Computer software to defend against malicious computer viruses
POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network Google dismantled the IPIDEA network that used residential proxies to route malicious traffic. https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network Fake Clawdbot VS Code Extension Installs ScreenConnect RAT The news about Clawdbot (now Moltbot) is used to distribute malware, in particular malicious VS Code extensions. https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware Threat Bulletin: Critical eScan Supply Chain Compromise Anti-virus vendor eScan was compromised, and its update servers were used to install malware on some customer systems. https://www.morphisec.com/blog/critical-escan-threat-bulletin/
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we explore a groundbreaking shift in cybersecurity threats focused on operational availability instead of data theft. Using five headline patterns from 2025, including a case where hospital scheduling systems were compromised, we highlight critical lessons for IT skills development and tech exam prep. Learn how these attacks challenge traditional security thinking and why ensuring system availability is vital for technology education and anyone preparing for CompTIA exams.From there, we dig into poisoned updates and the uneasy truth that digital signatures prove origin, not intent. By compromising a vendor's build pipeline, adversaries delivered “trusted” software that waited, watched, and embedded itself as infrastructure. Antivirus didn't catch it; analysts comparing subtle anomalies did. We unpack practical defenses: behavior monitoring for signed code, attestation, SBOM use, and staged rollouts that verify after trust, not just before.Next, the social engineering target shifts to the help desk at 24/7 casinos, where urgency is the culture. With real names, roles, and believable pressure, attackers turned resets into keys. The logs showed everything as legitimate because the system allowed it. We share fixes that work under fire: just-in-time privilege, second-operator verification for high-risk requests, audited callback flows, and playbooks that slow down when stakes go up.Then the cloud nightmare: a leaked admin token, logging disabled, and entire environments—plus backups—deleted. No exotic exploit, just excessive privilege and shared control planes. We break down guardrails that change outcomes: least privilege everywhere, break-glass elevation with time limits, immutable backups in isolated accounts, and monitoring that attackers can't silence.All roads lead to the same insight: humans aren't the weakest link; they're the most overused control. Real resilience comes from systems that assume trust will be abused and still contain damage—observed trust, independent logging, and workflows that don't require perfection from people under pressure. If you're building or defending, this is your blueprint for 2026: reduce blast radius, verify behavior, and never make a human your final barrier.If this hit a nerve or sparked an idea, follow, share with a teammate, and leave a quick review. Tell us: where does your organization rely on trust without verification?Pure Tested PeptidesPremium Peptides for Longevity, muscle growth , weight lossSupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Discussion with Michael Lawson, senior Principal Technical Marketing Engineer at advanced Wildfire sharing his insights on advanced Wildfire.
Chat control, děti a technologie nebo všudypřítomná umělá inteligence. To jsou tři témata, která byla letos podle týmu pořadu Antivirus nejdůležitější. A nepochybně se s nimi budeme setkávat i v příštím roce. Co přinesl rok 2025 ve světě online technologií, rekapitulujeme s redaktory Kateřinou Gruntovou a Janem Cibulkou.
Na začátku prosince Austrálie zavedla plošný zákaz sociálních sítí pro mladší 16 let. A protože téma omezování technologií pro děti je aktuální v celém světě i v Česku, o detailech tohoto opatření mluví v Antiviru s Kateřinou Gruntovou a Janem Cibulkou.
Evropská komise dala minulý týden sociální síti X rekordní pokutu podle evropského nařízení o digitálních službách známé pod zkratkou DSA. Podle amerických politiků a taky provozovatele sítě Elona Muska jde o cenzuru. Jenže pokuta se svobody projevu vůbec netýkala. O co šlo? Téma pro Antivirus s Kateřinou Gruntovou a Janem Cibulkou.
"Spear phishing is a direct attack." Connect With Our SponsorsGreyFinch - https://greyfinch.com/jillallen/A-Dec - https://www.a-dec.com/orthodonticsSmileSuite - https://getsmilesuite.com/ Summary In this conversation, Gary Salman, CEO of Black Talon Security, discusses the critical importance of cybersecurity in the dental and orthodontic fields. He shares insights on the evolution of cyber threats, particularly focusing on social engineering and phishing attacks. Gary emphasizes the need for comprehensive training for dental staff to recognize and prevent these threats. He also highlights the significance of understanding cyber risk ratings and the role of AI in enhancing cybersecurity measures. The discussion concludes with practical advice for practices to safeguard patient data and navigate the complexities of modern cybersecurity challenges. Connect With Our Guest Black Talon Security - https://www.blacktalonsecurity.com/ Takeaways Gary has over 33 years of experience in dental technology.He emphasizes the importance of cybersecurity in practices.Social engineering is a major threat, often leading to phishing attacks.Training staff is crucial as 60% of cyber attacks result from human error.Spear phishing is a targeted attack that can compromise email accounts.Antivirus software may not detect legitimate software used by hackers.Cybersecurity requires a proactive approach, similar to healthcare.Understanding cyber risk ratings is essential for practices.AI can enhance cybersecurity but requires due diligence.Practices must be aware of their vulnerabilities and take action.Chapters 00:00 Introduction02:02 Gary Salman's Background and Black Talon Security06:33 Understanding Social Engineering Attacks14:14 Preventative Measures and Training25:58 Understanding Cyber Risk in Dental Practices27:52 The Importance of Cyber Risk Ratings28:19 Known Exploitable Vulnerabilities and Network Security33:13 AI in Healthcare: Benefits and Risks36:09 Best Practices for Using AI in Practices38:49 Final Thoughts and Contact Information Episode Credits: Hosted by Jill AllenProduced by Jordann KillionAudio Engineering by Garrett LuceroAre you ready to start a practice of your own? Do you need a fresh set of eyes or some advice in your existing practice?Reach out to me- www.practiceresults.com. If you like what we are doing here on Hey Docs! and want to hear more of this awesome content, give us a 5-star Rating on your preferred listening platform and subscribe to our show so you never miss an episode. New episodes drop every Thursday!
Danny Jenkins — Founder of ThreatLocker and the Zero-Trust RevolutionDanny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny's journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/ 00:00 Introduction to Cybersecurity and ThreatLocker02:26 The Birth of ThreatLocker: A Personal Journey05:42 The Evolution of Zero Trust Security08:35 Real-World Impact of Cyber Attacks11:25 The Importance of a Hacker Mindset14:46 The Role of SOC Teams in Cybersecurity17:34 Building a Culture of Security20:23 Hiring for Passion and Skill in Cybersecurity23:44 Understanding Zero Trust: Trust No One26:32 Lifestyle Polygraph: Personal Insights and Fun29:41 Conclusion and Future of ThreatLocker
Narazili jste na nějakou nepravost, ať už jako občan, nebo jako státní zaměstnanec, a s tím, co víte, se chcete obrátit na média? Jak nahlásit třeba korupci nebo zneužívání pravomocí tak, abyste neohrozili sami sebe?
Lange habt ihr gewartet – jetzt ist es endlich soweit: Die neueste Folge des Trashcasts ist da – und das mit purem Action-Overkill! Denn Jacko, Carlo und der gute Kühne servieren euch Horden von Untoten, tödliche Laserschranken, groteske Mutationen, eine Welt am Rande der Auslöschung und eine finstere Organisation, die skrupellos die Strippen zieht. Die Rede ist – wie könnte es anders sein – von Paul W. S. Andersons Resident Evil. Aber es geht nicht nur um den ersten Teil, sondern gleich um die gesamte Reihe! Worauf wartet ihr also noch?! Schnappt euch 'ne Tüte Chips, haltet euch an einem Bier fest und vergesst bloß nicht die Spritze mit dem Antivirus!
Les collectivités territoriales sont devenues des cibles de choix pour les cybercriminels : budgets limités, données citoyens sensibles, systèmes d'information complexes parfois insuffisamment protégés. En février 2021, Angers Loire Métropole rejoint la liste des victimes avec une attaque ransomware qui compromet totalement son SI. Luc Dufresne, RSSI de la métropole, revient sur cette nuit où un attaquant opportuniste a pénétré le réseau.De la coupure immédiate d'Internet aux affiches dans les ascenseurs informant les agents de ne pas allumer leurs ordinateurs, notre invité raconte la gestion humaine et technique d'une crise qui a duré plusieurs mois. Il partage les leçons tirées de cette expérience : reconstruction à partir d'un cœur de confiance sécurisé, déploiement d'un SOC pour détecter les signaux faibles, sensibilisation renforcée des collaborateurs, et transformation de la culture cyber au sein de l'organisation.
Chytrá lednička, robotický vysavač nebo třeba nové auto. Domácí spotřebiče, automobily a další zařízení nám můžou usnadňovat život, spousta z nich ale při používání taky odesílá informace, které o nás hodně prozradí.
Sorry this podcast is so late. I merged the files on Thursday and never got the files up here. I may have dated the cast for Tjhursday and its still not here. I'm fixing that now.Welcome to the Security box, podcast 260. This is the first time we've done show notes since NCSAM, but that's OK. On this program, we're going to run through the landscape as well as have another interesting topic on EDR stuff. For those who are not familiar with EDR, and you're joining us for the first time, EDR stands for end point detection and response. This is part of some Antivirus tools. There is malware out there that disables this technology and we've been talking about this for quite awhile, even though we've not uploaded to the TSB directory in quite while. The article this time comes from Bleeping Computer and is titled New">https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/">New EDR-Freeze tool uses Windows WER to suspend security software which caught Nick's attention. If I remember, Windows WER stands for the "Windows Error Reporting" tool. So if this is the case, this is going to be bad. We'll break this down and we'll see what else the team is going to want to cover. Thanks so much for listening, and make it a great day!If you'd like to support our efforts on what this podcast is doing, you can feel free to donate">http://www.jaredrimer.net/donations.html">donate to the network, subscribing">www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog">https://technology.jaredrimer.net/contact-admins/">blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.
Cierran 68 tiendas Waldo's en Sonora tras incendio en HermosilloJornada de salud gratuita del 3 al 7 de noviembre en Miguel Hidalgo En Cuba rescatan a 16 mil personas tras crecida del río Cauto Más información en nuestro Podcast
Přišla vám zpráva od finančního úřadu, že dlužíte státu několik stokorun nebo vám naopak stát slibuje vrácení přeplatku? Zpozorněte, je totiž poměrně velká šance, že jde o podvod. Na co si dát pozor?
Llevamos años diciendo que no necesitas usar un antivirus y ahora va MacPaw y lanza uno. ¿O no es un antivirus?. Te lo explico en este capítulo 2852.Si te gustan los temas de Emilcar Daily, Weekly te va a encantar. Weekly es mi podcast privado semanal sobre Apple, tecnología, productividad, finanzas personales, domótica y las interioridades de mi negocio como podcaster y creador independiente. Únete a Weekly por solo 5 euros al mes eligiendo el plan anual en emilcar.fm/weekly.
Co se stalo včera ve světě? Co psaly noviny o válce na Ukrajině? Někteří z vás si možná odpustí listování novinami nebo zpravodajskými weby a takové otázky položí některému z asistentů, jako je třeba ChatGPT. Odpověď, kterou dostanete, ale často nebude pravdivá. Plyne to z mezinárodního výzkumu, na kterém se podílel i Český rozhlas.
Lže, kecá, vymýšlí si. A to dost často. Umělá inteligence. Nakolik se jí dá, nebo nedá věřit? Může se polepšit? A nahradí jednou chatovací asistenti televizi, rozhlas, noviny nebo internetové prohlížeče? Otázky na Jana Cibulku, spoluautora pořadu Antivirus na Radiožurnálu a datového novináře Českého rozhlasu. Ptá se Matěj Skalický.
Lže, kecá, vymýšlí si. A to dost často. Umělá inteligence. Nakolik se jí dá, nebo nedá věřit? Může se polepšit? A nahradí jednou chatovací asistenti televizi, rozhlas, noviny nebo internetové prohlížeče? Otázky na Jana Cibulku, spoluautora pořadu Antivirus na Radiožurnálu a datového novináře Českého rozhlasu. Ptá se Matěj Skalický. Všechny díly podcastu Vinohradská 12 můžete pohodlně poslouchat v mobilní aplikaci mujRozhlas pro Android a iOS nebo na webu mujRozhlas.cz.
Lže, kecá, vymýšlí si. A to dost často. Umělá inteligence. Nakolik se jí dá, nebo nedá věřit? Může se polepšit? A nahradí jednou chatovací asistenti televizi, rozhlas, noviny nebo internetové prohlížeče? Otázky na Jana Cibulku, spoluautora pořadu Antivirus na Radiožurnálu a datového novináře Českého rozhlasu. Ptá se Matěj Skalický.
Lže, kecá, vymýšlí si. A to dost často. Umělá inteligence. Nakolik se jí dá, nebo nedá věřit? Může se polepšit? A nahradí jednou chatovací asistenti televizi, rozhlas, noviny nebo internetové prohlížeče? Otázky na Jana Cibulku, spoluautora pořadu Antivirus na Radiožurnálu a datového novináře Českého rozhlasu. Ptá se Matěj Skalický.
durée : 00:24:41 - Informatique, Windows 10 - Comment protéger, nettoyer et mettre à jour son PC sans se ruiner ou se faire arnaquer ? David Maisonneuve, expert en informatique, démêle le vrai du faux et livre des conseils simples pour naviguer en toute sécurité. Vous aimez ce podcast ? Pour écouter tous les autres épisodes sans limite, rendez-vous sur Radio France.
Enrique Mugetti en RASCACIELOS – Parte 2Nos metemos a fondo en la etapa post Virus: cómo vivió la agonía de Federico Moura, el proceso detrás de Tierra del Fuego, 9 y la idea del “Antivirus”. Un recorrido por la reinvención artística de Quique al frente del proyecto visual Troy, con anécdotas imperdibles y una mirada íntima sobre una época clave del rock argentino.#Virus #FedericoMoura #RockArgentino #RascacielosPodcast #EnriqueMugetti #TierraDelFuego #Troy #PodcastDeRock #RockNacional #HistoriaDelRock
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Think you've been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You'll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You're Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query's Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker's Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker's Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend's Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity
V pátek se otevřou volební místnosti. Řada lidí si přitom ještě není jistá, koho bude volit, a politické strany tak mají posledních pár dnů na to přesvědčit nerozhodnuté. Pomáhají si u toho zhusta marketingem na sociálních sítích, který není vždycky dobře rozpoznatelný. Na co si dát pozor?
Našli jste na internetu speciální verzi TikToku s videi pouze pro dospělé? Pokud si ji nainstalujete, tak žádná videa neuvidíte, ale aplikace se vám pokusí ukrást peníze z vašeho bankovního účtu. Jak tento podvod funguje? Na co si dát pozor?
Rusko spouští svou vlastní aplikaci na posílání zpráv. Jmenuje se Max. Proč to dělá a je dobrý nápad ji vyzkoušet? „Rozhodně by nebyl dobrý nápad ji používat, ani kdyby to v Evropě šlo, což nejde.“
Slídí, šmíruje a čmuchá? Anebo prostě jen hlídá a brání? Chat Control. Jak by měl fungovat a proč teď vzbudil tolik emocí? Téma pro datového novináře Honzu Cibulku, který je spoluautorem pořadu Antivirus na Radiožurnálu. Ptá se Matěj Skalický. Všechny díly podcastu Vinohradská 12 můžete pohodlně poslouchat v mobilní aplikaci mujRozhlas pro Android a iOS nebo na webu mujRozhlas.cz.
Slídí, šmíruje a čmuchá? Anebo prostě jen hlídá a brání? Chat Control. Jak by měl fungovat a proč teď vzbudil tolik emocí? Téma pro datového novináře Honzu Cibulku, který je spoluautorem pořadu Antivirus na Radiožurnálu. Ptá se Matěj Skalický.
John McAfee turned computer security into a fortune, then spent the rest of his life making increasingly questionable life choices. Whether he was running from murder charges, pumping crypto schemes, or tattooing ""WHACKD"" on his arm before his suspicious prison death, McAfee proved that sometimes the most dangerous virus is success itself.Jeff Hiller and Leslie Liao join Misha to get the download on John McAfee.Be the first to know about Wondery's newest podcasts, curated recommendations, and more! Sign up now at https://wondery.fm/wonderynewsletterListen to The Big Flop on the Wondery App or wherever you get your podcasts. You can listen early and ad-free on Wondery+. Join Wondery+ in the Wondery App, Apple Podcasts or Spotify. Start your free trial by visiting wondery.com/links/the-big-flop/ now.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Internxt is creating a digital world that respects user privacy by making the ultimate web-3 privacy-first suite a reality. Internxt Drive, Mail, Send, Meet, Cleaner, Antivirus, VPN, and more.Fran Villalba Segarra (Spain, 1997) is the Founder and CEO of Internxt. He recently joined the Bitcoin.com News Podcast to talk about how to make the switch to the post-quantum zero-knowledge encrypted internet suite with Internxt.Internxt is one of the fastest-growing web3 startups, currently being valued at over €40M and offering its services to over a million users. Launched in 2020, the company has grown sustainably, at a steady 100% YoY rate to date. Fran is part of the Forbes 30 Under 30 2024 list and is one of the most well-known, reputable tech entrepreneurs in the space.In this episode Fran discussed the company's mission to create a privacy-respecting digital world, offering alternatives to major tech companies. Internxt provides cloud storage, VPN, and antivirus services with zero-knowledge client-side encryption, meaning they cannot access or sell user data. Segarra shared that his personal experience with a data breach at a previous company inspired him to build Internext to address the widespread issue of data insecurity and privacy violations by large tech entities. He highlighted that Internext recently became the first cloud company to offer post-quantum encryption, enhancing security and aligning with a "trustless" philosophy where users retain ultimate control over their data.Segarra also detailed Internxt's crypto strategy, which includes building a Bitcoin reserve through crypto payments and mining. He explained that Internext accepts nearly all cryptocurrencies via a partnership with Coingate, converting all crypto payments into Bitcoin for their reserve. Segarra emphasized the advantages of being an EU-based technology company due to the strong privacy protections offered by GDPR, which he believes surpasses those in other regions like the US or even Switzerland.Looking ahead, Segarra outlined Internxt's product expansion plans, including individual, business, and family subscriptions, with lifetime plans offering bundled services like VPN, antivirus, and upcoming features such as Internxt Meet, Internxt Mail, and a device cleaner, aiming to provide a comprehensive Google suite alternative. Segarra encouraged users to try Internxt's services, emphasizing their innovative, disruptive, and user-friendly nature, and highlighted the availability of promotional deals and a free 1 GB plan for testing.To learn more about the company visit internxt.com and follow the team on X. You can also check out pricing for a special offer right now and pay via crypto at Coingate.
Chcete jít na Facebook? Připravte si občanku. Tak může zanedlouho vypadat internet. Ve Velké Británii už taková pravidla zavedli, Evropská unie je zvažuje a chystá pro to podmínky. Jak funguje ověřování věku online a opravdu ochrání děti před nevhodným obsahem na internetu?
If you've used a computer in the last 40 years, chances are an annoying little pop-up has invaded your screen relentlessly. It was by McAfee, the most well-known and annoying anti-virus programme available on the market. Today, about 500 million customers rely on it to protect their computers from malicious software, and it made close to $3 billion in revenue in 2020 alone. Now, I bet you're thinking the inventor of this essential tech was probably a typical I.T. nerd who now lives a quiet, private life with his many millions of dollars… but that couldn't be further from the truth. John McAfee was a pioneer, inventor, and all-around coding genius. However, he led a life that was so unbelievable and bizarre, his recent obituary read more like an action movie plot than the life of a techie! From starting as an underdog, to making hundreds of millions of dollars, to becoming an addict, a fugitive, sucking a model's toes for the camera, and running for president while running from the cops! And that's not even half of it. Let's take a ride through the wild life of John McAfee. Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Začátkem měsíce si někteří hráči starší hry Call of Duty začali stěžovat, že jejich počítač napadl hacker. Jak se to stalo a na co by si hráči a hráčky měli dávat pozor?
Crime and Punishment by Fyodor Dostoyevsky - Part 3 chapter 5, narrated by Isaac BirchallSubscribe on YT or Join the Book Club on Patreon and support me as an independent creator :Dhttps://ko-fi.com/theessentialreadshttps://www.youtube.com/channel/UCfOFfvo05ElM96CmfsGsu3g/joinSUMMARY: Razumikhin is quite embarrassed by Raskolnikov, who is laughing loudly as they enter the room. Raskolnikov tries to be calm and confident with Porfiry but his laughter comes across as a bit strange. He become a bit uneasy when he notices Zamyotov and starts to assume that they much have been talking about him before they arrived. Razumikhin then makes the situation worse by saying that Raskolnikov gets nervous whenever the crime is mentioned. Raskolnikov assumes that Porfiry suspects him, and he nearly looses his cool when Porfiry mentions that he was the only person who pawned items to the victim who didn't come to collect their items. He starts to feel that Porfiry is playing with him. Porfiry mentions that he read an article that Raskolnikov had written "On Crime," and asks him to explain his arguments. Raskolnikov is surprised as he didn't know that it was published, but gladly accepts the challenge. He argued that certain men were above general humanity, and could commit crimes for the betterment of society. Razumikhin finds it very hard to believe that Raskolnikov holds this view, and the two men get up to leave. Just before they get out of the door however, Porfiry asks Raskolnikov if he saw the decorators when he pawned his last item to the victim. He recognises the trap, and tells Porfiry that he didn't, but did see that an apartment was moving, reminding Porfiry that the decorators where there 2 days later, on the day of the crime, not beforehand. SEO Stuff that I don't want to do lol...Welcome to this narration of Fyodor Dostoyevsky's masterpiece, bringing you another chapter of this incredible literary classic. In this literary fiction reading, we explore the depths of Russian literature as the a desperate young Russian man, Raskolnikov, plans the perfect crime - the murder of a despicable pawnbroker, an old woman who no one will mourn. It isn't just, he argues, for a man of of genius to commit a crime if it will ultimately benefit humanity. A powerful psychological study and a terrifying, thrilling murder mystery, filled with philosophical, religious and social commentary.Join me for this Crime and Punishment novel audiobook as we delve into themes of crime, social commentary, and Right and Wrong.Russian Literature, Dostoyevsky Audiobook, Classic Literature Get SurfShark and protect yourself online todayVPN: https://get.surfshark.net/aff_c?offer_id=926&aff_id=20389Antivirus: https://get.surfshark.net/aff_c?offer_id=934&aff_id=20389Get data brokers to stop selling your information with:Incogni: https://get.incogni.io/aff_c?offer_id=1219&aff_id=20389
In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple's private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it's not hackers with Wireshark), and share my approach with aliases.I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google's strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.In this week's episode:Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias managementMAC address randomization: GrapheneOS vs Apple's implementationThe real threats of public Wi-Fi in 2025Info stealers and video games can be a privacy nightmareGrapheneOS controversy: Developer conscription, Google's lockdown, and the future of custom ROMsWhy antivirus software might be the malware you're trying to avoidMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:MAC Address Lookup - https://maclookup.app/OUI Lookup - https://oui.is/33mail - https://www.33mail.com/OpenSnitch - https://github.com/evilsocket/opensnitchPrivacy.com - https://privacy.comLithic - https://lithic.comKaspersky and Russian Government - https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_governmentGoogle Not Killing AOSP - https://www.androidauthority.com/google-not-killing-aosp-3566882/GrapheneOS on Developer Conscription - https://grapheneos.social/@GrapheneOS/114359660453627718GrapheneOS on OEM Partnerships (June 19) - https://grapheneos.social/@GrapheneOS/114671100848024807GrapheneOS Response to Misinformation - https://grapheneos.social/@GrapheneOS/114825492698412916GrapheneOS on iPhone Security - https://grapheneos.social/@GrapheneOS/114824816120139544“Social engineering bypasses all technologies, including firewalls.”- Kevin Mitnick ★ Support this podcast on Patreon ★
Podvodné reklamy na sociálních sítích a ve vyhledávačích. Kryptoměny, které během chvíle ztratí všechnu hodnotu. Falešní bankéři, kteří zní jako z profesionálního call centra. To jsou podvody, které se týkají milionů lidí. Když se podaří část z nich zablokovat, pachatelé hned najdou novou cestu, jak dál oběti okrádat. Co mají všechny tyto podvody společného?
Snažíte se zaujmout na online seznamce? Plno lidí už si nechává radit od umělé inteligence, aby jim vymyslela atraktivní konverzační hlášky. Některé seznamovací aplikace už to začínají dokonce samy nabízet. Je ale dobrý nápad si nechat radit v této oblasti?
Přišlo WhatsAppem: „Ahoj, někdo se ti asi snaží ukrást účet na WhatsAppu. Měl by sis ho zabezpečit.“ Něco v tomto smyslu vám přijde od kamaráda i s odkazem na stránku, která vás požádá o telefonní číslo a opsání ověřovacího kódu. Jenže to nebyl kamarád a stránka je podvodná. Co se vám může stát a jak se bránit?
Výzkumníci z brazilské univerzity zveřejnili asi dvě miliardy zpráv uživatelů sociální sítě Discord, tedy asi deset procent obsahu celé sítě. Jsou to data z let 2015 až 2024. Jsou zprávy uživatelů sociálních sítí opravdu soukromé?
Kolik času vaše děti tráví u televize, na mobilu nebo s tabletem? Jakou pohádku pustit malým dětem? A kdy se začít obávat o svého teenagera, že na mobilu tráví času moc?
Lucie Výborná prozradila svůj obrovský měsíční plat, hlásá údajný titulek novinového článku na internetu, který se zobrazuje na facebookové zdi. Jenže když si budete chtít přečíst šťavnaté drby z osobního života moderátorky Radiožurnálu, ve skutečnosti naletíte podvodníkům.
Beginning the Romans 8 series, Pastor Brian Baer uses an illustration about a computer virus, and the antivirus to remedy the problem, and how it relates to sin and the remedy found in the cross.
This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US Government wants to look at routers, magic backdoors, weak password hashing, everyone is talking about Deepseek, hardware-level Anti-Virus, VMware ESXi and SSH, and if you pay the ransom you likely will not get your data back! This segment is sponsored by Bitwarden. Visit https://securityweekly.com/bitwarden to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-859
This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US Government wants to look at routers, magic backdoors, weak password hashing, everyone is talking about Deepseek, hardware-level Anti-Virus, VMware ESXi and SSH, and if you pay the ransom you likely will not get your data back! This segment is sponsored by Bitwarden. Visit https://securityweekly.com/bitwarden to learn more about them! Show Notes: https://securityweekly.com/psw-859
Možná lepší, asi levnější. Chatovací aplikace společnosti DeepSeek znejistěla konkurenci a ohromila svět. Jenže je z Číny. A to může být problém. Ve Vinohradské 12 o tom mluví datový novinář Jan Cibulka, spoluautor rozhlasového pořadu Antivirus. Ptá se Matěj Skalický.
Možná lepší, asi levnější. Chatovací aplikace společnosti DeepSeek znejistěla konkurenci a ohromila svět. Jenže je z Číny. A to může být problém. Ve Vinohradské 12 o tom mluví datový novinář Jan Cibulka, spoluautor rozhlasového pořadu Antivirus. Ptá se Matěj Skalický.Všechny díly podcastu Vinohradská 12 můžete pohodlně poslouchat v mobilní aplikaci mujRozhlas pro Android a iOS nebo na webu mujRozhlas.cz.
Elena má rakovinu. Tvrdí výzva na sociálních sítích. Pokud jí přispějete na péči, jakou máte jistotu, že peníze rodina dostane? A je tenhle příběh vůbec skutečný? Pátrala, ptala se, a poví Jana Magdoňová, spoluautorka rozhlasového pořadu Antivirus. Ptá se Matěj Skalický.
Q&A205: Do we have any suggestions for antivirus on Linux? What about physical home security? When does using a hardware crypto wallet make sense? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepodWelcome to the Surveillance Report Q&A - featuring Techlore & The New Oil answering your questions about privacy and security.❤️ Support us on Patreon: https://www.patreon.com/surveillancepod
Today we take a deep dive into AI tools: how to use them effectively and understanding their weaknesses. We go over new AI advancements fooling the “check this box if you're a human” button on many websites, and the FTC's crackdown on AI tools fooling consumers with fake reviews. We'll also talk about some new drone technology being used in active military combat zones and some of what to expect in the near future. Finally, a popular Antivirus recently banned by the US Government has replaced itself on user's computers, without their consent, with another antivirus program that's breaking user's PCs. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.