Podcasts about Encryption

Process of converting plaintext to ciphertext

  • 1,296PODCASTS
  • 3,460EPISODES
  • 48mAVG DURATION
  • 1DAILY NEW EPISODE
  • May 29, 2025LATEST
Encryption

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Encryption

Show all podcasts related to encryption

Latest podcast episodes about Encryption

All TWiT.tv Shows (MP3)
Hands-On Windows 142: The Bitlocker Controversy of 2025

All TWiT.tv Shows (MP3)

Play Episode Listen Later May 29, 2025 13:10 Transcription Available


In this episode of Hands-On Windows, we explore the pros and cons of using Microsoft accounts in Windows 11, mainly focusing on the vital role encryption plays in protecting your data. While some cling to the nostalgia of local accounts, we examine the undeniable advantages of disk encryption when using an online account. Additionally, I provide practical advice on managing your BitLocker recovery key to ensure you're never left in a lurch. Prepare to be informed and empowered as we dispel myths and equip you with the knowledge to enhance your device's security confidently. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

PayPod: The Payments Industry Podcast
How to Stop Payment Fraud with Encryption – Ruston Miles

PayPod: The Payments Industry Podcast

Play Episode Listen Later May 26, 2025 36:01


Episode Topic: Ruston Miles of Bluefin joins PayPod to unravel the real story behind payment data security. From debunking myths around chip card protection to highlighting the need for encryption at the point of interaction, Ruston shares critical insights into why businesses must adopt P2P encryption and tokenization to stay ahead of evolving threats. Lessons You'll Learn: How to distinguish fraud prevention from data security, the necessity of protecting data at the entry point, why chips don't equal encryption, and how upcoming technologies like quantum computing and AI are reshaping the threat landscape. About Our Guest: Ruston Miles is the Founder and Chief Strategy Officer at Bluefin, a payment security company that pioneered PCI-validated point-to-point encryption. With decades of experience in cybersecurity, Ruston has been instrumental in setting encryption standards adopted by Visa, Mastercard, and global universities. He's also a strong advocate for tokenization, quantum-resistant encryption, and secure digital wallets. Topics Covered: The difference between fraud and data breaches   How P2P encryption protects data before it can be stolen   Why EMV chips give a false sense of security   Storing tokens instead of real card numbers   Security challenges in higher education and enterprise   Quantum computing's potential threat to public key encryption

The CyberWire
Bypassing Bitlocker encryption.

The CyberWire

Play Episode Listen Later May 15, 2025 39:08


Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment and direct from RSAC 2025, our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. Listen to Devin's interview here. Selected Reading Google fixes high severity Chrome flaw with public exploit (Bleeping Computer) BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released (Cyber Security News) The Internet's Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge (WIRED)  German operation shuts down crypto mixer eXch, seizes millions in assets (The Record) CFPB Quietly Kills Rule to Shield Americans From Data Brokers (WIRED) EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis (Irish Council for Civil Liberties) Operation RoundPress targeting high-value webmail servers (We Live Security) Google says hackers that hit UK retailers now targeting American stores (Reuters) Cybersecurity incident forces largest US steelmaker to take some operations offline (The Record) Infosec Layoffs Aren't the Bargain Boards May Think (Dark Reading)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Compliance Divas Podcast
#205 Do I Have to Use Encryption?

The Compliance Divas Podcast

Play Episode Listen Later May 14, 2025 23:25


Email encryption ensures that only authorized individuals have access to patient information and it's required under the HIPAA Security Rule. Having the right program makes it easier to be compliant and protect your patients' sensitive information. In this episode, the Divas provide tips for evaluating your current email encryption program.HIPAA Security Rule updates: https://www.hhs.gov/hipaa/for-professionals/security/hipaa-security-rule-nprm/factsheet/index.htmlHolland and Hart Law article: https://www.hollandhart.com/hipaa-emails-texts https://www.thecompliancedivas.com

Afternoon Drive with John Maytham
Factory reset fallacy: Why your data's is still at risk

Afternoon Drive with John Maytham

Play Episode Listen Later May 7, 2025 7:55


John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.

Radio Wave
Podhoubí: Komu slouží technologie? Autokratické směry v americké politice komentují Schneider a Bohal

Radio Wave

Play Episode Listen Later Apr 30, 2025 54:35


Živé Podhoubí o technologiích a americké politice se natáčelo ve výstavě Poetics of Encryption. Současné technologie nejsou jako nástroje, které mají člověku usnadnit život. Stávají se čím dál víc svébytným ekosystémem, který se bez člověka obejde. Ideové směry jako akceleracionismus, technooptimismus nebo neorekcionářství s rapidním technologickým vývojem počítají, mnohdy ale na úkor demokracie. Člověk má být překonán, případně kolonizovat další planety.

ITSPmagazine | Technology. Cybersecurity. Society
Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo'Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 23, 2025 23:26


As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo'Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.Mary Carmichael, President of ISACA's Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she's co-presenting with Dooshima Dabo'Adzuana: Third-Party AI: What Are You Really Buying? Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.Alongside the AI focus, visitors to the booth can explore results from ISACA's Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.Learn more about ISACA: https://itspm.ag/isaca-96808Guests:Mary Carmichael, President of ISACA's Vancouver Chapter | https://www.linkedin.com/in/carmichaelmary/Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter | https://www.linkedin.com/in/dooshima-dabo-adzuana/ResourcesMary and Dooshima's session at RSA Conference: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyqLearn more about ISACA's AI resources: https://www.isaca.org/resources/artificial-intelligenceLearn more about ISACA's credentials: https://www.isaca.org/credentialingLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The Daily Crunch – Spoken Edition
Florida draft law mandating encryption backdoors for social media accounts billed ‘dangerous and dumb'

The Daily Crunch – Spoken Edition

Play Episode Listen Later Apr 23, 2025 3:34


A digital rights group blasted the Florida bill, but lawmakers voted to advanced the draft law. Learn more about your ad choices. Visit podcastchoices.com/adchoices

MacVoices Audio
MacVoices #25116: Live! - Contact Identification Responsibility, An Apple Store Surge, The Meta Trial

MacVoices Audio

Play Episode Listen Later Apr 21, 2025 22:09


A mix of national security, tech glitches, and policy debates drives this discussion with Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, and Web Bixby, starting with a case where iPhone contact merging was blamed for a classified information leak. The group questions the logic behind that defense and dives into how apps like Signal and iOS handle contact data. Additional topics include Apple Store sales surges tied to tariff fears, the UK's encryption fight with Apple, and Zuckerberg's testimony in Meta's antitrust trial.  This MacVoices episode is supported by Notion. Work faster, write better, and think bigger. Try it for free today at notion.com/macvoices. Show Notes: Chapters: 00:06 Contact Confusion and iPhone Blame 08:02 Reply All Regrets 08:19 UK Encryption Battle Revealed 11:58 Apple Store Surge Amid Tariffs 13:55 Meta's Antitrust Trial Insights Links: How Data Detectors led to a security breach on Signal https://appleinsider.com/articles/25/04/06/security-advisor-blames-iphone-for-revealing-war-plans The UK can't keep its encryption battle with Apple secret, court says - 9to5Mac https://9to5mac.com/2025/04/07/apple-uk-encryption-must-be-public/ Faced with bigly price hikes, America goes Apple shopping https://www.applemust.com/faced-with-bigly-price-hikes-america-goes-apple-shopping/ Meta CEO Mark Zuckerberg takes the stand in historic antitrust trial https://apnews.com/article/meta-ftc-antitrust-instagram-whatsapp-facebook-f602a09e86c9eb4538949572f72e8380 Guests:  Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

LINUX Unplugged
611: Distro Double Trouble

LINUX Unplugged

Play Episode Listen Later Apr 20, 2025 59:41 Transcription Available


Fedora 42 and Ubuntu 25.04 are here—We break down what's new, what stands out, and what we love most about each release.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. ConfigCat Feature Flags: Manage features and change your software configuration using ConfigCat feature flags, without the need to re-deploy code. Support LINUX UnpluggedLinks:

Tech Policy Podcast
404: The Worst Possible Moment to Break Encryption

Tech Policy Podcast

Play Episode Listen Later Apr 17, 2025 53:25


Corbin Barthold (TechFreedom) discusses the recent spate of attacks on end-to-end encryption—and free speech more broadly—in the United Kingdom and United States.Links:U.K. Orders Apple to Let It Spy on Users' Encrypted AccountsTech Policy Podcast 356: The UK Targets End-to-End EncryptionThe UK's state-funded anti-encryption propagandaThe UK Has A Voyeuristic New Propaganda Campaign Against Encryption

Cyber Security Headlines
Week in Review: Fake ChatGPT passport, Apple appeals UK encryption, Oracle's obsolete servers

Cyber Security Headlines

Play Episode Listen Later Apr 11, 2025 22:36


Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Carla Sweeney, SVP, InfoSec, Red Ventures Thanks to our show sponsor, Nudge Security Are you struggling to secure your exploding SaaS footprint? With Nudge Security, you can discover all SaaS apps and accounts, manage access, ensure secure configurations, vet unfamiliar tools, and automate daily identity security tasks. Start a free 14-day trial All links and the video of this episode can be found on CISO Series.com  

DrZeroTrust
Dr Zero Trust and Faction Networks

DrZeroTrust

Play Episode Listen Later Apr 10, 2025 27:18


In this conversation, Chase Cunningham and Dave Rand discuss the concept of Zero Trust security and how Faction Networks is innovating in this space. They explore the challenges of securing IoT devices, the unique approach of Faction in avoiding central key repositories, and the importance of encryption. The discussion also touches on the future of cybersecurity, the integration of AI, and the user experience in implementing these security measures.TakeawaysZero Trust is essential for modern cybersecurity.Traditional VPNs are inadequate for current security needs.IoT devices pose significant security challenges.Faction Networks uses a unique approach to key management.Encryption is a core component of Faction's security model.Micro-segmentation helps in isolating critical devices.AI can enhance security through anomaly detection.Privacy is a priority in Faction's design.User experience is crucial for security implementation.The future of cybersecurity will involve hardware and software integration.

Business of Tech
Kaseya's MSP Insights, Apple Encryption Case, and AI Breakthroughs from Meta, Google, and Microsoft

Business of Tech

Play Episode Listen Later Apr 8, 2025 14:22


Kaseya's 2025 Global MSP Benchmark Report reveals that cybersecurity has emerged as a crucial revenue driver for managed service providers (MSPs), with 67% of respondents identifying it as one of their fastest-growing revenue categories. The report highlights that 76% of MSPs recognize their clients' primary concern is security, emphasizing the need for integrating cybersecurity into service offerings. Additionally, operational efficiency is paramount, with 95% of MSPs acknowledging the necessity of connecting their tools for smoother operations. The report also notes a rise in co-managed IT services, with 61% of executives reporting year-over-year revenue growth in this area.The ongoing legal battle between Apple and the UK Home Office over encryption access has taken a significant turn, as the Investigatory Powers Tribunal has denied the government's request for complete secrecy. This ruling allows for public disclosure of the case, which stems from a technical capability notice requiring Apple to provide backdoor access to encrypted data for UK law enforcement. The tribunal's decision underscores the importance of transparency in legal proceedings, particularly concerning national security and private sector data protection practices.In the realm of artificial intelligence, the Trump administration has issued new guidance for AI use and acquisition in government, replacing previous directives from the Biden administration. This guidance includes a 200-day deadline for creating a web-based repository of AI procurement tools and emphasizes risk management practices for high-impact AI use cases. Analysts have raised concerns about the implementation of these directives, particularly regarding the commitment of the Department of Government Efficiency to adhere to the established framework.Meta has launched its latest AI models, Llama 4, which enhance its AI Assistant across various platforms, while Google has introduced Gemini 2.5 Pro, its most advanced AI model to date. Microsoft has also updated its AI assistant, CoPilot, with new features that enhance personalization and task management capabilities. Meanwhile, companies like Zoom, Enable, and DNSFilter are making strategic moves to integrate AI into their services, reflecting the growing trend of AI adoption in the tech industry. Framework has temporarily suspended sales of certain laptop models in the U.S. due to new tariffs, highlighting the impact of global trade policies on consumer electronics. Four things to know today 00:00 Kaseya's MSP Report: Cybersecurity Growth, M&A Plans, and the Fight to Keep Clients03:33 Apple Encryption Fight Goes Public While New AI Guidelines Roll Out in Government 06:10 Meta Debuts Llama 4, Google Launches Gemini 2.5 Pro, and Microsoft Updates Copilot – What IT Needs to Know08:55 Framework Pauses Laptop Sales Due to Tariffs While Zoom, N-able, DNSFilter, and SentinelOne Make Strategic Plays  Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://www.huntress.com/mspradio/  Join Dave April 22nd to learn about Marketing in the AI Era.  Signup here:  https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Cyber Security Headlines
Apple encryption appeal, Xanthorox AI tool, weaponizing CRM

Cyber Security Headlines

Play Episode Listen Later Apr 8, 2025 7:22


Apple appeals UK encryption back door order Researchers warn about AI-driven hacking tool  PoisonSeed campaign weaponizes CRM system Thanks to our episode sponsor, Nudge Security Nudge Security discovers every GenAI tool ever used in your org, even those you've never heard of. For each tool, you'll see who introduced it, who else is using it, where it's integrated into other tools, and a vendor security profile. Get your free GenAI inventory today.

The Deep Dive Radio Show and Nick's Nerd News
EU Wants Encryption Backdoors For Everything!

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Apr 7, 2025 5:17


EU Wants Encryption Backdoors For Everything! by Nick Espinosa, Chief Security Fanatic

The Audit
The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes

The Audit

Play Episode Listen Later Apr 7, 2025 36:42 Transcription Available


Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of computation, while Quantum Key Distribution (QKD) is making encrypted communications nearly unbreakable. As multiple sectors race to integrate quantum and AI, cybersecurity experts are racing to implement quantum-resistant encryption before traditional cryptographic methods become obsolete. Beyond the technical breakthroughs, quantum computing is also raising profound questions about reality itself. In this episode, we discuss: · The rise of 1,000-qubit machines and persistent error challenges · How QKD is reshaping secure communication worldwide · Microsoft's Majorana particle claims—fact or hype? · NASA's mysterious quantum shutdown in February 2024 · Google's research into quantum and unexpected findings · The cybersecurity arms race to counter quantum decryption Quantum computing isn't just the future—it's here, and it's reshaping everything from cybersecurity to our understanding of the universe. Don't miss this deep dive into the most mind-bending technology of our time! Like, share, and subscribe for more in-depth cybersecurity insights. #QuantumComputing #Cybersecurity #Encryption #AI #ParallelUniverses 

Monero Talk
3D Printed Gun Designer Joseph The Parrot on Shaping the Next Steps of True Liberty | EPI 346

Monero Talk

Play Episode Listen Later Apr 5, 2025 78:37


Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: In this episode Douglas Tuman has a discussion with 3D gun designer Joseph the Parrot about the intersection of 3D printed guns and cryptocurrency privacy. Joseph explained the origin of his persona and his entry into 3D gun printing through JStark's AR-15 CAD model and the FGC-9 (Fuck Gun Control) project. He described how the FGC-9 was designed to be manufactured with basic tools, outsourcing complex shapes to 3D printers while keeping metal parts simple. The discussion explores the philosophical parallels between Monero and 3D printed guns in fighting state monopolies. He highlighted his gun design improvements over the FGC-9, creating the first fully printable gun using no regulated parts worldwide. They also cover Joseph's upcoming presentation at MoneroKon and the importance of bridging the crypto and gun rights communities. TIMESTAMPS: (00:01:33) Introduction to Ze Carioca (Joseph the Parrot) (00:04:59) Explanation of FGC-9 and Fully Digital Self Guns (00:08:55) Philosophical Justification for 3D Printed Guns (00:10:59) Comparison Between Monero and 3D Printed Guns (00:14:14) Discussion on New Second Amendment and Triple Constraint (00:16:42) Addressing Concerns About Bad People Accessing Guns (00:21:01) Technical Improvements Made by Ze Carioca (00:30:52) The Role of Encryption in Freedom (00:39:16) First and Second Amendment Philosophies Worldwide (00:42:00) Bridging Crypto and Gun Communities at MoneroKon (00:47:50) Different Political Groups within Monero Community (00:50:20) Expanding the Bubble and Talking to Normies (00:54:50) Ze Carioca's Journey into Crypto and Monero (01:06:23) Closing Remarks and Contact Information LINKS: https://x.com/josephtheparrot Purchase Cafe & tip the farmers w/ XMR! https://gratuitas.org/ Purchase a plug & play Monero node at https://moneronodo.com SPONSORS: Cakewallet.com, the first open-source Monero wallet for iOS. You can even exchange between XMR, BTC, LTC & more in the app! Monero.com by Cake Wallet - ONLY Monero wallet (https://monero.com/) StealthEX, an instant exchange. Go to (https://stealthex.io) to instantly exchange between Monero and 450 plus assets, w/o having to create an account or register & with no limits. WEBSITE: https://www.monerotopia.com CONTACT: monerotalk@protonmail.com ODYSEE: https://odysee.com/@MoneroTalk:8 TWITTER: https://twitter.com/monerotalk FACEBOOK: https://www.facebook.com/MoneroTalk HOST: https://twitter.com/douglastuman INSTAGRAM: https://www.instagram.com/monerotalk TELEGRAM: https://t.me/monerotopia MATRIX: https://matrix.to/#/%23monerotopia%3Amonero.social MASTODON: @Monerotalk@mastodon.social MONERO.TOWN: https://monero.town/u/monerotalk

The Bid Picture - Cybersecurity & Intelligence Analysis
383. Encrypted Messaging Apps and National Security.

The Bid Picture - Cybersecurity & Intelligence Analysis

Play Episode Listen Later Apr 3, 2025 73:08


Send Bidemi a Text Message!In this episode, host Bidemi Ologunde talked about the national security risks of encrypted messaging — highlighting policy gaps and some suggested remedies.Support the show

The PC Pro Podcast
Episode 736: Email encryption, Donkey Kong and the LibGen fightback

The PC Pro Podcast

Play Episode Listen Later Apr 3, 2025 66:36


This week the team mull over Google's plan for email encryption and the perils of being the best at Donkey Kong. Frankly, he's not as good as Funky Kong, but that's only my opinion.We also discuss the writing community's retaliation to having their works used to train Meta's AI whilst research about the impact of screen use on sleep health forces our hosts to make revelations about their bedtime routine.The Hot Hardware this week is the Eizo FLT FlexScan 23.8” monitor packed with high impact sustainability credentials.The Society of Authors' letter is here

The Agenda Podcast: Decoding Crypto
Embrace privacy now or pay the price in 2025 (feat. Session)

The Agenda Podcast: Decoding Crypto

Play Episode Listen Later Apr 2, 2025 50:54


Kee Jefferys, technical co-founder of Session, breaks down the state of privacy and encryption in 2025 and explains why the Session encrypted messaging app chose to build on the blockchain. Kee also breaks down the app's SESH token launch, its long-term plans and how it differs from other apps like Signal.(00:00) Introduction to The Agenda podcast and this week's episode(02:05) What is Session? Who uses it?(05:31) Governments want encryption backdoors(09:38) Why and how Session uses blockchain(13:58) Session's security features(15:43) The story behind Session's founding(19:59) Session vs Signal(23:00) What metadata says about you(26:53) Approaching politics as a privacy project(30:07) Strong encryption is better than strong regulations(33:54) Can normies use Session?(36:35) Will Session go DeFi?(40:09) Long-term plans for SESH token(42:01) Privacy tips for noobs and paranoid users alike The Agenda is brought to you by Cointelegraph and hosted/produced by Ray Salmond and Jonathan DeYoung, with post-production by Elena Volkova (Hatch Up). Follow Cointelegraph on X (Twitter) at @Cointelegraph, Jonathan at @maddopemadic and Ray at @HorusHughes. Jonathan is also on Instagram at @maddopemadic and made the music for the podcast. Hear more at madic.art.Follow Kee Jefferys on X at @jefferyskee.Check out Cointelegraph at cointelegraph.com.If you like what you heard, rate us and leave a review!The views, thoughts and opinions expressed in this podcast are the participants' alone and do not necessarily reflect or represent the views and opinions of Cointelegraph. This podcast (and any related content) is for entertainment purposes only and does not constitute financial advice, nor should it be taken as such. Everyone must do their own research and make their own decisions. The podcast's participants may or may not own any of the assets mentioned.

Business of Tech
Cybersecurity Surge: AI Risks, Intel's Spin-Offs, Google's Gmail Encryption, and More

Business of Tech

Play Episode Listen Later Apr 1, 2025 13:01


Cybersecurity startups are experiencing a significant revenue surge as threats associated with artificial intelligence continue to multiply. Companies like ChainGuard have reported a remarkable seven-fold increase in annualized revenue, reaching approximately $40 million, while Island anticipates its revenue will hit $160 million by the end of the year. The rise in cyber attacks, particularly a 138% increase in phishing sites since the launch of ChatGPT, has created a greater demand for cybersecurity solutions. A recent report from Tenable highlights that 91% of organizations have misconfigured AI services, exposing them to potential threats, emphasizing the urgent need for organizations to adopt best practices in cybersecurity.Intel is undergoing a strategic reset under its new CEO, Lip Bu Tan, who announced plans to spin off non-core assets to focus on custom semiconductor development. While the specifics of what constitutes core versus non-core assets remain unclear, this move aims to streamline operations and enhance innovation in the semiconductor space. However, Intel's past struggles with execution raise questions about the effectiveness of this strategy. The company must leverage its strengths while shedding distractions to remain competitive in the evolving semiconductor landscape.Google has made strides in email security by allowing enterprise Gmail users to apply end-to-end encryption, a feature previously limited to larger organizations. This democratization of high-security email comes in response to rising email attacks, enabling users to control their encryption keys and reduce the risk of data interception. Meanwhile, Apple has addressed a significant vulnerability in its iOS 18.2 passwords app that exposed users to phishing attacks, highlighting the importance of rapid response to security flaws.CrowdStrike and SnapLogic are enhancing their partner ecosystems to improve security operations and streamline integration processes. CrowdStrike's new Services Partner program aims to promote the adoption of its next-gen security technology, while SnapLogic's Partner Connect program focuses on collaboration with technology and consulting partners. Additionally, OpenAI has increased its bug bounty program rewards, reflecting the need for ongoing vigilance in cybersecurity as AI becomes more prevalent. The convergence of AI and cybersecurity presents both challenges and opportunities, necessitating proactive measures to safeguard sensitive information. Four things to know today 00:00 Cybersecurity Startups See Revenue Surge as AI Threats Multiply—Are We Prepared?04:44 Intel's Strategic Reset: Spinning Off Non-Core Assets to Boost Custom Chip Development06:09 Google Brings Enterprise-Level Encryption to Gmail as Apple Patches Major iOS Vulnerability08:56 CrowdStrike and SnapLogic Step Up Partnerships While OpenAI Sweetens Bug Bounty Reward  Supported by:  https://syncromsp.com/  Join Dave April 22nd to learn about Marketing in the AI Era.  Signup here:  https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

MacVoices Video
MacVoices #25104: Live! - RCS Encryption, Metallica Experience Reports, Ted Lasso Returns

MacVoices Video

Play Episode Listen Later Apr 1, 2025 25:21


Chuck Joiner, Brittany Smith, David ginsburg,, Brian Flaingan-Arthurs, Jeff Gamet, MartyJencius, Eric Bolden, Mark Fuccio, Web Bixby, and Jim Rea explore the significance of end-to-end encryption for RCS messaging on iPhone, bringing secure communication to more users without extra effort. They also review the immersive Metallica concert experience on Apple Vision Pro, praising its production quality and spatial video evolution. Finally, they react with approval and enthusiasm to the surprise announcement of a new season of Ted Lasso, focusing on a women's football team.   This MacVoices episode is supported by Notion. Work faster, write better, and think bigger. Try it for free today at notion.com/macvoices. Show Notes: Chapters: 00:06 RCS Encryption Insights08:22 Metallica Experience Reports17:59 Apple Vision Pro and Concert Filming22:20 Ted Lasso Returns Links: End-to-end encrypted RCS messaging on iPhone coming in future software updatehttps://9to5mac.com/2025/03/14/end-to-end-encrypted-rcs-messaging-on-iphone/ You can now watch a full Metallica concert on Apple Vision Pro
 https://www.fastcompany.com/91298652/you-can-now-watch-a-full-metallica-concert-on-apple-vision-pro “It's unlike anything we've ever done before!” Metallica announce Apple Immersive concert experiencehttps://www.kerrang.com/metallica-m72-world-tour-drummer-lars-ulrich-interview-zane-lowe-immersive-apple-vision-pro Jason Sudeikis confirms Ted Lasso season 4, here's the storylinehttps://9to5mac.com/2025/03/14/ted-lasso-season-4-is-official/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Brittany Smith is a trained cognitive neuroscientist who provides ADD/ADHD, technology, and productivity coaching through her business, Devise and Conquer, along with companion video courses for folks with ADHD. She's also the cofounder of The ADHD Guild, a community for nerdy folks with ADHD. She, herself, is a self-designated “well-rounded geek”. She can be found on Twitter as @addliberator, on Mastodon as @addliberator@pdx.social, and on YouTube with tech tips.   Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Mastodon:     https://mastodon.cloud/@chuckjoiner      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #25104: Live! - RCS Encryption, Metallica Experience Reports, Ted Lasso Returns

MacVoices Audio

Play Episode Listen Later Apr 1, 2025 25:22


Chuck Joiner, Brittany Smith, David Ginsburg,, Brian Flaingan-Arthurs, Jeff Gamet, MartyJencius, Eric Bolden, Mark Fuccio, Web Bixby, and Jim Rea explore the significance of end-to-end encryption for RCS messaging on iPhone, bringing secure communication to more users without extra effort. They also review the immersive Metallica concert experience on Apple Vision Pro, praising its production quality and spatial video evolution. Finally, they react with approval and enthusiasm to the surprise announcement of a new season of Ted Lasso, focusing on a women's football team.   This MacVoices episode is supported by Notion. Work faster, write better, and think bigger. Try it for free today at notion.com/macvoices. Show Notes: Chapters: 00:06 RCS Encryption Insights 08:22 Metallica Experience Reports 17:59 Apple Vision Pro and Concert Filming 22:20 Ted Lasso Returns Links: End-to-end encrypted RCS messaging on iPhone coming in future software updatehttps://9to5mac.com/2025/03/14/end-to-end-encrypted-rcs-messaging-on-iphone/ You can now watch a full Metallica concert on Apple Vision Pro
https://www.fastcompany.com/91298652/you-can-now-watch-a-full-metallica-concert-on-apple-vision-pro “It's unlike anything we've ever done before!” Metallica announce Apple Immersive concert experiencehttps://www.kerrang.com/metallica-m72-world-tour-drummer-lars-ulrich-interview-zane-lowe-immersive-apple-vision-pro Jason Sudeikis confirms Ted Lasso season 4, here's the storylinehttps://9to5mac.com/2025/03/14/ted-lasso-season-4-is-official/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Brittany Smith is a trained cognitive neuroscientist who provides ADD/ADHD, technology, and productivity coaching through her business, Devise and Conquer, along with companion video courses for folks with ADHD. She's also the cofounder of The ADHD Guild, a community for nerdy folks with ADHD. She, herself, is a self-designated “well-rounded geek”. She can be found on Twitter as @addliberator, on Mastodon as @addliberator@pdx.social, and on YouTube with tech tips.   Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Afternoon Drive with John Maytham
Musk's X buys his AI company

Afternoon Drive with John Maytham

Play Episode Listen Later Mar 31, 2025 6:16


Elon Musk has announced a blockbuster move: the merger of his AI startup, xAI, with X (formerly Twitter), in a deal valuing the two at a combined $113 billion. But what does this mean for the tech world, investors, and the future of AI? Jan Vermeulen is Editor at MyBroadband.co.za and he joins John Maytham to break down the deal’s implications - from the strategic use of Grok, xAI’s powerful chatbot, to the financial engineering behind the $45 billion valuation of X. See omnystudio.com/listener for privacy information.

Security Conversations
Signalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returns

Security Conversations

Play Episode Listen Later Mar 28, 2025 112:34


Three Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky's ‘Operation Forum Troll' report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan' hack-and-leak exposures. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

HeroicStories
Protecting Your Data: Why I Avoid Most Pre-Installed Security and Encryption Software

HeroicStories

Play Episode Listen Later Mar 28, 2025 4:24


External hard drives often come with security and backup software. I'm not convinced it should be used.

Geekshow Podcast
Geekshow Helpdesk: Hell Ants or Hell, Ants?

Geekshow Podcast

Play Episode Listen Later Mar 27, 2025 61:52


-Good wifi rolls out at United: https://www.yahoo.com/tech/united-airlines-successfully-installed-starlink-130000684.html?guccounter=1 -Cordless Coke Machine: https://hydrogen-central.com/coca-colas-new-hydrogen-powered-vending-machine-doesnt-need-a-power-outlet/ -Bambu H2D is amazeballs: https://www.tomshardware.com/3d-printing/bambu-lab-h2d-review -Encryption is only as good as the user: https://www.theguardian.com/us-news/2025/mar/24/journalist-trump-yemen-war-chat -Norovirus vaccine on the horizon?! Norovirus vaccine hints at defusing explosive stomach bug in early trial -Napster just sold for a crazy sum: Napster just sold for $207 million -Sony has new display tech Sony Unveils RGB LED Backlight Tech That Outperforms Traditional Mini LED -Pixel 9a for $499 Google officially introduces the Pixel 9a for $499 -LEDs the size of a virus: World's Tiniest LED Display Has Pixels Smaller Than a Virus -23andMe filed for bankruptcy: DNA-Testing Firm 23andMe Files for Bankruptcy -Bio-Hybrid hand https://arstechnica.com/science/2025/03/a-biohybrid-robotic-hand-built-using-real-human-muscle-cells/ -BYD is pulling ahead of Tesla in pretty much every way: BYD announces charging tech that's twice as fast as Tesla's -Hell Ants don't exist anymore, and I am glad https://allthatsinteresting.com/amber-fossil-hell-ant

Dark Rhino Security Podcast
S16 E09 (VIDEO) Phishing, Encryption, and Cybersecurity Training

Dark Rhino Security Podcast

Play Episode Listen Later Mar 27, 2025 50:07


Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a positive cybersecurity culture. With a background in psychology and extensive experience leading security programs at Chase Paymentech, Vistaprint, and DXC Technology, Craig specializes in incident response, governance, and compliance. A CISSP-certified professional since 2001, he is a recognized thought leader, public speaker, and advocate for making cybersecurity training engaging, fun, and effective. 00:00 Introduction01:16 Our guest08:40 There are two types of companies10:00 We taught them how to Phish12:12 Business Email compromise13:50 Go back to the way your parents ran security16:19 What do I do first?26:12 Changing your passwords is not good for you29:00 Encryption31:30 What to look for in a Password Manager35:17 “Unsubscribe” button mishap46:15 Cyberhoot49:05 Free Training from Cyberhoot-----------------------------------------------------------------To learn more about Cyberhoot visit https://cyberhoot.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

The Deep Dive Radio Show and Nick's Nerd News
Secure encryption and online anonymity are now at risk in Switzerland

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Mar 27, 2025 6:22


Secure encryption and online anonymity are now at risk in Switzerland by Nick Espinosa, Chief Security Fanatic

Dark Rhino Security Podcast
S16 E09 Phishing, Encryption, and Cybersecurity Training

Dark Rhino Security Podcast

Play Episode Listen Later Mar 26, 2025 50:07


Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a positive cybersecurity culture. With a background in psychology and extensive experience leading security programs at Chase Paymentech, Vistaprint, and DXC Technology, Craig specializes in incident response, governance, and compliance. A CISSP-certified professional since 2001, he is a recognized thought leader, public speaker, and advocate for making cybersecurity training engaging, fun, and effective. 00:00 Introduction01:16 Our guest08:40 There are two types of companies10:00 We taught them how to Phish12:12 Business Email compromise13:50 Go back to the way your parents ran security16:19 What do I do first?26:12 Changing your passwords is not good for you29:00 Encryption31:30 What to look for in a Password Manager35:17 “Unsubscribe” button mishap46:15 Cyberhoot49:05 Free Training from Cyberhoot-----------------------------------------------------------------To learn more about Cyberhoot visit https://cyberhoot.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

Only in Seattle - Real Estate Unplugged
Denver mayor and staff used encryption app to illegally discuss migrant crisis, then auto-deleted messages.

Only in Seattle - Real Estate Unplugged

Play Episode Listen Later Mar 25, 2025 23:26


Denver Mayor Mike Johnston and 14 of his top advisors, appointees and lawyers nicknamed themselves "Strike Force" and communicated about the city's migrant crisis through an end-to end encryption app, CBS News Colorado has learned. The app, Signal, proceeded to automatically delete their initial conversations.

Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation missing person malware cyberbullying justice system community support defamation true crime podcasts personality disorders blackmail court cases encryption emotional abuse taser risk assessment data protection crime scene emotional resilience media coverage extortion social engineering narcissistic abuse private investigators criminal justice reform personal freedom emergency preparedness trauma recovery background checks healing from trauma situational awareness emergency response cyber threats spyware peeping toms mental resilience revenge porn forensic science criminal charges post traumatic stress legal action restraining orders security policies whistleblowing home security data breaches surveillance state it security federal laws digital literacy mental health resources security cameras security breach forensic psychology psychological warfare doxxing victim blaming criminal defense internet safety threat intelligence personal boundaries pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection digital security public records news coverage ethical hacking crisis hotline legal protection cyberstalking cyber defense digital rights emotional manipulation threat assessment security tips online harassment emotional distress public awareness internet privacy personal security mobile security protective services gps tracking email security online fraud crime scene investigations identity fraud criminal behavior identity protection forensic investigations onlinepredators behavioral analysis victim support local law enforcement emotional recovery privacy settings detective work legal advocacy criminal profiling security awareness training criminal intent aggressive behavior crime reporting protective gear police reports personal rights digital evidence home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing cyber investigations technology safety
Daily Tech News Show
Encryption for all RCS Messages - DTNSB 4976

Daily Tech News Show

Play Episode Listen Later Mar 14, 2025 28:45


Plus the rumors of SXSW Interactive's death are exaggerated, and Gemini gets personal. Starring Tom Merritt and Huyen Tue Dao.Show notes can be found here.

Random but Memorable
Security Audit App Ideas with Jacob DePriest

Random but Memorable

Play Episode Listen Later Mar 11, 2025 56:03


What's it like to work as a CISO at a security company? This week, 1Password's VP of Security and CISO, Jacob DePriest, reveals all. Jacob also shares his advice for building strong security teams with diverse perspectives, backgrounds, and skillsets.

Command Control Power: Apple Tech Support & Business Talk
608: In the Cloud: Troubleshooting Tech and Exploring Backups

Command Control Power: Apple Tech Support & Business Talk

Play Episode Listen Later Mar 11, 2025 48:46


ShrimpShellShineShoe24!   608: In the Cloud: Troubleshooting Tech and Exploring Backups   In this episode of Command Control Power, the team discusses a range of topics from humorous backdrops and personal anecdotes about health to dealing with poor support from vendors and troubleshooting client tech issues. They highlight the importance of routine check-ups, like colonoscopies, share experiences with various backup solutions including Backblaze and Carbon Copy Cloner, and delve into the complexities of using organizational tools like OmniFocus, Monday.com, and Things. The episode wraps up with a cautionary tale about outdated routers affecting internet performance and tips for navigating client inquiries.   00:00 Introduction and Welcome 00:07 Old Man Yells at Cloud 00:39 Dental Implants and Simpsons Humor 01:12 Health PSA: Colonoscopy 02:23 Backup Solutions Discussion 02:51 Carbon Copy Cloner Features 05:06 Backblaze and iCloud Storage 16:11 Encryption and External Drives 19:47 Organizational Tools: OmniFocus and Daylight 23:51 Reflecting on OmniFocus 25:13 Automation and OmniFocus Pro 26:15 Exploring Monday.com 27:19 The Things App and Emojis 28:12 The Importance of Quick Input 28:46 Handling Too Many Tasks 34:35 Dealing with Poor Support 41:17 Client Internet Troubleshooting 45:54 Wrapping Up and Final Thoughts

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 198 - Android Improves Phone Scam Protections, Apple Disables Encryption in UK, Sweden Forces Signal Backdoor, Car Racing

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Mar 10, 2025 53:13


Welcome to this week's episode of the PEBCAK Podcast!  We've got three amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Android adds protection for disabling security while on phone calls https://cybersecuritynews.com/new-android-security-feature-that-blocks/ https://www.androidauthority.com/android-16-phone-call-protections-3526068/  https://awfulannouncing.com/espn/student-mocks-kickers-misses-120k-kick-college-gameday.html  Wasting a scammer's time: https://www.youtube.com/shorts/ceKa7kTOaYw    Apple disables advanced data protection in UK https://apnews.com/article/apple-iphone-encryption-britain-cybersecurity-c5c37e99b3b9161dbed24231fbd94746 https://www.computerworld.com/article/3834928/us-chides-uk-for-seeking-encryption-backdoor.html    Sweden asks Signal to backdoor encryption https://www.techradar.com/computing/cyber-security/we-will-not-walk-back-signal-would-rather-leave-the-uk-and-sweden-than-remove-encryption-protections https://cybernews.com/news/signal-sweden-encryption-backdoor-police/    Car racing https://www.caranddriver.com/honda/civic-si/specs/2008/honda_civic-si_honda-civic-si-sedan_2008   Dad Joke of the Week (DJOW)   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Elisabeth - https://www.linkedin.com/in/elisabeth-sh/

System Update with Glenn Greenwald
UK Pressures Apple to Break Encryption in Major Privacy Clash; How Dems Can Win Back the Working Class: With Former Bernie Sanders Campaign Manager Faiz Shakir

System Update with Glenn Greenwald

Play Episode Listen Later Mar 7, 2025 57:03


Apple and the UK government clash over a backdoor feature that could allow the UK government access to private, encrypted data. Privacy advocate Sean Vitka explains why U.S. Apple users should be concerned about the encryption feature. Plus: former Bernie Sanders campaign manager Faiz Shakir reveals why Democrats have lost their way, and he shares his plan to bring working class Americans back to the party. -------------- Watch full episodes on Rumble, streamed LIVE 7pm ET. Become part of our Locals community Follow Lee Fang Follow System Update:  Twitter Instagram TikTok Facebook LinkedIn Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
Intel's AI Chips Launch, Apple Fights UK Encryption Order, and McDonald's Embraces AI Upgrades

Business of Tech

Play Episode Listen Later Mar 7, 2025 16:05


Intel has made significant strides in the tech industry by launching its next-generation AI chips, the Core Ultra Series 2 processors, designed specifically for commercial artificial intelligence applications. Built on the Arrow Lake architecture, these processors promise a 30% reduction in power usage compared to their predecessors, catering to the growing demand for efficiency in AI workloads. Additionally, a federal judge dismissed a shareholder lawsuit against Intel, which had accused the company of misleading investors about its foundry business. This legal victory alleviates some immediate uncertainties for Intel, although the company still faces ongoing challenges in a competitive market dominated by TSMC and Samsung.Apple is currently embroiled in a legal battle with the UK government over an order that demands access to encrypted iCloud files. The company has appealed to the Investigatory Powers Tribunal, which may hear the case soon. In response to the order, Apple has paused its Advanced Data Protection Service in the UK, raising concerns about user privacy and security. Meanwhile, the Trump administration is planning to revamp a $42.5 billion internet program aimed at connecting rural Americans to high-speed internet, potentially favoring satellite companies like Starlink over traditional fiber-optic networks.In the realm of managed service providers (MSPs) and small to mid-sized businesses (SMBs), several tech upgrades have been announced. GoTo has introduced AI-powered security and translation features for its LogMeIn rescue platform, enhancing customer support capabilities. Adigy has launched Adigy Assist, a tool designed to streamline Mac deployments, while One Password has improved password accessibility based on user location. Additionally, a new Swedish startup, Big Audience Machine, is set to launch an AI-driven content marketing platform tailored for smaller enterprises, allowing them to compete more effectively in the digital landscape.The podcast also discusses a shift in the use of artificial intelligence, with companies increasingly opting for multiple AI models rather than relying on a single solution. This trend reflects a growing understanding of the diverse capabilities required for various tasks. Notably, McDonald's is upgrading its restaurants with AI technology to improve order accuracy and customer experience, while the Xbox Kinect continues to find innovative applications beyond gaming, demonstrating the lasting impact of technology in creative fields. As the market evolves, businesses must adapt to these changes and explore new opportunities for growth and efficiency. Four things to know today 00:00 Intel Scores Legal Win, Launches Next-Gen AI Chips: Is the Tech Giant Finally Getting Back on Track?03:34 Apple vs. the UK, Satellite Broadband Heats Up, and Tariffs Stick Around—Tech Drama You Didn't Know You Needed07:00 From GoTo's Real-Time Translation and Security Enhancements to Reddit's Community Tools—How MSPs and SMBs Can Leverage These New Tech Upgrades10:04 Companies No Longer Trusting ‘One AI to Rule Them All'—Here's Why Shortwave, McDonald's, and Xbox Kinect Matter  Supported by: https://syncromsp.com/  Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Daily Tech Headlines
Apple Is Challenging The UK's iCloud Encryption Backdoor Order – DTH

Daily Tech Headlines

Play Episode Listen Later Mar 6, 2025


Apple is challenging UK's iCloud encryption backdoor order, the U.K. government appears to have quietly removed encryption advice from its web pages, and a US federal judge denies Elon Musk's request to block OpenAI from converting to a for-profit company. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks toContinue reading "Apple Is Challenging The UK's iCloud Encryption Backdoor Order – DTH"

9to5Mac Daily
Folding iPhone rumors, encryption pushback

9to5Mac Daily

Play Episode Listen Later Feb 28, 2025 7:18


Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple's Podcasts app, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Sponsored by ChargeASAP: Check out the Flash Pro Ultra, featuring a new 275W power bank with an OLED screen that can charge up to 6 devices simultaneously, including your MacBook, phone, smartwatch, and more! New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as they're available. Stories discussed in this episode: The biggest problem with a folding iPhone has been solved – report iPhone 17 Pro again rumored to feature 12GB RAM for better AI Director of National Intelligence Tulsi Gabbard suggests UK broke agreement in secretly asking Apple to build iCloud backdoor  Listen & Subscribe: Apple Podcasts Overcast RSS Spotify TuneIn Google Podcasts Subscribe to support Chance directly with 9to5Mac Daily Plus and unlock: Ad-free versions of every episode Bonus content Catch up on 9to5Mac Daily episodes! Don't miss out on our other daily podcasts: Quick Charge 9to5Toys Daily Share your thoughts! Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show.

Security Now (MP3)
SN 1014: FREEDOM Administration Login - Apple's UK Privacy Showdown, $1.5 Billion Crypto Heist

Security Now (MP3)

Play Episode Listen Later Feb 26, 2025 159:37 Transcription Available


Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in OpenSSH. The U.S. seems unable to evict Chinese attackers from its Telecom systems. What are those Chinese "Salt Typhoon" hackers doing to get in? The largest (by far) cryptocurrency heist in history occurred Friday. Ex-NSA head says the U.S. is falling behind on the cyber front lines. We have the winner (and a good one) replacement term for "backdoor". A look at a pathetic access control system that begs to be hacked (and will be). Show Notes - https://www.grc.com/sn/SN-1014-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT uscloud.com canary.tools/twit - use code: TWIT

All TWiT.tv Shows (MP3)
Security Now 1014: FREEDOM Administration Login

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 26, 2025 159:37 Transcription Available


Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in OpenSSH. The U.S. seems unable to evict Chinese attackers from its Telecom systems. What are those Chinese "Salt Typhoon" hackers doing to get in? The largest (by far) cryptocurrency heist in history occurred Friday. Ex-NSA head says the U.S. is falling behind on the cyber front lines. We have the winner (and a good one) replacement term for "backdoor". A look at a pathetic access control system that begs to be hacked (and will be). Show Notes - https://www.grc.com/sn/SN-1014-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT uscloud.com canary.tools/twit - use code: TWIT

Security Now (Video HD)
SN 1014: FREEDOM Administration Login - Apple's UK Privacy Showdown, $1.5 Billion Crypto Heist

Security Now (Video HD)

Play Episode Listen Later Feb 26, 2025 159:37 Transcription Available


Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in OpenSSH. The U.S. seems unable to evict Chinese attackers from its Telecom systems. What are those Chinese "Salt Typhoon" hackers doing to get in? The largest (by far) cryptocurrency heist in history occurred Friday. Ex-NSA head says the U.S. is falling behind on the cyber front lines. We have the winner (and a good one) replacement term for "backdoor". A look at a pathetic access control system that begs to be hacked (and will be). Show Notes - https://www.grc.com/sn/SN-1014-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT uscloud.com canary.tools/twit - use code: TWIT

Daily Tech News Show
Apple Pulls Encryption from the UK - DTNSB 4961

Daily Tech News Show

Play Episode Listen Later Feb 21, 2025 30:02


Bloomberg's Nate Lanxon joins us to talk about how it affects him, plus faster 3D printing and AI is coming to robotsStarring Tom Merritt and Huyen Tue DaoShow Notes can be found here.

9to5Mac Daily
UK encryption, reverse wireless charging

9to5Mac Daily

Play Episode Listen Later Feb 21, 2025 7:55


Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple's Podcasts app, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Sponsored by ChargeASAP: Check out the Flash Pro Ultra, featuring a new 275W power bank with an OLED screen that can charge up to 6 devices simultaneously, including your MacBook, phone, smartwatch, and more! New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as they're available. Stories discussed in this episode: Wireless reverse charging being tested in the iPhone 17 Pro – leaker Apple is removing iCloud end-to-encryption features from the UK after government compelled it to add backdoors British government secretly ordered Apple to create a worldwide iCloud backdoor Here's an inside look at the iPhone 16e's C1 modem and how it works with the A18 chip Testing confirms MagSafe doesn't interfere with Apple's C1 modem in iPhone 16e iPhone 16e benchmark results, RAM, and charging speed revealed Listen & Subscribe: Apple Podcasts Overcast RSS Spotify TuneIn Google Podcasts Subscribe to support Chance directly with 9to5Mac Daily Plus and unlock: Ad-free versions of every episode Bonus content Catch up on 9to5Mac Daily episodes! Don't miss out on our other daily podcasts: Quick Charge 9to5Toys Daily Share your thoughts! Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show.

Security Now (MP3)
SN 1013: Chrome Web Store is a mess - Apple Encryption in the UK, Texas Vs. DeepSeek

Security Now (MP3)

Play Episode Listen Later Feb 19, 2025 151:28


US lawmakers respond to the UK's outrageous demand about Apple's encryption. What, exactly, is a "backdoor", and can a "backdoor" NOT be secret? Highlights from last week's Windows' Patch Tuesday. A look into RansomHub: The latest king of the Ransomware hill. "TOAD": Telephone-Oriented Attack Delivery. The state of Texas -versus- DeepSeek. Disabling Apple's "Restricted Mode". Where did I put that $800 million in Bitcoin? A Sci-Fi author update. And a deep dive into the misoperation of Chrome's critically important Web Extension Store Show Notes - https://www.grc.com/sn/SN-1013-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: veeam.com legatosecurity.com threatlocker.com for Security Now bitwarden.com/twit vanta.com/SECURITYNOW

Daily Tech News Show
UK Orders a Back Door to Apple Encryption - DTNSB 4952

Daily Tech News Show

Play Episode Listen Later Feb 7, 2025 28:01


Huawei sees its fastest growth in four years, the ASUS Zenfone 12 Ultra is here, and cheese gets Google AI in hot water yet again!Starring Tom Merritt and Shannon Morse.Show notes can be found here.