POPULARITY
Categories
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people into pasting commands into Windows Veeam “patches” its backup software RCE like it's 2002 … by breaking the public PoC This week's episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they're destined for the woodchipper. This episode is also available on Youtube. Show notes No, the 16 billion credentials leak is not a new data breach Canadian telecom hacked by suspected China state group - Ars Technica Telecom giant Viasat breached by China's Salt Typhoon hackers WarTranslated on X: "Iran's jamming GPS in the Strait of Hormuz, messing with ~970 ships, per Windward. UKMTO confirms the interference. Faulty AIS coordinates are screwing up navigation in the Persian Gulf. The IRGC threatens to shut the strait down in hours. https://t.co/kdMJvshOGC" / X Dmitri Alperovitch on X: "Chairman of the Joint Chiefs Gen. Dan Caine says @US_CYBERCOM supported this strike mission" / X Top Pentagon spy pick rejected by White House - POLITICO DHS warns of heightened cyber threat as US enters Iran conflict | Cybersecurity Dive Exclusive: Early US intel assessment suggests strikes on Iran did not destroy nuclear sites, sources say U.S. braces for Iran's response after overnight strikes on nuclear sites Assessing the Damage to Iran's Nuclear Program Iran Hacks Tirana Municipality in Retaliation Over MEK - Tirana Times Iran's government says it shut down internet to protect against cyberattacks | TechCrunch Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry | Cybersecurity Dive Tonga Ministry of Health hit with cyberattack affecting website, IT systems | The Record from Recorded Future News Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US | The Record from Recorded Future News Russia releases REvil members after convictions for payment card fraud | The Record from Recorded Future News OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys - SpecterOps Triaging security issues reported by third parties (#913) · Issue · GNOME/libxml2 README: Set expectations straight (35d04a08) · Commits · GNOME / libxml2 · GitLab What's in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog FileFix - A ClickFix Alternative | mr.d0x Address bar shows hp.com. Browser displays scammers' malicious text anyway. - Ars Technica Researchers urge vigilance as Veeam releases patch to address critical flaw | Cybersecurity Dive ASUSpicious Flaw - Millions of Users' Information Exposed Since 2022 | MrBruh's Epic Blog Perth dad who created ‘evil twin' Wi-Fi did so to access pictures of women GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401
Matched by Browser History by Maine's Coast 93.1
Send us a textYour browser history might be your most closely guarded secret. We all have those moments—hovering over the delete button, wondering if anyone else might see the digital breadcrumbs of our curiosity. This episode dives headfirst into those moments when our private digital lives suddenly become exposed.Jack kicks things off with a provocative thought experiment: what's your honest reaction when you discover something unexpected in someone else's browser history? Through hilarious personal anecdotes—including an unforgettable night at a Guam nightclub called "Denial" that takes an unexpected turn—we explore how these moments of accidental discovery can create both comedy and crisis in our relationships.The humor here isn't just for laughs; it reveals something deeper about how we navigate privacy, judgment, and acceptance in the digital age. When someone's browser history exposes interests or preferences they haven't shared with you, is it a betrayal or simply a part of their private world you weren't meant to see?This episode also debuts our new segment "No Face, No Case," where listeners can anonymously submit their relationship questions and dilemmas. Our first submission tackles a painful situation: discovering a long-term partner is bisexual and has been unfaithful with a mutual friend. Through this discussion, we examine how couples might better navigate curiosity and desire together rather than separately.Whether you've had your own "delete my history" moment or you're curious about how others handle digital privacy in relationships, this raw, unfiltered conversation offers both entertainment and insight. Share your own anonymous questions or feedback through any platform where you listen to Four Steppers Only.Songs Featured:Leon Thomas - MUTThttps://music.apple.com/us/album/mutt/1770204463?i=1770205275Dj Drama Feat. Chris Brown https://music.apple.com/us/album/mutt/1770204463?i=1770205275Support the show
In this episode of The Collaboration Space, host Nancy Lussier welcomes Val Fernandez, AVI-SPL's Surface Champ, to explore the latest updates to Microsoft Surface Hub 3. They discuss exciting enhancements, returning features and functionality, and why consistency across Microsoft Teams Rooms (MTR) is a key focus.Watch the Surface Hub 3 Demo on our YouTube Channel.Val brings deep expertise, having worked with the Surface Hub since its launch in 2015, and shares both historical context and a live demo of features that improve collaboration across teams.Discussion TopicsMeet Val Fernandez: His journey with Surface Hub since version 1Surface Hub evolution: From Perceptive Pixel to Surface Hub 3What's new in Surface Hub 3 vs. 2S:OS shift to standardize MTR experienceNew and returning features IT leaders and users will love:✅ Edge Browser for easy access to OneDrive and web-based content✅ Miracast for wireless content casting—even off-network✅ Center of Table Console for in-room meeting controlLive Surface Hub 3 demo highlights:One-touch joinWhiteboard editing and sharingAnnotating, templates, reactions, and raising handsSaving whiteboards to OneDriveCalling from Surface Hub without a laptopLooking ahead: Browser integration and more collaboration tools on the horizonVal reminds listeners of the power and flexibility of the Surface Hub 3—especially with feature parity returning. Whether you're inside the room or remote, Surface Hub is designed for inclusive, consistent collaboration.
A böngészők csodálatos dolgokra képesek: néhány kattintással hozzáférhetünk az emberiség tudásához, szórakozáshoz, hírekhez, vagy akár egy jó kis online bevásárláshoz is. Olyan, mintha egy kapu nyílna ki előttünk az internet végtelen világa felé. Csakhogy nem mi vagyunk az egyetlenek, akik ezen a kapun közlekednek. A támadók is jól tudják, milyen kulcsszerepet töltenek be a böngészők, és keresik a módját, hogyan férkőzhetnének be rajtuk keresztül a digitális életünkbe. De hogyan néz ki egy böngészőalapú támadás? Milyen trükkökkel élnek a hackerek, és hogyan tudjuk felismerni, ha valami gyanús? Ebben a részben ezekre a kérdésekre keressük a választ – közérthetően, de szakmai alapon. Tarts velünk, és tudd meg, hogyan ne válj prédává a saját böngésződ miatt! Az adásban elhangzó VPN-ek működéséről szóló jelentésünk az alábbi linken érhető el: https://nki.gov.hu/it-biztonsag/elemzesek/a-vpn-mukodese-es-alkalmazasa-a-modern-internetes-kornyezetben/
The panel digs into the abrupt shutdown of the Arc browser and what it signals about user expectations and innovation fatigue in the browser space. Chuck Joiner, Dave Ginsburg, Jim Rea, Marty Jencius, Web Bixby, Eric Bolden, and Jeff Gamet explore Opera's foray into agentic AI and how it could redefine how we interact with the web. A deep dive into Getty Images' aggressive lawsuit against Stability AI sparks a broader conversation about copyright, content ownership, and AI ethics. Meta's surprising move to open physical retail stores invites skepticism and speculation, while a T-Mobile privacy issue raises concerns over default screen recording in its app. The group also touches on new app store laws and a Victoria's Secret cybersecurity incident, wrapping up with updates on MacStock and personal projects. Today's MacVoices is supported by CleanMyMac by MacPaw, your ultimate solution for Mac control and care. Try CleanMyMac for 7 days free, then use the code “MacVoices20” for 20% off at CLNMY.com/MacVoices.Show Notes: Chapters: 00:10 Browsers and the Arc Debate08:07 Opera's New Agentic Browser12:19 Getty Images and AI Lawsuit19:54 New App Store Laws in Texas22:04 Meta's Retail Strategy31:54 T-Mobile's Screen Recording Controversy35:18 Victoria's Secret Security Incident43:13 Brian's New Podcast Launch46:58 Closing Remarks and Connections Links: Mac browser Arc being discontinued in favor of new Dia apphttps://9to5mac.com/2025/05/27/mac-browser-arc-being-discontinued-in-favor-of-new-dia-app/ Opera's new 'fully agentic' browser can surf the web for youhttps://www.engadget.com/ai/operas-new-fully-agentic-browser-can-surf-the-web-for-you-145035874.html Getty Images spending millions to battle a ‘world of rhetoric' in AI suit, CEO sayshttps://www.cnbc.com/2025/05/28/getty-ceo-stability-ai-lawsuit-doesnt-cover-industry-mass-theft.html Texas just passed the App Store law that Tim Cook personally tried to stophttps://9to5mac.com/2025/05/27/texas-app-store-law-tim-cook/ Meta plans to open its own physical stores like the Apple Store - 9to5Machttps://9to5mac.com/2025/05/28/meta-plans-to-open-retail-locations-like-the-apple-store/ T-Mobile's App Is Recording Your Screen by Default, and You Should Turn It Offhttps://lifehacker.com/tech/t-mobile-app-screen-recording What's happening with Victoria's Secret? Website down, stock falls after unspecified 'security incident'https://www.fastcompany.com/91342878/victorias-secret-website-down-stock-falls-security-incident-whats-happening Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Tesla's first Robotaxi rides kick off in Austin, Perplexity's AI-powered browser opens up to select Windows users, and Meta told the Oversight Board it isn't removing the word 'transgenderism' from its hate speech rules. It's Monday June 23rd and here's a quick look at tech in the news this morning from Engadget. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The panel digs into the abrupt shutdown of the Arc browser and what it signals about user expectations and innovation fatigue in the browser space. Chuck Joiner, Dave Ginsburg, Jim Rea, Marty Jencius, Web Bixby, Eric Bolden, and Jeff Gamet explore Opera's foray into agentic AI and how it could redefine how we interact with the web. A deep dive into Getty Images' aggressive lawsuit against Stability AI sparks a broader conversation about copyright, content ownership, and AI ethics. Meta's surprising move to open physical retail stores invites skepticism and speculation, while a T-Mobile privacy issue raises concerns over default screen recording in its app. The group also touches on new app store laws and a Victoria's Secret cybersecurity incident, wrapping up with updates on MacStock and personal projects. Today's MacVoices is supported by CleanMyMac by MacPaw, your ultimate solution for Mac control and care. Try CleanMyMac for 7 days free, then use the code “MacVoices20” for 20% off at CLNMY.com/MacVoices. Show Notes: Chapters: 00:10 Browsers and the Arc Debate 08:07 Opera's New Agentic Browser 12:19 Getty Images and AI Lawsuit 19:54 New App Store Laws in Texas 22:04 Meta's Retail Strategy 31:54 T-Mobile's Screen Recording Controversy 35:18 Victoria's Secret Security Incident 43:13 Brian's New Podcast Launch 46:58 Closing Remarks and Connections Links: Mac browser Arc being discontinued in favor of new Dia app https://9to5mac.com/2025/05/27/mac-browser-arc-being-discontinued-in-favor-of-new-dia-app/ Opera's new 'fully agentic' browser can surf the web for you https://www.engadget.com/ai/operas-new-fully-agentic-browser-can-surf-the-web-for-you-145035874.html Getty Images spending millions to battle a ‘world of rhetoric' in AI suit, CEO says https://www.cnbc.com/2025/05/28/getty-ceo-stability-ai-lawsuit-doesnt-cover-industry-mass-theft.html Texas just passed the App Store law that Tim Cook personally tried to stop https://9to5mac.com/2025/05/27/texas-app-store-law-tim-cook/ Meta plans to open its own physical stores like the Apple Store - 9to5Mac https://9to5mac.com/2025/05/28/meta-plans-to-open-retail-locations-like-the-apple-store/ T-Mobile's App Is Recording Your Screen by Default, and You Should Turn It Off https://lifehacker.com/tech/t-mobile-app-screen-recording What's happening with Victoria's Secret? Website down, stock falls after unspecified 'security incident' https://www.fastcompany.com/91342878/victorias-secret-website-down-stock-falls-security-incident-whats-happening Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
If the results you get from popular search engines are becoming too liberal for your taste, consider switching to a browser that aligns with your point of view. Go with TUSK—and don't look back! Find out more at https://tuskbrowser.com/ TUSK City: Santa Barbara Address: 5383 Hollister Ave., Suite 120 Website: https://tuskbrowser.com/
Tired of mainstream news? With TUSK you'll get a much more conservative-focused search experience, and it even comes bundled with Gippr AI, a great alternative to ChatGPT! Find out more at: https://tuskbrowser.com/search/ TUSK City: Santa Barbara Address: 5383 Hollister Ave., Suite 120 Website: https://tuskbrowser.com/
Are you tired of big tech controlling what you see online? A lot of users are switching from mainstream browsers to alternatives that prioritize user control and free speech. Find out more at: https://tuskbrowser.com/search/ TUSK City: Santa Barbara Address: 5383 Hollister Ave., Suite 120 Website: https://tuskbrowser.com/
In Episode 82 of The Kershner Files, Dave provides a ton of updates along with the usual Survival Realty and Gun Show information. After all of that, he takes considerable time to discuss water system vulnerabilities in conjunction with the previously discussed rogue comms devices and some other events. From there, Dave closes the show with two different warnings for the potential of Civil Wars not only in the US but also throughout Europe. Articles/topics discussed: Two Rivers Outfitter - The Premiere Online Preparedness Store DesignsbyDandTStore - Dave's Etsy Shop for fun clothing options Spot Prices for Gold (Au) and Silver (Ag) - from the davidjkershner.com website Survival Realty - featured properties and new listings State-by-State Gun Shows - from the davidjkershner.com website Misconfigured HMIs Expose US Water Systems to Anyone With a Browser by Ryan Laraine from Security Week Rogue communication devices found in Chinese solar power inverters by Sarah MacFarlane from Reuters ‘We're Already Past The Tipping Point': Academic Sounds ‘Civil War' Warning For High-Migration Western Nations by Oliver JJ Lane from Breitbart Civil War 2.0? by Kevin Finn from American Thinker Support Dave by visiting his new website at Two Rivers Outfitter for all of your preparedness needs and you can also visit his Etsy shop at DesignsbyDandTStore for fun clothing options. Available for Purchase - Fiction: When Rome Stumbles | Hannibal is at the Gates | By the Dawn's Early Light | Colder Weather | A Time for Reckoning (paperback versions) | Fiction Series (paperback) | Fiction Series (audio) Available for Purchase - Non-Fiction: Preparing to Prepare (electronic/paperback) | Home Remedies (electronic/paperback) | Just a Small Gathering (paperback) | Just a Small Gathering (electronic)
Scott and Wes break down the state of web browsers in 2025, from the rise and fall of Arc and the fate of Firefox to hot takes on Opera GX, Raycast, and why power users might not be profitable. They compare rendering engines, rant about dev tools, and reveal what browser stats say about Syntax listeners. Show Notes 00:00 Welcome to Syntax! 01:37 Rendering Engines. 02:11 Arc Browser. 02:41 Microsoft Edge. 03:45 Why not Brave? 05:25 Brought to you by Sentry.io. 05:50 Google Manifest v2. 07:32 Opera. OperaGX. 10:13 Vivaldi. 11:23 The death of Arc Browser. 11:44 Dia? 14:43 No revenue from power-users. Letter to Arc Members. 15:38 Arc's transition to a new browser. 17:02 Browser companies need to lock users fast! 19:42 Gecko. 19:45 Firefox. 21:08 Zen. 22:38 Webkit. There Still Arent Any iPhone Browsers With Custom Engines 29:18 Wtf is Ladybird? 34:14 Usage statistics. StatCounter.com. 39:32 Dev Tools experience ranked. 42:06 Tab experience. 43:37 Containers and profiles. Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
GPT-4.1 entzaubert: Was die 1 Mio. Token wirklich bedeuten GPT-4.1 ist in aller Munde – und mit ihm das Versprechen eines riesigen Kontextfensters von einer Million Token. Doch was steckt wirklich dahinter? Kannst du wirklich ganze Bücher, Logfiles oder Datensätze ohne Einschränkung analysieren? In diesem kurzen Impuls klären wir, was Realität ist, wo die technischen Grenzen liegen und wie du GPT-4.1 sinnvoll in deinem Business nutzt, ohne dich von Schlagworten blenden zu lassen. Torsten Kohnert auf LinkedIn: LinkedIn - https://www.linkedin.com/in/torsten-kohnert/ GPT-4.1 ist nicht gleich GPT-4.1 Das neue Modell GPT-4.1 gibt es in drei Varianten: Standard, Schnell (Mini) und Nano. Alle Modelle sollen bis zu eine Million Token verarbeiten können. Auf dem Papier klingt das nach einem Quantensprung. Doch die entscheidende Frage ist: In welcher Umgebung arbeitest du mit dem Modell? Die Leistungsfähigkeit hängt stark davon ab, ob du die Web-Version nutzt oder über eine Schnittstelle gehst. Genau hier trennt sich Theorie und Praxis. Web-App vs. API – was du wirklich bekommst Die meisten nutzen GPT-4.1 über die ChatGPT-Webanwendung – hier liegt das Limit bei 128.000 Token. Das ist solide, aber weit entfernt vom vollen Potenzial. Die oft erwähnten eine Million Token sind nur über die OpenAI API erreichbar. Wer also eigene Tools baut oder GPT-4.1 über den Playground steuert, kann auf das volle Kontextfenster zugreifen. Wer nur über den Browser arbeitet, bleibt deutlich eingeschränkter – und genau das sorgt oft für Verwirrung. Leistungsstark, aber nur mit dem richtigen Zugang Ein Beispiel aus der Praxis: In einer öffentlichen Demo wurden mit GPT-4.1 über 450.000 Token an NASA-Logdaten analysiert – ohne Fehler, schnell und präzise. Aber das funktionierte eben nicht im Browser, sondern über die API. Für datenintensive Aufgaben wie Reportings, Protokollanalysen oder komplexe Textvergleiche ist der API-Zugang entscheidend. Wer diese Power nutzen will, braucht entweder technisches Verständnis oder einen Partner, der bei der Umsetzung unterstützt. Fazit: Technologisch top – mit klarem Setup-Check GPT-4.1 ist ein starkes Modell – keine Frage. Aber die kommunizierten Leistungsdaten gelten nicht für jeden Anwendungsfall. Wenn du über die API arbeitest, kannst du wirklich das Maximum herausholen. In der Web-App bekommst du eine starke, aber begrenzte Version. Bevor du also Erwartungen entwickelst, prüfe genau, welches Setup du nutzt – und was es in der Praxis leisten kann. Nur dann hilft dir GPT-4.1 wirklich weiter. Noch mehr von den Koertings ... Das KI-Café ... jede Woche Mittwoch (>350 Teilnehmer) von 08:30 bis 10:00 Uhr ... online via Zoom .. kostenlos und nicht umsonstJede Woche Mittwoch um 08:30 Uhr öffnet das KI-Café seine Online-Pforten ... wir lösen KI-Anwendungsfälle live auf der Bühne ... moderieren Expertenpanel zu speziellen Themen (bspw. KI im Recruiting ... KI in der Qualitätssicherung ... KI im Projektmanagement ... und vieles mehr) ... ordnen die neuen Entwicklungen in der KI-Welt ein und geben einen Ausblick ... und laden Experten ein für spezielle Themen ... und gehen auch mal in die Tiefe und durchdringen bestimmte Bereiche ganz konkret ... alles für dein Weiterkommen. Melde dich kostenfrei an ... www.koerting-institute.com/ki-cafe/ Das KI-Buch ... für Selbstständige und Unternehmer Lerne, wie ChatGPT deine Produktivität steigert, Zeit spart und Umsätze maximiert. Enthält praxisnahe Beispiele für Buchvermarktung, Text- und Datenanalysen sowie 30 konkrete Anwendungsfälle. Entwickle eigene Prompts, verbessere Marketing & Vertrieb und entlaste dich von Routineaufgaben. Geschrieben von Torsten & Birgit Koerting, Vorreitern im KI-Bereich, die Unternehmer bei der Transformation unterstützen. Das Buch ist ein Geschenk, nur Versandkosten von 6,95 € fallen an. Perfekt für Anfänger und Fortgeschrittene, die mit KI ihr Potenzial ausschöpfen möchten. Das Buch in deinen Briefkasten ... www.koerting-institute.com/ki-buch/ Die KI-Lounge ... unsere Community für den Einstieg in die KI (>2100 Mitglieder) Die KI-Lounge ist eine Community für alle, die mehr über generative KI erfahren und anwenden möchten. Mitglieder erhalten exklusive monatliche KI-Updates, Experten-Interviews, Vorträge des KI-Speaker-Slams, KI-Café-Aufzeichnungen und einen 3-stündigen ChatGPT-Kurs. Tausche dich mit über 2100 KI-Enthusiasten aus, stelle Fragen und starte durch. Initiiert von Torsten & Birgit Koerting, bietet die KI-Lounge Orientierung und Inspiration für den Einstieg in die KI-Revolution. Hier findet der Austausch statt ... www.koerting-institute.com/ki-lounge/ Starte mit uns in die 1:1 Zusammenarbeit Wenn du direkt mit uns arbeiten und KI in deinem Business integrieren möchtest, buche dir einen Termin für ein persönliches Gespräch. Gemeinsam finden wir Antworten auf deine Fragen und finden heraus, wie wir dich unterstützen können. Klicke hier, um einen Termin zu buchen und deine Fragen zu klären. Buche dir jetzt deinen Termin mit uns ... www.koerting-institute.com/termin/ Weitere Impulse im Netflix Stil ... Wenn du auf der Suche nach weiteren spannenden Impulsen für deine Selbstständigkeit bist, dann gehe jetzt auf unsere Impulseseite und lass die zahlreichen spannenden Impulse auf dich wirken. Inspiration pur ... www.koerting-institute.com/impulse/ Die Koertings auf die Ohren ... Wenn dir diese Podcastfolge gefallen hat, dann höre dir jetzt noch weitere informative und spannende Folgen an ... über 420 Folgen findest du hier ... www.koerting-institute.com/podcast/ Wir freuen uns darauf, dich auf deinem Weg zu begleiten!
From Billy the Bookworm to Browser the Library Lion, we learn about the history and characteristics of Milwaukee Public Library's Summer Reading Program mascots.
In this Risky Bulletin sponsor interview Michael Leland, Field CTO of Island, talks about how Island manages risks from extensions, phishing and infostealers. Even when credentials are stolen, it is still not game over and there are still ways to prevent data loss and breaches. Show notes
Full show - Thursday | GMD - Does he have to follow through on his fantasy football bet? | News or Nope - Browser Dating, Silento, and Liam Payne | Would you let AI write your vows? | Erin wanted to surprise T. Hack, but he ruined it | The French Fry Showdown | Occasional Diddy Dirt | Stupid stories @theslackershow @ericasheaaa @thackiswack @radioerin
In this episode, host Toomey offers an in-depth review of µBrowser: Watch Web Browser, a lightweight and efficient web browser designed specifically for the Apple Watch. Ideal for quick web searches and browsing simple websites on the go, µBrowser focuses on speed and ease of use rather than heavy browsing tasks like social media or account management.What You'll Learn in This EpisodeIntroduction to µBrowserA minimalistic browser for Apple Watch enabling fast access to basic websites and web searches.Not intended for complex browsing activities such as managing social media or online accounts.App Structure & ComponentsTwo-part system: the Apple Watch app (main browsing) and a companion iPhone app (bookmark management).Breakdown of watch app sections: MicroBrowser (main browser), Bookmarks, Browsing History, and About.Navigating the Watch AppLaunching via the Digital Crown.Using the address/search bar powered by DuckDuckGo for privacy-focused searches.Four key sections for seamless navigation.Bookmarks ManagementEmoji-labeled bookmark folders for quick identification.Add, activate, or delete bookmarks directly on the watch.Search and Navigation FeaturesVoice input to facilitate hands-free searching.Heading-based navigation for quick jumps within websites.Known LimitationsNo back button feature.Simplified browsing experience, with some restrictions on advanced web interactions (e.g., Google services).Companion iPhone AppEdit, add, and reorder bookmarks with an easy-to-use interface on iPhone.Synchronization between the watch and phone for streamlined bookmark management.Step-by-Step Guide to Using µBrowserOpen MicroBrowser Press the Digital Crown on your Apple Watch and select the MicroBrowser app.Perform a Search Tap the search icon and use voice dictation to input your query.Access and Manage Bookmarks Navigate to Bookmarks, swipe to activate or delete entries.Use the Address Bar Enter a URL manually or via dictation, then tap done to load the page.Manage Bookmarks on iPhone Open the companion app to add, edit, or reorder bookmarks easily.Download µBrowser: Watch Web BrowserTry out µBrowser today to enhance your Apple Watch browsing experience! Download on the App StoreTranscriptDisclaimer: This transcript was generated by AI Note Taker – VoicePen, an AI-powered transcription app. It is not edited or formatted, and it may not accurately capture the speakers' names, voices, or content.tunmi: Hello guys, this is tunmi, and welcome to another episode of the AppleVisPodcast. In this one, I'm going to be reviewing the watch app known as MicroBrowser. Now, MicroBrowser is a lightweight web browser that allows you…
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
Read Online | Sign Up | Advertise | AI Builder's ToolkitHello AI Unraveled Listeners,In today's AI Daily News,NY Requires Disclosure of AI‑Related Layoffs in WARN Notices Wikipedia pauses AI summaries after editor backlashDisney, Universal sue Midjourney over copyrightTBC goes all-in on AI with Dia browserHow to connect Claude to external applicationsNvidia to build first industrial AI cloud in Germany.Meta launches AI ‘world model' to advance robotics, self-driving cars.News Sites Are Getting Crushed by Google's New AI Tools.
These are the headlines you NEED to know about!
CISA, Microsoft warn of Windows zero-day used in attack on ‘major' Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There's something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening your security posture and driving revenue for your business. Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. The impact is real: A recent IDC analysis found that compliance teams using Vanta are one hundred and twenty nine percent more productive. Get back time to focus on strengthening security and scaling your business. Get started at Vanta.com/headlines.
OpenAI has a new API in beta called the Realtime API, which enables speech conversations with LLMs. Real-time text and audio processing means users can have conversations with voice agents and voice-enabled apps, and OpenAI makes it simple to connect via WebRTC or WebSockets.Several months ago, The Browser Company, abruptly announced they were stopping work on Arc browser in favor of building a completely new, AI-first browser called Dia. Now, the company's CEO has released a letter detailing why these decisions were made and what the future holds for The Browser Company. Details on Dia are vague, but the team is optimistic they can build “a true successor to the browser”.AI-enabled coding IDE Cursor hit v1.0, this week with a bunch of notable features. Notable highlights in this release include: BugBot, which automatically reviews PRs and identifies bugs and issues, Background Agent (Cursor's remote coding agent) for all users, Memories to help Cursor remember facts and conversations within projects for future use, and one-click MCP install and OAuth support.Timestamps:1:10 - OpenAI's realtime agent API10:03 - The Browser Company Kills Arc16:53 - Cursor 1.028:04 - Codex gets internet access31:09 - React Router's open governance34:18 - Fire Starter39:55 - What's making us happyNews:Paige - Cursor 1.0Jack - OpenAI's Realtime Agent for AI chatTJ - The Browser Company stops developing ArcLightning News:React Router Open GovernanceCodex gets access to the internetFire Starter:console.log formatting stringsWhat Makes Us Happy this Week:Paige - Clarkson's Farm season 4Jack - Shokz OpenRun Pro 2 headphonesTJ - Rotary cheese graterThanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
Enterprise security has always been a moving target, but with the surge of AI adoption, it's entering a whole new era of complexity. In this episode of Tech Talks Daily, I speak with Bradon Rogers, Chief Customer Officer at Island, who brings over 25 years of cybersecurity experience to a conversation that cuts through the noise on AI, data protection, and the evolving role of the browser. Bradon warns that AI isn't just creating new opportunities. It's also generating what he calls a derivative data nightmare. Large language models are now producing massive volumes of unstructured outputs that differ in formatting but carry the same meaning. These subtle variations are already overwhelming traditional data loss prevention tools, and the challenge is only growing. Yet Bradon doesn't stop at the warning. He believes AI might also be the solution. We discuss why businesses need to move beyond old data-centric approaches and start designing application-centric frameworks that mirror how people work. In a world where banning AI is no longer realistic, organizations need practical ways to guide users toward safe, sanctioned tools. Bradon explains how enterprise browsers can serve as that safe space, combining usability with security and offering a familiar interface that doesn't get in the way of productivity. He also addresses the new breed of shadow IT emerging from embedded AI features in everyday apps, as well as the importance of understanding how third-party providers utilize your data behind the scenes. For anyone still thinking of AI adoption as a checkbox exercise, Bradon makes it clear this is a complex governance challenge that demands a new mindset. From call center automation to real-time coaching workflows, the conversation explores how AI can enhance precision, minimize false positives, and support teams without overwhelming them. We wrap up with a powerful music recommendation that perfectly reflects the winding road many tech leaders now find themselves navigating.
How do I turn off MS Copilot, ChatGPT defies orders to shut down! Do I care if my memory has integrity? Apple is changing the naming of OSs to be based on Date vs a random number. Why am I not getting the Win 11 Update what's wrong with my computer? Gonetspeed getting to my house! Still can't get my scanner to work, Why does my App and Browser security stop working, Riffusion Ai generated Music, Windows updates do the Security updates come by default? How long to keep PC on to be updated.
Smartwatches sind längst kein Nerd-Spielzeug mehr, sondern massentaugliches Accessoire. Es gibt sie eckig und rund, halbwegs günstig oder edel hochpreisig. Drei große Player haben sich herauskristallisiert: Apple, Google und Samsung. Und wie das Smartphone längst mehr ist als ein Telefon mit großem Display, haben auch Smartwatches vielfältige Einsatzgebiete erobert oder ersetzen das Mobiltelefon gar teils gänzlich. Gleichzeitig ist mit dem Fossil-Konzern ein Pionier ganz aus dem Smartwatch-Geschäft herausgezogen. Die c't Redakteure Steffen Herget und Nico Jurran haben Smartwatches von Apple, Google und Samsung einem Vergleichstest unterzogen. Im c't uplink erläutern sich, wie sich die verschiedenen Modelle sowie Modellreihen unterscheiden und für wen sich welche Smartwatch lohnt und wann man besser auf eine Spezialuhr von Garmin & Co. zurückgreift. Im Gespräch mit Moderator Keywan Tonekaboni zeichnen sie die Entwicklung der Smartwatches von der Pebble über die Apple Watch bis hin zu Googles Pixel-Uhr nach. Die drei c't Redakteure diskutieren zudem darüber, wo Google es mit dem Uhren-Betriebssystem Wear OS vergeigt hat und warum sich Fossil zurückgezogen hat. Mit dabei: Steffen Herget, Nico Jurran Host: Keywan Tonekaboni Produktion: Ralf Taschke Die c't 13/2025 gibt's am Kiosk, im Browser und in der c't-App für iOS und Android. https://www.heise.de/select/ct/2025/13 ► Unseren Smartwatches-Test und den Ratgeber zu Smartwatches findet ihr in c't 14/2025: https://www.heise.de/ratgeber/Smartwatches-von-Apple-Google-und-Samsung-im-Vergleich-10392977.html https://www.heise.de/ratgeber/Wie-Sie-die-richtige-Smartwatch-finden-10393015.html ► Gadgetbridge: Fitnessuhren und Smartwatches ohne Cloud und Hersteller-Apps https://www.heise.de/ratgeber/Fitnessuhren-und-Armbaender-ohne-Cloud-und-Hersteller-Apps-nutzen-9985727.html
Smartwatches sind längst kein Nerd-Spielzeug mehr, sondern massentaugliches Accessoire. Es gibt sie eckig und rund, halbwegs günstig oder edel hochpreisig. Drei große Player haben sich herauskristallisiert: Apple, Google und Samsung. Und wie das Smartphone längst mehr ist als ein Telefon mit großem Display, haben auch Smartwatches vielfältige Einsatzgebiete erobert oder ersetzen das Mobiltelefon gar teils gänzlich. Gleichzeitig ist mit dem Fossil-Konzern ein Pionier ganz aus dem Smartwatch-Geschäft herausgezogen. Die c't Redakteure Steffen Herget und Nico Jurran haben Smartwatches von Apple, Google und Samsung einem Vergleichstest unterzogen. Im c't uplink erläutern sich, wie sich die verschiedenen Modelle sowie Modellreihen unterscheiden und für wen sich welche Smartwatch lohnt und wann man besser auf eine Spezialuhr von Garmin & Co. zurückgreift. Im Gespräch mit Moderator Keywan Tonekaboni zeichnen sie die Entwicklung der Smartwatches von der Pebble über die Apple Watch bis hin zu Googles Pixel-Uhr nach. Die drei c't Redakteure diskutieren zudem darüber, wo Google es mit dem Uhren-Betriebssystem Wear OS vergeigt hat und warum sich Fossil zurückgezogen hat. Mit dabei: Steffen Herget, Nico Jurran Host: Keywan Tonekaboni Produktion: Ralf Taschke Die c't 13/2025 gibt's am Kiosk, im Browser und in der c't-App für iOS und Android. https://www.heise.de/select/ct/2025/13 ► Unseren Smartwatches-Test und den Ratgeber zu Smartwatches findet ihr in c't 14/2025: https://www.heise.de/ratgeber/Smartwatches-von-Apple-Google-und-Samsung-im-Vergleich-10392977.html https://www.heise.de/ratgeber/Wie-Sie-die-richtige-Smartwatch-finden-10393015.html ► Gadgetbridge: Fitnessuhren und Smartwatches ohne Cloud und Hersteller-Apps https://www.heise.de/ratgeber/Fitnessuhren-und-Armbaender-ohne-Cloud-und-Hersteller-Apps-nutzen-9985727.html
Comfort Zone has completed its first year! Instead of doing a clip show or something, the gang gets right down to business doing what they do best: complaining about browsers, going down an audiophile rabbit hole, and battling to see who has the best Mac background app. How would you have done our challenges? How would you answer the question at the end of the show? Let us know! Main Topics Dia Letter to Arc members 2025 Beyerdynamic PRO X USB-C CABLE 1.6 M sad Beyerdynamic PRO X COILED CABLE Elgato Wave XLR UGREEN 3.5mm to USB-C adapter Apple 3.5mm to USB-C adapter Other Things Discussed RCMD LeaderKey Vivid MicDrop Backdrop Follow the Hosts Chris on YouTube Matt on Birchtree Niléane on Mastodon Comfort Zone on Mastodon Comfort Zone on Bluesky
Here we have it! This is the full interview with Josh Miller of The Browser Company where Marques, Andrew, and David ask him about Arc, Dia, and the future of browsers in general. Enjoy! Music provided by Epidemic Sound Shop the merch: https://shop.mkbhd.com Social: Waveform Threads: https://www.threads.net/@waveformpodcast Waveform Instagram: https://www.instagram.com/waveformpodcast/?hl=en Hosts: Marques: https://www.threads.net/@mkbhd Andrew: https://www.threads.net/@andrew_manganelli David: https://www.threads.net/@davidimel Adam: https://www.threads.net/@parmesanpapi17 Ellis: https://twitter.com/EllisRovin TikTok: https://www.tiktok.com/@waveformpodcast Join the Discord: https://discord.gg/mkbhd Music by 20syl: https://bit.ly/2S53xlC Waveform is part of the Vox Media Podcast Network. Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this conversation, Dr. Chase Cunningham and Michael Shieh from Mammoth Cyber discuss the evolution of Zero Trust security, focusing on browser security and AI's role in enhancing security measures. They explore the concept of data-first security, the significance of mobile security, and the future of Zero Trust in the context of increasing cyber threats. Michael emphasizes the need for a browser-centric approach to security, which allows for better control and visibility over user behavior and data access.TakeawaysMammoth Cyber focuses on browser-centric security solutions.The evolution of web applications has increased data leakage risks.AI tools are becoming integral to browser security.Data isolation allows users to access data without downloading it.User productivity should not be hindered by security measures.The attack surface for cyber threats is broader than ever.Browser security is essential for all users, not just enterprises.Phishing training is less effective than implementing browser isolation.Mobile security is crucial as users access company data on personal devices.The future of Zero Trust will heavily involve browser security solutions.
This show has been flagged as Explicit by the host. New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 4369 Thu 2025-05-01 What LP records do I have? Fred Black 4370 Fri 2025-05-02 Playing Civilization IV, Part 8 Ahuka 4371 Mon 2025-05-05 HPR Community News for April 2025 HPR Volunteers 4372 Tue 2025-05-06 The power of GNU Readline - part 4 Some Guy On The Internet 4373 Wed 2025-05-07 Rsync with stdin as source oxo 4374 Thu 2025-05-08 24-25 New Years Eve show 7 Honkeymagoo 4375 Fri 2025-05-09 Long Chain Carbons,Eggs and Dorodango? operat0r 4376 Mon 2025-05-12 Re-research Lee 4377 Tue 2025-05-13 Password store and the pass command Klaatu 4378 Wed 2025-05-14 SQL to get the next_free_slot norrist 4379 Thu 2025-05-15 Mapping Municipalities' Digital Dependencies Trollercoaster 4380 Fri 2025-05-16 Isaac Asimov: The Rest of Asimov's Foundation Stories Ahuka 4381 Mon 2025-05-19 What Omni-Instantness Makes To My Brain and Your Brain? Antoine 4382 Tue 2025-05-20 Understanding Antenna Gain and the Decibel scale Paulj 4383 Wed 2025-05-21 Changing font in Arch Linux (Wayland) oxo 4384 Thu 2025-05-22 Browser and dedicated apps on the mobile phone Henrik Hemrin 4385 Fri 2025-05-23 Cable un-managment lol operat0r 4386 Mon 2025-05-26 Silly Tavern Spicy Roll Play operat0r 4387 Tue 2025-05-27 Did she say she flew light aircraft?! Elsbeth 4388 Wed 2025-05-28 BSD Overview norrist 4389 Thu 2025-05-29 Comments on hpr4373 Rho`n 4390 Fri 2025-05-30 Playing Civilization IV, Part 9 Ahuka Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 40 comments in total. Past shows There are 9 comments on 6 previous shows: hpr3511 (2022-01-17) "Podman like Vagrant" by Klaatu. Comment 1: Some Guy on the Internet on 2025-05-16: "It's show time" hpr4036 (2024-01-22) "The Tildeverse" by Claudio Miranda. Comment 2: leeand0 on 2025-05-25: "Another Public Access Unix" Comment 3: leeand0 on 2025-05-25: "Another Public Access Unix" hpr4072 (2024-03-12) "Piper text to speech engine" by Archer72. Comment 1: Archer72 on 2025-05-20: "Voice synthesis" hpr4281 (2024-12-30) "My ridiculously complicated DHCP setup at home" by Jon The Nice Guy. Comment 2: Windigo on 2025-05-23: "As advertised" hpr4367 (2025-04-29) "My first episode; 001 Introduction" by oxo. Comment 1: Torin Doyle on 2025-05-09: "Welcome!" Comment 2: archer72 on 2025-05-09: "Welcome. " Comment 3: oxo on 2025-05-30: "Thank you" hpr4368 (2025-04-30) "Lessons learned moderating technical discussion panels" by Trixter. Comment 1: Reto on 2025-05-06: "A link to one or more" This month's shows There are 31 comments on 15 of this month's shows: hpr4371 (2025-05-05) "HPR Community News for April 2025" by HPR Volunteers. Comment 1: Paul on 2025-05-05: "mp3 quality "Comment 2: Ken Fallon on 2025-05-05: "Good question !"Comment 3: Henrik Hemrin on 2025-05-08: "Community" hpr4372 (2025-05-06) "The power of GNU Readline - part 4" by Some Guy On The Internet. Comment 1: Torin Doyle on 2025-05-09: "SGOTI is so likeable."Comment 2: Dave Morriss on 2025-05-17: "VI Mode" hpr4373 (2025-05-07) "Rsync with stdin as source" by oxo. Comment 1: Paulj on 2025-05-09: "rsync capabilities"Comment 2: archer72 on 2025-05-09: "Rsync - paulj"Comment 3: Dave Morriss on 2025-05-17: "Enjoyable show!" hpr4374 (2025-05-08) "24-25 New Years Eve show 7" by Honkeymagoo. Comment 1: ClaudioM on 2025-05-08: "Ha! The signoff!" hpr4375 (2025-05-09) "Long Chain Carbons,Eggs and Dorodango?" by operat0r. Comment 1: Torin Doyle on 2025-05-09: "The cruelty of the egg industry."Comment 2: Bob on 2025-05-09: "Free range eggs"Comment 3: Some Guy on the Internet on 2025-05-16: "@Bob, Free range eggs." hpr4376 (2025-05-12) "Re-research" by Lee. Comment 1: paul on 2025-05-12: "sonos play back"Comment 2: Lee on 2025-05-13: "Sonos"Comment 3: Some Guy on the Internet on 2025-05-16: "LLMs in academic research" hpr4377 (2025-05-13) "Password store and the pass command" by Klaatu. Comment 1: Some Guy on the Internet on 2025-05-16: "Great show." hpr4379 (2025-05-15) "Mapping Municipalities' Digital Dependencies" by Trollercoaster. Comment 1: Some Guy on the Internet on 2025-05-25: " I agree with the intentions." hpr4380 (2025-05-16) "Isaac Asimov: The Rest of Asimov's Foundation Stories" by Ahuka. Comment 1: Some Guy on the Internet on 2025-05-27: "I'll have a go." hpr4381 (2025-05-19) "What Omni-Instantness Makes To My Brain and Your Brain?" by Antoine. Comment 1: Ken Fallon on 2025-03-19: "Interesting show."Comment 2: Antoine on 2025-03-20: "Nice study =)"Comment 3: Some Guy on the Internet on 2025-05-25: "My two cents."Comment 4: Antoine on 2025-05-29: "Education" hpr4384 (2025-05-22) "Browser and dedicated apps on the mobile phone" by Henrik Hemrin. Comment 1: lyunpaw@gmail.com on 2025-05-27: "I agree." hpr4385 (2025-05-23) "Cable un-managment lol" by operat0r. Comment 1: Some Guy on the Internet on 2025-05-27: "It's over 9000!" hpr4387 (2025-05-27) "Did she say she flew light aircraft?!" by Elsbeth. Comment 1: archer72 on 2025-05-18: "Thank you for sharing"Comment 2: KEVIN B OBRIEN on 2025-05-29: "I loved the show"Comment 3: Jim DeVore on 2025-05-31: "Thanks for the inspiration" hpr4388 (2025-05-28) "BSD Overview" by norrist. Comment 1: Dave Morriss on 2025-05-29: "Thanks for this"Comment 2: Jim DeVore on 2025-05-31: "Thank you!" hpr4389 (2025-05-29) "Comments on hpr4373" by Rho`n. Comment 1: oxo on 2025-05-29: "Hi Rho`n"Comment 2: Dave Morriss on 2025-05-29: "Good episode" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2025-May/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Provide feedback on this episode.
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket. CyberWire Guest On our Industry Voices segment, at the 2025 RSA Conference, we were joined by Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt's conversation here. Selected Reading Cybersecurity Firm SentinelOne Suffers Major Outage (Bank Infosecurity) DDoS incident disrupts internet for thousands in Moscow (The Record) Banks Want SEC to Rescind Cyberattack Disclosure Requirements (PYMNTS.com) Australian ransomware victims now must tell the government if they pay up (The Record) New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials (Cyber Security News) Florida Health System Pays $800K for Insider Record Snooping (Bank Infosecurity) UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers (Cyber Security News) CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits (Cyber Security News) Trump Taps Palantir to Compile Data on Americans (The New York Times) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Today's show: Alex interviews two cutting-edge startups shaping the future of AI: AthenaHQ, pioneering “GEO” (Generative Engine Optimization) to help brands rank in AI-powered search engines like ChatGPT and Gemini, and Browser Use, building infrastructure that lets AI agents take real actions on the web—from form-filling to workflow automation. Both teams dive deep into how fast AI is evolving, how brands and developers can stay competitive, and why adaptability and technical precision are key in the era of intelligent search and autonomous agents.Timestamps:(0:00) Episode Teaser(1:54) Athena HQ's Generative Engine Optimization (GEO) strategy(10:05) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWIST(14:51) Will GEO Market Adoption Forever CHange Marketing?(19:50) Fidelity Private Shares℠ - Visit https://fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(22:58) How Being AI Model Agnostic Gives You An Edge(29:54) Superpower - The best founders know: better health = better business. Visit http://superpower.com/twist to skip the waitlist.(35:13) Browser Use and Making Smarter AI Agents(45:03) Will AI Agents Do Your Grocery Shopping For You?Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpLinks from episode:AthenHQ: https://www.athenahq.ai/Browser Use: https://browser-use.com/Follow Andrew:X: https://x.com/andrewyan200Follow Magnus:X: https://x.com/mamagnus00Follow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(10:05) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWIST(19:50) Fidelity Private Shares℠ - Visit https://fidelityprivateshares.com! Mention our podcast and receive 20% off your first-year paid subscription.(29:54) Superpower - The best founders know: better health = better business. Visit http://superpower.com/twist to skip the waitlist.Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916
Ireland ranks 117th out of 253 countries, with over 57 million leaked cookies - 4.7 million of which are still active and tied to real user activity. According to the latest research by cybersecurity company NordVPN, Ireland has landed a troubling spot on the global leaderboard for leaked cookies, ranking 117th out of 253 countries. Over 57 million cookies linked to Irish users have been found on the dark web. Although cookies are commonly seen as helpful for improving online experiences, many don't realise that hackers can exploit them to steal personal data and access secure systems. "Cookies may seem harmless, but in the wrong hands, they're digital keys to our most private information," says Adrianus Warmenhoven, cybersecurity expert at NordVPN. "What was designed to enhance convenience is now a growing vulnerability exploited by cybercriminals worldwide." The hidden risk behind everyday browsing Cookies are small text files that websites store on a user's browser to remember preferences, login details, and browsing behaviour. They play a vital role in making online experiences smoother, helping websites load faster, keeping shopping carts full, and allowing users to stay logged in across sessions. Without cookies, the convenience and personalisation of the modern web would be severely limited. However, as the digital landscape evolves, so does the misuse of these tools. Cybercriminals have learned to harvest cookies to hijack sessions, steal identities, and bypass security measures. "Most people don't realise that a stolen cookie can be just as dangerous as a password," says Warmenhoven. "Once intercepted, a cookie can give hackers direct access to accounts and sensitive data, no login required." Millions of pieces of personal data exposed NordVPN's research reveals a massive malware operation that stole almost 94 billion cookies - a dramatic jump from 54 billion just a year ago, marking a 74% increase. Even more concerning, 20.55% of these cookies are still active, posing an ongoing risk to users' online privacy. Most stolen cookies came from major platforms, including Google (4.5 billion), YouTube (1.33 billion), and over 1 billion each from Microsoft and Bing. The growth is just as alarming when comparing personal data exposure over the past few years. In 2024, NordVPN identified 10.5 billion assigned IDs, 739 million session IDs, 154 million authentication tokens, and 37 million login credentials. In 2025, those numbers rose sharply, with 18 billion assigned IDs and 1.2 billion session IDs now exposed. These data types are critical for identifying users and securing their online accounts, making them highly valuable to cybercriminals. The stolen information often included full names, email addresses, cities, passwords, and physical addresses - key personal data that can be used for identity theft, fraud, and unauthorised account access. The data was harvested using 38 different types of malware, more than triple the 12 types identified last year. The most active strains were Redline (41.6 billion cookies), Vidar (10 billion), and LummaC2 (9 billion). These malware families are known for stealing login details, passwords, and other sensitive data. Redline is a powerful infostealer that extracts saved passwords, cookies, and autofill data from browsers, giving hackers direct access to personal accounts. Vidar works similarly but also downloads additional malware, making it a gateway to more complex attacks. LummaC2 is particularly evasive, frequently updating its tactics to slip past antivirus tools and spread across systems undetected. In addition to these known threats, researchers discovered 26 new types of malware not seen in 2024 - a sign of how quickly the cybercrime landscape is evolving. New entries like RisePro, Stealc, Nexus, and Rhadamanthys are especially dangerous. RisePro and Stealc are built to rapidly steal browser credentials and session data, while Nexus targets banking information using mobile emul...
It's called Dia and was first announced last year. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Marsha Collier & Marc Cohen Techradio by Computer and Technology Radio / wsRadio
Netflix discontinues support; Apple take a step back on Apple Watch and Smart Glasses; New SynthID verifies AI content; Notepad upgrade; Reducing browser battery drain; Topps Pope Leo XIV trading card; Tom Cruise best stunts #TomCruise4Oscar; Streaming
What if everything we've been taught about human history is wrong? In this explosive episode of Total Disclosure, we're joined by Michael Forest—researcher, author, and documentarian behind the popular YouTube channel Aliencarvings. For the past five years, Michael has uncovered over 10,000 mysterious artifacts found in Mexico—many of which depict advanced beings, spacecraft-like imagery, and symbols that challenge mainstream timelines and the accepted origins of human civilization. Are these the remnants of a lost advanced race? Evidence of extraterrestrial contact? Or clues pointing to a deeper, hidden truth about our past? We dive deep into:The hidden meaning behind the alien-like carvingsWhy mainstream archaeology refuses to touch this subjectThe global implications if these artifacts are authenticConnections to Atlantis, the Anunnaki, and ancient mythsWhether history is being rewritten in real timeMichael's documentaries and books are available at AlienCarvings.com, and his work is opening minds around the world. Tune in for an unforgettable conversation that will leave you questioning everything.
This episode was recorded and captured LIVE on Independent Bookstore Day (April 26, 2025) from Browsers' Bookstore in Albany, Oregon. Pete Dryden:Photographer, cabinet maker, professional overthinker. Hiding out in Albany, Oregon—dodging small talk, chasing meaning in the grain and the frame. Restless mind, calloused hands, too many questions and never enough quiet.Abe Richmond:Owner of Browsers' Bookstore. If spotted in the wild, he is reading totally tubular titles.We talk about bookstores, Edward Abbey, Kathy Acker, Morrissey, Hunter S. Thompson and so much more.Celebrate Independent Books & Bookstores!!!
This show has been flagged as Clean by the host. Recently I had a discussion on Mastodon about mobile phone applications. The other person stated "the web belongs to web browsers". I agreed to it as a general good approach. Some dedicated apps cannot be substituted with the browser, but some can. I do not have so many apps myself, but anyway that statement got me to review a couple of my apps how they works in the Firefox browser. And actually, I could delete three apps and all functions I needed from them can be managed from Firefox. Beside traditional bookmarks, those pages can be pinned to the Firefox start page or placed like a webapp on the mobile screen, so they look like an ordinary app. Using the Firefox browser makes it easier to control the privacy. In addition to what is built into Firefox, I currently also have the two extensions, Privacy Badger and uBlock Origin in my Firefox browser. Beside privacy and in general to be somewhat more in control, this approach also reduces the number of apps to keep updated and reduce storage need. Sometimes apps are necessary of otherwise beneficial. But I think the traditional browser should not be forgotten also on the smart mobile phone. Provide feedback on this episode.
On this month's transmission, Emma and Alex share System76 news about the Linux Community at LFNW. Listen to an interview with View.io discussing how to securely use your internal data to build private AI-powered apps. Think rapid case research, risk assessment, enhanced patient care. Alex and Emma also talk about COSMIC DE and Linux laptops!00:40 LinuxFest Northwest Un-BBQ and COSMIC DE Presentation02:38 New birthday tradition at LFNW03:10 COSMIC news03:50 New Bonobo WS Laptop04:30 New Serval WS Laptop05:10 nVidia 5060 TI available on Thelio Prime and Mira Desktops05:35 Introduction to View.IO07:40 Fully self-contained on premises platform for AI09:50 Browser based or native application?14:05 Role of Linux and Open Source with ViewIO software16:40 Using System76 Hardware for development at ViewIO18:00 Nothing like the Thelio Astra and Darter Pro Laptop on the Market22:15 One last thought about Thelio Astra Performance for AI
Susan Bradley from Social Sales Girls is talking about a question I get all the time: what do we do to get people to buy on our website? We're talking about online conversions and how to make them happen. Tune in and be sure to sign up for Susan's upcoming bootcamp: https://classroom.thesocialsalesgirls.com/a/2148106161/4e3zLcrm Work with Me - https://www.ciarastockeland.com/work-with-meVisit the Bookstore - https://www.ciarastockeland.com/bookstoreSign Up for Free Weekly Tips and Trainings - https://www.ciarastockeland.com/subscribe More About the Episode Sponsor:Brandakin Social Media (https://www.brandakinsocialmedia.com/) - Maximize your social media presence and reach.
Susan Bradley from Social Sales Girls is talking about a question I get all the time: what do we do to get people to buy on our website? We're talking about online conversions and how to make them happen. Tune in and be sure to sign up for Susan's upcoming bootcamp: https://classroom.thesocialsalesgirls.com/a/2148106161/4e3zLcrm Work with Me - https://www.ciarastockeland.com/work-with-meVisit the Bookstore - https://www.ciarastockeland.com/bookstoreSign Up for Free Weekly Tips and Trainings - https://www.ciarastockeland.com/subscribe More About the Episode Sponsor:Brandakin Social Media (https://www.brandakinsocialmedia.com/) - Maximize your social media presence and reach.
AI is no longer on the horizon. It's part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today's Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »
On this episode we talk about the flood that went through our area, Annabelle gets moved into a penitentiary in West Virginia, and if we can bring back old internet browser games. What do you want to hear us talk about?Follow us!All our links for ShinoBroz WadeTwitch:WadeMFMorganSlyInstagram:SillySly07TikTok:SillySly07YouTube:LimitlessDazeBe sure to subscribe to our YouTube and like our videos!Follow us for more content!ShinoBrozInstagram:ShinoBrozTikTok:ShinoBrozYouTube:ShinoBrozDiscord: ShinoBroz
In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users' browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/personal account that a user has spun up. It's extremely difficult to bypass. That's because when you're in the browser it doesn't matter how a phishing link arrives, or how a threat actor has concealed it from your detection stack – if the user sees it, Push sees it. There are solutions for protecting your users SSO credentials, like passkeys. But what about all the SaaS in your environment? Even if it's enrolled into your SSO, are you sure that's how your users are authenticating to it? What about the automation platforms your developers and admins use? What about data platforms like Snowflake? Are your using setting up passkeys for those accounts? How would you know, and what problems can it cause if those accounts are vulnerable? This is a fun one! This episode is also available on Youtube. Show notes