POPULARITY
Categories
This show has been flagged as Clean by the host. Oathtool 06 OATH Options and Oathtool The OATH standard has several options. You need to know which OATH options the site you wish to log into uses in order to use OATH. 07 Options - TOTP versus HOTP There are two different types of OATH one time passwords, HOTP and TOTP. HOTP uses a counter. I won't go into more detail on HOTP as I haven't come across anyone using it. TOTP uses the current time instead of a counter. The time is fed into the OATH algorithm along with the shared secret to generate a new password on both ends of the connection. All the instances of OATH that I am familiar with use TOTP. 08 TOTP Mode Totp has different "modes". These modes are hash encoding algorithms such as SHA1, SHA256, or SHA512. The correct mode must be selected in order to log in using OATH with TOTP. 09 Encoding - Hex versus Base32 Both ends of the connection must be initialized with a shared secret or key which is required as part of the OATH algorithm. This key could be encoded in one of two forms, either hexadecimal or base32. Web sites often do not document which encoding method they are using. If you cannot determine the encoding of the key by simply looking at it you may need to use trial and error during your first OATH log in attempts to see which type of key has been used. 10 Github and Pypi Options Github and Pypi are two of the most prominent web sites using OATH. Both use the same options, TOTP with SHA1 mode, and base32 encoding. 11 Using Oathtool oathtool is a simple command line application which generates one time passwords for use with OATH. It can be run in a terminal. However, can also be turned into a simple GUI application using Zenity. Will discuss this in more detail later. By default oathtool uses hotp and hex encoding. To use totp and base32 encoding you must specify these on the command line. To specify base32 encoding for use with for example Github, pass the "-b" or "--base32" argument on the command line. To specify TOTP, pass the "--totp" argument on the command line. By default, oathtool uses SHA1 with totp, so you don't need to specify that if you require SHA1. If you need a different TOTP mode, you specify that as part of the TOTP argument separated by an "=" character. For example "--totp=SHA256". 12 Oathtool Example Here is a simple example of using oathtool to create a one time password to use with Github or Pypi. Open a terminal and type the following. oathtool -b --totp SOMEBIGBASE32SECRETCODE The one time password will be printed out in the terminal. You can try this out without using a valid key so long as it is a valid base32 string. When used with a valid key you then enter that one time password into Github, Pypi, or other web site where it asks for the one time password. Note that I have not covered in the above how to store and retrieve the key securely, as that is too big of a topic to cover here. 13 Zenity Example Oathtool is a command line application, but if you are using Linux it is simple to convert it into a GUI application by using "Zenity". Zenity is a simple to use package that creates GUI windows on the command line or in a shell script. There are two steps to the proceess. First create the OTP from the key by using oathtool and save it in a variable. Next, call a Zenity "info" window with the OTP as part of the provided text. You can now copy and paste the OTP from the window into your web browser. To close the window, click on the "OK" button. See the previous note on storing the key securely. hprcode=$(oathtool -b --totp SOMEBIGBASE32SECRETCODE) zenity --info --width=150 --title="HPR 2FA" --text="2FA code is: nn $hprcode n" If you are using Gnome you can make the script launchable from the desktop by creading a ".desktop" file in the "Desktop" directory. Provide feedback on this episode.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to hot@twit.tv! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Hey everyone—it's Steve Edwards here, and in this episode of JavaScript Jabber, I'm joined by returning guest Feross Aboukhadijeh, founder of Socket.dev, for a deep dive into the dark and fascinating world of open source supply chain security. From phishing campaigns targeting top NPM maintainers to the now-infamous Chalk library compromise, we unpack the latest wave of JavaScript package attacks and what developers can learn from them.Feross explains how some hackers are even using AI tools like Claude and Gemini as part of their payloads—and how defenders like Socket are fighting back with AI-powered analysis of their own. We also dive into GitHub Actions vulnerabilities, the role of two-factor authentication, and the growing need for “phishing-resistant 2FA.” Whether you're an open source maintainer or just someone who runs npm install a little too often, this episode will open your eyes to how much happens behind the scenes to keep your code safe.
In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts disabling Starlink terminals used by scammers Garbage HP update deletes certificates that authed Windows systems to Entra This week's episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation. This episode is also available on Youtube. Show notes US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer | TechCrunch Attackers bypass patch in deprecated Windows Server update tool | CyberScoop CVE-2025-59287 WSUS Unauthenticated RCE | HawkTrace CVE-2025-59287 WSUS Remote Code Execution | HawkTrace Catching Credential Guard Off Guard - SpecterOps Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica Uncovering Qilin attack methods exposed through multiple cases Safety on X: "By November 10, we're asking all accounts that use a security key as their two factor authentication (2FA) method to re-enroll their key to continue accessing X. You can re-enroll your existing security key, or enroll a new one. A reminder: if you enroll a new security key, any" / X SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds | The Record from Recorded Future News SpaceX: Update Your Inactive Starlink Dishes Now or They'll Be Bricked How we linked ForumTroll APT to Dante spyware by Memento Labs | Securelist Former Polish official indicted over spyware purchase | The Record from Recorded Future News HP OneAgent Update Broke Entra Trust on HP AI Devices Windows' Built-in OpenSSH for Offensive Security How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA | WIRED
Parce que… c'est l'épisode 0x647! Shameless plug 12 au 17 octobre 2025 - Objective by the sea v8 14 et 15 octobre 2025 - ATT&CKcon 6.0 14 et 15 octobre 2025 - Forum inCyber Canada Code rabais de 30% - CA25KDUX92 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Notes IA AI Agent Security: Whose Responsibility Is It? Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique AI makes phishing 4.5x more effective, Microsoft says How AI-powered ransomware could destroy your business Agentic AI's OODA Loop Problem ‘Sovereign AI' Has Become a New Front in the US-China Tech War Microsoft Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords Extortion and ransomware drive over half of cyberattacks Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication Microsoft: Exchange 2016 and 2019 have reached end of support Microsoft frightful Patch Tuesday: 175+ CVEs, 3 under attack Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Edge - IE Microsoft restricts IE mode access in Edge after zero-day attacks Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users' Devices Défensif Identity Security: Your First and Last Line of Defense Banks need stricter controls to prevent romance fraud, says City regulator CVE, CVSS scores need overhauling, argues Codific CEO How to spot dark web threats on your network using NDR Ukraine takes steps to launch dedicated cyber force for offensive strikes How Microsoft is creating a security-first culture that lasts Root Cause Analysis? You're Doing It Wrong Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed Wireshark 4.6.0 Supports macOS pktap Metadata (PID, Process Name, etc.) Offensif F5 Why the F5 Hack Created an ‘Imminent Threat' for Thousands of Networks F5 says hackers stole undisclosed BIG-IP flaws, source code ‘Highly sophisticated' government goons hacked F5 Oracle Google, Mandiant expose malware and zero-day behind Oracle EBS extortion Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884 Fortigate FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Satellite Unencrypted satellites expose global communications Researchers find a startlingly cheap way to steal your secrets from space Study reveals satellites comms spilling unencrypted data Axis Communications Vulnerability Exposes Azure Storage Account Credentials Android Pixnapping attack can capture app data like 2FA info Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware Cyberattackers Target LastPass, Top Password Managers Devs of VS Code extensions are leaking secrets en masse How Attackers Bypass Synced Passkeys RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacks New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability Les Uropes Europe's Digital Sovereignty Paradox - “Chat Control” update Britain issues first online safety fine to US website 4chan Cyber-attacks rise by 50% in past year, UK security agency says Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia Divers GrapheneOS is finally ready to break free from Pixels, and it may never look back [ProtonVPN Lied About Logging Blog](https://vp.net/l/en-US/blog/ProtonVPN-Lied-About-Logging) Adam Shostack : “Yay, more age verification law…” California enacts age verification, chatbot laws The Guardian view on the online scam industry: authorities must not forget that perpetrators are often victims too Insolite TikTok Videos Promoting Malware Installation Kevin Beaumont: “This whole thing with TLP RED …” - Cyberplace Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc
El grupo de ciberdelincuentes asegura haber sustraído 60 GB de datos fiscales de contribuyentes y empresas, equivalentes a unos 238.799 archivos, y ha exigido un rescate al Gobierno. La AEAT ha negado haber sufrido una brecha en sus sistemas y apunta a que la filtración podría haberse producido en una gestoría externa que maneja datos fiscales. Este patrón ya se vio en diciembre de 2024 con otro grupo de hackers. Aunque no se confirme afectación directa de Hacienda, los especialistas advierten del riesgo de suplantación de identidad, fraude y phishing, ya que los archivos podrían incluir NIF, direcciones, cuentas bancarias e ingresos. Recomendaciones clave: Empresas: Auditar proveedores, limitar accesos, segmentar redes, plan de respuesta ante incidentes y backups. Particulares: Usar contraseñas robustas y únicas, activar 2FA, desconfiar de correos o llamadas sospechosas y revisar movimientos bancarios. Este incidente refuerza la idea de que la ciberseguridad es responsabilidad de todos, desde organismos públicos hasta usuarios y empresas. La prevención y la formación son clave para minimizar riesgos.
Aggressive Government RegulationStates are intervening heavily in tech markets. Texas mandated app stores verify ages and restrict minor access starting January 2026, requiring parental approval for under-18 users. The Netherlands took partial control of Chinese chipmaker Nexperia to block sensitive technology transfer. The U.S. FCC forced retailers to delist millions of Chinese electronics from Huawei, ZTE, and others over security concerns.Privacy vs. Security BattlesThe EU postponed "Chat Control" legislation requiring message scanning after insufficient support - only 12 of 27 states backed it. Germany called it "taboo for the rule of law" while 40+ tech firms warned it would harm privacy. Digital activism generated massive opposition emails to lawmakers.California expanded privacy enforcement beyond tech giants, fining Tractor Supply $1.35 million for violating job applicant rights - the CPPA's largest fine. New legislation requires browsers to offer one-click tracking opt-outs by 2027.Evolving Cyber Threats"Scattered LAPSUS$ Hunters" breached Salesforce via compromised third-party app, stealing 1 billion records from major companies including 5.7 million from Qantas. Researchers discovered "pixnapping" attacks on Android that bypass browser protections to steal screen data, including 2FA codes from Google Authenticator in under 30 seconds.Key ImplicationsGeopolitical tensions drive protectionist tech policies as governments prioritize security over privacy. Regulatory enforcement extends beyond major tech to all data-collecting businesses. Supply chain vulnerabilities remain critical attack vectors, with novel mobile threats challenging existing security assumptions.
EP 262In this week's update:Texas's App Store Accountability Act mandates age verification, raising privacy concerns for Apple and Google users.The Dutch government seizes control of Chinese-owned chipmaker Nexperia to protect sensitive technology transfers.And the FCC enforces removal of millions of banned Chinese electronics from U.S. retailers over national security risks.'Pixnapping' attack exposes Android app vulnerabilities, stealing sensitive data like 2FA codes.California fines Tractor Supply $1.35M for violating consumer and job applicant privacy rights.California's 'Opt Me Out Act' requires browsers to offer one-click tracking opt-out by 2027.Danish engineer's mass email campaign disrupts EU's 'Chat Control' bill, highlighting privacy concerns.EU postpones 'Chat Control' vote amid privacy backlash, but revised proposals may resurface.Salesforce data breach leaks customer records after ransom refusal, exposing supply chain vulnerabilities.And... since we have no age restrictions we can get started right away!Find the full transcript to this week's podcast here.
Do you ever feel like your practice culture is toxic? In this episode, Kirk Behrendt brings back Adriana Booth, one of ACT's amazing coaches, to list the seven toxic habits that you might be doing, how they're affecting your culture, and what you can do to create a happier, more committed team. Great culture doesn't happen by accident! To learn how you might be sabotaging your team and what you can do to fix it, listen to Episode 951 of The Best Practices Show!Learn More About Adriana:Join Adriana on Facebook: https://www.facebook.com/adriana.boothFollow Adriana on Instagram: https://www.instagram.com/adrimariebSend Courtney an email to learn more about ACT: courtney@actdental.com More Helpful Links for a Better Practice & a Better Life:Subscribe to The Best Practices Show: https://the-best-practices-show.captivate.fm/listenJoin The Best Practices Association: https://www.actdental.com/bpaDownload ACT's BPA app on the Apple App Store: https://apps.apple.com/us/app/best-practices-association/id6738960360Download ACT's BPA app on the Google Play Store: https://play.google.com/store/apps/details?id=com.actdental.join&hl=en_USJoin ACT's To The Top Study Club: https://www.actdental.com/tttGet The Best Practices Magazine for free: https://www.actdental.com/magazinePlease leave us a review on the podcast: https://podcasts.apple.com/us/podcast/the-best-practices-show-with-kirk-behrendt/id1223838218Episode Resources:Watch the video version of Episode 951: https://www.youtube.com/@actdental/videosRegister to ACT's BPA for their Guide to Building Trust: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fa-team-playbook-to-maximize-performance-handout#emailRegister to ACT's BPA for their How Trustworthy Are You? tool: https://join.actdental.com/users/sign_in?post_login_redirect=https%3A%2F%2Fjoin.actdental.com%2Fc%2Fpractice-coaching-tools%2Fhow-trustworthy-are-you#emailRegister to ACT's BPA for their Rules of Engagement tool:
The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&T's CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest CISO Perspectives host Kim Jones previews the upcoming season, sharing what's ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener here. Selected Reading Cache of Devices Capable of Crashing Cell Network Is Found Near U.N. (The New York Times) Secret Service Disrupts Threat Network Near UN General Assembly (YouTube) JLR extends shutdown – again – as toll on workers laid bare (The Register) The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams (The Verge) Nimbus Manticore Deploys New Malware Targeting Europe (Check Point Research) Kimsuky attack disguised as sex offender notice information (Logpresso) GitHub tightens npm security with mandatory 2FA, access tokens (Bleeping Computer) NPM package caught using QR Code to fetch cookie-stealing malware (Bleeping Computer) LastPass: Fake password managers infect Mac users with malware (Bleeping Computer) Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques (CyberScoop) Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases (PCMag) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!
Worried about the personal risks when your phone and your digital identity, falls into the wrong hands? This episode of Everything Counts dives deep into the realities of phone theft and the ripple effects it can have on your banking, social media, passwords and more. Join host Motheo Khoaripe as he chats with Kevin Hogan, Head of Fraud Risk at Investec and cybersecurity expert Anna Collard to uncover how fraudsters gain access, the myths about phone security and the vital steps you must take immediately to secure your money and digital life. Learn about the importance of long passwords, biometric security, virtual cards for safer online shopping, spotting phishing scams, managing your digital footprint and using tools like remote wipe and password managers. Discover why acting fast, staying vigilant and adopting good digital habits can keep you one step ahead of fraudsters. Whether you've experienced phone theft or want to safeguard your digital world before it happens, this episode empowers you to protect what matters most. 00:00 Introduction 01:20 What do you do if your phone is stolen? 02:00 Phone security isn't bulletproof: weak passwords are common 03:00 How to keep your phone secure: Strong passwords and facial recognition 04:00 Delink stolen device from your banking accounts 05:00 How fraudsters use your WhatsApp, iTunes and social media accounts 06:00 What do fraudsters look for once they have your phone? 07:30 Security tips for online shopping 10:00 The risks of using a credit card 10:40 What are virtual cards and how do virtual cards work? 12:00 How can you check if a website is legit? 13:00 Why you shouldn't use instant EFT payments 15:00 Everyday habits that can lead to digital security risks 16:10 Don't conduct financial transactions in public 16:35 Risk of not updating software 18:00 What is NFC and how does it work? 18:30 Paying using Apple Pay or Google Wallet 20:15 How secure are biometrics features on your phone? 21:00 Remote wipe function: What it is and how does it work? 22:00 What is a faraday pouch? 22:40 How to keep your email account safe 23:45 ISPs in South Africa don't have 2FA for email 24:30 The value of a password manager 26:15 Digital mindfulness: How to stay safe online 27:00 The threat of social engineering 29:15 Update your passwords and change your passwords regularly 30:30 Conclusion Investec Focus Radio SA
The supply chain attacks on npm continue and this week, Crowdstrike's npm packages fell victim to the “Shai-Hulud” worm. To mitigate the potential of downloading these malicious packages, consider pinning specific package versions in JS projects and using 2FA to publish new package versions to npm.Also this week, WebAssembly Specification (Wasm) released v3.0. This version dramatically expands the memory Wasm apps can use, supports multiple memory usage, and now allows garbage collection.It's been a while since we last covered LLM options for folks who want to run their own models locally or in the browser, so Jack gives a quick rundown of some of the best options out today. There's WebLLM from MLC, MediaPipe from Google, and ONNX from Microsoft, and although none are easily interchangeable with another, if cost, privacy, or working offline are concerns of your LLM-enabled app, these may be good options to explore.Chapter Markers:00:58 - npm supply chain attack16:28 - Wasm 3.023:34 - LLM options in the browser34:41 - Jack's experience at CascadiaJS and a discussion on the value of in-person conferences in 202541:54 - GitHub's new MCP registry43:26 - Microsoft Paint is getting project files46:54 - What's making us happyLinks:Paige - “Shai-Hulud” supply chain attack on npm continues against Crowdstrike npm packages and pnpm 10.16 minimumReleaseAge settingJack - LLM options in the browser: WebLLM, MediaPipe, ONNXTJ - Wasm 3.0GitHub's new MCP registryMicrosoft Paint is getting its own Photoshop-like project filesPaige - Great British Bake Off season 16 is back!Jack - YoyosTJ - phishyurl.comThanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
News and Updates: A Boston medical study found smartphone use on the toilet raises hemorrhoid risk by 46%. Phone users stayed seated far longer — often 6–15 minutes — amplifying pressure that leads to painful swelling. While causation wasn't proven, doctors warn the habit may be fueling the condition. Taco Bell is rethinking AI drive-thrus after viral failures, like glitchy bots repeating orders or a prank request for 18,000 cups of water. The chain says humans may still be better in high-volume locations. Rival fast food chains Wendy's and McDonald's are pushing ahead with AI rollouts in 2025. At IFA 2025, Amazon, Google, Samsung, and LG touted AI-powered smart homes that anticipate user needs — from proactive lighting to predictive repairs. But privacy, infrastructure, and reliability remain major hurdles before homes achieve Star Trek–style ambient computing. A new survey shows 85% of U.S. college students use generative AI for coursework, calling it a “24/7 tutor.” Students want clear rules and training, not bans, though many admit AI can weaken critical thinking. Despite AI's rise, most still see college as relevant — though its payoff may be shrinking. A lottery expert warns Powerball's “Quick Picks” feature hurts players' odds by generating duplicate numbers, just as the jackpot swells to $1.7B. Officials deny foul play, but critics urge filling tickets by hand. Odds remain astronomical at 1 in 292 million. Confusion erupted over Gmail security after reports falsely claimed Google told 2.5B users to reset passwords. Google clarified no mass breach occurred, though hackers have targeted Salesforce data and used vishing scams. The company urges 2FA, passkeys, and vigilance against phishing.
Anthropic support CA AI laws, Albania has a new minister of Corruption and it's AI, A man was convinced by ChatGPT to build a computer to free it, Senator Wyden calls out Microsoft for still allowing RC4 to be used in Ransomware attacks. Cell Phone Recycle, Win 10 update, 2FA, backup to cloud. New HP Laptop, e-Cycle very old laptop, E-cycle and shredding, Win 11 playing DVD on my AIO,
Casi pierdo el canal por un “contrato” demasiado perfecto. Te cuento paso a paso cómo un email de “colaboración anual” casi me hackea YouTube y qué hice para recuperarlo. Si creas contenido o tu negocio vive en redes, guárdate este episodio. En este episodio: • Cómo detecté (tarde) que era phishing aunque el correo parecía real. • Señales rojas: urgencia sutil, adjunto/“contrato” vía enlace, alertas de YouTube ignoradas. • Qué funcionó para recuperarlo: alertas, cambio inmediato de contraseña, 2FA y protocolo de emergencia. • Lecciones para mamás emprendedoras: nadie está inmune; la prevención es diaria. Checklist exprés (cópialo): • 2FA activado en TODO. • Nunca hagas click en enlaces: responde al remitente primero. • Verifica dominios (no solo el “nombre”). • No abras “contratos” desde el móvil. • Cierra sesiones y cambia contraseñas al primer aviso. • Usa gestor de passwords. • Crea un plan de contingencia: quién hace qué en 5 minutos.
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft's upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks. The research can be found here: Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing Learn more about your ad choices. Visit megaphone.fm/adchoices
Gabriel Custodiet speaks with the famous "hacker" from Darknet Diaries who was arrested unjustly in Uruguay. The story reveals how your physical possessions, willingness to help, and dependence on tech-illiterate judges can cost you your freedom and sanity. YOUTUBE VERSION WITH CAPTIONS →https://youtu.be/nMgvDE-rg1E GUEST → https://x.com/ADanielHill → linktr.ee/adanielhill → https://www.amazon.com/dp/B08L592FG7 (Hill's book) WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS → https://watchmanprivacy.com/donate.html TIMELINE 00:00 – Introduction 2:20 - Guest introduction 4:30 - Hacker paraphernalia 11:12 - Did hacker paraphernalia cost Alberto his freedom? 19:52 - Losing 2FA tokens 26:00 - How would Albert do 2FA differently today 29:00 - Preparing for disaster 36:20 - Alberto's thoughts on cryptocurrency best practices 44:30 - Thoughts on helpful penetration testing 57:05 - Thoughts on mainstream media that demonized him 1:06:15 - Final thoughts Music by Karl Casey @ White Bat Audio
Cloud Stories | Cloud Accounting Apps | Accounting Ecosystem
Heather Smith & Tyler Caskey join ApprovalMax to have a conversation exploring how finance automation boosts accuracy, prevents fraud, and streamlines processes. Today I'm speaking with Tyler Caskey Partner at The Bean Counters In this episode, we talk about . . . Key Points: How automation reduces human error and speeds approvals Real-world case studies with ApprovalMax & Xero Common vulnerabilities: hacked emails, invoice scams, credit card fraud Risk reduction strategies: 2FA, segregation of duties, virtual credit cards The role of password managers & proactive anti-fraud controls Fraud detection warning signs & team training Stats: $277M lost to payment redirection scams in Australia (2023) 80–90% of finance errors caused by human error Automation can detect fraud 50% faster & reduce losses by 50% Event Preview: Brisbane Xerocon tips & networking advice Apps & Tools Mentioned: ApprovalMax, Xero, Mayday, Power BI, OnePassword, Practice Protect, EFTsure. 00:00 – Welcome & Introductions Hosts set the scene, introduce Tyler Caskey, and outline today's automation & fraud prevention focus. 02:15 – Why Finance Automation is a "No Brainer" How automation improves efficiency, accuracy, and security for finance teams. 05:04 – Real-World Automation Wins Case study: $50M invoice group transforms processes with ApprovalMax & Xero. 08:42 – Common Fraud Vulnerabilities in Small Business From hacked emails to bank detail changes—how fraudsters infiltrate. 12:15 – Invoice Scams & How to Spot Them Practical warning signs and red flags finance teams should never ignore. 15:50 – Credit Card & Virtual Card Fraud Prevention Reducing risk with approval processes and controlled card usage. 19:32 – Passwords, 2FA & Segregation of Duties The non-negotiable security practices for finance teams. 23:05 – Fraud Cost & Prevention Statistics Eye-opening data on human error, scam losses, and automation benefits. 26:40 – Training Your Team for Fraud Awareness Creating a culture that detects scams before they succeed. 29:55 – ApprovalMax Features That Reduce Risk Notifications, audit trails, and bank account verification tools. 33:12 – Xerocon Brisbane Preview What Heather & Tyler are excited about—plus networking tips for attendees. 37:18 – Final Advice for Accountants & Bookkeepers Leading clients toward best-practice automation and fraud prevention. Contact details: Accounting Apps newsletter: http://accountingapps.io/ Accounting Apps Mastermind: https://www.facebook.com/groups/XeroMasterMind LinkedIn: https://www.linkedin.com/in/HeatherSmithAU/ YouTube Channel: https://www.youtube.com/ANISEConsulting X: https://twitter.com/HeatherSmithAU
Identity thieves work extra hard to trick us into giving over our personal information. But there are ways for us to implement effective tactics to safeguard our identities and stop thieves in their tracks. In this tip, we're sharing five ways to take steps you can take to make it harder for identity thieves to steal your information. Links: Explore the identity protecting benefits of a Better Checking account IRS Taxpayer Guide to Identity Theft Check out TCU University for financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. Identity theft continues to be more than just a costly headache. Fraud scams and identity theft reports continued to top the list of scams reported to the FTC in 2024. In fact, nearly 6.5 million incidents were reported to the FTC last year, and over 1 million of those incidents included an instance of identity theft. These numbers prove that while scams and identity theft continue to evolve, so do the tactics that criminals use to commit these crimes. In this tip we'll share some lesser-known steps you can take to help avoid becoming the next victim of identity theft and fraud. Use fake answers for your security questions One simple way to add a layer of protection to your accounts is to choose wrong or nonsense answers to security questions. If at age 16, you drove a green SUV, the security answer to “What was your first car?” might be “big avocado” rather than “green Ford Explorer.” The idea is to choose an answer that only has meaning to you and cannot be easily guessed. Real answers to your security questions may have been published in the past if you have ever participated in social media quizzes, polls, and challenges. Avoid using your real information, especially information typically found in security questions, like your mother's maiden name or the name of the street you grew up on, in any situation, no matter how seemingly harmless it may seem. A moment of fun could lead to many lost hours spent repairing damage to your identity. Opt in for multi-factor authentication When available, enable multi-factor authentication ("MFA") to your online accounts. MFA is a type of authentication that adds two or more layers of security beyond a password. If only two factors are used, it is sometimes referred to as two-factor authentication or 2FA. While passwords should always be difficult to guess, and you can work to protect the answers to your security questions, adding another step to the login process decreases the chance that a hacker can gain access to your accounts. MFA typically works by sending a verification code by SMS text, by email, or by voice to a phone number listed on your profile. You must enter the provided code before being allowed to complete the login process. MFA should always be added when available. To know whether your account provider offers MFA, you may need to investigate your online options or give the company a call to ask, as it is not always offered proactively. File your taxes early As this IRS Taxpayer Guide to Identity Theft website states, "tax-related identity theft occurs when someone uses your stolen personal information, including your Social Security number, to file a tax return claiming a fraudulent refund." One simple way to avoid scammers getting a hold of your tax refund is to file before they do! Surprisingly, this type of fraud affects an estimated hundreds of thousands of Americans every year. Often, the scam isn't uncovered until an individual tries to file their own return and their refund is rejected because it has already been claimed. When tax season comes around, get everything in order ` and file early. This way you can both mark the chore off your list and avoid leaving your refund out there for someone else to claim. Be smart and stay private on social media Two ways people put themselves at risk on social media are by disclosing their location and engaging with strangers. It's incredibly rare to truly need to share your location with a large group of friends and followers, yet location sharing is often an app's default setting. Some social media platforms keep location sharing on all of the time in the background, so you can always see another user's location. This allows ill-meaning individuals to access your home and work address, your travel routines, when you might be out of town, and your favorite vacation destination. Mobile location settings are often lifesavers when navigating in a new city or avoiding traffic jams, but allowing the social media universe to know where you are at all times is never necessary and can be detrimental to the security of both your identity and your possessions. While most people know to limit the information they share with those they meet online, there are still thousands of cases each year of people losing their money or identity information to a romantic interest or a new friend who wasn't who they claimed to be. Remember to keep your personal information private if you make connections online. Routinely check your "in-app" privacy settings Occasionally, posts, articles, or notifications will remind us to review our privacy information, and for a time after doing a reassessment, our settings will remain locked down. However, sharing a public post from a business (to qualify for a prize, for instance) can reset your privacy preferences for future posts. Creating an intentionally public post, like when you have an item to sell or need to find a missing pet, can also change privacy settings on a future update that you intend to be more personal. On a regular basis, check your privacy settings in the apps where you are active, and take an extra second to check each social post before publishing to ensure that it is reaching only who you intend. Consider culling your friends list to those in your inner circle, or set most of your updates to only reach a select number of friends and family. Games and shopping apps are often checking your background in the same way to show you more relevant and personal ads. Locking down what you are sharing will help you protect your information while also using the internet to stay connected with friends and family in the way that you intend. Add an annual task to your calendar to check in on these security measures and get started now. Also verify that your account passwords aren't reused or easy to guess (especially on banking, mortgage, and investment accounts). And remember, if you suspect that your identity has been compromised, you have access to an Identity Theft Recovery Advocate as a benefit of your Triangle Better Checking account. These professionals are trained and ready to help you reverse the damage and get back on track quickly. They're experienced advocates who know how to spot identity theft and, when necessary, will support you through the process of repairing any damages. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
First up in the news: Mint 22.2 betas now in testing, Arch AUR Under Fire Once More as Malware Resurfaces, Debian 13 Trixie Release Date is Officially Confirmed, and Hyprland Hyprperks have been launched. In Security and Privacy, Introducing Proton Authenticator – secure 2FA, your way and Microsoft Recall issues In Check This Out, Ignition allows you to manage startup apps and scripts And finally, Vibrations From the Ether
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
“The simple believe everything, but the prudent give thought to their steps.” — Proverbs 14:15In an age where scams are becoming more sophisticated by the day, Scripture reminds us that discernment isn't optional—it's essential. As believers, protecting the resources God has entrusted to us is more than a practical concern—it's an act of stewardship. Here's how you can guard your finances with wisdom, not fear.Scams Are Everywhere—But So Is WisdomFraudsters use every channel available: phone calls, text messages, emails, and even impersonations of people you trust. But as followers of Christ, we're not called to panic. We're called to walk in wisdom (Ephesians 5:15). That begins with slowing down and thinking critically.Pause before you respond. Scammers rely on urgency. If someone pressures you to act immediately—whether claiming your account is locked or your money is at risk—take a step back. Hang up. Verify the source independently. Urgency is often a red flag. Avoid untraceable payments. No legitimate organization will ask for payment via wire transfer or gift cards. These are the preferred tools of scammers because they're nearly impossible to recover.Practical Steps for Digital ProtectionFinancial stewardship now includes digital awareness. Here are practical ways to protect yourself and your family:Use credit cards, not debit cards, for online purchases. Credit cards usually come with stronger fraud protection. Enable two-factor authentication (2FA) on all your financial accounts. Even if a scammer gets your password, they can't access your account without a second form of verification. Don't reuse passwords. Use a secure password manager, such as Bitwarden or NordPass, to create and store strong, unique passwords. Set up account alerts. Most banks allow you to monitor activity in real-time, giving you a heads-up if something unusual occurs. Freeze your credit. It's free to do and offers one of the best defenses against identity theft. You can always unfreeze it temporarily when needed. Avoid public Wi-Fi for financial transactions. Wait until you're on a secure network or at home to check your bank accounts or make purchases. Limit what you share on social media. Personal details, such as birthdays or family names, can be used to guess passwords or security questions. Adjust your privacy settings and post wisely. Shred sensitive documents before discarding them. Even in the digital age, identity thieves still dig through trash. Don't click on unfamiliar links, even if they appear to come from someone you know. When in doubt, contact the person or organization directly for clarification.Stewarding Wisdom in CommunityScammers often target the vulnerable, particularly older adults and teenagers. So make this a shared effort. Discuss online fraud with your family. Equip them with knowledge. If you receive a letter or email about identity protection following a data breach, verify it by contacting the company directly, rather than through the provided link or number.Financial faithfulness today includes digital vigilance. But there's no need for fear. By taking these simple steps, you can walk confidently, knowing you're stewarding God's resources with care.A Tool for Wise Stewardship: The FaithFi AppLooking for a practical way to manage your money with wisdom and peace of mind? The FaithFi app is a secure tool that helps you track your spending, plan your giving, and align your finances with biblical values. With 256-bit encryption, your data is protected, and your login credentials are never stored. FaithFi Pro users also receive exclusive articles, digital devotionals, and daily encouragement.Visit FaithFi.com and click “App” or search “FaithFi” in your app store to get started today.Steward your finances wisely. Protect what God has entrusted to you. And walk in peace, not panic.On Today's Program, Rob Answers Listener Questions:My 14-year-old son just started his first full-time summer job, working around 37 to 40 hours a week. I'd like to help him get started with investing and am considering opening a Roth IRA in his name. What's the best way to set that up, and where should we go to open the account?We're debt-free and recently bought a home. Our current vehicle is paid off, but we're thinking about adding a second car with a monthly payment of around $500. I'm a little uneasy about the added expense. How can we determine if this is a wise financial move for us at this time?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)The Money Challenge for Teens: Prepare for College, Run from Debt, and Live Generously by Dr. Art RainerThe Finish Line PledgeSchwab Intelligent Portfolios | BettermentBitwarden | NordPassWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
Chris and Hector break down the massive Qantas Airlines data breach, expose the growing threat of ransomware negotiation scams, and discuss a dam hack in Norway that had potentially disastrous consequences. They get into real-world advice on 2FA bypass scams, the importance of network segmentation, and a candid look at why critical infrastructure hacks are so dangerous. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Two-time Emmy and Three-time NAACP Image Award-winning, television Executive Producer Rushion McDonald interviewed Gregory Richardson. A cybersecurity expert and AI consultant. The conversation explores cybersecurity best practices, the rise of AI, and how Gregory is helping churches and nonprofits leverage technology to spread the gospel.
Ai used to figure out ancient text, Anthropic AI can use copyrighted material but they have to pay for it, MIT finds that if you use ChatGPT you might be getting stupider, Extended support for Win 10, Printer issues HP can't find the Ink, Google Security Questions and 2FA, Small Triangle on my MAC, Cloud backup onedrive,
- Report: Foxconn Sends Most Chinese Employees in India Back to China - Report: Tariffs on Apple Hardware from Vietnam Jump from ~4% to 20% - Canalys: Exciting Q1 PC Import Numbers Are Nothing to Get Excited About - Apple Quizzes Headset Owners on Smart Glasses - Apple Sues Former Vision Pro Exec for Alleged Theft of Trade Secrets - Ming-Chi Kuo Eyes Apple Roadmap for Smart Glasses and Headsets - MLS Season Pass Drops to Half-Price - Jennifer Aniston Onboard for Apple TV+ Series “I'm Glad My Mom Died” - Three-Part Docuseries on UCONN Women's Basketball Bouncing to Apple TV+ - Apple TV+ Kids Series “Stillwater” Coming Back for Fourth Season - Ten-Part Apple TV+ “Neuromancer” Now in Production - Apple TV+ Teases Third Season of “Invasion” - Ahead of Premier, Critics Are Digging Third Season of “Foundation” - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Appeals “Epic” Ruling to 9th Circuit Court - Bipartisan US Senators Reintroduce Legislation to Open App Stores - DOJ iPhone Monopoly Case Set to Proceed - Proton Sues Apple for the Usual Reasons - Apple Shareholder Sues Over Smarter Siri Debacle - Apple Seeds Second Betas for Current OS Updates - Apple Brings Added RAW Support and Image Playground to Pixelmator Pro - Apple Updates Sports App - Podcaster, Blogger Tim Robertson Logs Off - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Barclays Bearish on AAPL Due to iPhone Weakness and Services Worries - Chatterjee: iPhone 16 Panic Buying to Dent iPhone 17 Demand - Apple Joins China Subsidy Program Directly - BofA Weighs Potential Perplexity Purchase by Apple - F1: The Blockbuster - Apple Music Turns 10, Offers Personalized “Replay All Time” Playlist - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Ken is traveling this week, but please - enjoy the comedy stylings of Ken's computer. - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Fine Day for an EC Delay - No Live Activities for EU Macs in macOS 26 Tahoe - FireWire Support Missing from First macOS 26 Developer Beta - Google Acknowledges Problem with YouTube Mobile Apps - Nine Sega Forever Games to Grab Before Forever Ends - Apple Vision Pro Gets Immersive Promo for “F1: The Movie” - “Shot on iPhone” Campaign Wins Cannes Lions Award - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Avoiding SMS for 2FA and a Plot Twist for 23andMe on Checklist No. 428 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Yahoo! Finance Digs Apple's WWDC 2025 A.I. Approach - WhatsApp Stands with Apple in UK's Secret iCloud Backdoor Case - DTLA Apple Store Looted Amid Unrest - F1: The Haptic Trailer - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Highlighting Some Features from watchOS 26 - Which Watches Will Support watchOS 26 - Highlighting Some Features from tvOS 26 - Which Apple TVs Can Do tvOS 26 - Highlighting Some Features from visionOS 26 - Apple Analysts Unmoved by WWDC Announcements - Appleverse: A WWDC for Developers - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- Apple Refines Apple Intelligence, Opens On-Device LLMs to Developers - Apple's New Design Language: Liquid Glass - Reelin' in the Years: everyOS is 26 - Highlighting Some Features from iOS 26 - iPhone XR and iPhone XS Can't Handle iOS 26 - Highlighting Some Features from iPadOS 26 - 7th-Gen iPad Can't Handle iPadOS 26 - Highlighting Some Features from macOS 26 - macOS 26 is Last Stop for Last Intel Macs - Apple Says Studio Quality Recording Ahead for AirPods - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- WWDC is Mere Hours Away - An Immersive "The Talk Show" for Apple Vision Pro - On the Passing of Bill Atkinson - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
- J.P. Morgan: Apple's 9th Circuit Denial Not That Big a Deal - Morgan Stanley: Buyers Will Need Big Discounts to Leave App Store - Deepwater: Apple's Got Two Years to Get Its A.I. Act Together - Report: Apple Plans Second Store for Mumbai - Report: Tata Takes Over iPhone and MacBook Repair in India - Study Says Apple Watch Calorie Burn Metric Not Super Accurate - New Games for Apple Arcade - Sponsored by Insta360's new X5: Get 8K 360° video and an invisible selfie stick at store.insta360.com with code macosken - Your T-Life recorded and considering mandatory 2FA on Checklist 426 - find it at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken