POPULARITY
Categories
Do you ever feel like your practice culture is toxic? In this episode, Kirk Behrendt brings back Adriana Booth, one of ACT's amazing coaches, to list the seven toxic habits that you might be doing, how they're affecting your culture, and what you can do to create a happier, more committed team. Great culture doesn't happen by accident! To learn how you might be sabotaging your team and what you can do to fix it, listen to Episode 951 of The Best Practices Show!Learn More About Adriana:Join Adriana on Facebook: https://www.facebook.com/adriana.boothFollow Adriana on Instagram: https://www.instagram.com/adrimariebSend Courtney an email to learn more about ACT: courtney@actdental.com More Helpful Links for a Better Practice & a Better Life:Subscribe to The Best Practices Show: https://the-best-practices-show.captivate.fm/listenJoin The Best Practices Association: https://www.actdental.com/bpaDownload ACT's BPA app on the Apple App Store: https://apps.apple.com/us/app/best-practices-association/id6738960360Download ACT's BPA app on the Google Play Store: https://play.google.com/store/apps/details?id=com.actdental.join&hl=en_USJoin ACT's To The Top Study Club: https://www.actdental.com/tttGet The Best Practices Magazine for free: https://www.actdental.com/magazinePlease leave us a review on the podcast: https://podcasts.apple.com/us/podcast/the-best-practices-show-with-kirk-behrendt/id1223838218Episode Resources:Watch the video version of Episode 951: https://www.youtube.com/@actdental/videosRegister to ACT's BPA for their Guide to Building Trust: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fa-team-playbook-to-maximize-performance-handout#emailRegister to ACT's BPA for their How Trustworthy Are You? tool: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fhow-trustworthy-are-you#emailRegister to ACT's BPA for their Rules of Engagement tool:
The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&T's CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest CISO Perspectives host Kim Jones previews the upcoming season, sharing what's ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener here. Selected Reading Cache of Devices Capable of Crashing Cell Network Is Found Near U.N. (The New York Times) Secret Service Disrupts Threat Network Near UN General Assembly (YouTube) JLR extends shutdown – again – as toll on workers laid bare (The Register) The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams (The Verge) Nimbus Manticore Deploys New Malware Targeting Europe (Check Point Research) Kimsuky attack disguised as sex offender notice information (Logpresso) GitHub tightens npm security with mandatory 2FA, access tokens (Bleeping Computer) NPM package caught using QR Code to fetch cookie-stealing malware (Bleeping Computer) LastPass: Fake password managers infect Mac users with malware (Bleeping Computer) Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques (CyberScoop) Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases (PCMag) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!
Worried about the personal risks when your phone and your digital identity, falls into the wrong hands? This episode of Everything Counts dives deep into the realities of phone theft and the ripple effects it can have on your banking, social media, passwords and more. Join host Motheo Khoaripe as he chats with Kevin Hogan, Head of Fraud Risk at Investec and cybersecurity expert Anna Collard to uncover how fraudsters gain access, the myths about phone security and the vital steps you must take immediately to secure your money and digital life. Learn about the importance of long passwords, biometric security, virtual cards for safer online shopping, spotting phishing scams, managing your digital footprint and using tools like remote wipe and password managers. Discover why acting fast, staying vigilant and adopting good digital habits can keep you one step ahead of fraudsters. Whether you've experienced phone theft or want to safeguard your digital world before it happens, this episode empowers you to protect what matters most. 00:00 Introduction 01:20 What do you do if your phone is stolen? 02:00 Phone security isn't bulletproof: weak passwords are common 03:00 How to keep your phone secure: Strong passwords and facial recognition 04:00 Delink stolen device from your banking accounts 05:00 How fraudsters use your WhatsApp, iTunes and social media accounts 06:00 What do fraudsters look for once they have your phone? 07:30 Security tips for online shopping 10:00 The risks of using a credit card 10:40 What are virtual cards and how do virtual cards work? 12:00 How can you check if a website is legit? 13:00 Why you shouldn't use instant EFT payments 15:00 Everyday habits that can lead to digital security risks 16:10 Don't conduct financial transactions in public 16:35 Risk of not updating software 18:00 What is NFC and how does it work? 18:30 Paying using Apple Pay or Google Wallet 20:15 How secure are biometrics features on your phone? 21:00 Remote wipe function: What it is and how does it work? 22:00 What is a faraday pouch? 22:40 How to keep your email account safe 23:45 ISPs in South Africa don't have 2FA for email 24:30 The value of a password manager 26:15 Digital mindfulness: How to stay safe online 27:00 The threat of social engineering 29:15 Update your passwords and change your passwords regularly 30:30 Conclusion Investec Focus Radio SA
The supply chain attacks on npm continue and this week, Crowdstrike's npm packages fell victim to the “Shai-Hulud” worm. To mitigate the potential of downloading these malicious packages, consider pinning specific package versions in JS projects and using 2FA to publish new package versions to npm.Also this week, WebAssembly Specification (Wasm) released v3.0. This version dramatically expands the memory Wasm apps can use, supports multiple memory usage, and now allows garbage collection.It's been a while since we last covered LLM options for folks who want to run their own models locally or in the browser, so Jack gives a quick rundown of some of the best options out today. There's WebLLM from MLC, MediaPipe from Google, and ONNX from Microsoft, and although none are easily interchangeable with another, if cost, privacy, or working offline are concerns of your LLM-enabled app, these may be good options to explore.Chapter Markers:00:58 - npm supply chain attack16:28 - Wasm 3.023:34 - LLM options in the browser34:41 - Jack's experience at CascadiaJS and a discussion on the value of in-person conferences in 202541:54 - GitHub's new MCP registry43:26 - Microsoft Paint is getting project files46:54 - What's making us happyLinks:Paige - “Shai-Hulud” supply chain attack on npm continues against Crowdstrike npm packages and pnpm 10.16 minimumReleaseAge settingJack - LLM options in the browser: WebLLM, MediaPipe, ONNXTJ - Wasm 3.0GitHub's new MCP registryMicrosoft Paint is getting its own Photoshop-like project filesPaige - Great British Bake Off season 16 is back!Jack - YoyosTJ - phishyurl.comThanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
News and Updates: A Boston medical study found smartphone use on the toilet raises hemorrhoid risk by 46%. Phone users stayed seated far longer — often 6–15 minutes — amplifying pressure that leads to painful swelling. While causation wasn't proven, doctors warn the habit may be fueling the condition. Taco Bell is rethinking AI drive-thrus after viral failures, like glitchy bots repeating orders or a prank request for 18,000 cups of water. The chain says humans may still be better in high-volume locations. Rival fast food chains Wendy's and McDonald's are pushing ahead with AI rollouts in 2025. At IFA 2025, Amazon, Google, Samsung, and LG touted AI-powered smart homes that anticipate user needs — from proactive lighting to predictive repairs. But privacy, infrastructure, and reliability remain major hurdles before homes achieve Star Trek–style ambient computing. A new survey shows 85% of U.S. college students use generative AI for coursework, calling it a “24/7 tutor.” Students want clear rules and training, not bans, though many admit AI can weaken critical thinking. Despite AI's rise, most still see college as relevant — though its payoff may be shrinking. A lottery expert warns Powerball's “Quick Picks” feature hurts players' odds by generating duplicate numbers, just as the jackpot swells to $1.7B. Officials deny foul play, but critics urge filling tickets by hand. Odds remain astronomical at 1 in 292 million. Confusion erupted over Gmail security after reports falsely claimed Google told 2.5B users to reset passwords. Google clarified no mass breach occurred, though hackers have targeted Salesforce data and used vishing scams. The company urges 2FA, passkeys, and vigilance against phishing.
Want help building a brand strategy that keeps clients coming back? Work with Deirdre to craft your uncopyable brand, offers, messaging, and experiences that make your growth inevitable.—--Most small-business owners tell themselves they're “too small to hack” or they'll get to security “later.” But one rushed click, one reused password, or one fake “invoice” email can freeze your accounts, lock your files, and wipe out months of work.In this episode of the Master Your Business Podcast, I sit down with cybersecurity consultant Bryan Altimas to unpack the simplest, lowest-cost moves that block the vast majority of attacks, no tech degree required.Bryan shares jaw-dropping stories (including a CEO who nearly wired £100,000 after a single click), eye-opening realities about phishing and ransomware, and practical ways to protect your business, your clients, and your reputation.If you've ever felt overwhelmed by “cyber stuff,” this episode is your permission slip to stop procrastinating and start protecting, without spending a fortune.We cover:✔️ The 3 biggest mistakes owners make (password reuse, no 2FA, no EDR)✔️ Phishing vs. ransomware, what actually happens after one bad click✔️ Passkeys (finally!) and why they beat even long passwords✔️ The Apple vs. Windows myth, why both are targets now✔️ How AI makes scams look real (and a simple safe-word protocol to beat voice clones)✔️ Backups that actually save you and why “the cloud” isn't oneHighlights[02.26] Why cyber feels intimidating (and why it doesn't have to)[03.45] The 90s origin story: weak passwords, early breaches, hard lessons[05.40] Who's attacking whom? Nation-states vs. organised crime[07.08] Case study: a car post → spoofed email → near £100,000 payment[14.39] Mistake #1: Reusing passwords across apps (and how to stop)[15.24] Password managers share access, not passwords[18.50] Mistake #2: No 2FA - why authenticator apps beat SMS[19.28] Passkeys > passwords: say yes when offered[20.57] Phishing mechanics: urgency, fake logins, and browser malware[23.02] Ransomware in plain English: exfiltration + encryption + extortion[24.42] Cyber resilience: updates, policies, culture, and quick wins[31.25] AI scams, deepfakes, and the “safe-word” protocol[41.30] Backups that work (primary cloud + secondary cloud + offline)[42.20] Feeling overwhelmed? Start with this 6-step checklistAbout Bryan AltimasBryan Altimas is a cybersecurity and technology-risk consultant and the Managing Director of Riverside Court Consulting. With decades in cyber and data protection, including senior work in Big Four consulting, Bryan helps founders, leaders, and teams build practical, resilient security that protects what matters most.
Anthropic support CA AI laws, Albania has a new minister of Corruption and it's AI, A man was convinced by ChatGPT to build a computer to free it, Senator Wyden calls out Microsoft for still allowing RC4 to be used in Ransomware attacks. Cell Phone Recycle, Win 10 update, 2FA, backup to cloud. New HP Laptop, e-Cycle very old laptop, E-cycle and shredding, Win 11 playing DVD on my AIO,
Casi pierdo el canal por un “contrato” demasiado perfecto. Te cuento paso a paso cómo un email de “colaboración anual” casi me hackea YouTube y qué hice para recuperarlo. Si creas contenido o tu negocio vive en redes, guárdate este episodio. En este episodio: • Cómo detecté (tarde) que era phishing aunque el correo parecía real. • Señales rojas: urgencia sutil, adjunto/“contrato” vía enlace, alertas de YouTube ignoradas. • Qué funcionó para recuperarlo: alertas, cambio inmediato de contraseña, 2FA y protocolo de emergencia. • Lecciones para mamás emprendedoras: nadie está inmune; la prevención es diaria. Checklist exprés (cópialo): • 2FA activado en TODO. • Nunca hagas click en enlaces: responde al remitente primero. • Verifica dominios (no solo el “nombre”). • No abras “contratos” desde el móvil. • Cierra sesiones y cambia contraseñas al primer aviso. • Usa gestor de passwords. • Crea un plan de contingencia: quién hace qué en 5 minutos.
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Gabriel Custodiet speaks with the famous "hacker" from Darknet Diaries who was arrested unjustly in Uruguay. The story reveals how your physical possessions, willingness to help, and dependence on tech-illiterate judges can cost you your freedom and sanity. YOUTUBE VERSION WITH CAPTIONS →https://youtu.be/nMgvDE-rg1E GUEST → https://x.com/ADanielHill → linktr.ee/adanielhill → https://www.amazon.com/dp/B08L592FG7 (Hill's book) WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS → https://watchmanprivacy.com/donate.html TIMELINE 00:00 – Introduction 2:20 - Guest introduction 4:30 - Hacker paraphernalia 11:12 - Did hacker paraphernalia cost Alberto his freedom? 19:52 - Losing 2FA tokens 26:00 - How would Albert do 2FA differently today 29:00 - Preparing for disaster 36:20 - Alberto's thoughts on cryptocurrency best practices 44:30 - Thoughts on helpful penetration testing 57:05 - Thoughts on mainstream media that demonized him 1:06:15 - Final thoughts Music by Karl Casey @ White Bat Audio
Cloud Stories | Cloud Accounting Apps | Accounting Ecosystem
Heather Smith & Tyler Caskey join ApprovalMax to have a conversation exploring how finance automation boosts accuracy, prevents fraud, and streamlines processes. Today I'm speaking with Tyler Caskey Partner at The Bean Counters In this episode, we talk about . . . Key Points: How automation reduces human error and speeds approvals Real-world case studies with ApprovalMax & Xero Common vulnerabilities: hacked emails, invoice scams, credit card fraud Risk reduction strategies: 2FA, segregation of duties, virtual credit cards The role of password managers & proactive anti-fraud controls Fraud detection warning signs & team training Stats: $277M lost to payment redirection scams in Australia (2023) 80–90% of finance errors caused by human error Automation can detect fraud 50% faster & reduce losses by 50% Event Preview: Brisbane Xerocon tips & networking advice Apps & Tools Mentioned: ApprovalMax, Xero, Mayday, Power BI, OnePassword, Practice Protect, EFTsure. 00:00 – Welcome & Introductions Hosts set the scene, introduce Tyler Caskey, and outline today's automation & fraud prevention focus. 02:15 – Why Finance Automation is a "No Brainer" How automation improves efficiency, accuracy, and security for finance teams. 05:04 – Real-World Automation Wins Case study: $50M invoice group transforms processes with ApprovalMax & Xero. 08:42 – Common Fraud Vulnerabilities in Small Business From hacked emails to bank detail changes—how fraudsters infiltrate. 12:15 – Invoice Scams & How to Spot Them Practical warning signs and red flags finance teams should never ignore. 15:50 – Credit Card & Virtual Card Fraud Prevention Reducing risk with approval processes and controlled card usage. 19:32 – Passwords, 2FA & Segregation of Duties The non-negotiable security practices for finance teams. 23:05 – Fraud Cost & Prevention Statistics Eye-opening data on human error, scam losses, and automation benefits. 26:40 – Training Your Team for Fraud Awareness Creating a culture that detects scams before they succeed. 29:55 – ApprovalMax Features That Reduce Risk Notifications, audit trails, and bank account verification tools. 33:12 – Xerocon Brisbane Preview What Heather & Tyler are excited about—plus networking tips for attendees. 37:18 – Final Advice for Accountants & Bookkeepers Leading clients toward best-practice automation and fraud prevention. Contact details: Accounting Apps newsletter: http://accountingapps.io/ Accounting Apps Mastermind: https://www.facebook.com/groups/XeroMasterMind LinkedIn: https://www.linkedin.com/in/HeatherSmithAU/ YouTube Channel: https://www.youtube.com/ANISEConsulting X: https://twitter.com/HeatherSmithAU
Identity thieves work extra hard to trick us into giving over our personal information. But there are ways for us to implement effective tactics to safeguard our identities and stop thieves in their tracks. In this tip, we're sharing five ways to take steps you can take to make it harder for identity thieves to steal your information. Links: Explore the identity protecting benefits of a Better Checking account IRS Taxpayer Guide to Identity Theft Check out TCU University for financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. Identity theft continues to be more than just a costly headache. Fraud scams and identity theft reports continued to top the list of scams reported to the FTC in 2024. In fact, nearly 6.5 million incidents were reported to the FTC last year, and over 1 million of those incidents included an instance of identity theft. These numbers prove that while scams and identity theft continue to evolve, so do the tactics that criminals use to commit these crimes. In this tip we'll share some lesser-known steps you can take to help avoid becoming the next victim of identity theft and fraud. Use fake answers for your security questions One simple way to add a layer of protection to your accounts is to choose wrong or nonsense answers to security questions. If at age 16, you drove a green SUV, the security answer to “What was your first car?” might be “big avocado” rather than “green Ford Explorer.” The idea is to choose an answer that only has meaning to you and cannot be easily guessed. Real answers to your security questions may have been published in the past if you have ever participated in social media quizzes, polls, and challenges. Avoid using your real information, especially information typically found in security questions, like your mother's maiden name or the name of the street you grew up on, in any situation, no matter how seemingly harmless it may seem. A moment of fun could lead to many lost hours spent repairing damage to your identity. Opt in for multi-factor authentication When available, enable multi-factor authentication ("MFA") to your online accounts. MFA is a type of authentication that adds two or more layers of security beyond a password. If only two factors are used, it is sometimes referred to as two-factor authentication or 2FA. While passwords should always be difficult to guess, and you can work to protect the answers to your security questions, adding another step to the login process decreases the chance that a hacker can gain access to your accounts. MFA typically works by sending a verification code by SMS text, by email, or by voice to a phone number listed on your profile. You must enter the provided code before being allowed to complete the login process. MFA should always be added when available. To know whether your account provider offers MFA, you may need to investigate your online options or give the company a call to ask, as it is not always offered proactively. File your taxes early As this IRS Taxpayer Guide to Identity Theft website states, "tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund." One simple way to avoid scammers getting a hold of your tax refund is to file before they do! Surprisingly, this type of fraud affects an estimated hundreds of thousands of Americans every year. Often, the scam isn't uncovered until an individual tries to file their own return and their refund is rejected because it has already been claimed. When tax season comes around, get everything in order ` and file early. This way you can both mark the chore off your list and avoid leaving your refund out there for someone else to claim. Be smart and stay private on social media Two ways people put themselves at risk on social media are by disclosing their location and engaging with strangers. It's incredibly rare to truly need to share your location with a large group of friends and followers, yet location sharing is often an app's default setting. Some social media platforms keep location sharing on all of the time in the background, so you can always see another user's location. This allows ill-meaning individuals to access your home and work address, your travel routines, when you might be out of town, and your favorite vacation destination. Mobile location settings are often lifesavers when navigating in a new city or avoiding traffic jams, but allowing the social media universe to know where you are at all times is never necessary and can be detrimental to the security of both your identity and your possessions. While most people know to limit the information they share with those they meet online, there are still thousands of cases each year of people losing their money or identity information to a romantic interest or a new friend who wasn't who they claimed to be. Remember to keep your personal information private if you make connections online. Routinely check your "in-app" privacy settings Occasionally, posts, articles, or notifications will remind us to review our privacy information, and for a time after doing a reassessment, our settings will remain locked down. However, sharing a public post from a business (to qualify for a prize, for instance) can reset your privacy preferences for future posts. Creating an intentionally public post, like when you have an item to sell or need to find a missing pet, can also change privacy settings on a future update that you intend to be more personal. On a regular basis, check your privacy settings in the apps where you are active, and take an extra second to check each social post before publishing to ensure that it is reaching only who you intend. Consider culling your friends list to those in your inner circle, or set most of your updates to only reach a select number of friends and family. Games and shopping apps are often checking your background in the same way to show you more relevant and personal ads. Locking down what you are sharing will help you protect your information while also using the internet to stay connected with friends and family in the way that you intend. Add an annual task to your calendar to check in on these security measures and get started now. Also verify that your account passwords aren't reused or easy to guess (especially on banking, mortgage, and investment accounts). And remember, if you suspect that your identity has been compromised, you have access to an Identity Theft Recovery Advocate as a benefit of your Triangle Better Checking account. These professionals are trained and ready to help you reverse the damage and get back on track quickly. They're experienced advocates who know how to spot identity theft and, when necessary, will support you through the process of repairing any damages. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
First up in the news: Mint 22.2 betas now in testing, Arch AUR Under Fire Once More as Malware Resurfaces, Debian 13 Trixie Release Date is Officially Confirmed, and Hyprland Hyprperks have been launched. In Security and Privacy, Introducing Proton Authenticator – secure 2FA, your way and Microsoft Recall issues In Check This Out, Ignition allows you to manage startup apps and scripts And finally, Vibrations From the Ether
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
“The simple believe everything, but the prudent give thought to their steps.” — Proverbs 14:15In an age where scams are becoming more sophisticated by the day, Scripture reminds us that discernment isn't optional—it's essential. As believers, protecting the resources God has entrusted to us is more than a practical concern—it's an act of stewardship. Here's how you can guard your finances with wisdom, not fear.Scams Are Everywhere—But So Is WisdomFraudsters use every channel available: phone calls, text messages, emails, and even impersonations of people you trust. But as followers of Christ, we're not called to panic. We're called to walk in wisdom (Ephesians 5:15). That begins with slowing down and thinking critically.Pause before you respond. Scammers rely on urgency. If someone pressures you to act immediately—whether claiming your account is locked or your money is at risk—take a step back. Hang up. Verify the source independently. Urgency is often a red flag. Avoid untraceable payments. No legitimate organization will ask for payment via wire transfer or gift cards. These are the preferred tools of scammers because they're nearly impossible to recover.Practical Steps for Digital ProtectionFinancial stewardship now includes digital awareness. Here are practical ways to protect yourself and your family:Use credit cards, not debit cards, for online purchases. Credit cards usually come with stronger fraud protection. Enable two-factor authentication (2FA) on all your financial accounts. Even if a scammer gets your password, they can't access your account without a second form of verification. Don't reuse passwords. Use a secure password manager, such as Bitwarden or NordPass, to create and store strong, unique passwords. Set up account alerts. Most banks allow you to monitor activity in real-time, giving you a heads-up if something unusual occurs. Freeze your credit. It's free to do and offers one of the best defenses against identity theft. You can always unfreeze it temporarily when needed. Avoid public Wi-Fi for financial transactions. Wait until you're on a secure network or at home to check your bank accounts or make purchases. Limit what you share on social media. Personal details, such as birthdays or family names, can be used to guess passwords or security questions. Adjust your privacy settings and post wisely. Shred sensitive documents before discarding them. Even in the digital age, identity thieves still dig through trash. Don't click on unfamiliar links, even if they appear to come from someone you know. When in doubt, contact the person or organization directly for clarification.Stewarding Wisdom in CommunityScammers often target the vulnerable, particularly older adults and teenagers. So make this a shared effort. Discuss online fraud with your family. Equip them with knowledge. If you receive a letter or email about identity protection following a data breach, verify it by contacting the company directly, rather than through the provided link or number.Financial faithfulness today includes digital vigilance. But there's no need for fear. By taking these simple steps, you can walk confidently, knowing you're stewarding God's resources with care.A Tool for Wise Stewardship: The FaithFi AppLooking for a practical way to manage your money with wisdom and peace of mind? The FaithFi app is a secure tool that helps you track your spending, plan your giving, and align your finances with biblical values. With 256-bit encryption, your data is protected, and your login credentials are never stored. FaithFi Pro users also receive exclusive articles, digital devotionals, and daily encouragement.Visit FaithFi.com and click “App” or search “FaithFi” in your app store to get started today.Steward your finances wisely. Protect what God has entrusted to you. And walk in peace, not panic.On Today's Program, Rob Answers Listener Questions:My 14-year-old son just started his first full-time summer job, working around 37 to 40 hours a week. I'd like to help him get started with investing and am considering opening a Roth IRA in his name. What's the best way to set that up, and where should we go to open the account?We're debt-free and recently bought a home. Our current vehicle is paid off, but we're thinking about adding a second car with a monthly payment of around $500. I'm a little uneasy about the added expense. How can we determine if this is a wise financial move for us at this time?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)The Money Challenge for Teens: Prepare for College, Run from Debt, and Live Generously by Dr. Art RainerThe Finish Line PledgeSchwab Intelligent Portfolios | BettermentBitwarden | NordPassWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
Chris and Hector break down the massive Qantas Airlines data breach, expose the growing threat of ransomware negotiation scams, and discuss a dam hack in Norway that had potentially disastrous consequences. They get into real-world advice on 2FA bypass scams, the importance of network segmentation, and a candid look at why critical infrastructure hacks are so dangerous. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Ai used to figure out ancient text, Anthropic AI can use copyrighted material but they have to pay for it, MIT finds that if you use ChatGPT you might be getting stupider, Extended support for Win 10, Printer issues HP can't find the Ink, Google Security Questions and 2FA, Small Triangle on my MAC, Cloud backup onedrive,
- Report: Foxconn Sends Most Chinese Employees in India Back to China - Report: Tariffs on Apple Hardware from Vietnam Jump from ~4% to 20% - Canalys: Exciting Q1 PC Import Numbers Are Nothing to Get Excited About - Apple Quizzes Headset Owners on Smart Glasses - Apple Sues Former Vision Pro Exec for Alleged Theft of Trade Secrets - Ming-Chi Kuo Eyes Apple Roadmap for Smart Glasses and Headsets - MLS Season Pass Drops to Half-Price - Jennifer Aniston Onboard for Apple TV+ Series “I'm Glad My Mom Died” - Three-Part Docuseries on UCONN Women's Basketball Bouncing to Apple TV+ - Apple TV+ Kids Series “Stillwater” Coming Back for Fourth Season - Ten-Part Apple TV+ “Neuromancer” Now in Production - Apple TV+ Teases Third Season of “Invasion” - Ahead of Premier, Critics Are Digging Third Season of “Foundation” - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Appeals “Epic” Ruling to 9th Circuit Court - Bipartisan US Senators Reintroduce Legislation to Open App Stores - DOJ iPhone Monopoly Case Set to Proceed - Proton Sues Apple for the Usual Reasons - Apple Shareholder Sues Over Smarter Siri Debacle - Apple Seeds Second Betas for Current OS Updates - Apple Brings Added RAW Support and Image Playground to Pixelmator Pro - Apple Updates Sports App - Podcaster, Blogger Tim Robertson Logs Off - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Barclays Bearish on AAPL Due to iPhone Weakness and Services Worries - Chatterjee: iPhone 16 Panic Buying to Dent iPhone 17 Demand - Apple Joins China Subsidy Program Directly - BofA Weighs Potential Perplexity Purchase by Apple - F1: The Blockbuster - Apple Music Turns 10, Offers Personalized “Replay All Time” Playlist - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we have a realistic, high impact action for you to take today to boost your practice security: set up two-factor authentication (2FA). We discuss: What 2FA is and why it's so useful Where we recommend having 2FA set up How Google Authenticator works for 2FA and why we love it How to set up and use Google Authenticator Action steps to take today to boost practice security with 2FA Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources
Get your customized planning started by scheduling a no-cost discovery call: http://bit.ly/calltruewealth Retirees are increasingly targeted by cybercriminals — and the scams are getting more sophisticated. From fake emails and stolen phones to account takeovers and SIM card fraud, even cautious investors can be at risk. In this episode, Tyler Emrick, CFA®, CFP®, shares a real story of an attempted security breach involving a True Wealth Design client — and what made the firm catch it before damage was done. You'll learn the most common cybersecurity threats facing retirees, how to secure your financial accounts, and what to do if you think you've been scammed. Plus, we cover smart strategies like using a password manager, enabling two-factor authentication, freezing your credit, and why every retiree should have a Trusted Contact on file. If you've worked hard to build a secure retirement, this episode will help you protect it. Here's some of what we discuss in this episode:
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
It makes for a great headline saying that 16 billion passwords were leaked. Was this some new massive data breach? What should you do about it? We take a look. We've got plenty of other tech news, tips, and picks to get you caught up on this week so you can get out there and tech better! Watch on YouTube! - Notnerd.com and Notpicks.com INTRO (00:00) It's not just Prime Video: Max shows 50% more ads now (06:45) MAIN TOPIC: 16 Billion with a B Passwords Leaked (09:20) 16 Billion Apple, Facebook, Google And Other Passwords Leaked No, the 16 billion credentials leak is not a new data breach haveibeenpwned.com Please use passkeys, a password manager, and 2FA! DAVE'S PRO-TIP OF THE WEEK: Schedule Text Message, Send Later on iOS (18:55) JUST THE HEADLINES: (25:35) Applebee's and IHOP plan to introduce AI in restaurants Axolotl discovery brings us closer than ever to regrowing human limbs A mathematician calculated the size of a giant meatball made of every human Scientists once hoarded pre-nuclear steel; now we're hoarding pre-AI content Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic Iran bans officials from using internet-connected devices Scientists create 'world's smallest violin' TAKES: Introducing Oakley Meta Glasses, a New Category of Performance AI Glasses (28:30) macOS Tahoe beta drops FireWire support (36:05) Project Indigo - a computational photography camera app from Adobe (38:55) Why Denmark is dumping Microsoft Office and Windows for LibreOffice and Linux (43:30) BONUS ODD TAKE: Catleidoscope and Catcordian! (46:50) PICKS OF THE WEEK: Dave: Lytro Camera (48:45) Nate: Ryan Trahan YouTube Channel (56:40) RAMAZON PURCHASE - Giveaway! (01:03:35)
In this action-packed episode of AwesomeCast, hosts Michael Sorg and Katie Dudas recap their high-tech adventures at the Formula SAE EV event at Michigan International Speedway. From streaming challenges and tech problem-solving to a surprise appearance by a lizard named Hank, it's a wild ride through the world of engineering and media production. Plus, we get geeky with a new LEGO robotics set for kids, Dragon's Lair nostalgia on Netflix, cutting-edge photo apps, and a Godzilla-themed theater experience!
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Fine Day for an EC Delay - No Live Activities for EU Macs in macOS 26 Tahoe - FireWire Support Missing from First macOS 26 Developer Beta - Google Acknowledges Problem with YouTube Mobile Apps - Nine Sega Forever Games to Grab Before Forever Ends - Apple Vision Pro Gets Immersive Promo for “F1: The Movie” - “Shot on iPhone” Campaign Wins Cannes Lions Award - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
This week on The Checklist, brought to you by SecureMac - Using two-factor authentication is a great idea. Using SMS for 2FA is about the worst way to do it. We'll tell you why. Plus - plot twist for 23andMe. You may think you know the latest, but do you? Listen in and find out on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com
- Yahoo! Finance Digs Apple's WWDC 2025 A.I. Approach - WhatsApp Stands with Apple in UK's Secret iCloud Backdoor Case - DTLA Apple Store Looted Amid Unrest - F1: The Haptic Trailer - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Highlighting Some Features from watchOS 26 - Which Watches Will Support watchOS 26 - Highlighting Some Features from tvOS 26 - Which Apple TVs Can Do tvOS 26 - Highlighting Some Features from visionOS 26 - Apple Analysts Unmoved by WWDC Announcements - Appleverse: A WWDC for Developers - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Refines Apple Intelligence, Opens On-Device LLMs to Developers - Apple's New Design Language: Liquid Glass - Reelin' in the Years: everyOS is 26 - Highlighting Some Features from iOS 26 - iPhone XR and iPhone XS Can't Handle iOS 26 - Highlighting Some Features from iPadOS 26 - 7th-Gen iPad Can't Handle iPadOS 26 - Highlighting Some Features from macOS 26 - macOS 26 is Last Stop for Last Intel Macs - Apple Says Studio Quality Recording Ahead for AirPods - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- WWDC is Mere Hours Away - An Immersive "The Talk Show" for Apple Vision Pro - On the Passing of Bill Atkinson - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- J.P. Morgan: Apple's 9th Circuit Denial Not That Big a Deal - Morgan Stanley: Buyers Will Need Big Discounts to Leave App Store - Deepwater: Apple's Got Two Years to Get Its A.I. Act Together - Report: Apple Plans Second Store for Mumbai - Report: Tata Takes Over iPhone and MacBook Repair in India - Study Says Apple Watch Calorie Burn Metric Not Super Accurate - New Games for Apple Arcade - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
Random but Memorable turns 150! 1️⃣5️⃣0️⃣ (It's official, we're old.)
SteamOS gets a landing page! An Android-powered Wii U gamepad for Linux, drivers for ByoWave Proteus controllers, mechs with pickaxes, and GOG turns on 2FA.
Send us a textLosing your OTP or access to Amazon Seller Central can cost sellers serious time. This video breaks down how to recover your account and prevent future login problems. Includes steps for better 2FA setup, security tips, and tools like Authenticator.Need help securing your Amazon account or getting back in? https://bit.ly/44uHuaR#AmazonSeller #SellerCentral #AmazonAccountHelp #TwoStepVerification #FBAHelpWatch these videos on YouTube:Simple Trick to Cut PPC Costs https://www.youtube.com/watch?v=k5CM6XtYo1c&list=PLDkvNlz8yl_YEKE1B5o1uhbBm1QQcPzmY&index=39How to Increase IPI https://www.youtube.com/watch?v=TMysF_XACdQ&list=PLDkvNlz8yl_b5s-jb7KgPe-aPWP47jZIL-------------------------------------------------Struggling with ads? Download our free PPC guide made for Amazon sellers: https://bit.ly/4kjWmgQWant better rankings? Grab the free Amazon SEO toolkit and start fixing your listings: https://bit.ly/3GW5zxMTimestamps00:00 – What To Do If You Lose Your OTP Code00:30 – Common Mistakes When Setting Up OTP01:20 – Account Recovery Using Amazon.com Login02:00 – Required Documents for OTP Reset03:00 – Manual Review Process by Amazon Security04:00 – Better Ways to Set Up Account Security05:10 – How to Use an Authenticator App06:00 – Using 1Password or LastPass for OTP07:00 – Why All Amazon Sellers Should Update OTP Settings-------------------------------------------------Follow us:LinkedIn: https://www.linkedin.com/company/28605816/Instagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Twitter: https://twitter.com/myamazonguySubscribe to the My Amazon Guy podcast: https://podcast.myamazonguy.comApple Podcast: https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show
В этом выпуске: является ли 500-ый выпуск юбилейным, как погасить наводки-вибрации на вертушки, что нового в Node.js v24 и почему он будет LTS но пока не LTS, сэмплируем резервуары, выбираем между iPhone 11 Pro, iPhone 12 mini и iPhone 13 mini, выбираем правильный способ 2FA, закапываем SQL, а также обсуждаем темы слушателей. [00:03:17] Чему мы… Читать далее →
It's our World Password Day Special!
Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK's NCSC goes full influencer to promote 2FA. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about the importance of networking and creating a directory for former government and military professionals. Selected Reading New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch (cybersecuritynews) Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows (Reuters) New npm attack poisons local packages with backdoors (bleepingcomputer) macOS Users Warned of New Versions of ReaderUpdate Malware (securityweek) DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop (cybersecuritynews) ENISA Probes Space Threat Landscape in New Report (Infosecurity Magazine) CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS (cybersecuritynews) Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft (hackread) NCSC taps influencers to make 2FA go viral (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices