Podcasts about antivirus software

  • 52PODCASTS
  • 60EPISODES
  • 26mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 30, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about antivirus software

Latest podcast episodes about antivirus software

Absolute Business Mindset podcast
Protecting Your Business: The Importance of Cybersecurity in the Digital Age

Absolute Business Mindset podcast

Play Episode Listen Later May 30, 2024 9:52


In this riveting episode of the Business Growth Talks podcast with Mark Hayward, listeners are invited to delve deep into the critical realm of cybersecurity. As the digital landscape continues to evolve, the protection of data becomes paramount, not just for large corporations but for smaller businesses and solo entrepreneurs as well. Our episode serves as a clarion call for heightened vigilance and robust security tactics in the increasingly treacherous cyber domain.Data is today's unparalleled digital treasure, and its safeguarding is central to the discourse in this episode. The conversation cuts through the complexity of cybersecurity challenges, presenting the stark realities faced by businesses in the growth stage. The narrative is interwoven with engaging insights and actionable strategies, emphasizing the indispensability of cybersecurity in the modern business framework.Key discussions illuminate the pressing threats posed by cybercriminals and rogue states alike, while also decreeing the transformative power of AI and automation in fortifying cyber defenses. Furthermore, the role of governments and the essential actions they must undertake to buttress the private sector against digital dangers are thoughtfully examined.Key Takeaways:Cybersecurity is a critical concern for all businesses, not just large corporations but also small businesses and solo entrepreneurs, who are often highly vulnerable to attacks.With data being an invaluable asset in the digital era, robust cybersecurity measures are an absolute necessity for the survival and success of a business.AI and automation play a crucial role in the defense against cyber threats, offering small businesses advanced protection without the need for extensive in-house expertise.Rogue state-sponsored cyber activities, such a those attributed to China and Russia, add a layer of complexity to cybersecurity and highlight the need for international cooperation.Governments can significantly contribute to cybersecurity efforts by creating safer digital environments through legislation, resources, and support for small businesses.Support the Show.Do you want to be a guest on multiple podcasts as a service go to:www.podcastintroduction.comFind more details about the podcast and my coaching business on:www.businessgrowthtalks.comDo you want to be a podcaster? Sign up onwww.abmpodcastcourse.co.ukFind me onLinkedIn - https://www.linkedin.com/in/mark-hayw...Facebook - https://www.facebook.com/markjhayward​

Perceptual Pneuma Ministries
Antivirus Software

Perceptual Pneuma Ministries

Play Episode Listen Later Nov 18, 2023 34:20


This week during bible study, Prophetess Mary took the reigns of ministry. May the good Lord bless and keep you. I love you all and be blessed in Jesus name! Check out the YouTube channel here and join the family: https://www.youtube.com/channel/UCsHzbN9Ut4hhri85-1zO9PQ If you would like to join us for bible study, bible study is on Friday nights from 7:30pm - 9pm CST. To get the link, please feel free to message us at perceptualpneumaministries@gmail.com.

Datenschutz Plaudereien
DAT177 Böse Antivirus-Software (Stefan Thöni, Teil 2)

Datenschutz Plaudereien

Play Episode Listen Later Sep 29, 2023 9:43


USB-Sticks können «böse» sein, aber wie kann man sich vor dieser Gefahr schützen? Martin diskutiert mit Spezialgast Stefan Thöni, wieso Antivirus-Software keinen wirksamen Schutz bietet, im Gegenteil. Aber wie kann man sich sinnvoll schützen?

SAfm Market Update with Moneyweb
How much it costs your company when your antivirus software isn't updated

SAfm Market Update with Moneyweb

Play Episode Listen Later Jul 4, 2023 10:28


Ahmore Burger-Smidt – Director and Head of Data Privacy and Cybercrime Practice, Werksmans Attorneys SAfm Market Update - Podcasts and live stream

Cybercrime Magazine Podcast
Cybersecurity Elevator Pitch: Mac Security & Antivirus Software. Provided By Intego.

Cybercrime Magazine Podcast

Play Episode Listen Later May 16, 2023 1:09


Touted as the leading provider of Mac security software, Intego offers advanced protection against malware, viruses, phishing scams, and other online threats that can compromise valuable assets and data. Its advanced features include real-time scanning, proactive defense mechanisms, and customizable settings that allow users to tailor security measures to meet their specific needs. Moreover, with automatic updates and constant monitoring of the latest threats, Intego ensures that you'll be protected no matter what you do or where you go online. Visit https://intego.com for more.

Risk, Governance, and Cyber Compliance
A Worthy Mention - Antivirus Software

Risk, Governance, and Cyber Compliance

Play Episode Listen Later Jan 26, 2023 4:00


Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization's needs. NIST has guidance that you can leverage; NIST 800-83 recommends key capabilities that an antivirus software must have:Scanning startup files and boot recordsReal-time scanning of emails and email attachments for malwareBehavior monitoring of emails, browsers, and instant messaging softwareScanning for known malwareDisinfecting filesQuarantining filesIdentifying common types of malware and attacker toolsNIST also recommends that organizations deploy antivirus software from a host and network-based perspective.NIST 800-83: https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final========Let E|CE help your Small Business*** Book a Call ***https://booking.execcybered.com/#/customer/drbillsouzaexeccyberedLinkedin: https://www.linkedin.com/company/exceccybered/Twitter: https://twitter.com/DrBillSouzaInstagram: https://www.instagram.com/drbillsouza/Youtube: https://bit.ly/3BGOtPAThanks.Dr. Bill SouzaCEO | Founderwww.execcybered.com

ChooseFI
397 | Securing Your Financial Life

ChooseFI

Play Episode Listen Later Oct 3, 2022 76:31


In this episode: cybersecurity, password managers, two-factor authentication, safely navigating the internet, and more hot-seat questions! Have you ever considered how secure your finances are in the modern world? Within the cyber-dominated world we are all living in, it can be tough to stay on top of updates, passwords, and other necessary resources that help us keep our digital footprints safe. Well in order to provide you all with some high-level tips and tricks to stay ahead of the curve, we decided to have long time listener and cybersecurity expert Tom on the show this week to discuss how you can secure your online life. Keeping yourself secure and your assets safe is one of the best ways to ensure a progressive future as you move forward in the digital era while on your FI journey! Timestamps: 1:44 - Introduction 2:52 - Passwords and Password Managers 13:22 - Two-Factor Authentication 22:03 - Email Links 28:38 - Cyber Financial Risks 34:57 - Surfing The Web Safely 39:14 - Antivirus Software 43:57 - Public Wifi, Back-ups, and High-Level Tips 55:18 - Look Out For Elderly Loved Ones 58:38 - Tom Takes On The Hot Seat 75:01 - Conclusion Resources Mentioned In Today's Episode: Join ChooseFI's Facebook Group! Yubico Lastpass 1Password KeePass Why You Need A Legacy Binder JL Collins Die With Zero: Getting All You Can from Your Money and Your Life By Bill Perkins RunnersFI Suggested Books Libby Subscribe to The FI Weekly! More Helpful Links and Resources: Earn $1,000 in cashback with ChooseFI's 3-card credit card strategy Share FI by sending a friend ChooseFI: Your Blueprint to Financial Independence Track your personal finances with Personal Capital Keep learning or start a new side hustle with one of our educational courses Slash your cell phone bill without sacrificing service with Mint Mobile

Datenschutz Plaudereien
DAT023 Cyber-Versicherung (Marcel Waldvogel)

Datenschutz Plaudereien

Play Episode Listen Later Jul 7, 2022 19:46


Wer eine Cyber-Versicherung abschliessen möchte, muss viele Voraussetzungen erfüllen: Antivirus-Software, Backups, regelmässig gewechselte Passwörter, … Martin diskutiert mit Spezialgast Marcel Waldvogel, Experte für IT-Sicherheit, über den Sinn und vor allem Unsinn der gängigen Voraussetzungen.

Consumer Tech Update
Remove this popular antivirus software from your computers

Consumer Tech Update

Play Episode Listen Later Mar 29, 2022 1:25


Have you ever downloaded an antivirus program called Kaspersky? It's a national security risk. Listen to this one-minute podcast to protect yourself. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Defrag
Is Your Antivirus Software At Risk?

The Defrag

Play Episode Listen Later Mar 17, 2022 15:19


This week the German Federal Office for Information Security (BSI) issued a warning against the use of products made by the Russian cybersecurity company Kaspersky. So who are Kaspersky, and is there a real threat from using its software?Sign up to our free newsletter at https://thedefrag.com/ - or become a paid member and get an ad-free feed and bonus episodes.Join our Discord: https://discord.gg/rHb7JVHz42Follow us on Facebook, Twitter, Instagram, or YouTube.Advertisers:Command Line Heroes: https://link.chtbl.com/commandlineheroes_cyoa?sid=s9.podcast.thedefrag

Talking SME with Ten2Two  … eavesdropping on the experts
Simple antivirus software is not enough anymore ...... Gary Swanwick of Epoq IT, chats with Jane O'Gorman of Ten2Two

Talking SME with Ten2Two … eavesdropping on the experts

Play Episode Play 29 sec Highlight Listen Later Jul 16, 2021 21:02 Transcription Available


Gary Swanwick, Co-founder and Managing Director at Epoq IT discusses how simple antivirus software is no longer enough, how the rise in remote working has impacted cyber security and steps business leaders can take to educate themselves and their people. Gary is co-founder and managing director of managed services provider Epoq  IT, which is based in High Wycombe. With over 20 years' experience in the IT industry advising corporate and SME clients, Gary is a winner of the Buckinghamshire Entrepreneur of the year award. 

Relational Technology
Episode 7 -The Father of Antivirus Software John McAfee

Relational Technology

Play Episode Listen Later Jul 8, 2021 47:04


  If you have ever been frustrated by a nagging window asking you to update your antivirus software, then you have John McAfee to thank. Taylor and Eric do just that in this week's episode of Relational Technology. Please feel free to leave a comment. We would love to hear from you. Visit our website: https://www.emeralddata.us/ Visit our Facebook: https://www.facebook.com/emeralddatapartners   

Creating Wealth Real Estate Investing with Jason Hartman
1704 FBF: NSA-Proof Internet Browsing with John McAfee Developer of the McAfee Antivirus Software & Founder of McAfee Associates

Creating Wealth Real Estate Investing with Jason Hartman

Play Episode Listen Later Jun 25, 2021 49:39


Today's Flash Back Friday comes from Episode 353, originally published in December 2013. John McAfee is in the news, as he is trying to create an NSA-proof gadget used for private internet browsing, called "Decentral." McAfee, original creator of McAfee Antivirus software was born in the United Kingdom and raised in Salem, Virginia, United States.  McAfee was employed as a programmer by NASA's Institute for Space Studies in New York City from 1968 to 1970. From there he went to Univac as a software designer and later to Xerox. as an operating system architect. In 1978 he joined Computer Sciences Corporation as a software consultant. Later, while employed by Lockheed in the 1980s, McAfee received a copy of the Pakistani Brain computer virus and began developing software to combat viruses. In 1987 McAfee founded McAfee Associates, a computer anti-virus company. He was the first to distribute anti-virus software using the shareware business model. In 1989, he quit Lockheed and began working full-time at McAfee Associates, which he initially operated from his home in Santa Clara, California.The company was incorporated in Delaware in 1992, and McAfee resigned from the company in 1994. Two years after McAfee Associates went public, McAfee sold his remaining stake in the company. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. This company later became Network Associates, a name it retained for seven years until it was renamed McAfee. Now a subsidiary of Intel corporation, McAfee remains today as one of the largest anti-virus companies in the world. Other business ventures that he founded included Tribal Voice, which developed one of the first instant messaging programs, PowWow. In 2000, John McAfee invested in and joined the board of directors of Zone Labs, makers of firewall software, prior to its acquisition by Check Point Software in 2003. In August 2009, The New York Times reported that McAfee's personal fortune had declined to $4 million from a peak of $100 million, the effect of the global financial crisis and recession on his investments. Beginning in February 2010, McAfee started a new venture in the field of bacterial quorum sensing. His company QuorumEx has its headquarters in Belize and is working towards producing commercial all natural antibiotics based on anti-quorum sensing technology. In 2013 McAfee started a new company, Future Tense Central, to produce a secure computer network device called the D-Central. Website: www.FutureTenseCentral.com www.JasonHartman.com/Properties

WSJ Minute Briefing
John McAfee, Antivirus Software Pioneer, Found Dead in Spanish Jail

WSJ Minute Briefing

Play Episode Listen Later Jun 24, 2021 2:15


BuzzFeed is close to a deal to go public through a merger with a special-acquisition purpose company. FedEx this month suspended service for 1,400 freight customers to help ease network congestion. The Federal Reserve releases results from its annual bank stress tests today. Keith Collins hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices

Talking Tech with Jefferson Graham
Antivirus software entrepreneur John McAfee found dead

Talking Tech with Jefferson Graham

Play Episode Listen Later Jun 24, 2021 3:53


John McAfee, the entrepreneur who founded the antivirus software company bearing his name, was found dead after his extradition to the U.S. to face tax charges was cleared.Privacy Policy and California Privacy Notice.

NerdZoom
NRDZM141 Polizei findet Wassermelonen auf Mars

NerdZoom

Play Episode Listen Later Jun 10, 2021


Peter und Marius reden über Ethereum-minende Antivirus Software, Firefox 89 und sie besprechen die WWDC 2021!

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 9 - A Wolf in Sheep's Clothing: Ransomware Defense, China Buys Foreign AntiVirus Software, AXA Insurance Hit With Ransomware After Saying It Will Not Pay, Hosts' Jobs Outside of Tech

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later May 24, 2021


Programming note: Glenn was traveling during the recording of episode 9 so his audio quality is not as great as prior episodes.  Episode 10 should return to normal audio quality. Welcome to this week's episode of the PEBCAK Podcast!  We’ve got three amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) PEBCAK - Acronym of “problem exists between chair and keyboard.”

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 9 - A Wolf in Sheep's Clothing: Ransomware Defense, China Buys Foreign AntiVirus Software, AXA Insurance Hit With Ransomware After Saying It Will Not Pay, Hosts' Jobs Outside of Tech

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later May 23, 2021 34:56


Programming note: Glenn was traveling during the recording of episode 9 so his audio quality is not as great as prior episodes.  Episode 10 should return to normal audio quality. Welcome to this week's episode of the PEBCAK Podcast!  We've got three amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) PEBCAK - Acronym of “problem exists between chair and keyboard.”   A wolf in sheep's clothing: ransomware defense with virtual keyboards https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/ https://www.bleepingcomputer.com/news/security/irelands-health-services-hit-with-20-million-ransomware-demand/   China's military intelligence group purchases 10-30 seats of foreign AV software https://www.recordedfuture.com/china-pla-unit-purchasing-antivirus-exploitation/ https://www.zdnet.com/article/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack/   AXA Insurance hit with ransomware attack after it states it will no longer pay ransoms for cybersecurity insurance policies https://www.bleepingcomputer.com/news/security/insurer-axa-hit-by-ransomware-after-dropping-support-for-ransom-payments/ https://www.zdnet.com/article/axa-pledges-to-stop-reimbursing-ransom-payments-for-french-ransomware-victims/   Hosts discuss their careers outside of tech https://www.fpri.org/ https://www.mouthhealthy.org/ https://www.medicalnewstoday.com/articles/287857   Dad Joke of the Week (DJOW)   Remember, the number of likes you get on social media just jumped up by 20% now that you've listened to the podcast.  If you know anyone else who would like 20% more likes on social media, please share this podcast with them!   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/

IGeometry
North Korean Hackers Hide Malicious Code within BMP image, Goes Undetected by AntiVirus software

IGeometry

Play Episode Listen Later Apr 20, 2021 14:51


Let us discuss the complexity behind this trojan hack, the multi-layer approach of hiding the RAT (remote access trojan) is absolutely genius. https://en.wikipedia.org/wiki/HTML_Application https://en.wikipedia.org/wiki/Portable_Network_Graphics https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/ --- Send in a voice message: https://anchor.fm/hnasr/message

Gaurav Tiwari
Best Antivirus Software for Windows

Gaurav Tiwari

Play Episode Listen Later Feb 23, 2021 7:33


This episode is also available as a blog post: https://gauravtiwari.org/best-antivirus-software-for-windows/ --- Send in a voice message: https://anchor.fm/gauravtiwari/message

Caffe 2.0
1857 Rasonware: Esistono protezioni, antivirus, software di monitoraggio efficaci ?

Caffe 2.0

Play Episode Listen Later Nov 24, 2020 4:04


A vedere il numero di infezioni sembra proprio di no.E' possibile che non esistano tool di monitoraggio, protezione e alert efficaci ? Segnalateli sul gruppo telegram del caffe20 e ne parleremo insieme.Scusate per l'audio con il microfono di riserva, sto ancora imparando a conoscerlo ...

Destination Linux
200: Anti-Virus On Linux: Should You Use One? | Destination Linux 200

Destination Linux

Play Episode Listen Later Nov 18, 2020 59:41


On this week's episode of Destination Linux, we have a great episode in store for you. We're going to talk about the marketshare potential of Linux. Growth numbers in the 300% range and wondering how this is going to translate to the Linux desktop. In addition we will be covering community feedback, Antivirus Software on Linux? Is this something you should worry about? Google Play Store reportedly containing the highest risks for malware and then of course we have our popular tips/tricks and software picks. All of this and so much more this week on Destination Linux. Help Us Decide The Recipient of the Next DLN Gives Back: https://discourse.destinationlinux.network/t/its-time-to-give-back-dln-charity-drive/2888 Sponsored by: Digital Ocean - https://do.co/dln Bitwarden - https://bitwarden.com/dln DL Hosts: Ryan (DasGeek) = https://dasgeekcommunity.com Noah Chelliah = https://asknoahshow.com Michael Tunnell = https://tuxdigital.com Jill Bryant = https://twitter.com/jill_linuxgirl Want to Support the Show? Support us on Patreon = https://destinationlinux.org/patreon Support us on Sponsus = https://destinationlinux.org/sponsus DLN Store = http://dlnstore.com Want to follow the show and hosts on social media? You can find all of our social accounts at https://destinationlinux.org/contact Topics covered in this episode: Full Show Notes (for links and such) https://destinationlinux.org/episode-200 00:00 = Welcome to Episode 200 of Destination Linux! 02:44 = Community Feedback: A Different Take on Proprietary Software vs Open Source 09:45 = Michael Has A Revelation About GIMP 12:21 = How to send in Community Feedback 12:33 = New DLN Podcast = Game Sphere ( https://gamesphere.show ) 16:16 = Digital Ocean - VPS & App Platform ( https://do.co/dln ) 17:51 = Anti-Virus On Linux: Should You Use One? 29:13 = Fortune Projects Major Growth for Linux Marketshare! 40:13 = Our Take On Reports of Android's Malware Issues 46:58 = Bitwarden - Password Manager ( https://bitwarden.com/dln ) 47:47 = Linux Gaming: FlightGear - Flight Simulation 52:03 = Tip of the Week: "cal" (Command-line Calendar) 52:43 = Software Spotlight: Gitbook (Documentation Creation) 56:02 = Outro Linux #OpenSource #Podcast

Destination Linux
Anti-Virus On Linux: Should You Use One? | Destination Linux 200

Destination Linux

Play Episode Listen Later Nov 18, 2020 59:41


On this week’s episode of Destination Linux, we have a great episode in store for you. We’re going to talk about the marketshare potential of Linux. Growth numbers in the 300% range and wondering how this is going to translate to the Linux desktop. In addition we will be covering community feedback, Antivirus Software on […]

Helping You Tech
Is Your Antivirus Software Really Protecting Your Business?

Helping You Tech

Play Episode Listen Later Nov 17, 2020 46:41


Technically, antivirus software only fights viruses. How to protect your devices.

Hacked Week
Hacked Week #27: Flaws in Antivirus Software, Shopify Data Breach, Nintendo Switch hacks

Hacked Week

Play Episode Listen Later Oct 7, 2020 4:53


You will see Cybersecurity and Hacking related News from 30th September 2020 to 6th October 2020 which includes news like Flaws in Antivirus Software, Shopify Data Breach, Nintendo Switch hacks and many more. --- Send in a voice message: https://anchor.fm/quitehacker/message

Tekkie Table
Episode 011 – Proaktive Schutztechnologien + G DATA im PLAYBOY?!

Tekkie Table

Play Episode Listen Later Oct 6, 2020 28:05


Wie funktioniert graphenbasierte Erkennung? Wie sieht der Arbeitsalltag eines „Cyberkriegers“ aus? Und was macht das G DATA im #Playboy?! In der neuen Episode des Tekkie Tables liefern Hauke, Arnas und Thomas die Antworten. 00:00 – Intro 00:39 – Die Cyberkrieger 05:40 – Wie funktioniert eine Antivirus-Software? 07:50 – Proaktive Technologien 10:42 – Verhaltensüberwachung 13:30 – Das BEAST in Aktion 22:57 – Retrospective Removal 24:12 – False Positives 27:37 – Outro --- Send in a voice message: https://anchor.fm/tekkie-table/message

Firewalls Don't Stop Dragons Podcast
The Pros & Cons of Antivirus Software

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Aug 3, 2020 42:39


When most people think of protecting their computers, they think of antivirus software. Viruses are a real problem, of course, but how well do antivirus (AV) apps protect you? And are there any downsides to using AV software? Turns out there are plenty - so many that the cons probably outweigh the pros for most people, on Apple Mac or on Windows PC. Don't believe me? Listen to this show and then decide. In other news: Google is finally bringing its Google One storage app to iOS, but don't use it; Netgear has declared that at least 45 of their highly vulnerably routers will never be fixed; and if you've purchased anything from Amazon, you have a public profile - and you should review what others can see about you. Further Info: Cryptomator: https://cryptomator.org/Sync.com secure cloud storageNetgear routers you should get rid of: https://www.tomsguide.com/news/netgear-routers-no-fixesMy "pros & cons of AV" article: https://firewallsdontstopdragons.com/the-pros-and-cons-of-anti-virus-software/

Techකතා Podcast
EP241: Best Firewall & Antivirus Software!

Techකතා Podcast

Play Episode Listen Later Jul 17, 2020 60:11


Security, Best Firewall, Antivirus, Block-chain, Social Engineering, Twitter hacked and more… Download MP3 or Torrent

Radio Leo (Video HI)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

Radio Leo (Video HI)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

All TWiT.tv Shows (Video LO)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Radio Leo (Video LO)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

Radio Leo (Video LO)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

All TWiT.tv Shows (Video HD)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

All TWiT.tv Shows (Video HI)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

All TWiT.tv Shows (MP3)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Radio Leo (Video HD)
Ask The Tech Guy 42: Do You Need Antivirus Software for a Chromebook?

Radio Leo (Video HD)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (Video HI)
ATG 42: Do You Need Antivirus Software for a Chromebook?

Ask The Tech Guy (Video HI)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (Video HD)
ATG 42: Do You Need Antivirus Software for a Chromebook?

Ask The Tech Guy (Video HD)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (MP3)
ATG 42: Do You Need Antivirus Software for a Chromebook?

Ask The Tech Guy (MP3)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (Video LO)
ATG 42: Do You Need Antivirus Software for a Chromebook?

Ask The Tech Guy (Video LO)

Play Episode Listen Later Jun 29, 2020 13:35


Do you need antivirus software for a Chromebook? Leo Laporte explains Chrome OS security. Find the right Chromebook for you: https://my.lustre.ai/hTJ9a Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

WIRED Tech in Two
Spying Antivirus Software — Most Interesting Thing in Tech

WIRED Tech in Two

Play Episode Listen Later Jan 28, 2020 3:45


It turns out your antivirus software might be spying on you too. The more we learn about privacy, the less it seems we have. Here's the story about Avast and its subsidiary, Jumpshot: https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation.

Computer Talk with TAB
Computer Talk: What You Need To Know About Antivirus Software (1/25/20)

Computer Talk with TAB

Play Episode Listen Later Jan 24, 2020 41:33


A caller with an external Western Digital hard drive wonders if he backed up the data from his old computer properly.  A caller with a new Windows 10 computer asks which antivirus he should use.  We recommend using Webroot fo antivirus.  The antivirus questions continue as we help a listener uninstall Avast antivirus. We also provide help on how to check if OpenDNS is operating properly.  A user has questions about use of his e-mail old address when he moves to another town and changes his e-mail address.  We help a caller with caller with a brother MFP-9125 install drivers on his printer.  Finally we help a Mac user with a browser hijack reset his browser settings and fix being connected to a "captive" network.

Comodo Internet Security
The Importance of Antivirus Software - Comodo

Comodo Internet Security

Play Episode Listen Later Oct 4, 2019 2:19


Antivirus software is the "policeman" at the gate of a computer system. It protects the computer from incoming threats and seeks out, destroys and warns of possible threats to the system. New viruses are coming out all the time. It is the job of the antivirus software to keep up with the latest threats. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. What are the differences between viruses, Trojans, Worms, Spyware, and Other Malware? To help protect against malicious spyware, users can run antispyware programs on their computer system. Antispyware programs are designed to search your hard drive for traces of known spyware and adware. https://antivirus.comodo.com/faq/antivirus/what-is-difference-between-virus-and-antivirus/ Tag: Virus vs Antivirus

Ask The Tech Guy (MP3)
ATG 3: What's the Top Antivirus for Windows 10? - The best antivirus software to protect Windows PCs in 2019.

Ask The Tech Guy (MP3)

Play Episode Listen Later Sep 9, 2019 4:49


Leo Laporte answers Joe's question: My Bitdefender expired two days ago. I am looking to the top-rated virus protection. Bitdefender was at one time but I see so many scan protection as number 1 and I don't know if I should keep Bitdefender or buy a new one. What's the top virus protection today? Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Where's the Mic
Sex, Drugs, and Antivirus Software?

Where's the Mic

Play Episode Listen Later Aug 16, 2019 59:23


The boys discuss the heavy topics of murder, deception, and living on the run with bath salts. LOTS of Bath Salts

IT Manager Podcast (DE, german) - IT-Begriffe einfach und verständlich erklärt

Kontakt: Ingo Lücker, ingo.luecker@itleague.de Heute dreht sich alles um das Thema: „Was ist eigentlich ein Rootkit?“ Bei einem Rootkit handelt es sich um eine ganze Sammlung verschiedener Schadprogramme. Diese nisten sich über eine Sicherheitslücke in einen Computer ein und ermöglichen einem Angreifer, den dauerhaft Remote-Access (ferngesteuerten Zugriff) auf den Rechner. Je nachdem, auf welcher Berechtigungsebene sich das Rootkit ausgebreitet hat, kann es dem Angreifer sogar umfassende Administrationsrechte verschaffen, wodurch er die uneingeschränkte Kontrolle über den Rechner erhält. Da Rootkits in der Lage sind, sich und andere virtuellen Schädlinge zu verstecken, können sie unter anderem Änderungen auf der grundlegendsten Ebene eines Rechners vornehmen, Dateien auszuführen, das System modifizieren und seine Verwendung nachverfolgen. Und das Ganze geschieht natürlich ohne das Wissen des eigentlichen Nutzers. Deswegen werden Rootkits oft auch „Tarnviren“ genannt, obwohl sie per Definition nicht als Viren klassifiziert werden. Geschichte: Die ersten Rootkits tauchten in den frühen 90er-Jahren auf. Damals zielten sie noch ausschließlich auf Unix-ähnliche Betriebssysteme wie Linux ab. Aus dieser Zeit stammt auch ihre Bezeichnung: Mit „Root“ wird bei Unix  der Administrator bezeichnet, der Wortteil „kit“ bedeutet wiederum so viel wie „Ausrüstung“ oder „Werkzeugkasten“. Ein „Rootkit“ ist also ein Programm, das einem Anwender (berechtigt oder unberechtigt) privilegierten Zugriff auf einen Computer ermöglicht. Einige von Ihnen dringen bis in den Kernel – also den innersten Kern und damit die „Wurzel“ (Englisch: „root“) – des Systems vor und werden von dort aus aktiv. Wie funktionieren Rootkits eigentlich? Inzwischen gibt es die verschiedensten Arten von Rootkits. Doch die Funktionsweise der Rootkits und das Vorgehen zur Infiltration eines Systems ist immer noch dieselbe:  Infektion Zuerst wird ein System infiziert: Das geschieht entweder durch (Social Engineering, Drive-by-Download, einem USB Stick oder einem Evil Maid Attack)    Social Engineering, wo Cyberkriminelle durch Beeinflussung oder bewusste Täuschung von Mitarbeitern an Zugangsdaten und Passwörter gelangen, und so Zugriff auf den Rechner erhalten und das Rootkit installieren oder durch  Drive-by-Download. Hier gelangen Rootkits beim Herunterladen einer Software aus einer unsicheren Quelle oder per Klick auf einen Link oder Anhang in einer Phishing-E-Mail auf den Rechner.  oder durch einen USB-Stick, der ein Rootkit enthält und durch einen unbedachter Finder und seiner Neugier auf eine Rechner gelangt oder aber durch den Häcker eigenhändig auf einem unbewachten Computer installiert wird. Man nennt diese Art von System Infizierung auch „Evil Maid Attacks“ zu Deutsch: „Böses-Dienstmädchen-Angriff.  Tarnung (Stealth) Sobald das System infiziert ist, und sich das Rootkit eingenistet hat, erfolgt die Tarnung. Dafür beginnt das Rootkit, jene Prozesse zu manipulieren, über die Programme und Systemfunktionen Daten untereinander austauschen. Auf diese Weise erhält ein Virenprogramm bei einem Scan lediglich gefälschte Informationen, aus denen sämtliche Hinweise auf das Rootkit herausgefiltert wurden. Aus diesem Grund ist es selbst professioneller Antivirus-Software oft unmöglich, die Schädlinge anhand ihrer Signaturen oder einer Verhaltensanalyse (Heuristik) ausfindig zu machen. Hintertür (Backdoor) einrichten Im letzten Schritt richtet das Rootkit eine sogenannte „Backdoor“ zu deutsch eine Hintertür im System ein. Diese wird vom Angreifer Hacker mittels eines ausgespähten Passworts oder einer Shell genutzt, um dauerhaft via Remote-Access auf den Rechner zuzugreifen. Häufig werden mit einem Rootkit infizierte Rechner auch zu Bot-Netzen zusammengeschlossen und für Phishing oder DDoS-Attacken mobilisiert. Dem Rootkit kommt dabei die Aufgabe zu, jeden Anmeldevorgang und jede verdächtige Aktivität zu verbergen.  Was für Rootkits gibt es eigentlich? Rootkits unterscheiden sich vor allem in ihrer Methodik, mit der sie Malware-Prozesse und Hacker-Aktivitäten tarnen. Am häufigsten kommen Kernel- und User-Mode-Rootkits zum Einsatz. Kernel-Mode-Rootkits Kernel-Mode-Rootkits nisten sich im Kernel eines Betriebssystems ein und ermöglicht somit den Tiefenzugriff auf sämtliche Hardware-Komponenten und erlaubt beliebige Veränderungen von Systemeinstellungen. Das bedeutet: Konnte ein Angreifer dort ein Rootkit platzieren, erhält er die volle Kontrolle über das gesamte System.  User-Mode-Rootkit Im Gegensatz zu Kernel-Mode-Rootkits agieren User-Mode-Rootkits lediglich auf der Benutzerebene eines Computers. User-Mode-Rootkits tarnen sich, indem sie den Datenverkehr zwischen dem Betriebssystem und den installierten Viren- und Sicherheitsprogrammen abfangen und manipulieren. Sonstige Rootkits Neben diesen beiden unterscheidet man noch vier weitere Arten von Rootkits, die eher als ungefährlich eingestuft werden: Application-Rootkit: Application-Rootkit ist die primitivste Variante des Rootkits. Sie ersetzt Systemprogramme durch eigene, modifizierte Varianten und ist daher recht einfach zu erkennen. Aus diesem Grund wird sie von Angreifern kaum noch eingesetzt.  Speicher-Rootkit: Speicher-Rootkit können nur im Arbeitsspeicher existieren und verschwinden demnach vom System, sobald es neu gestartet wird. Bootkits: Bootkits verändern den Bootsektor, die Software, die vor dem Laden des Betriebssystems gestartet wird. Mobile Rootkits Mobiler Rootkits attackieren vor allem Android-Geräte. Diese Rootkits sind meist Teil einer schädlichen App, die von einem Drittanbieter-App-Store heruntergeladen wird. Zu guter Letzt widme ich mich der Frage, wie kann man sich vor Rootkits schützen? Die Sicherheitsmaßnahmen gegenüber Rootkits sind grundsätzlich dieselben, die auch für andere häufig vorkommende Schädlingstypen gelten: Nutzen Sie starke Passwörter. Führen Sie regelmäßig Security Awareness Schulungen für Ihre Mitarbeiter durch Implementieren Sie mehrstufige Sicherheitsprogramme in Ihre IT-Infrastruktur. Pflegen Sie Ihr System mit regelmäßigen Updates. oder Sie nutzen speziell auf Rootkits ausgerichtete Programme wie beispielsweise den sogenannten Rootkit-Scan. In manchen Security-Softwares ist diese Funktion bereits enthalten.

InSecurity
BlueKeep: It’s Not Just About The Worm

InSecurity

Play Episode Listen Later Jun 13, 2019 70:48


BlueKeep: It’s Not Just About The Worm In the last week, you have likely heard and read stories about the security vulnerability BlueKeep. It has been said to be capable of being exploited for the initiation of self-replicating worm as destructive as WannaCry. As of June 1, over 1M computers may be at risk. But is the danger really about The Worm? Or is it more about millions of endpoints providing direct ingress into networks worldwide? “The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats.  Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the internet. We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact and are seeking to motivate increased protections against this flaw. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches. This is critical not just for NSA’s protection of National Security Systems but for all networks.”  -- NSA Cybersecurity Advisory - Patch Remote Desktop Services on Legacy Versions of Windows In this Very Special Episode of InSecurity, Matt Stephenson rounded up a cast of experts to discuss BlueKeep… What is it? Where did it come from? Can it be stopped? Maybe a better question is… can it be prevented? After WannaCry and Petya/NotPetya… why is this happening again? We are joined by best-selling Cybersecurity author and Kip Boyle, Automox’s Richard Melick and BlackBerry|Cylance’s Scott Scheferman to take good hard look at BlueKeep. There’s a Bad Moon on the Rise… make sure you are ready for it. About Kip Boyle   Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. Fire Doesn’t Innovate Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.  Cybersecurity is not just a technology problem, it's a management opportunity. Learn how to manage cyber risks and ensure your company is cyber resilient now, and remain in the game no matter what the future holds.  About Richard Melick Richard Melick (@RCMelick) is a Sr. Technical Product Marketing Manager at Automox. He has over a decade of experience in Cybersecurity and Antivirus Software, working in various career functions in the industry that have taken him all over the world.  About Automox Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint and software, regardless of location, meets regulatory and operational security requirements. About Scott Scheferman   Scott Scheferman (@transhackerism) wears many hats at BlackBerry|Cylance, working between the white spaces on the org chart to ensure timely delivery of Consulting Services, effective messaging around the value of predictive AI in the context of cybersecurity operations and risk, research around how the Temporal Predictive Advantaged (TPA) ofBlackBerry|Cylance’s AI affects the broader malware economy, and public speaking at conferences and seminars around the country.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV  Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

Finding Genius Podcast
Next Generation Antivirus Software—Adam Kujawa—Malwarebytes

Finding Genius Podcast

Play Episode Listen Later Nov 15, 2018 36:22


Criminal cyber activity has increased dramatically over the past 10 years, leading to the existence of more malware than ever before. With so many hacker forums and cyber criminals offering their services on the dark web, committing cybercrimes no longer requires an extensive amount of knowledge or experience; you just need to know who to talk to.  Having spent over 14 years working in the field of cybersecurity, Adam Kujawa has witnessed the evolution of cybercrime. While it might seem like he's seen it all, he's the first to admit that the landscape is constantly changing, requiring cybersecurity measures to remain a step ahead of the cyber criminals. He joins the podcast today to discuss the work he's doing as the director of malware intelligence at Malwarebytes, a security solution company developing layered defense software for individual consumers and enterprises with the ultimate goal of creating a malware-free existence for the world. Tune in for an informative and insightful conversation about the current types of malware, ransomware, and cyber-attacks, sandbox security mechanisms, security countermeasures carried out by criminals, and the recent increase in cyber-attacks in the business arena.  Learn more and check out free trial services at malwarebytes.com.  

DirtySecurity
Tales from Cylance’s Ultimate Road Warrior, Richard Melick

DirtySecurity

Play Episode Listen Later Nov 7, 2018 27:26


Tales from Cylance’s Ultimate Road Warrior Road Shows and Lunch & Learns and Meet & Greets OH MY! For the past 3 years, Richard Melick has traveled all over the world bringing Cylance’s prevention-based endpoint protection to the masses. From the Unbelievable Tour to the UNDRWRLD Tour and beyond, Richard has created 0-Day malware and ransomware in front of thousands of people, then challenged CylancePROTECT to prevent those 0-Days from executing… all live in front of a an audience. There was no safety net. There was no chance to make a second first impression. These events were more than just marketing though. Richard was there to inform and educate his guests on the perils of Ransomware-as-a-Service. Sometimes, there were even headline grabbing events like WannaCry and Petya/NotPetya. In this week’s episode of DirtySecurity, Edward Preston chats with Cylance’s world traveler about the evolution of their live road shows. Find out what we’ve learned from the past, what we’re doing in the present and Cylance’s plans for the future. About Richard Melick Richard Melick(@RCMelick) has over a decade of experience in Cybersecurity and Antivirus Software. Working in various career functions in the industry that have taken him all over the world. His focus is emerging next generation Cybersecurity and Antivirus Software   About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

Enterprise Security Weekly (Video)
Rip & Replace Your Antivirus Software? - Enterprise Security Weekly #100

Enterprise Security Weekly (Video)

Play Episode Listen Later Jul 27, 2018 12:56


John Strand discusses whether your enterprise should replace your antivirus software and replace it with a new generation security software. Or, should the enterprises stick with your current vendor and try to implement the technology that will get you about 60% - 70% of what the new generation security software will get you. Full Show Notes: https://wiki.securityweekly.com/ES_Episode100 Visit http://securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Rip & Replace Your Antivirus Software? - Enterprise Security Weekly #99

Paul's Security Weekly TV

Play Episode Listen Later Jul 27, 2018 12:56


John Strand discusses whether your enterprise should replace your antivirus software and replace it with a new generation security software. Or, should the enterprises stick with your current vendor and try to implement the technology that will get you about 60% - 70% of what the new generation security software will get you. Full Show Notes: https://wiki.securityweekly.com/ES_Episode100 Visit http://securityweekly.com/esw for all the latest episodes!

Task Force 7 Cyber Security Radio
Ep. 5: Intelligence Agencies are Using Anti-Virus Software to Spy on You

Task Force 7 Cyber Security Radio

Play Episode Listen Later Oct 23, 2017 58:23


Intelligence Agencies are Using AV Software to Spy on People Around the World. We'll Take a Look at the Allegations Against Kaspersky, What the North Koreans Recently Did To Steal South Korean Military Plans, and tell you what you should know about AV software on your computer.

The Armstrong and Getty Show (Bingo)
10/6/17 -7AM- Russia using antivirus software to spy on us.

The Armstrong and Getty Show (Bingo)

Play Episode Listen Later Oct 6, 2017


Armstrong & Getty On Demand
10/6/17 -7AM- Russia using antivirus software to spy on us.

Armstrong & Getty On Demand

Play Episode Listen Later Oct 6, 2017 36:21


Armstrong & Getty On Demand
10/6/17 -7AM- Russia using antivirus software to spy on us.

Armstrong & Getty On Demand

Play Episode Listen Later Oct 6, 2017 36:21


SyrupCast
SyrupCast Podcast 97: Pizza Pockets, antivirus software and freedom

SyrupCast

Play Episode Listen Later Nov 25, 2016 41:09


On this episode of the SyrupCast, co-hosts Igor Bonifacic, Ian Hardy, Patrick O'Rourke and Jessica Vomiero, are joined by Josh McConnell, tech producer at the Financial Post. To start off the show, the crew delves into Wind's recent rebranding to Freedom Mobile and what that means for the telecom.   Next, in a rather confusing series of events, VentureBeat reported that Equibit, a Toronto-based Blockchain security startup, named controversial tech figure John McAfee as its Chief Security Officer. Not long after, this claim was disputed by McAfee himself via Twitter. The MobileSyrup team was able to reach out to McAfee to get to the bottom of it all. The podcast crew wants to know, where was the disconnect? Tune in to hear the SyrupCast team’s thoughts, and jump in the comments to tell us what you think.

backspace.fm
#006: @nomaさんVAIO事業売却について語る

backspace.fm

Play Episode Listen Later Feb 11, 2014 89:21


このページをウェブブラウザで見る: リンク 今週は通常のニュース&ガジェットニュースの他に、ゲストに@nomaさんをお迎えしてVAIO事業売却の話題を中心にソニーについてかなり語って頂きました。ということでいつもよりかなり長めの収録になっています。 audio 要素はサポートされていません Download MP3 (107.2MB) また、機材トラブルがあって、特に前半がお聞き苦しいところがありますがご了承ください。 今週お話ししたネタに関するリンクを↓に載せておきます。 先週のおさらい さようなら、カメラたち - 写真あれこれ - Yahoo!ブログ drikin さんのオヌヌメするカメラアプリ + ノイズ修正アプリを組み合わせたら、iPhone5で当社比三倍の驚きの写真が撮れた件 - Nyadgets ! 今週のニュース IBMの短縮URL特許が強力すぎる件(そしてその強力な武器はtwitter社の手に!) 栗原潔のIT弁理士日記 - ONETOPI ガンホー、プラットフォーム別売上高も開示 対アップルが前年比7倍の691億円、対グーグルが16倍の815億円 Social Game Info Google設定まで読み取るAndroid版Facebookアプリはさすがにアンインストールです:海外速報部ログ:ITmedia オルタナティブ・ブログ 【エコ対決】最もバッテリーが長持ちするインターネットブラウザが決定!! : はちま起稿 FacebookのニュースアプリPaperのUIと、その背後に見える戦略について fladdict Google Launches Chromebox For Meetings, A $999 Videoconferencing System Based On ChromeOS TechCrunch Indie smash hit ‘Flappy Bird' racks up $50K per day in ad revenue The Verge Google Nexus 5 に新色ブライトレッド追加、Google Play で販売開始(更新) - Engadget Japanese 今週の特ダネ なんと! スティーブ・ジョブズがVAIOにMac OSを搭載することを計画していた : ギズモード・ジャパン 今週のガジェット レンズスタイルカメラ「QX10・QX100」の最新ファームウェアが公開〜フルHD動画・ISO手動設定が追加 Touch Lab - タッチ ラボ iPhone 5sの指紋認証「Touch ID」の認識率をアップさせる方法 Touch Lab - タッチ ラボ 新型Mac Proが”デスクトップ型”パソコンにもたらすイノベーション(本田 雅一) - Yahoo!ニュース - ONETOPI 1番速いバッテリー充電方法はコレだ!USB?ワイヤレス?それとも…検証してみた【2014年新春バッテリー対決】 andronavi スマホアプリが見つかる! iPhone 5sだけで! Apple、Macの30周年記念日に世界10ヶ国で撮影した映像「1.24.14」を公開 : ギズモード・ジャパン Google Launches Chromebox For Meetings, A $999 Videoconferencing System Based On ChromeOS TechCrunch 周囲の騒音を90%カット。でも人の声は聞こえる「デジタル耳せん」が登場 : ギズモード・ジャパン 「BOSE史上最高のBluetoothスピーカー」BOSE Soundlink Bluetooth Speaker III発表 - Engadget Japanese この恐怖、ハンパないっす! Oculus Riftでゾンビゲーム(動画) : ギズモード・ジャパン みんなのMacにインストールされているアプリ 2013 - Macの手書き説明書 EpisoPass - 記憶からパスワードを生成 Antivirus Software for Mac OS X® Mac Virus Protection and Antispyware ESET Cyber Security 番組で取り上げてほしいネタなどもありましたらお気軽に声をかけてください! 収録日: 2014/02/08

Creating Wealth Real Estate Investing with Jason Hartman
CW 353: NSA-Proof Internet Browsing with John McAfee Developer of the McAfee Antivirus Software & Founder of McAfee Associates

Creating Wealth Real Estate Investing with Jason Hartman

Play Episode Listen Later Dec 11, 2013 50:18


John McAfee is in the news, as he is trying to create an NSA-proof gadget used for private internet browsing, called "Decentral." [read more] McAfee, original creator of McAfee Antivirus software was born in the United Kingdom and raised in Salem, Virginia, United States.    McAfee was employed as a programmer by NASA's Institute for Space Studies in New York City from 1968 to 1970. From there he went to Univac as a software designer and later to Xerox. as an operating system architect. In 1978 he joined Computer Sciences Corporation as a software consultant. Later, while employed by Lockheed in the 1980s, McAfee received a copy of the Pakistani Brain computer virus and began developing software to combat viruses.   In 1987 McAfee founded McAfee Associates, a computer anti-virus company. He was the first to distribute anti-virus software using the shareware business model. In 1989, he quit Lockheed and began working full-time at McAfee Associates, which he initially operated from his home in Santa Clara, California.The company was incorporated in Delaware in 1992, and McAfee resigned from the company in 1994. Two years after McAfee Associates went public, McAfee sold his remaining stake in the company.   Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. This company later became Network Associates, a name it retained for seven years until it was renamed McAfee. Now a subsidiary of Intel corporation, McAfee remains today as one of the largest anti-virus companies in the world.   Other business ventures that he founded included Tribal Voice, which developed one of the first instant messaging programs, PowWow. In 2000, John McAfee invested in and joined the board of directors of Zone Labs, makers of firewall software, prior to its acquisition by Check Point Software in 2003.   In August 2009, The New York Times reported that McAfee's personal fortune had declined to $4 million from a peak of $100 million, the effect of the global financial crisis and recession on his investments. Beginning in February 2010, McAfee started a new venture in the field of bacterial quorum sensing. His company QuorumEx has its headquarters in Belize and is working towards producing commercial all natural antibiotics based on anti-quorum sensing technology. In 2013 McAfee started a new company, Future Tense Central, to produce a secure computer network device called the D-Central.

MobileBeyond
Mobile AntiVirus Software from AVG Keeps You Safe

MobileBeyond

Play Episode Listen Later Jul 7, 2011 1:04


Now that you’ve protected your personal computer with antivirus software, it’s time to zap those mobile electronic bugs before they invade your smartphone. Here’s a list of the top ten 2012  mobile antivirus software products. Tony Anscombe, who has the auspicious title of “Ambassador of Free Products” at AVG,  says Android phones, in particular, need […]