasy about the added expense. How can we determine if this is a wise financial move for us at this time?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)The Money Challenge for Teens: Prepare for College, Run from Debt, and Live Generously by Dr. Art RainerThe Finish Line PledgeSchwab Intelligent Portfolios | BettermentBitwarden | NordPassWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.

Podcast Jurnal Lembu

Halo semuanya! Kembali lagi bersama saya di episode kali ini, kita akan bahas satu hal yang krusial banget buat kamu para pengguna PayPal. Terutama kamu yang kerja freelance, terima bayaran dari luar negeri, atau aktif di platform-platform digital internasional.Yes, hari ini kita ngomongin soal sistem keamanan baru PayPal – yaitu penguncian ganda alias two-factor authentication (2FA) yang sekarang diarahkan langsung ke nomor handphone kamu.

Hacker And The Fed
Are We Losing the Cyber War?

Hacker And The Fed

Play Episode Listen Later Jul 10, 2025 49:51


Chris and Hector break down the massive Qantas Airlines data breach, expose the growing threat of ransomware negotiation scams, and discuss a dam hack in Norway that had potentially disastrous consequences. They get into real-world advice on 2FA bypass scams, the importance of network segmentation, and a candid look at why critical infrastructure hacks are so dangerous. Join our new Patreon! ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠questions@hackerandthefed.com

HeroicStories
How to Share Two-Factor With Another Person

HeroicStories

Play Episode Listen Later Jul 10, 2025 12:03


Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.

Best of The Steve Harvey Morning Show
Uplift: He helps churches and nonprofits leverage technology to spread the gospel.

Best of The Steve Harvey Morning Show

Play Episode Listen Later Jul 5, 2025 34:27 Transcription Available


Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.

Computer Talk with TAB
Computer Talk 7-5-25 HR 1

Computer Talk with TAB

Play Episode Listen Later Jul 5, 2025 39:35


Ai used to figure out ancient text, Anthropic AI can use copyrighted material but they have to pay for it, MIT finds that if you use ChatGPT you might be getting stupider, Extended support for Win 10, Printer issues HP can't find the Ink, Google Security Questions and 2FA, Small Triangle on my MAC, Cloud backup onedrive,

Mac OS Ken
Supply Chain Stuff, Face-Able News, and TV Talk - MOSK: 07.03.2025

Mac OS Ken

Play Episode Listen Later Jul 3, 2025 16:12


- Report: Foxconn Sends Most Chinese Employees in India Back to China - Report: Tariffs on Apple Hardware from Vietnam Jump from ~4% to 20% - Canalys: Exciting Q1 PC Import Numbers Are Nothing to Get Excited About - Apple Quizzes Headset Owners on Smart Glasses - Apple Sues Former Vision Pro Exec for Alleged Theft of Trade Secrets - Ming-Chi Kuo Eyes Apple Roadmap for Smart Glasses and Headsets - MLS Season Pass Drops to Half-Price - Jennifer Aniston Onboard for Apple TV+ Series “I'm Glad My Mom Died” - Three-Part Docuseries on UCONN Women's Basketball Bouncing to Apple TV+ - Apple TV+ Kids Series “Stillwater” Coming Back for Fourth Season - Ten-Part Apple TV+ “Neuromancer” Now in Production - Apple TV+ Teases Third Season of “Invasion” - Ahead of Premier, Critics Are Digging Third Season of “Foundation” - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
App Store Attacks, Lawsuits, and a Podcaster's Passing - MOSK: 07.02.2025

Mac OS Ken

Play Episode Listen Later Jul 2, 2025 12:55


- Apple Appeals “Epic” Ruling to 9th Circuit Court - Bipartisan US Senators Reintroduce Legislation to Open App Stores - DOJ iPhone Monopoly Case Set to Proceed - Proton Sues Apple for the Usual Reasons - Apple Shareholder Sues Over Smarter Siri Debacle - Apple Seeds Second Betas for Current OS Updates - Apple Brings Added RAW Support and Image Playground to Pixelmator Pro - Apple Updates Sports App - Podcaster, Blogger Tim Robertson Logs Off - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
Two Bulls and a Bear Share Notes - MOSK: 07.01.2025

Mac OS Ken

Play Episode Listen Later Jul 1, 2025 12:23


- Barclays Bearish on AAPL Due to iPhone Weakness and Services Worries - Chatterjee: iPhone 16 Panic Buying to Dent iPhone 17 Demand - Apple Joins China Subsidy Program Directly - BofA Weighs Potential Perplexity Purchase by Apple - F1: The Blockbuster - Apple Music Turns 10, Offers Personalized “Replay All Time” Playlist - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Group Practice Tech
Episode 523: Quick Wins: Boost Your Practice Security With 2FA and Google Authenticator

Group Practice Tech

Play Episode Listen Later Jun 27, 2025 14:09


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we have a realistic, high impact action for you to take today to boost your practice security: set up two-factor authentication (2FA).  We discuss: What 2FA is and why it's so useful Where we recommend having 2FA set up How Google Authenticator works for 2FA and why we love it How to set up and use Google Authenticator Action steps to take today to boost practice security with 2FA Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources

Retire Smarter
Cybersecurity and Your Retirement: Protecting What You've Built

Retire Smarter

Play Episode Listen Later Jun 26, 2025 36:12


Get your customized planning started by scheduling a no-cost discovery call: http://bit.ly/calltruewealth Retirees are increasingly targeted by cybercriminals — and the scams are getting more sophisticated. From fake emails and stolen phones to account takeovers and SIM card fraud, even cautious investors can be at risk. In this episode, Tyler Emrick, CFA®, CFP®, shares a real story of an attempted security breach involving a True Wealth Design client — and what made the firm catch it before damage was done. You'll learn the most common cybersecurity threats facing retirees, how to secure your financial accounts, and what to do if you think you've been scammed. Plus, we cover smart strategies like using a password manager, enabling two-factor authentication, freezing your credit, and why every retiree should have a Trusted Contact on file. If you've worked hard to build a secure retirement, this episode will help you protect it. Here's some of what we discuss in this episode:

Mac OS Ken
More Stolen Jokes from Ken's Computer - MOSK: 06.25.2025

Mac OS Ken

Play Episode Listen Later Jun 25, 2025 0:56


- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer.  - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Notnerd Podcast: Tech Better
Ep. 498: Where did the 16 billion passwords come from? And some more pleasant tech news

Notnerd Podcast: Tech Better

Play Episode Listen Later Jun 25, 2025 67:40


It makes for a great headline saying that 16 billion passwords were leaked. Was this some new massive data breach? What should you do about it? We take a look. We've got plenty of other tech news, tips, and picks to get you caught up on this week so you can get out there and tech better! Watch on YouTube! - Notnerd.com and Notpicks.com INTRO (00:00) It's not just Prime Video: Max shows 50% more ads now (06:45) MAIN TOPIC: 16 Billion with a B Passwords Leaked (09:20) 16 Billion Apple, Facebook, Google And Other Passwords Leaked No, the 16 billion credentials leak is not a new data breach haveibeenpwned.com Please use passkeys, a password manager, and 2FA! DAVE'S PRO-TIP OF THE WEEK:  Schedule Text Message, Send Later on iOS (18:55) JUST THE HEADLINES: (25:35) Applebee's and IHOP plan to introduce AI in restaurants Axolotl discovery brings us closer than ever to regrowing human limbs A mathematician calculated the size of a giant meatball made of every human Scientists once hoarded pre-nuclear steel; now we're hoarding pre-AI content Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic Iran bans officials from using internet-connected devices Scientists create 'world's smallest violin' TAKES: Introducing Oakley Meta Glasses, a New Category of Performance AI Glasses (28:30) macOS Tahoe beta drops FireWire support (36:05) Project Indigo - a computational photography camera app from Adobe (38:55) Why Denmark is dumping Microsoft Office and Windows for LibreOffice and Linux (43:30) BONUS ODD TAKE: Catleidoscope and Catcordian! (46:50) PICKS OF THE WEEK: Dave: Lytro Camera (48:45) Nate: Ryan Trahan YouTube Channel (56:40) RAMAZON PURCHASE - Giveaway! (01:03:35)

AwesomeCast: Tech and Gadget Talk
Password Leaks, Lizard Geeks & LEGO Sneaks | AwesomeCast 738

AwesomeCast: Tech and Gadget Talk

Play Episode Listen Later Jun 25, 2025 51:12


In this action-packed episode of AwesomeCast, hosts Michael Sorg and Katie Dudas recap their high-tech adventures at the Formula SAE EV event at Michigan International Speedway. From streaming challenges and tech problem-solving to a surprise appearance by a lizard named Hank, it's a wild ride through the world of engineering and media production. Plus, we get geeky with a new LEGO robotics set for kids, Dragon's Lair nostalgia on Netflix, cutting-edge photo apps, and a Godzilla-themed theater experience!

Sorgatron Media Master Feed
AwesomeCast 738: Password Leaks, Lizard Geeks & LEGO Sneaks

Sorgatron Media Master Feed

Play Episode Listen Later Jun 25, 2025 51:12


In this action-packed episode of AwesomeCast, hosts Michael Sorg and Katie Dudas recap their high-tech adventures at the Formula SAE EV event at Michigan International Speedway. From streaming challenges and tech problem-solving to a surprise appearance by a lizard named Hank, it's a wild ride through the world of engineering and media production. Plus, we get geeky with a new LEGO robotics set for kids, Dragon's Lair nostalgia on Netflix, cutting-edge photo apps, and a Godzilla-themed theater experience!

Mac OS Ken
Stolen Comedy Jokes from Ken's Computer: MOSK: 06.23.2025

Mac OS Ken

Play Episode Listen Later Jun 23, 2025 1:06


- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer.  - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
"Hot Lap Immersive" Only SOUNDS Dirty - MOSK: 06.20.2025

Mac OS Ken

Play Episode Listen Later Jun 20, 2025 14:39


- Fine Day for an EC Delay - No Live Activities for EU Macs in macOS 26 Tahoe - FireWire Support Missing from First macOS 26 Developer Beta - Google Acknowledges Problem with YouTube Mobile Apps - Nine Sega Forever Games to Grab Before Forever Ends - Apple Vision Pro Gets Immersive Promo for “F1: The Movie” - “Shot on iPhone” Campaign Wins Cannes Lions Award - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

The Checklist by SecureMac
Checklist 428 - Avoiding SMS for 2FA and a Plot Twist for 23andMe

The Checklist by SecureMac

Play Episode Listen Later Jun 20, 2025 15:55


This week on The Checklist, brought to you by SecureMac - Using two-factor authentication is a great idea. Using SMS for 2FA is about the worst way to do it. We'll tell you why. Plus - plot twist for 23andMe. You may think you know the latest, but do you? Listen in and find out on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

Mac OS Ken
Slow and Steady Could Win the A.I. Race - MOSK: 06.12.2025

Mac OS Ken

Play Episode Listen Later Jun 12, 2025 12:11


- Yahoo! Finance Digs Apple's WWDC 2025 A.I. Approach - WhatsApp Stands with Apple in UK's Secret iCloud Backdoor Case - DTLA Apple Store Looted Amid Unrest - F1: The Haptic Trailer - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
WWDC 2025 Recap: Part 2 - MOSK: 06.11.2025

Mac OS Ken

Play Episode Listen Later Jun 11, 2025 18:58


- Highlighting Some Features from watchOS 26  - Which Watches Will Support watchOS 26 - Highlighting Some Features from tvOS 26  - Which Apple TVs Can Do tvOS 26 - Highlighting Some Features from visionOS 26 - Apple Analysts Unmoved by WWDC Announcements - Appleverse: A WWDC for Developers - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
WWDC 2025 Recap: Part 1 - MOSK: 06.10.2025

Mac OS Ken

Play Episode Listen Later Jun 10, 2025 18:29


- Apple Refines Apple Intelligence, Opens On-Device LLMs to Developers - Apple's New Design Language: Liquid Glass - Reelin' in the Years: everyOS is 26 - Highlighting Some Features from iOS 26  - iPhone XR and iPhone XS Can't Handle iOS 26 - Highlighting Some Features from iPadOS 26  - 7th-Gen iPad Can't Handle iPadOS 26 - Highlighting Some Features from macOS 26 - macOS 26 is Last Stop for Last Intel Macs - Apple Says Studio Quality Recording Ahead for AirPods - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
Bill Atkinson's Passing and WWDC25's Arrival - MOSK: 06.09.2025

Mac OS Ken

Play Episode Listen Later Jun 9, 2025 10:49


- WWDC is Mere Hours Away - An Immersive "The Talk Show" for Apple Vision Pro - On the Passing of Bill Atkinson - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Mac OS Ken
Analysts Offer Less App Store Link-Out Worry - MOSK: 06.06.2025

Mac OS Ken

Play Episode Listen Later Jun 6, 2025 17:08


- J.P. Morgan: Apple's 9th Circuit Denial Not That Big a Deal - Morgan Stanley: Buyers Will Need Big Discounts to Leave App Store - Deepwater: Apple's Got Two Years to Get Its A.I. Act Together - Report: Apple Plans Second Store for Mumbai - Report: Tata Takes Over iPhone and MacBook Repair in India - Study Says Apple Watch Calorie Burn Metric Not Super Accurate - New Games for Apple Arcade - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

Divorce Master Radio
How to Divide Shared Digital Assets and Cloud Storage Accounts? | Los Angeles Divorce

Divorce Master Radio

Play Episode Listen Later Jun 3, 2025 1:58


LinuxGameCast Weekly
Gamepads On Linux

LinuxGameCast Weekly

Play Episode Listen Later May 25, 2025 65:22


SteamOS gets a landing page! An Android-powered Wii U gamepad for Linux, drivers for ByoWave Proteus controllers, mechs with pickaxes, and GOG turns on 2FA.

My Amazon Guy
How to Recover and Secure an Amazon Seller Central Account

My Amazon Guy

Play Episode Listen Later May 23, 2025 7:19


Send us a textLosing your OTP or access to Amazon Seller Central can cost sellers serious time. This video breaks down how to recover your account and prevent future login problems. Includes steps for better 2FA setup, security tips, and tools like  Authenticator.Need help securing your Amazon account or getting back in? https://bit.ly/44uHuaR#AmazonSeller #SellerCentral #AmazonAccountHelp #TwoStepVerification #FBAHelpWatch these videos on YouTube:Simple Trick to Cut PPC Costs https://www.youtube.com/watch?v=k5CM6XtYo1c&list=PLDkvNlz8yl_YEKE1B5o1uhbBm1QQcPzmY&index=39How to Increase IPI https://www.youtube.com/watch?v=TMysF_XACdQ&list=PLDkvNlz8yl_b5s-jb7KgPe-aPWP47jZIL-------------------------------------------------Struggling with ads? Download our free PPC guide made for Amazon sellers: https://bit.ly/4kjWmgQWant better rankings? Grab the free Amazon SEO toolkit and start fixing your listings: https://bit.ly/3GW5zxMTimestamps00:00 – What To Do If You Lose Your OTP Code00:30 – Common Mistakes When Setting Up OTP01:20 – Account Recovery Using Amazon.com Login02:00 – Required Documents for OTP Reset03:00 – Manual Review Process by Amazon Security04:00 – Better Ways to Set Up Account Security05:10 – How to Use an Authenticator App06:00 – Using 1Password or LastPass for OTP07:00 – Why All Amazon Sellers Should Update OTP Settings-------------------------------------------------Follow us:LinkedIn: https://www.linkedin.com/company/28605816/Instagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Twitter: https://twitter.com/myamazonguySubscribe to the My Amazon Guy podcast: https://podcast.myamazonguy.comApple Podcast: https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show

Divorce Master Radio
How to Organize Digital Accounts and Passwords Post-Divorce? | Los Angeles Divorce

Divorce Master Radio

Play Episode Listen Later May 18, 2025 1:35


The Front
Have hackers stolen your tax refund?

The Front

Play Episode Listen Later May 18, 2025 13:37 Transcription Available


Hackers have harvested potentially millions of dollars from unsuspecting taxpayers by submitting bogus tax returns – and nobody knows how. Find out more about The Front podcast here. You can read about this story and more on The Australian's website or on The Australian’s app. This episode of The Front is presented and produced by Kristen Amiet, and edited by Joshua Burton. Our regular host is Claire Harvey and our team includes Lia Tsamoglou, Tiffany Dimmack, Stephanie Coombes and Jasper Leak, who also composed our music. See omnystudio.com/listener for privacy information.

DevZen Podcast
Ошибочный выпуск — Episode 500

DevZen Podcast

Play Episode Listen Later May 15, 2025 152:55


В этом выпуске: является ли 500-ый выпуск юбилейным, как погасить наводки-вибрации на вертушки, что нового в Node.js v24 и почему он будет LTS но пока не LTS, сэмплируем резервуары, выбираем между iPhone 11 Pro, iPhone 12 mini и iPhone 13 mini, выбираем правильный способ 2FA, закапываем SQL, а также обсуждаем темы слушателей. [00:03:17] Чему мы… Читать далее →

Cryptocast | BNR
Deep Dive: Hoe bewaar je crypto veilig? | 377 B

Cryptocast | BNR

Play Episode Listen Later May 13, 2025 56:45


Het veilig bewaren van je crypto staat centraal in deze aflevering van de Cryptocast. De cryptowereld verandert constant en juist daarom is het belangrijk om de verschillende mogelijkheden van opslag onder de loep te nemen. Bitcoin maxi's hechten veel waarde aan self custody, oftewel het zelf bewaren van je Bitcoin. Zij zien de controle over je eigen digitale vermogen als een fundamenteel principe van de cryptocurrency-filosofie: "Not your keys, not your coins". Er zijn verschillende vormen van opslag mogelijk. De eenvoudigste optie is je crypto op een handelsplatform (exchange) bewaren. Dit heeft als voordeel dat het gebruiksvriendelijk is, maar het nadeel is dat je de controle uit handen geeft. Vroeger werd dit door velen gezien als onveilig, maar de beveiliging is tegenwoordig sterk verbeterd. Wel blijft tweefactorauthenticatie (2FA) cruciaal voor de beveiliging van je account. Er bestaan bovendien aanzienlijke verschillen in veiligheid tussen exchanges. Voor wie meer controle wil, zijn er software wallets en hardware wallets. Bij beide opties neem je de opslag in eigen beheer. De vraag is natuurlijk wanneer deze stap verstandig is. Sommigen adviseren deze stap te zetten zodra je cryptobezit meer dan 1000 euro waard is. Hierbij is het essentieel om te begrijpen wat public keys en private keys zijn. De public key is vergelijkbaar met je rekeningnummer, terwijl de private key toegang geeft tot je crypto. Het veilig opslaan van deze private key is cruciaal, evenals nadenken over wat er gebeurt als jou iets overkomt. Software wallets zijn programma's die je installeert op bijvoorbeeld je laptop of smartphone. Het voordeel is dat ze gebruiksvriendelijk en vaak gratis zijn. Het nadeel is dat ze kwetsbaarder zijn voor hacks omdat ze verbonden zijn met het internet. Er zijn verschillende gebruiksvriendelijke wallet-apps beschikbaar voor zowel Android als iOS. Hardware wallets worden gezien als de veiligste manier om crypto op te slaan. Dit zijn losse apparaatjes, niet verbonden met het internet, waar je private keys veilig op staan. Het voordeel is de hoge veiligheid, het nadeel de aanschafkosten en iets meer complexiteit in gebruik. Bij de aanschaf van een hardware wallet is het belangrijk te letten op de reputatie van de fabrikant en de ondersteunde cryptocurrencies. De meest voorkomende beginnersfouten bij het zelf bewaren van crypto zijn het verliezen van private keys, het niet maken van back-ups en het vallen voor phishing-aanvallen. Tot slot speelt vertrouwen een belangrijke rol: wie hardware en software wallets maakt, heeft grote invloed op de veiligheid van je crypto. Gasten Bart Mol Veronique Estié Links Host Meindert Schut Redactie Wouter Hoes See omnystudio.com/listener for privacy information.

Rocky Mountain Marketing
Here's How to Recover Your Account if your Hacked on LinkedIn

Rocky Mountain Marketing

Play Episode Listen Later May 1, 2025 7:57


This week's Rocky Mountain Marketing Quickcast wraps up our account recovery series with one of the most overlooked (but critical) platforms: LinkedIn. You may not post there often—but your future clients, collaborators, podcast hosts, and even the media absolutely check it. And if your LinkedIn gets hacked, the damage isn't just annoying—it's reputation-ruining.In under 10 minutes, I walk you through:What to do if your LinkedIn is hacked or compromisedHow LinkedIn's recovery partner (Persona) actually worksWhat ID you'll need to submit—and why it's legitA full post-hack checklist to secure your professional presenceDon't wait until your reputation is at risk. This is your proactive LinkedIn playbook.Time Stamps00:00 – Why LinkedIn matters more than you think00:30 – The dangers of low LinkedIn activity01:10 – Yes, even 2FA accounts get hacked01:45 – Step-by-step: How to start recovery with LinkedIn02:30 – What is Persona and why it's safe03:15 – ID verification: What you'll need04:00 – How fast LinkedIn responds after ID submission04:30 – Create a rock-solid new password05:00 – The ultimate post-hack LinkedIn checklist06:15 – Why one hacked post could cost you clients07:00 – Final mindset shift to stay ahead of threats08:00 – Closing tips & how to protect your reputationLearn more about Katie and Next Step Social Communications:Speaking: https://katiebrinkley.com/Website: https://www.nextstepsocialcommunications.comLinkedin: https://www.linkedin.com/in/katiebrinkleyYouTube: https://www.youtube.com/channel/@rockymountainmarketingInstagram: https://www.instagram.com/iamkatiebrinkley/Facebook: https://www.facebook.com/groups/socialprofitlab#LinkedInTips #AccountRecovery #RockyMountainMarketing #QuickCast #KatieBrinkley #CyberSecurityTips #LinkedInMarketing #ReputationMatters #SocialMediaHacks #DigitalSafety Hosted on Acast. See acast.com/privacy for more information.

Rocky Mountain Marketing
TikTok Account Recovery Tutorial

Rocky Mountain Marketing

Play Episode Listen Later Apr 24, 2025 9:26


Locked out of TikTok? Whether it's a forgotten password, a hacked account, or an unexpected ban, today's Quickcast gives you the step-by-step blueprint to get back in—fast. In this no-fluff episode, I'm breaking down what to do right now if your TikTok account goes dark, and the exact ways to recover it safely.Inside this 8-minute strategy drop, I cover:How to reset your TikTok password (even without email or phone access)What to do if your account is banned, hacked, or deletedRecovery methods for login via Facebook, Google, or AppleA TikTok security checklist to prevent future disastersIf you're a business owner, creator, or agency using TikTok, this is a must-listen. Save it, share it, and make it part of your monthly maintenance routine. 00:00 – Intro: TikTok trouble is real 01:00 – Forgot password? Here's the easy reset method 01:45 – What to do when you can't access email or phone 02:30 – How to appeal a banned TikTok account 03:15 – Fixing ad account suspensions in TikTok Ads Manager 04:00 – Deleted your account? You might still recover it 04:45 – What to do if you lost access to 2FA 05:30 – Recovering logins via Facebook or Google 06:00 – Signs you've been hacked + how to fix it 07:00 – Katie's TikTok Security Checklist 08:00 – Final tips & monthly action stepsLearn more about Katie and Next Step Social Communications:Speaking: https://katiebrinkley.com/Website: https://www.nextstepsocialcommunications.comLinkedin: https://www.linkedin.com/in/katiebrinkleyYouTube: https://www.youtube.com/channel/@rockymountainmarketingInstagram: https://www.instagram.com/iamkatiebrinkley/Facebook: https://www.facebook.com/groups/socialprofitlab#TikTokAccountRecovery #QuickCast #RockyMountainMarketing #KatieBrinkley #TikTokHelp #SocialMediaStrategy #CreatorSupport #TikTokSecurity #DigitalMarketingTips #MarketingPodcast Hosted on Acast. See acast.com/privacy for more information.

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier
Nissan's Tariff Plan, Working Man's Cybertruck, Cybercriminals Mimic Google

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier

Play Episode Listen Later Apr 22, 2025 14:31


Shoot us a Text.Episode #1025: We cover Nissan's plan to hold vehicle prices through early June and increase U.S. production in response to tariffs. Plus we examine Tesla's strategic repositioning of the Cybertruck and how cybercriminals are creating a realistic-looking phishing campaign using Google's own tools.Show Notes with links:Nissan is staying steady on pricing through June 2 and looking to its underused U.S. factories to soften the blow of auto tariffs. The strategy focuses on affordability and domestic production leverage.Nissan has a 3-month supply of tariff-free vehicles and won't raise prices yet.The company plans to boost output at Smyrna, TN and Canton, MS plants, all of which operated at half their capacity in 2024.Rogue production will jump by 54% over the next year, adding 60,000 units, while price cuts of $1K on 2025 Rogue and Pathfinder aim to drive demand.Nissan is incentivizing retailers with its April and May dealer volume bonus program, which pays extra cash to stores that meet sales targets.“We count all the cars [toward the sales target], but we only pay on the U.S.-made cars because we want to give [them a] tailwind,” said Nissan Americas Chair Christian MeunierTesla is quietly shifting the Cybertruck's identity from status symbol to workhorse after early hype faded, trucks stockpiled, and political ties turned divisive. The new approach aims to resonate with a more traditional truck-buying audience.Cybertruck deliveries remain under 50,000; demand has sharply declined with sales dropping 50% in Q1.Tesla updated the product page with rugged, utilitarian imagery, aligning with Ford's F-150 ads.Sales teams report it's harder to sell the truck to actual truck buyers; its novelty isn't enough."They need to advertise durability. It needs to be used and abused, and all of the capabilities that make it a work truck need to be on full display," said Edmunds' Ivan Drury.Cybercriminals are exploiting Google's own “Sites” app to run a phishing campaign that convincingly mimics law enforcement subpoenas and bypasses email authentication safeguards.Emails appear from “no-reply@google.com” and claim law enforcement access to your account.Attackers use Google Sites to create convincing portals that evade DKIM checks.DomainKeys Identified Mail (DKIM) authentication is passed since the emails originate from Google's own infrastructure.Google has acknowledged the issue and is deploying mitigations while encouraging 2FA and passkeys.Join Paul J Daly and Kyle Mountsier every morning for the Automotive State of the Union podcast as they connect the dots across car dealerships, retail trends, emerging tech like AI, and cultural shifts—bringing clarity, speed, and people-first insight to automotive leaders navigating a rapidly changing industry.Get the Daily Push Back email at https://www.asotu.com/ JOIN the conversation on LinkedIn at: https://www.linkedin.com/company/asotu/

על המשמעות
#714 עינת מירון - מומחית הסייבר מזהירה: "ישראל לא באמת מוגנת! התוקפים צעד לפנינו!"

על המשמעות

Play Episode Listen Later Apr 10, 2025 38:24


בפרק זה של הפודקאסט "על המשמעות" עו"ד תמיר דורטל מארח את עינת מירון, מומחית סייבר המסייעת לארגונים בהתמודדות עם מתקפות סייבר, לשיחה מרתקת ומטרידה על המציאות שמאחורי הכותרות הנוצצות של "מעצמת הסייבר".השיחה נפתחת בפרשת מוריה אשרף במשרד ראש הממשלה, כמקרה בוחן לכשלים פיזיים שעלולים להפוך בקלות לאירועי סייבר הרסניים, וממשיכה לצלול לעומקם של אירועי סייבר גדולים שהתרחשו בישראל ובעולם. עינת מירון מפרטת את ההשלכות הקשות של מתקפת הסייבר על בית החולים הילל יפה – השבתה של 54 ימים ועלות מוערכת של עשרות מיליוני שקלים למשלם המיסים – ומדגימה כיצד גם ארגונים גדולים ומתוקצבים, כמו חברת הביטוח שירביט (שנסגרה ונמכרה בסכום זעום בעקבות מתקפה) או תאגיד הענק כלורוקס, אינם חסינים.האם ישראל באמת "מעצמת סייבר" או שמא מדובר במיתוג מוצלח שמסתיר פערים מדאיגים בהגנה האמיתית על תשתיות וארגונים? מירון טוענת שהתוקפים, בין אם מדינתיים ובין אם פליליים, תמיד נמצאים צעד אחד לפנינו, מונעים ממוטיבציה גבוהה ופועלים ללא מגבלות, בעוד שהארגונים המותקפים כבולים ברגולציה שלעיתים אינה יעילה (כמו תקן ISO שלא תמיד מיושם כראוי) ובמגבלות תקציב ונהלים. היא אף מותחת ביקורת על מערך הסייבר הלאומי, שלטענתה אינו מסוגל לתת מענה אמיתי לכלל הארגונים במשק.מירון מספקת גם שורה של המלצות מעשיות וצעדים שכל אדם וכל ארגון, קטן כגדול, יכולים וצריכים לנקוט כדי להקשות על התוקפים ולצמצם נזקים פוטנציאליים, כולל חשיבותם של גיבויים (גם פיזיים!), החלפת סיסמאות, שימוש באימות דו-שלבי (2FA) והיערכות לתרחיש שבו המערכות הדיגיטליות פשוט קורסות.00:00:00-00:03:34 הקדמה ופתיחה: מוריה אסרף והחדירה למשרד ראש הממשלה00:03:34-00:06:50 מתקפת הסייבר על בית חולים הלל יפה והשלכותיה00:06:50-00:11:16 כשל בתקינה הבינלאומית ודוגמת חברת Clorox00:11:16-00:14:46 לינקדין כפלטפורמת תקיפה ופרשת פגסוס00:14:46-00:17:57 קשר בין שבת למערך הסייבר ופעילות האקרים00:17:57-00:21:30 ישראל ומעצמות סייבר - מציאות לעומת פוטנציאל00:21:30-00:25:27 הפרצות של חברות הייטק ופינטק ומתקפות סייבר יומיומיות00:25:27-00:29:31 מקרה שירביט והשלכותיו על עובדי מדינה ואנשי ביטחון00:29:31-00:33:18 סיכוני סייבר נלווים - דוגמת הקייטרינג בבית חולים מעייני הישועה00:33:18-00:41:05 תפקיד מערך הסייבר, נהלים לא יעילים והצורך בגיבויים פיזיים00:41:05-00:48:50 המלצות מעשיות לאבטחת מידע00:48:50-00:51:08 סיכום והמלצות נוספות להתנהלות נכונה בעולם הסייבר#פודקאסט #על_המשמעותSupport the show◀️ פרסמו אצלנו - לקבלת הצעת מחיר: פנו לג'ו - 054-236-0136 - https://wa.me/972542360136▶️

Geopolitics & Empire
Nik Kraljevic: Dual Citizenship, Privacy, & Why Technocracy’s Tough to Implement

Geopolitics & Empire

Play Episode Listen Later Apr 6, 2025 52:03


Nik Kraljevic of Societatis Civis and PassVult discusses dual citizenship and internationalization which he helps facilitate through his CitizenHR, CitizenIT, CitizenPL, CitizenAR, and CitizenPY apps. He also gives his broad opinion on cybersecurity, privacy, surveillance, and why he thinks it will be difficult for governments to streamline technocracy. He describes one of his privacy solutions known as PassVult, an offline password manager which also functions as 2FA and has a "Dead Man's Switch". Watch on BitChute / Brighteon / Rumble / Substack / YouTube Geopolitics & Empire · Nik Kraljevic: Dual Citizenship, Privacy, & Why Technocracy's Tough to Implement #536 *Support Geopolitics & Empire! Become a Member https://geopoliticsandempire.substack.com Donate https://geopoliticsandempire.com/donations Consult https://geopoliticsandempire.com/consultation **Visit Our Affiliates & Sponsors! Above Phone https://abovephone.com/?above=geopolitics easyDNS (15% off with GEOPOLITICS) https://easydns.com Escape Technocracy course (15% off with GEOPOLITICS) https://escapethetechnocracy.com/geopolitics PassVult https://passvult.com Sociatates Civis (CitizenHR, CitizenIT, CitizenPL) https://societates-civis.com Wise Wolf Gold https://www.wolfpack.gold/?ref=geopolitics Websites Sociatates Civis (CitizenHR, CitizenIT, CitizenPL) https://societates-civis.com PassVult https://passvult.com PassVult's VIP Cybersecurity Service https://passvult.com/vip X https://x.com/Security_Sleuth About Nik Kraljevic Nik Kraljevic is an entrepreneur and Cyber Security professional. Nik is the founder of Sociatates Civis which helps make Dual Citizenship simple by systematising and simplifying the process for the user by guiding them through questions and showing them if they are eligible, suggesting paths they can take, including cheat codes and hacks to skip the naturalization queue, and bringing the cost down for users by connecting them with trusted partners. Nik is also the creator of PassVult, the ultimate anti-cloud and privacy focused password manager. The cloud is just somebody else's computer, so don't store your credentials on it! *Podcast intro music is from the song "The Queens Jig" by "Musicke & Mirth" from their album "Music for Two Lyra Viols": http://musicke-mirth.de/en/recordings.html (available on iTunes or Amazon)

The CyberWire
No click, all tricks.

The CyberWire

Play Episode Listen Later Mar 26, 2025 30:42


Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK's NCSC goes full influencer to promote 2FA. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about the importance of networking and creating a directory for former government and military professionals. Selected Reading New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch (cybersecuritynews) Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows (Reuters) New npm attack poisons local packages with backdoors (bleepingcomputer) macOS Users Warned of New Versions of ReaderUpdate Malware (securityweek) DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop (cybersecuritynews) ENISA Probes Space Threat Landscape in New Report (Infosecurity Magazine) CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS (cybersecuritynews) Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft (hackread) NCSC taps influencers to make 2FA go viral (The Register)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Windows Weekly (MP3)
WW 921: Regret as a Service - Drag tray, 3 new Framework PCs, Free Office test?

Windows Weekly (MP3)

Play Episode Listen Later Feb 27, 2025 159:02


Week D - If a preview update falls in the woods and no one downloads it, did it really happen? Plus, what is going on with AI for free? Isn't this stuff expensive? Windows 23H2/24H2: Taskbar share, Spotlight updates, Windows Backup snooze in File Explorer, etc. Dev and Beta - Semantic search adds OneDrive photo search to Search (was in File Explorer previously), plus the Recall reboot no one is explaining. And Trim comes to Snipping Tool (Canary and Dev) Beta (23H2) - Share gets a drag tray and Start All apps gets new Grid and Category views Lenovo revenues surge 20 percent Framework announces Ryzen AI-based Laptop 13, plus Laptop 12 and Desktop Opera adds Bluesky, Discord, and Slack to the sidebar Microsoft 365 Microsoft confuses us with a test of a free, ad-supported core Office suite for Windows Amazon kills Chime, will use Zoom, Teams, and more Amazon kills Appstore for Android Google to drop SMS-based 2FA, move to QR codes Paul continues with his SSO removals, an update on whether this impacts account availability AI/Dev Following up the previous discussion with an interesting way to use an AI chatbot Alexa enters the AI era OpenAI now has 400 million weekly active users Microsoft cancels some AI datacenter leases, but it's not done spending billions on AI Anthropic releases first reasoning model, with a twist Gemini Code Assist is now free for individuals! ThinkDeeper and Voice in Copilot no longer have usage restrictions OpenAI makes Deep Research available to all paid customers Apple delays biggest Siri advances past iOS 18.4 - Math is hard, but AI is even harder Spotify expands into AI-narrated audiobooks NVIDIA partners to bring free ASL training to everyone .NET 10 Preview 1 arrives with the promise of LTS and not much else Xbox Xbox Cloud Gaming gets its first update in a while, and it's a big one Microsoft delays Fable reboot to 2026 Tips and Picks Tip of the week: You can view the source code for the oldest machine-readable version of Unix App pick of the week: Adobe Photoshop for iPhone RunAs Radio this week: Exchange Server in 2025 with Michel de Rooij Brown liquor pick of the week: Glenrothes 15 Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to Windows Weekly at https://twit.tv/shows/windows-weekly Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/windowsweekly cachefly.com/twit

All TWiT.tv Shows (MP3)
Windows Weekly 921: Regret as a Service

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 27, 2025 159:02 Transcription Available


Week D - If a preview update falls in the woods and no one downloads it, did it really happen? Plus, what is going on with AI for free? Isn't this stuff expensive? Windows 23H2/24H2: Taskbar share, Spotlight updates, Windows Backup snooze in File Explorer, etc. Dev and Beta - Semantic search adds OneDrive photo search to Search (was in File Explorer previously), plus the Recall reboot no one is explaining. And Trim comes to Snipping Tool (Canary and Dev) Beta (23H2) - Share gets a drag tray and Start All apps gets new Grid and Category views Lenovo revenues surge 20 percent Framework announces Ryzen AI-based Laptop 13, plus Laptop 12 and Desktop Opera adds Bluesky, Discord, and Slack to the sidebar Microsoft 365 Microsoft confuses us with a test of a free, ad-supported core Office suite for Windows Amazon kills Chime, will use Zoom, Teams, and more Amazon kills Appstore for Android Google to drop SMS-based 2FA, move to QR codes Paul continues with his SSO removals, an update on whether this impacts account availability AI/Dev Following up the previous discussion with an interesting way to use an AI chatbot Alexa enters the AI era OpenAI now has 400 million weekly active users Microsoft cancels some AI datacenter leases, but it's not done spending billions on AI Anthropic releases first reasoning model, with a twist Gemini Code Assist is now free for individuals! ThinkDeeper and Voice in Copilot no longer have usage restrictions OpenAI makes Deep Research available to all paid customers Apple delays biggest Siri advances past iOS 18.4 - Math is hard, but AI is even harder Spotify expands into AI-narrated audiobooks NVIDIA partners to bring free ASL training to everyone .NET 10 Preview 1 arrives with the promise of LTS and not much else Xbox Xbox Cloud Gaming gets its first update in a while, and it's a big one Microsoft delays Fable reboot to 2026 Tips and Picks Tip of the week: You can view the source code for the oldest machine-readable version of Unix App pick of the week: Adobe Photoshop for iPhone RunAs Radio this week: Exchange Server in 2025 with Michel de Rooij Brown liquor pick of the week: Glenrothes 15 Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to Windows Weekly at https://twit.tv/shows/windows-weekly Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/windowsweekly cachefly.com/twit

Cancel Me, Daddy
What's the Meta With You? (ft. Tat Bellamy-Walker)

Cancel Me, Daddy

Play Episode Listen Later Feb 21, 2025 52:47


From Mark Zuckerberg at the inauguration to Elon Musk in the oval office, the tech broligarchy is upon us, shaping policy to erase trans people, Black people, and “childless cat ladies” from the Internet and ultimately from public life. “Cis” has been a slur on Twitter since 2023. More recently, Meta, the parent company of Facebook and Instagram, put an end to third party fact-checking, reduced automated content moderation, and loosened hateful conduct standards. Guest Tat Bellamy-Walker joins Katelyn and Christine on this week's episode to identify and clarify Meta's three-pronged attack. Bellamy-Walker, a longtime journalist turned program manager of digital safety training and resources (media) at PEN America, provides us—and listeners—with tangible steps to protect ourselves and each other online. Listen and learn about digital hygiene, counter speech, resources, and more. 2FA all the way!Citations: Follow Tat Bellamy-Walker on Twitter: @bell_tatiPEN America's Online Harassment Field ManualExtensive safety resources geared toward women and nonbinary journalists at the International Women's Media FoundationDonate to the Black Journalists Therapy Relief FundDelete Me and other subscription services to scrub your personal data from the InternetDonate to the Trans Journalists AssociationSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The CyberWire
AI's blind spots need human eyes.

The CyberWire

Play Episode Listen Later Feb 14, 2025 34:10


Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple's App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape." Selected Reading Putting the human back into AI is key, former NSA Director Nakasone says (The Record) Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day) Musk's DOGE team: Judges to consider barring it from US government systems (Reuters) Anyone Can Push Updates to the DOGE.gov Website (404 Media) Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer) Apple app tracking rules more strict for others – watchdog (The Register) PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer) CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits (Cyber Security News)  Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers)  SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek) Have I Been Pwned likely to ban resellers (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices