POPULARITY
Categories
In this episode of Banking on Fraudology, Hailey Windham reflects on a transformational year in fraud by unpacking recent, high-stakes cases and zooming out to address the "seismic shift" in the payment ecosystem. The conversation dives into the industry's evolution , highlighting how human intuition, technology, and a unified view of risk are shaping the future of fraud prevention. Key Takeaways: Cases, Controls, and the Future of PaymentsEmpathy and Human Intuition are Essential: The episode shares several cases that underscore the power of the human element.The Mrs. Doubtfire Scam: A bizarre case where a man disguised himself as his deceased 82-year-old mother to collect her pension for three years. The case was cracked by a frontline clerk who noticed the hands looked too young and the voice slipped, proving that intuition is irreplaceable. The Frontline Hero: A Missouri bank teller saved a woman from a jury duty arrest scam by quietly slipping her a note, proving that no AI system can replace human compassion and intuition. The End of Siloed Intelligence (Internal Threat): Insider threats highlight a control problem, not just an employee problem. Cases involving unauthorized withdrawals, debit card ordering, and forged checks by multiple employees at a major US bank point to patterns of inadequate monitoring and excessive permissions. The Tacoma Credit Union case, where a remote employee stole $345,000 weeks after hire, reinforces that remote work requires stronger oversight, and new hires are high-risk periods. Innovation is Working For Us (External Threats): Scams are evolving alongside technology. Scammers are using real bank activity (transaction amounts and timestamps) to build trust and bypass knowledge-based authentication. New tactics include fake CAPTCHAs that install malware to bypass 2FA, log keystrokes, and spy on sessions, leading to rapidly climbing losses. The State of the Fraud Fighter (Payment Rail Shift): The industry must adapt to the speed of instant payments. Scams are the #1 driver of losses across every rail (ACH, Wires, P2P, Zelle, RTP, FedNow); the vulnerability is social engineering, not the rail itself. The number one strategic imperative is to build a unified, real-time view of risk across every payment rail, as regulators now demand real-time resilience and proof that harm could have been prevented. Get in the mood of being grateful for the fraud-fighting community, and be reminded of how strong the fraud-fighting community truly is. Show Notes — Resources & Articles MentionedInsider Fraud Cases1 - Multiple Trust Employees Accused of Draining Customer Accounts — $363,452 in Losses2 - The “Mrs. Doubtfire” Fraud Case (Italian Identity Fraud Scandal) - Source via Frank on Fraud (PDF)3 - Tacoma Credit Union Insider Steals...
Everyone in crypto has a horror story. In this episode, Joel and Travis turn the mic on themselves and the community for a raw, honest look at loss, regret, and the painful side of the crypto journey. Travis recounts how he lost 55 Bitcoin he mined back in 2010 after a hardware failure and no backup of his keys. Joel shares how he was seconds away from reading a 2FA code to a fake “Google security” caller that could have compromised everything tied to his account. Add in a 10 ETH honeypot scam, drained wallets, and NFT phishing, and you start to see a pattern: nobody is immune. Along the way, they read anonymous posts from the CoinFessions account on X – real stories of people who:– Turned life-changing gains into dust by trying to time “one more pump”– Lost six figures to scams and bad decisions– Sat through entire bull runs and never took profits– Finally got it right after years of pain and one big, smart exit This episode covers:– Why even experienced users still get wrecked– The psychology behind never taking profits on the way up– How grief, stress, and desperation make you vulnerable to scams– Why experiences and relationships matter more than your portfolio balance– A brief look ahead at what macro conditions and liquidity might mean for the next phase of the market If you have ever:– Round-tripped your portfolio– Lost coins to a scam, bad link, or bad judgment– Felt alone or ashamed about your mistakes …this is group therapy. You are not the only one. The Bad Crypto Podcast has been here since 2017, and the guys are still in the arena with you. Pull up a chair, listen in, and maybe walk away feeling a little less wrecked and a little more human.Support the show: https://badcryptopodcast.comSee omnystudio.com/listener for privacy information.
Do you think your passwords don't matter because you use 2FA everywhere? I'll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.
2FA continued, Win 11 data Transfer, Proton Mail in my New Years resolution!, Transunion Fraud Alert should I pay for monitoring? My External Drive is Full, Upgraded my phone and I can't get in my mail, new Dell for only $299? Copper Line? Webroot install,
The Cybersecurity Landscape in Austin In this episode, Alison Dixon shares insights into the fast-evolving cybersecurity environment in Austin, Texas. She discusses the rising importance of protecting both personal and corporate data amid growing cyber threats, emphasizing the dual challenge of convenience versus protection. Alison and Michael explore how AI complicates the landscape—accelerating innovation but also introducing new vulnerabilities. They underscore the urgent need for smarter, password-free security solutions and thoughtful tech adoption that prioritizes user safety. AI Integration with Intention Michael and Alison explore the importance of deliberate, strategic integration of AI into business operations. They agree that AI should serve genuine business value, not simply act as a marketing add-on. Clear processes and structured systems must precede AI adoption to avoid inefficiencies. Michael points out that transparency in AI systems, such as chatbots identifying themselves and providing human contact options, can significantly enhance customer trust. Both emphasize the need for balance, restraint, and purpose when embracing new technologies. Balancing AI Budgets and Cybersecurity Priorities The conversation turns to the tension between investing in AI and maintaining strong cybersecurity foundations. Alison warns that over-investing in AI while cutting cybersecurity budgets increases the risk of attacks like phishing and ransomware. Michael shares a real-life story about a senior manager's phone hack that illustrates the importance of vigilance and response protocols. Alison reinforces the need for proactive defenses and risk-reduction strategies rather than reactive training. AI Voice Scams and Public Awareness Michael recounts a growing trend of AI-driven voice scams, where criminals mimic loved ones' voices to exploit victims. He shares a case involving an elderly Toronto couple who lost nearly $100,000 to a voice fraud scheme, stressing the importance of using family “safe words” to verify identity. The discussion underscores how easily anyone—public figure or private citizen—can become a target, highlighting the growing sophistication of AI misuse. Human Factors and Preventive Strategies Alison and Michael discuss why human behavior remains the weakest link in cybersecurity. They argue that education alone is insufficient and that organizations should focus on eliminating risk exposure through stronger systems and policies. Practical steps such as multi-factor authentication, unique passwords, and an “assume it's fake” mindset can dramatically reduce vulnerability. Alison notes that leadership accountability and proactive system design are the true foundations of digital safety. The Role of Two-Factor Authentication and Holiday Vigilance In closing, Michael and Alison revisit the vital role of two-factor authentication (2FA). While it adds a few extra seconds to login, they agree it is a small price for peace of mind. They also caution that the holiday season often brings a spike in cyberattacks, as people let their guard down. Their message is clear: cybersecurity is not just about technology—it's about disciplined habits, awareness, and making security a leadership priority. Alison Dixon, the Chief Customer Experience Officer at Portnox, a leading zero trust network access control platform. Alison is at the forefront of shaping how technical, high-stakes industries like cybersecurity can deliver world-class customer experiences. With a background that spans HR, Sales Enablement, and IT, she brings a uniquely holistic view to customer success—balancing strategy, empathy, and execution. At Portnox, she's led the charge in transforming onboarding into a competitive advantage, expanding CX beyond support, and building programs that reduce churn and drive long-term value. LinkedIn: https://www.linkedin.com/in/alison-dixon-msod/
GRADING MY RECRUITMENT FORECASTS FOR 2025 Every year I write a long post making 20 predictions for the year ahead. This year, for the first time ever, I'm going to grade my predictions and see how I have got on 20 x Predictions for Recruiting in 2025 1. AI Assessment mainstreams; 50% of high volume hirers (more than 5000 hires per year) will have a solution in place by EOY. 2. ‘Skill based hiring' revives as employers describe deployment of AI assessment as commitment to SBH. %age of employers describing themselves as SBH increases 50%. 3. 2FA on job ads increases 400% as an attempt to suppress increased applicant flow. 4. Applications per job increase by 25% as AI-enablement mainstreams candidate side. 5. Big round of investment for AI voice interview vendors currently at Seed - $100M raised in this sector by EOY 2025. 6. Non-FTE vs FTE hiring increases by 10% in 2025. 7. Avg internal TA team goes 25% non-FTE. 8. Req load per recruiter increases 15%. 9. Percentage of solo TA function goes from 73% to 83%. 10. TA teams continue geographic dispersal - %age of TA teams with multinational component increases by 30%. 11. More companies decentralise talent acquisition - %age of employers where HM do outreach increases by 10%. 12. Candidate resentment stabilises - with 2% points either side of 2024 level. 13. ‘Chief Automation Officer' becomes an industry talking point in 2025, same as Chief Diversity Officer in 2020. 14. Speaking of DEIB, clear Atlantic divergence in 2025 - US explicit retrench, Europe implicit progress. 15. US vs UK economic integration deepens - %age of new UK based TA jobs from US employers increases 100%. 16. Global Staffing agencies revenue / profit down another 10% (profit warning again in Q1 2025). 17. But medium sized agencies / RPO stage mini bounce back as employers push more requirements out from denuded TA teams. 18. RecOps, Talent Intelligence roles decline 20%, EB roles decline 30%. People & Culture roles increase 15%. 19. Somebody Ubersises the legions of fractional TA's out there. Probably this is Indeed. 20. Over half of these predictions will be directionally incorrect, 20% will be absolutely incorrect. What should the grading system be? I thinking a sliding scale A to E. What should be the source of truth? That is where we will be bringing in experts from industry who can validate the claims. It's going to be a good one folks. Friday 14th November, 12pm GMT Register by click on the green button (save my spot) and follow the channel here (recommended) to be noticed when we go live. Ep 344 is sponsored by our friends Popp Popp's AI recruitment platform amplifies what your team can do by effortlessly and instantly scaling your recruiting capacity. Popp's recruitment platform sits between your ATS and your talent team, providing unprecedented hiring power at unlimited scale. Our AI automates repetitive tasks throughout the hiring journey, intelligently and accurately. Meaning your team can focus on higher value tasks. Randstand, Robert Walters, Bloom & Wild, AMN Healthcare and more are using Popp to x10 their hiring capacity. Want to know more? Book a demo with one of Popp's friendly founding team
This show has been flagged as Clean by the host. Oathtool 06 OATH Options and Oathtool The OATH standard has several options. You need to know which OATH options the site you wish to log into uses in order to use OATH. 07 Options - TOTP versus HOTP There are two different types of OATH one time passwords, HOTP and TOTP. HOTP uses a counter. I won't go into more detail on HOTP as I haven't come across anyone using it. TOTP uses the current time instead of a counter. The time is fed into the OATH algorithm along with the shared secret to generate a new password on both ends of the connection. All the instances of OATH that I am familiar with use TOTP. 08 TOTP Mode Totp has different "modes". These modes are hash encoding algorithms such as SHA1, SHA256, or SHA512. The correct mode must be selected in order to log in using OATH with TOTP. 09 Encoding - Hex versus Base32 Both ends of the connection must be initialized with a shared secret or key which is required as part of the OATH algorithm. This key could be encoded in one of two forms, either hexadecimal or base32. Web sites often do not document which encoding method they are using. If you cannot determine the encoding of the key by simply looking at it you may need to use trial and error during your first OATH log in attempts to see which type of key has been used. 10 Github and Pypi Options Github and Pypi are two of the most prominent web sites using OATH. Both use the same options, TOTP with SHA1 mode, and base32 encoding. 11 Using Oathtool oathtool is a simple command line application which generates one time passwords for use with OATH. It can be run in a terminal. However, can also be turned into a simple GUI application using Zenity. Will discuss this in more detail later. By default oathtool uses hotp and hex encoding. To use totp and base32 encoding you must specify these on the command line. To specify base32 encoding for use with for example Github, pass the "-b" or "--base32" argument on the command line. To specify TOTP, pass the "--totp" argument on the command line. By default, oathtool uses SHA1 with totp, so you don't need to specify that if you require SHA1. If you need a different TOTP mode, you specify that as part of the TOTP argument separated by an "=" character. For example "--totp=SHA256". 12 Oathtool Example Here is a simple example of using oathtool to create a one time password to use with Github or Pypi. Open a terminal and type the following. oathtool -b --totp SOMEBIGBASE32SECRETCODE The one time password will be printed out in the terminal. You can try this out without using a valid key so long as it is a valid base32 string. When used with a valid key you then enter that one time password into Github, Pypi, or other web site where it asks for the one time password. Note that I have not covered in the above how to store and retrieve the key securely, as that is too big of a topic to cover here. 13 Zenity Example Oathtool is a command line application, but if you are using Linux it is simple to convert it into a GUI application by using "Zenity". Zenity is a simple to use package that creates GUI windows on the command line or in a shell script. There are two steps to the proceess. First create the OTP from the key by using oathtool and save it in a variable. Next, call a Zenity "info" window with the OTP as part of the provided text. You can now copy and paste the OTP from the window into your web browser. To close the window, click on the "OK" button. See the previous note on storing the key securely. hprcode=$(oathtool -b --totp SOMEBIGBASE32SECRETCODE) zenity --info --width=150 --title="HPR 2FA" --text="2FA code is: nn $hprcode n" If you are using Gnome you can make the script launchable from the desktop by creading a ".desktop" file in the "Desktop" directory. Provide feedback on this episode.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Hey everyone—it's Steve Edwards here, and in this episode of JavaScript Jabber, I'm joined by returning guest Feross Aboukhadijeh, founder of Socket.dev, for a deep dive into the dark and fascinating world of open source supply chain security. From phishing campaigns targeting top NPM maintainers to the now-infamous Chalk library compromise, we unpack the latest wave of JavaScript package attacks and what developers can learn from them.Feross explains how some hackers are even using AI tools like Claude and Gemini as part of their payloads—and how defenders like Socket are fighting back with AI-powered analysis of their own. We also dive into GitHub Actions vulnerabilities, the role of two-factor authentication, and the growing need for “phishing-resistant 2FA.” Whether you're an open source maintainer or just someone who runs npm install a little too often, this episode will open your eyes to how much happens behind the scenes to keep your code safe.
In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts disabling Starlink terminals used by scammers Garbage HP update deletes certificates that authed Windows systems to Entra This week's episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation. This episode is also available on Youtube. Show notes US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer | TechCrunch Attackers bypass patch in deprecated Windows Server update tool | CyberScoop CVE-2025-59287 WSUS Unauthenticated RCE | HawkTrace CVE-2025-59287 WSUS Remote Code Execution | HawkTrace Catching Credential Guard Off Guard - SpecterOps Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica Uncovering Qilin attack methods exposed through multiple cases Safety on X: "By November 10, we're asking all accounts that use a security key as their two factor authentication (2FA) method to re-enroll their key to continue accessing X. You can re-enroll your existing security key, or enroll a new one. A reminder: if you enroll a new security key, any" / X SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds | The Record from Recorded Future News SpaceX: Update Your Inactive Starlink Dishes Now or They'll Be Bricked How we linked ForumTroll APT to Dante spyware by Memento Labs | Securelist Former Polish official indicted over spyware purchase | The Record from Recorded Future News HP OneAgent Update Broke Entra Trust on HP AI Devices Windows' Built-in OpenSSH for Offensive Security How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA | WIRED
Aggressive Government RegulationStates are intervening heavily in tech markets. Texas mandated app stores verify ages and restrict minor access starting January 2026, requiring parental approval for under-18 users. The Netherlands took partial control of Chinese chipmaker Nexperia to block sensitive technology transfer. The U.S. FCC forced retailers to delist millions of Chinese electronics from Huawei, ZTE, and others over security concerns.Privacy vs. Security BattlesThe EU postponed "Chat Control" legislation requiring message scanning after insufficient support - only 12 of 27 states backed it. Germany called it "taboo for the rule of law" while 40+ tech firms warned it would harm privacy. Digital activism generated massive opposition emails to lawmakers.California expanded privacy enforcement beyond tech giants, fining Tractor Supply $1.35 million for violating job applicant rights - the CPPA's largest fine. New legislation requires browsers to offer one-click tracking opt-outs by 2027.Evolving Cyber Threats"Scattered LAPSUS$ Hunters" breached Salesforce via compromised third-party app, stealing 1 billion records from major companies including 5.7 million from Qantas. Researchers discovered "pixnapping" attacks on Android that bypass browser protections to steal screen data, including 2FA codes from Google Authenticator in under 30 seconds.Key ImplicationsGeopolitical tensions drive protectionist tech policies as governments prioritize security over privacy. Regulatory enforcement extends beyond major tech to all data-collecting businesses. Supply chain vulnerabilities remain critical attack vectors, with novel mobile threats challenging existing security assumptions.
EP 262In this week's update:Texas's App Store Accountability Act mandates age verification, raising privacy concerns for Apple and Google users.The Dutch government seizes control of Chinese-owned chipmaker Nexperia to protect sensitive technology transfers.And the FCC enforces removal of millions of banned Chinese electronics from U.S. retailers over national security risks.'Pixnapping' attack exposes Android app vulnerabilities, stealing sensitive data like 2FA codes.California fines Tractor Supply $1.35M for violating consumer and job applicant privacy rights.California's 'Opt Me Out Act' requires browsers to offer one-click tracking opt-out by 2027.Danish engineer's mass email campaign disrupts EU's 'Chat Control' bill, highlighting privacy concerns.EU postpones 'Chat Control' vote amid privacy backlash, but revised proposals may resurface.Salesforce data breach leaks customer records after ransom refusal, exposing supply chain vulnerabilities.And... since we have no age restrictions we can get started right away!Find the full transcript to this week's podcast here.
Do you ever feel like your practice culture is toxic? In this episode, Kirk Behrendt brings back Adriana Booth, one of ACT's amazing coaches, to list the seven toxic habits that you might be doing, how they're affecting your culture, and what you can do to create a happier, more committed team. Great culture doesn't happen by accident! To learn how you might be sabotaging your team and what you can do to fix it, listen to Episode 951 of The Best Practices Show!Learn More About Adriana:Join Adriana on Facebook: https://www.facebook.com/adriana.boothFollow Adriana on Instagram: https://www.instagram.com/adrimariebSend Courtney an email to learn more about ACT: courtney@actdental.com More Helpful Links for a Better Practice & a Better Life:Subscribe to The Best Practices Show: https://the-best-practices-show.captivate.fm/listenJoin The Best Practices Association: https://www.actdental.com/bpaDownload ACT's BPA app on the Apple App Store: https://apps.apple.com/us/app/best-practices-association/id6738960360Download ACT's BPA app on the Google Play Store: https://play.google.com/store/apps/details?id=com.actdental.join&hl=en_USJoin ACT's To The Top Study Club: https://www.actdental.com/tttGet The Best Practices Magazine for free: https://www.actdental.com/magazinePlease leave us a review on the podcast: https://podcasts.apple.com/us/podcast/the-best-practices-show-with-kirk-behrendt/id1223838218Episode Resources:Watch the video version of Episode 951: https://www.youtube.com/@actdental/videosRegister to ACT's BPA for their Guide to Building Trust: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fa-team-playbook-to-maximize-performance-handout#emailRegister to ACT's BPA for their How Trustworthy Are You? tool: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fhow-trustworthy-are-you#emailRegister to ACT's BPA for their Rules of Engagement tool:
The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&T's CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest CISO Perspectives host Kim Jones previews the upcoming season, sharing what's ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener here. Selected Reading Cache of Devices Capable of Crashing Cell Network Is Found Near U.N. (The New York Times) Secret Service Disrupts Threat Network Near UN General Assembly (YouTube) JLR extends shutdown – again – as toll on workers laid bare (The Register) The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams (The Verge) Nimbus Manticore Deploys New Malware Targeting Europe (Check Point Research) Kimsuky attack disguised as sex offender notice information (Logpresso) GitHub tightens npm security with mandatory 2FA, access tokens (Bleeping Computer) NPM package caught using QR Code to fetch cookie-stealing malware (Bleeping Computer) LastPass: Fake password managers infect Mac users with malware (Bleeping Computer) Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques (CyberScoop) Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases (PCMag) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!
Worried about the personal risks when your phone and your digital identity, falls into the wrong hands? This episode of Everything Counts dives deep into the realities of phone theft and the ripple effects it can have on your banking, social media, passwords and more. Join host Motheo Khoaripe as he chats with Kevin Hogan, Head of Fraud Risk at Investec and cybersecurity expert Anna Collard to uncover how fraudsters gain access, the myths about phone security and the vital steps you must take immediately to secure your money and digital life. Learn about the importance of long passwords, biometric security, virtual cards for safer online shopping, spotting phishing scams, managing your digital footprint and using tools like remote wipe and password managers. Discover why acting fast, staying vigilant and adopting good digital habits can keep you one step ahead of fraudsters. Whether you've experienced phone theft or want to safeguard your digital world before it happens, this episode empowers you to protect what matters most. 00:00 Introduction 01:20 What do you do if your phone is stolen? 02:00 Phone security isn't bulletproof: weak passwords are common 03:00 How to keep your phone secure: Strong passwords and facial recognition 04:00 Delink stolen device from your banking accounts 05:00 How fraudsters use your WhatsApp, iTunes and social media accounts 06:00 What do fraudsters look for once they have your phone? 07:30 Security tips for online shopping 10:00 The risks of using a credit card 10:40 What are virtual cards and how do virtual cards work? 12:00 How can you check if a website is legit? 13:00 Why you shouldn't use instant EFT payments 15:00 Everyday habits that can lead to digital security risks 16:10 Don't conduct financial transactions in public 16:35 Risk of not updating software 18:00 What is NFC and how does it work? 18:30 Paying using Apple Pay or Google Wallet 20:15 How secure are biometrics features on your phone? 21:00 Remote wipe function: What it is and how does it work? 22:00 What is a faraday pouch? 22:40 How to keep your email account safe 23:45 ISPs in South Africa don't have 2FA for email 24:30 The value of a password manager 26:15 Digital mindfulness: How to stay safe online 27:00 The threat of social engineering 29:15 Update your passwords and change your passwords regularly 30:30 Conclusion Investec Focus Radio SA
The supply chain attacks on npm continue and this week, Crowdstrike's npm packages fell victim to the “Shai-Hulud” worm. To mitigate the potential of downloading these malicious packages, consider pinning specific package versions in JS projects and using 2FA to publish new package versions to npm.Also this week, WebAssembly Specification (Wasm) released v3.0. This version dramatically expands the memory Wasm apps can use, supports multiple memory usage, and now allows garbage collection.It's been a while since we last covered LLM options for folks who want to run their own models locally or in the browser, so Jack gives a quick rundown of some of the best options out today. There's WebLLM from MLC, MediaPipe from Google, and ONNX from Microsoft, and although none are easily interchangeable with another, if cost, privacy, or working offline are concerns of your LLM-enabled app, these may be good options to explore.Chapter Markers:00:58 - npm supply chain attack16:28 - Wasm 3.023:34 - LLM options in the browser34:41 - Jack's experience at CascadiaJS and a discussion on the value of in-person conferences in 202541:54 - GitHub's new MCP registry43:26 - Microsoft Paint is getting project files46:54 - What's making us happyLinks:Paige - “Shai-Hulud” supply chain attack on npm continues against Crowdstrike npm packages and pnpm 10.16 minimumReleaseAge settingJack - LLM options in the browser: WebLLM, MediaPipe, ONNXTJ - Wasm 3.0GitHub's new MCP registryMicrosoft Paint is getting its own Photoshop-like project filesPaige - Great British Bake Off season 16 is back!Jack - YoyosTJ - phishyurl.comThanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
News and Updates: A Boston medical study found smartphone use on the toilet raises hemorrhoid risk by 46%. Phone users stayed seated far longer — often 6–15 minutes — amplifying pressure that leads to painful swelling. While causation wasn't proven, doctors warn the habit may be fueling the condition. Taco Bell is rethinking AI drive-thrus after viral failures, like glitchy bots repeating orders or a prank request for 18,000 cups of water. The chain says humans may still be better in high-volume locations. Rival fast food chains Wendy's and McDonald's are pushing ahead with AI rollouts in 2025. At IFA 2025, Amazon, Google, Samsung, and LG touted AI-powered smart homes that anticipate user needs — from proactive lighting to predictive repairs. But privacy, infrastructure, and reliability remain major hurdles before homes achieve Star Trek–style ambient computing. A new survey shows 85% of U.S. college students use generative AI for coursework, calling it a “24/7 tutor.” Students want clear rules and training, not bans, though many admit AI can weaken critical thinking. Despite AI's rise, most still see college as relevant — though its payoff may be shrinking. A lottery expert warns Powerball's “Quick Picks” feature hurts players' odds by generating duplicate numbers, just as the jackpot swells to $1.7B. Officials deny foul play, but critics urge filling tickets by hand. Odds remain astronomical at 1 in 292 million. Confusion erupted over Gmail security after reports falsely claimed Google told 2.5B users to reset passwords. Google clarified no mass breach occurred, though hackers have targeted Salesforce data and used vishing scams. The company urges 2FA, passkeys, and vigilance against phishing.
Anthropic support CA AI laws, Albania has a new minister of Corruption and it's AI, A man was convinced by ChatGPT to build a computer to free it, Senator Wyden calls out Microsoft for still allowing RC4 to be used in Ransomware attacks. Cell Phone Recycle, Win 10 update, 2FA, backup to cloud. New HP Laptop, e-Cycle very old laptop, E-cycle and shredding, Win 11 playing DVD on my AIO,
Casi pierdo el canal por un “contrato” demasiado perfecto. Te cuento paso a paso cómo un email de “colaboración anual” casi me hackea YouTube y qué hice para recuperarlo. Si creas contenido o tu negocio vive en redes, guárdate este episodio. En este episodio: • Cómo detecté (tarde) que era phishing aunque el correo parecía real. • Señales rojas: urgencia sutil, adjunto/“contrato” vía enlace, alertas de YouTube ignoradas. • Qué funcionó para recuperarlo: alertas, cambio inmediato de contraseña, 2FA y protocolo de emergencia. • Lecciones para mamás emprendedoras: nadie está inmune; la prevención es diaria. Checklist exprés (cópialo): • 2FA activado en TODO. • Nunca hagas click en enlaces: responde al remitente primero. • Verifica dominios (no solo el “nombre”). • No abras “contratos” desde el móvil. • Cierra sesiones y cambia contraseñas al primer aviso. • Usa gestor de passwords. • Crea un plan de contingencia: quién hace qué en 5 minutos.
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Identity thieves work extra hard to trick us into giving over our personal information. But there are ways for us to implement effective tactics to safeguard our identities and stop thieves in their tracks. In this tip, we're sharing five ways to take steps you can take to make it harder for identity thieves to steal your information. Links: Explore the identity protecting benefits of a Better Checking account IRS Taxpayer Guide to Identity Theft Check out TCU University for financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. Identity theft continues to be more than just a costly headache. Fraud scams and identity theft reports continued to top the list of scams reported to the FTC in 2024. In fact, nearly 6.5 million incidents were reported to the FTC last year, and over 1 million of those incidents included an instance of identity theft. These numbers prove that while scams and identity theft continue to evolve, so do the tactics that criminals use to commit these crimes. In this tip we'll share some lesser-known steps you can take to help avoid becoming the next victim of identity theft and fraud. Use fake answers for your security questions One simple way to add a layer of protection to your accounts is to choose wrong or nonsense answers to security questions. If at age 16, you drove a green SUV, the security answer to “What was your first car?” might be “big avocado” rather than “green Ford Explorer.” The idea is to choose an answer that only has meaning to you and cannot be easily guessed. Real answers to your security questions may have been published in the past if you have ever participated in social media quizzes, polls, and challenges. Avoid using your real information, especially information typically found in security questions, like your mother's maiden name or the name of the street you grew up on, in any situation, no matter how seemingly harmless it may seem. A moment of fun could lead to many lost hours spent repairing damage to your identity. Opt in for multi-factor authentication When available, enable multi-factor authentication ("MFA") to your online accounts. MFA is a type of authentication that adds two or more layers of security beyond a password. If only two factors are used, it is sometimes referred to as two-factor authentication or 2FA. While passwords should always be difficult to guess, and you can work to protect the answers to your security questions, adding another step to the login process decreases the chance that a hacker can gain access to your accounts. MFA typically works by sending a verification code by SMS text, by email, or by voice to a phone number listed on your profile. You must enter the provided code before being allowed to complete the login process. MFA should always be added when available. To know whether your account provider offers MFA, you may need to investigate your online options or give the company a call to ask, as it is not always offered proactively. File your taxes early As this IRS Taxpayer Guide to Identity Theft website states, "tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund." One simple way to avoid scammers getting a hold of your tax refund is to file before they do! Surprisingly, this type of fraud affects an estimated hundreds of thousands of Americans every year. Often, the scam isn't uncovered until an individual tries to file their own return and their refund is rejected because it has already been claimed. When tax season comes around, get everything in order ` and file early. This way you can both mark the chore off your list and avoid leaving your refund out there for someone else to claim. Be smart and stay private on social media Two ways people put themselves at risk on social media are by disclosing their location and engaging with strangers. It's incredibly rare to truly need to share your location with a large group of friends and followers, yet location sharing is often an app's default setting. Some social media platforms keep location sharing on all of the time in the background, so you can always see another user's location. This allows ill-meaning individuals to access your home and work address, your travel routines, when you might be out of town, and your favorite vacation destination. Mobile location settings are often lifesavers when navigating in a new city or avoiding traffic jams, but allowing the social media universe to know where you are at all times is never necessary and can be detrimental to the security of both your identity and your possessions. While most people know to limit the information they share with those they meet online, there are still thousands of cases each year of people losing their money or identity information to a romantic interest or a new friend who wasn't who they claimed to be. Remember to keep your personal information private if you make connections online. Routinely check your "in-app" privacy settings Occasionally, posts, articles, or notifications will remind us to review our privacy information, and for a time after doing a reassessment, our settings will remain locked down. However, sharing a public post from a business (to qualify for a prize, for instance) can reset your privacy preferences for future posts. Creating an intentionally public post, like when you have an item to sell or need to find a missing pet, can also change privacy settings on a future update that you intend to be more personal. On a regular basis, check your privacy settings in the apps where you are active, and take an extra second to check each social post before publishing to ensure that it is reaching only who you intend. Consider culling your friends list to those in your inner circle, or set most of your updates to only reach a select number of friends and family. Games and shopping apps are often checking your background in the same way to show you more relevant and personal ads. Locking down what you are sharing will help you protect your information while also using the internet to stay connected with friends and family in the way that you intend. Add an annual task to your calendar to check in on these security measures and get started now. Also verify that your account passwords aren't reused or easy to guess (especially on banking, mortgage, and investment accounts). And remember, if you suspect that your identity has been compromised, you have access to an Identity Theft Recovery Advocate as a benefit of your Triangle Better Checking account. These professionals are trained and ready to help you reverse the damage and get back on track quickly. They're experienced advocates who know how to spot identity theft and, when necessary, will support you through the process of repairing any damages. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
“The simple believe everything, but the prudent give thought to their steps.” — Proverbs 14:15In an age where scams are becoming more sophisticated by the day, Scripture reminds us that discernment isn't optional—it's essential. As believers, protecting the resources God has entrusted to us is more than a practical concern—it's an act of stewardship. Here's how you can guard your finances with wisdom, not fear.Scams Are Everywhere—But So Is WisdomFraudsters use every channel available: phone calls, text messages, emails, and even impersonations of people you trust. But as followers of Christ, we're not called to panic. We're called to walk in wisdom (Ephesians 5:15). That begins with slowing down and thinking critically.Pause before you respond. Scammers rely on urgency. If someone pressures you to act immediately—whether claiming your account is locked or your money is at risk—take a step back. Hang up. Verify the source independently. Urgency is often a red flag. Avoid untraceable payments. No legitimate organization will ask for payment via wire transfer or gift cards. These are the preferred tools of scammers because they're nearly impossible to recover.Practical Steps for Digital ProtectionFinancial stewardship now includes digital awareness. Here are practical ways to protect yourself and your family:Use credit cards, not debit cards, for online purchases. Credit cards usually come with stronger fraud protection. Enable two-factor authentication (2FA) on all your financial accounts. Even if a scammer gets your password, they can't access your account without a second form of verification. Don't reuse passwords. Use a secure password manager, such as Bitwarden or NordPass, to create and store strong, unique passwords. Set up account alerts. Most banks allow you to monitor activity in real-time, giving you a heads-up if something unusual occurs. Freeze your credit. It's free to do and offers one of the best defenses against identity theft. You can always unfreeze it temporarily when needed. Avoid public Wi-Fi for financial transactions. Wait until you're on a secure network or at home to check your bank accounts or make purchases. Limit what you share on social media. Personal details, such as birthdays or family names, can be used to guess passwords or security questions. Adjust your privacy settings and post wisely. Shred sensitive documents before discarding them. Even in the digital age, identity thieves still dig through trash. Don't click on unfamiliar links, even if they appear to come from someone you know. When in doubt, contact the person or organization directly for clarification.Stewarding Wisdom in CommunityScammers often target the vulnerable, particularly older adults and teenagers. So make this a shared effort. Discuss online fraud with your family. Equip them with knowledge. If you receive a letter or email about identity protection following a data breach, verify it by contacting the company directly, rather than through the provided link or number.Financial faithfulness today includes digital vigilance. But there's no need for fear. By taking these simple steps, you can walk confidently, knowing you're stewarding God's resources with care.A Tool for Wise Stewardship: The FaithFi AppLooking for a practical way to manage your money with wisdom and peace of mind? The FaithFi app is a secure tool that helps you track your spending, plan your giving, and align your finances with biblical values. With 256-bit encryption, your data is protected, and your login credentials are never stored. FaithFi Pro users also receive exclusive articles, digital devotionals, and daily encouragement.Visit FaithFi.com and click “App” or search “FaithFi” in your app store to get started today.Steward your finances wisely. Protect what God has entrusted to you. And walk in peace, not panic.On Today's Program, Rob Answers Listener Questions:My 14-year-old son just started his first full-time summer job, working around 37 to 40 hours a week. I'd like to help him get started with investing and am considering opening a Roth IRA in his name. What's the best way to set that up, and where should we go to open the account?We're debt-free and recently bought a home. Our current vehicle is paid off, but we're thinking about adding a second car with a monthly payment of around $500. I'm a little uneasy about the added expense. How can we determine if this is a wise financial move for us at this time?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)The Money Challenge for Teens: Prepare for College, Run from Debt, and Live Generously by Dr. Art RainerThe Finish Line PledgeSchwab Intelligent Portfolios | BettermentBitwarden | NordPassWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
Chris and Hector break down the massive Qantas Airlines data breach, expose the growing threat of ransomware negotiation scams, and discuss a dam hack in Norway that had potentially disastrous consequences. They get into real-world advice on 2FA bypass scams, the importance of network segmentation, and a candid look at why critical infrastructure hacks are so dangerous. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
- Report: Foxconn Sends Most Chinese Employees in India Back to China - Report: Tariffs on Apple Hardware from Vietnam Jump from ~4% to 20% - Canalys: Exciting Q1 PC Import Numbers Are Nothing to Get Excited About - Apple Quizzes Headset Owners on Smart Glasses - Apple Sues Former Vision Pro Exec for Alleged Theft of Trade Secrets - Ming-Chi Kuo Eyes Apple Roadmap for Smart Glasses and Headsets - MLS Season Pass Drops to Half-Price - Jennifer Aniston Onboard for Apple TV+ Series “I'm Glad My Mom Died” - Three-Part Docuseries on UCONN Women's Basketball Bouncing to Apple TV+ - Apple TV+ Kids Series “Stillwater” Coming Back for Fourth Season - Ten-Part Apple TV+ “Neuromancer” Now in Production - Apple TV+ Teases Third Season of “Invasion” - Ahead of Premier, Critics Are Digging Third Season of “Foundation” - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Appeals “Epic” Ruling to 9th Circuit Court - Bipartisan US Senators Reintroduce Legislation to Open App Stores - DOJ iPhone Monopoly Case Set to Proceed - Proton Sues Apple for the Usual Reasons - Apple Shareholder Sues Over Smarter Siri Debacle - Apple Seeds Second Betas for Current OS Updates - Apple Brings Added RAW Support and Image Playground to Pixelmator Pro - Apple Updates Sports App - Podcaster, Blogger Tim Robertson Logs Off - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Barclays Bearish on AAPL Due to iPhone Weakness and Services Worries - Chatterjee: iPhone 16 Panic Buying to Dent iPhone 17 Demand - Apple Joins China Subsidy Program Directly - BofA Weighs Potential Perplexity Purchase by Apple - F1: The Blockbuster - Apple Music Turns 10, Offers Personalized “Replay All Time” Playlist - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Fine Day for an EC Delay - No Live Activities for EU Macs in macOS 26 Tahoe - FireWire Support Missing from First macOS 26 Developer Beta - Google Acknowledges Problem with YouTube Mobile Apps - Nine Sega Forever Games to Grab Before Forever Ends - Apple Vision Pro Gets Immersive Promo for “F1: The Movie” - “Shot on iPhone” Campaign Wins Cannes Lions Award - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Yahoo! Finance Digs Apple's WWDC 2025 A.I. Approach - WhatsApp Stands with Apple in UK's Secret iCloud Backdoor Case - DTLA Apple Store Looted Amid Unrest - F1: The Haptic Trailer - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Highlighting Some Features from watchOS 26 - Which Watches Will Support watchOS 26 - Highlighting Some Features from tvOS 26 - Which Apple TVs Can Do tvOS 26 - Highlighting Some Features from visionOS 26 - Apple Analysts Unmoved by WWDC Announcements - Appleverse: A WWDC for Developers - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Refines Apple Intelligence, Opens On-Device LLMs to Developers - Apple's New Design Language: Liquid Glass - Reelin' in the Years: everyOS is 26 - Highlighting Some Features from iOS 26 - iPhone XR and iPhone XS Can't Handle iOS 26 - Highlighting Some Features from iPadOS 26 - 7th-Gen iPad Can't Handle iPadOS 26 - Highlighting Some Features from macOS 26 - macOS 26 is Last Stop for Last Intel Macs - Apple Says Studio Quality Recording Ahead for AirPods - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- WWDC is Mere Hours Away - An Immersive "The Talk Show" for Apple Vision Pro - On the Passing of Bill Atkinson - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken