Podcasts about Encryption

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Share on LinkedIn
Copy link to clipboard

Process of converting plaintext to ciphertext

  • 942PODCASTS
  • 2,509EPISODES
  • 50mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 7, 2022LATEST
Encryption

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about Encryption

Show all podcasts related to encryption

Latest podcast episodes about Encryption

Q & A Presents: Maui Online! – Hawaii's Only Computer Talk Show!
Danno returns! Let’s talk about that! (7/23/22 Part 1)

Q & A Presents: Maui Online! – Hawaii's Only Computer Talk Show!

Play Episode Listen Later Aug 7, 2022 54:45


We have a special guest, Danno! Dan Visits about VPNs You might remember him as our security and privacy guy. Well he's back! We'll be talking about VPNs, Encryption, and Quantum computing!

Q & A Presents: Maui Online! – Hawaii's Only Computer Talk Show!

Our security and privacy guy is back! More with Dan! We've been talking about VPNs, Encryption, and Quantum computing!

TechStuff
Tech News: Virtual Real Estate Values Plummet in the Metaverse

TechStuff

Play Episode Listen Later Aug 4, 2022 26:41 Very Popular


Late last year, speculation around the metaverse fed into a crazy market for virtual real estate. Six months later, values have dropped 80%. What happened? Plus an update on Apple's battle with Ericsson and how some researchers were able to defeat a next-generation encryption strategy. See omnystudio.com/listener for privacy information.

ISACA Podcast
Managing Security Across Disparate Database Technologies

ISACA Podcast

Play Episode Listen Later Aug 4, 2022 31:30


We usually think about the most efficient way to do things while working in production environments. Still, often employees forget about an insecure environment once the work has been completed and they have moved on to another project. “We don't always need to audit things; sometimes you can gauge risk by having a conversation with stakeholders…on how they manage databases,” says Adam Kohnke, Cybersecurity Architect for Charter Next Generation. Adam joins ISACA's Jon Brandt in this episode to discuss his recently released ISACA Journal article, “Managing Security Across Disparate Database Technologies.” Adam breaks down best practices for User Access Management, Encryption, and Logging. He comments on the best ways to start the conversation about security beyond what management considers vital for IT. Tune in now for the full episode! To read the full article, visit www.isaca.org/managing-security-across-disparate-database-technologies. To listen to more ISACA podcasts, visit: www.isaca.org/podcasts 

Hack Naked News (Audio)
SWN #228 - Encryption, Microsoft, Lockbit 3.0, Twitter keys, Outlook News & Russ Beauchemin

Hack Naked News (Audio)

Play Episode Listen Later Aug 3, 2022 28:19


This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/swn228

TerraSpaces
Encryption and Mining with Docushield and Full Spend Yacht Club

TerraSpaces

Play Episode Listen Later Aug 3, 2022 92:39


Today on the Ether we have a space all about encryption and mining with the Full Spend Yacht Club and Docushield. Recorded on August 3rd 2022. If you enjoy the music at the end of the episodes, you can find the albums streaming on Spotify, and the rest of your favorite streaming platforms. Check out Project Survival, Virus Diaries, and Plan B wherever you get your music. Thank you to everyone in the community who supports TerraSpaces.

Paul's Security Weekly
SWN #228 - Encryption, Microsoft, Lockbit 3.0, Twitter keys, Outlook News & Russ Beauchemin

Paul's Security Weekly

Play Episode Listen Later Aug 3, 2022 28:19


This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/swn228

Hack Naked News (Video)
Encryption, Microsoft, Lockbit 3.0, Twitter keys, Outlook News & Russ Beauchemin - SWN #228

Hack Naked News (Video)

Play Episode Listen Later Aug 2, 2022 28:22


This week Dr. Doug talks: Tears in the Rain, Encryption, Microsoft, LockBit 3.0, Twitter keys, Outlook crashes, 911, and Russ Beauchemin on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn228

.NET in pillole
Lettura estiva: De/cifrare di Mark Frary

.NET in pillole

Play Episode Listen Later Aug 1, 2022 8:33


Oggi vi voglio consigliare un bel libro, "De/cifrare. Come funzionano i più grandi codici della storia, dal cifrario di Cesare alla password del wi-fi".Usciamo dai soliti binari del podcast, e vi consiglio una lettura che mi è davvero piaciuta.https://www.amazon.it/cifrare-funzionano-grandi-cifrario-password/dp/885802298X/

Data Privacy Detective - how data is regulated, managed, protected, collected, mined, stolen, defended and transcended.

Cryptography comes from the ancient Greek word “cryptos,” meaning “hidden” or “secret.” Encryption is a cybersecurity pillar, a key defense against invasion of our privacy. But it may be underappreciated in practice. Tune in to learn about the growing need for encryption technology to combat the rising tide of cyber-attacks. A recent report by the Port of Los Angeles to the FBI indicated that it suffers from over one million cyber-attacks per day. Dan Draper, CEO and Founder of CipherStash, explains from his home in Sydney, Australia the role of cryptography in protecting sensitive personal and other information. Dan's company provides a data storage platform for sensitive data that uses searchable encryption technology to protect against attacks. Dan discusses how encryption protects personal data and how traditional databases are vulnerable to hacking and other risks. Learn why cryptography is becoming increasingly crucial in guarding data privacy and why Dan is optimistic about the use of encryption even as the age of quantum computing dawns. If you have ideas for more interviews or stories, please email info@thedataprivacydetective.com.

Comsteria Podcast
England win Euro 2022, Snapchat helps unsigned musicians, WhatsApp won't budge on encryption.

Comsteria Podcast

Play Episode Listen Later Jul 31, 2022 1:26


England's European Championship winning footballers are the toast of social media right now after their nail biting extra time 2-1 win over Germany.   Hashtags including ‘itscomehome' and ‘womensfootball' have been trending across Twitter and Instagram alongside of course #lionesses.   Video clips going viral include the players gatecrashing manager Sarina Weigman's post match press conference and the winning goal from Chloe Kelly.   If you're interested in finding out more about women's football on social media, the Lionesses have their own @lionesses Twitter and Instagram accounts and the women's super league is @barclaysWSL.   In Scotland you can visit scotwomensfootball.com for an overviews of all levels of the game and you'll find the top flight clubs in the SWPL where the new season kicks off this coming Sunday.   In other digital news today Snapchat has launched a new fund to encourage unsigned musicians to share their music on the platform.   And WhatsApp is attracting controversy for its stance regarding encryption.   The boss of the service says it would never bow to government pressure to weaken security - which could have made it easier for authorities to tackle the spread of illegal images through direct messages.   The discussions are part of the debate around the UK government's Online Safety Bill which has now been delayed until the autumn.

StarTalk Radio
Cosmic Queries – Quantum Catastrophe with Brian Cox

StarTalk Radio

Play Episode Listen Later Jul 26, 2022 49:26 Very Popular


What is the black hole information paradox? On this episode, Neil deGrasse Tyson and comic co-host Chuck Nice explore the Higgs Boson, quantum entanglement, and black holes with particle physicist Brian Cox. NOTE: StarTalk+ Patrons can watch or listen to this entire episode commercial-free here: https://startalkmedia.com/show/cosmic-queries-quantum-catastrophe-with-brian-cox/Thanks to our Patrons Detlef Van de Wal, Devon Gogel, Jay Salmon, Jacek Kono, Jordan Hume, Brynjar, M J, and Yoni Liberman for supporting us this week.Photo Credit: XMM-Newton, ESA, NASA, Public domain, via Wikimedia Commons

Work Life Balance Podcast: Business | Productivity | Results
6 Cybersecurity Tips to Protect Your Business

Work Life Balance Podcast: Business | Productivity | Results

Play Episode Listen Later Jul 21, 2022 10:57


Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ Want more from me? Subscribe to my business success tips and resources blog by going to www.acountabilitycoach.com/blog. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. Take advantage of all the complimentary business tips and tools by joining the Free Silver Membership on https://www.accountabilitycoach.com/coaching-store/inner-circle-store/. If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.

The Business Accelerator: Accountability | Productivity
6 Cybersecurity Tips to Protect Your Business

The Business Accelerator: Accountability | Productivity

Play Episode Listen Later Jul 21, 2022 10:57


Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.

The Accountability Coach: Business Acceleration|Productivity
6 Cybersecurity Tips to Protect Your Business

The Accountability Coach: Business Acceleration|Productivity

Play Episode Listen Later Jul 21, 2022 10:57


Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.

Goal Setting & Achievement Podcast: Business|Productivity
6 Cybersecurity Tips to Protect Your Business

Goal Setting & Achievement Podcast: Business|Productivity

Play Episode Listen Later Jul 21, 2022 10:57


Making sure your business has systems in place to withstand cyberattacks is one of the most important actions you need to do. As a business owner, you have an obligation to protect your company's sensitive information, as well as your clients' information. The Equifax data breach of 2017 exposed the personal data of millions of people. As a result, Equifax had to pay $700 million in settlement fees. This is just one of many unfortunate examples. Smaller businesses may be even easier targets, which is why it's very important to have a solid cybersecurity strategy in place. If you're not sure where to start, let's review 6 tips to help you increase your company's cybersecurity to protect your business. 1. Use Secure Passwords and Multi-factor Authentication Not only should you have a strong password to sign into the various platforms and software that your business uses, it's also good practice to change those passwords regularly and use multi-factor authentication. Longer passwords are better—at least 8 characters, with a mix of uppercase and lowercase letters, numbers, and symbols. Passwords can be hacked with automated software that tries every possible combination, so the longer your password is, the more combinations it has to try. Multi-factor authentication is when you need a password and an additional step. It's also called two-step verification. This reduces the likelihood of a successful attack because there is additional information needed. Typically, this is a code sent to the user's cell phone, or a code generated by a two-factor authentication (2FA) app such as Authy. You can use a password manager to manage the various passwords for your accounts, so you're not reusing the same one, or having to try and remember all the passwords you have for all your accounts. If one account gets hacked, then any other account using the same password can also more easily get hacked. And whatever you do, avoid using the word “password” as your password at all costs. There are many password manger options. Some are: • Dashlane • LastPass • LogMeOnce • Keeper • NordPass • Bitwarden • RememBear • 1Password • PasswordBoss • Enpass • RoboForm • ZohoVault • TrueKey 2. Secure Your Wi-Fi Network Make sure your Wi-Fi is secure and hidden. While your router typically comes with a pre-set password, make sure to change it immediately to something more secure. Additionally, if you offer free Wi-Fi to your guests, create a separate guest network with a different password, so they don't have access to your company's network. You're ultimately responsible for what people do on your network. By securing your guest network with a password, you can control who has access to it and make sure you're not opening up your business to considerable risks. Also check that encryption is enabled on your router. Encryption provides data security for sensitive information, and enabling it scrambles plain text that's sent or stored on the web into unreadable, or “cipher text.” Once it's sent to the end user, the text is unscrambled, or decrypted. If you're out of the office or in a public area, avoid using the free Wi-Fi network. As tempting as it may be to check your email at the airport, there are a lot of potential risks that come with a free public network, such as opening yourself up to hackers. Look for a network that's secured with a strong password, and if you can't find one and absolutely need to hop online, use your phone as a temporarily private hotspot. 3. Backup Your Data Regularly If your system gets hacked, not only will others gain access to sensitive information, but you may lose access to your own data. Backing up your data regularly to the cloud will still give you access to it if anything happens. Ransomware attacks happen by locking you out of your data and preventing access until you pay a ransom fee. If you have a recent copy of your data, you don't need to worry about getting that information back. How often you backup your data depends on your business and how much information you're storing. At the very least, you should back it up after any important task has been completed. Some backup service options are: • https://www.carbonite.com/en/ • https://mozy.com/ • www.mypcbackup.com • www.justcloud.com • www.backupgenie.com • www.zipcloud.com • www5.ibackup.com • www.crashplan.com • www.sosonlinebackup.com • https://www.idrive.com/index.html 4. Create Separate User Accounts for Each Team Member As much as you'd love to retain your team members for as long as possible, the time will sometimes come for them to move on. Hopefully that's on good terms, but in case it's not, it's always safer to make sure you can easily delete their individual user accounts. Having separate user accounts also helps keep track of version history, or who makes changes to what. If anything ever happens to your files or data, you'll be able to track who the last person to make the changes was so you can restore the files. Make sure that when your employees are setting up their user accounts, they understand how to set up a strong password. 5. Encrypt Any Data Sent Via Email Cybersecurity training should be part of any new employee onboarding. This includes training employees on the types of data to send or not to send through email. Any sensitive information, such as login information and passwords, credit card information, or social security information, should never be sent through email. Tools such as Enigmail are useful security tools to encrypt your email. Never email any confidential information to anyone via email. Passwords can be sent through software such as LastPass. The same way you wouldn't want to send sensitive information on a postcard for everyone to see, you should be cautious about what you send through email in case you get hacked. 6. Implement Anti-Virus Software and Firewalls Anti-virus software and firewalls block malicious software from getting into and infecting your computer. They guard your system from any suspicious activity or users trying to make contact with it. It's like a security guard, making sure only the people on your approved list are let in. VPNs mask your identity on the internet and protect your location and online activities. A VPN is like a middleman—when you go to a site, the site sees the VPN's IP address, not your own personal IP address. You get what you pay for, so it's a good idea to pay for a VPN service instead of going with a free one. A decent VPN can cost you between $5-$12 per month, which is a small price to pay for added security. Anti-virus software can protect your computer from things like spyware, adware, or trojan horses. Firewalls, on the other hand, protect your network from suspicious traffic. Together, you have the best chance of fighting cyberattacks from various angles. A few anti-virus software options are: • McAfee • Norton • Total AV • Surfshark • Kaspersky • Bitdefender • AURA • Panda • Avira If you don't already have a cybersecurity strategy in place, now's the time to implement one. Take a look at the systems you have and get a sense of what needs to be done to protect them from all angles, whether that's using two-factor authentication, backing up your data regularly, using a VPN, implementing anti-virus software, or encrypting any sensitive information sent over email. It's your job as a business owner to protect your company and its assets from cyberattacks. Putting in the work now and having the proper tools to build resilience to threats will definitely pay off. For more help with growing your business and accelerating your results, reach out to me today and schedule your complimentary consultation. Aim for what you want each and every day! Anne Bachrach The Accountability Coach™ The Results Accelerator™ To help you stay focused and on track to achieving your goals, check out these other high-value resources. Subscribe to my high-value business success tips and resources Blog https://www.accountabilitycoach.com/blog/) - Subscribe to my YouTube channel with business success principles (https://www.youtube.com/annebachrach) - Connect with me on Facebook (https://www.facebook.com/TheAccountabilityCoach) - Connect with me on Linked-in (https://www.linkedin.com/in/annebachrach) - Connect with me on Pinterest (https://pinterest.com/resultsrule/) - Connect with me on Instagram (https://www.instagram.com/annebachrach/) If you are getting value from any of Podcasts, please take a minute to leave me a short rating and review. I would really appreciate it, and love to hear from you. Go to https://www.accountabilitycoach.com to check out for yourself how I, as your Accountability Coach™, can help you get and stay focused on you highest payoff activities that put you in the highest probability position to achieve your professional and personal goals, so you can enjoy the kind of business and life you truly want and deserve. Get your daily Accountability Minute shot of a single, simple, doable idea, so you can start your day off on the "right foot". You can find The Accountability Minute on https://www.accountabilitycoach.com/my-podcast/ as well as on most podcast platforms and in most English-speaking countries. As an experienced accountability coach and author of 5 books, I help business professionals make more money, work less, and enjoy even better work life balance. Check out my proven business accelerator resources by going to https://www.accountabilitycoach.com/coaching-store/. Author of Excuses Don't Count; Results Rule, Live Life with No Regrets, No Excuses, and the Work Life Balance Emergency Kit, The Roadmap To Success with Stephen Covey and Ken Blanchard, and more.

Federal Drive with Tom Temin
What's in the new NIST guidance for encryption, and therefore cybersecurity, in the quantum era

Federal Drive with Tom Temin

Play Episode Listen Later Jul 15, 2022 17:28


One of the biggest concerns among cybersecurity people is the advent of quantum computers. The theory is, quantum will be so powerful it will easily crack encryption algorithms conventional computers would take thousands of years to crack. Now, the National Institute of Standards and Technology has issued four cryptographic algorithms researchers believe are quantum resistant. Joining the Federal Drive with details, NIST mathematician Dustin Moody.

Nothing About You Says Computer Technology
98. The Internet Runs on Encryption with Dan Draper

Nothing About You Says Computer Technology

Play Episode Listen Later Jul 14, 2022 39:30


Today we have an amazing episode.  I interviewed Dan Draper the CEO and Founder of Cipherstash, a cybersecurity startup and Executive Producer of the documentary Debugging Diversity.   We chat about his journey in cybersecurity, his work Cipherstash and the importance of encryption, the documentary series Debugging Diversity, and diversity in cybersecurity.  You can visit the show's website at nothingaboutyou.com

CSO Perspectives (public)
Enterprise encryption around the Hash Table.

CSO Perspectives (public)

Play Episode Listen Later Jul 11, 2022 22:48


Enterprise encryption is a cybersecurity first principle strategy. Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion. With Rick Howard, the Cyberwire's CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy. Cybersecurity professional development and continued education. You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion. CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more encryption and cybersecurity first principles resources, check the topic essay.

Komando On Demand
Netflix ads, creepiest tech, encryption 101

Komando On Demand

Play Episode Listen Later Jul 6, 2022 42:47 Very Popular


Not sure what encryption is? Here's a quick explanation, plus how to tell if your texts are encrypted. In this episode, you'll get the scoop on new Netflix ads, the creepiest tech to watch out for and how to hide your phone number when making a call. Learn more about your ad choices. Visit megaphone.fm/adchoices

Other Life
Zero-Knowledge Crypto-Anarchy with Rachel-Rose O'Leary from DarkFi

Other Life

Play Episode Listen Later Jul 6, 2022 76:58


Rachel-Rose O'Leary was an artist before getting into crypto through Nick Land and Julian Assange. She's now a programmer working with Amir Taaki to build a crypto-anarchist DeFi ecosystem called DarkFi.✦ DarkFi✦ Rachel-Rose on TwitterOther Life✦ Subscribe to the coolest newsletter in the world OtherLife.co✦ Get a free Urbit planet at imperceptible.computer✦ We're building a new country at imperceptible.countryIndieThinkers.org✦ If you're working on independent intellectual work, join the next cohort of IndieThinkers.org

The CyberHub Podcast
Ransomware Update, Quantum Resistant Encryption, China leak & TikTok

The CyberHub Podcast

Play Episode Listen Later Jul 6, 2022 10:13


Ransomware Update, Quantum Resistant Encryption, China leak & TikTok Cybersecurity News CyberHub Podcast July 6th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method New RedAlert Ransomware targets Windows, Linux VMware ESXi servers NIST selects first group of quantum-resistant encryption tools Human Error Blamed for Leak of 1 Billion Records of Chinese Citizens US Senators Call for Close Look at TikTok Story Links: https://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.html https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/ https://therecord.media/nist-selects-first-group-of-quantum-resistant-encryption-tools/ https://threatpost.com/hbillion-records/180125/ https://www.securityweek.com/us-senators-call-close-look-tiktok “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: Your BRAND here - Contact us for opportunities today! ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 s Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity

CSO Perspectives (public)
Enterprise encryption and cybersecurity first principles.

CSO Perspectives (public)

Play Episode Listen Later Jul 4, 2022 22:46


Enterprise encryption is a cybersecurity first principle strategy. Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. Cybersecurity professional development and continued education. You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion. CyberWire is the world's most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more encryption and cybersecurity first principles resources, check the topic essay.

Security Now (Video HD)
SN 877: The "Hertzbleed" Attack - 3rd Party FIDO2, Log4Shell, '311" Proposal

Security Now (Video HD)

Play Episode Listen Later Jun 28, 2022 Very Popular


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

Security Now (MP3)
SN 877: The "Hertzbleed" Attack - 3rd Party FIDO2, Log4Shell, '311" Proposal

Security Now (MP3)

Play Episode Listen Later Jun 28, 2022 Very Popular


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

Total Jason (Audio)
Security Now 877: The "Hertzbleed" Attack

Total Jason (Audio)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

Total Jason (Video)
Security Now 877: The "Hertzbleed" Attack

Total Jason (Video)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

Security Now (Video HI)
SN 877: The "Hertzbleed" Attack - 3rd Party FIDO2, Log4Shell, '311" Proposal

Security Now (Video HI)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

All TWiT.tv Shows (MP3)
Security Now 877: The "Hertzbleed" Attack

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

Security Now (Video LO)
SN 877: The "Hertzbleed" Attack - 3rd Party FIDO2, Log4Shell, '311" Proposal

Security Now (Video LO)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

All TWiT.tv Shows (Video LO)
Security Now 877: The "Hertzbleed" Attack

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jun 28, 2022


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing The Loop The "Hertzbleed" Attack We invite you to read our show notes at https://www.grc.com/sn/SN-877-Notes.pdf Hosts: Steve Gibson and Jason Howell Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: drata.com/twit barracuda.com/securitynow Melissa.com/twit

The CyberWire
Notes from the cyber phases of the hybrid war against Ukraine. Conti retires its brand, and LockBit 2.0 is now tops in ransomware. Extortion skips the encryption. Cyber exercise in the financial sector.

The CyberWire

Play Episode Listen Later Jun 27, 2022 25:15 Very Popular


Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/122 Selected reading. Russia's Killnet hacker group says it attacked Lithuania (Reuters) The hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media)  5 years after NotPetya: Lessons learned (CSO Online)  The cyber security impact of Operation Russia by Anonymous (ComputerWeekly) Conti ransomware finally shuts down data leak, negotiation sites (BleepingComputer) The Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB) Fake copyright infringement emails install LockBit ransomware (BleepingComputer) NCC Group Monthly Threat Pulse – May 2022 (NCC Group) We're now truly in the era of ransomware as pure extortion without the encryption (Register) Wall Street Banks Quietly Test Cyber Defenses at Treasury's Direction (Bloomberg)

Open Source Security Podcast
Episode 329 - Signing (What is it good for)

Open Source Security Podcast

Play Episode Listen Later Jun 27, 2022 30:54


Josh and Kurt talk about what the actual purpose of signing artifacts is. This is one of those spaces where the chain of custody for signing content is a lot more complicated than it sometimes seems to be. Is delivering software over https just as good as using a detached signature? How did we end up here, what do we think the future looks like? This episode will have something for everyone to complain about! Show Notes Twitter thread Kurt's security advisory page Bug 998

Consumer Tech Update
Encryption 101

Consumer Tech Update

Play Episode Listen Later Jun 24, 2022 1:16


Not sure what encryption is? Here's all you need to know, in 60 seconds. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
June 23, 2022

Cyber Security Headlines

Play Episode Listen Later Jun 23, 2022 6:57 Very Popular


Daycare apps found insecure Encryption flaws found in Mega Microsoft retires cloud facial recognition Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, discusses what challenges CISOs are facing in today's ever-changing climate: • Increasing security • Decreasing risk • Lowering cost Learn more at www.optiv.com/IAM-Microsoft.

Bitcoin, Blockchain, and the Technologies of Our Future
PRIVATE Alternatives to Google Docs!

Bitcoin, Blockchain, and the Technologies of Our Future

Play Episode Listen Later Jun 22, 2022 12:53


Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

The Deep Dive Radio Show and Nick's Nerd News
The NSA pinky swears there is "No Backdoor" in their new encryption!

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Jun 17, 2022 10:47


The NSA pinky swears there is "No Backdoor" in their new encryption! by Nick Espinosa, Chief Security Fanatic

Ask Noah Show
Episode 290: Technology Complexity and The Solution

Ask Noah Show

Play Episode Listen Later Jun 15, 2022 52:26


SELF 2022 is a wrap! It was a blast and now the countdown begins for SELF 2023. Has technology become so complicated that it's not approachable for many people or is there a solution? The best PDF editor for Linux, a self hosted, secure, private, cloud camera system. K9 mail becomes Thunderbird for Android, Element call enters beta 2, and KDE 5.25 is out! -- During The Show -- 01:50 Jeremy H SOGO (https://www.sogo.nu/) 03:08 Keith S * Linux BackBlaze Client? Local Encryption GPG VeraCrypt (https://www.veracrypt.fr/en/Home.html) encfs (https://en.wikipedia.org/wiki/EncFS) and cryfs (https://www.cryfs.org/) TarSnap (https://www.tarsnap.com/) Spider Oak (https://spideroak.com/) Encryption gets weaker over time 10:06 Zac Signing PDFs? Okular (https://okular.kde.org/) PDF Studio (https://www.qoppa.com/pdfstudio/) Pick of the Week E2E Cloud Surveillance system using Raspberry Pis and Matrix Backend (https://github.com/Open-Source-Videos/Matrix-surveillance-camera-controller) Front End (https://github.com/Open-Source-Videos/Matrix-surveillant-camera-security-web) Prototype 16:56 Gadget of the Week ZimaBoard (https://www.zimaboard.com/) $119 USD 6W Power OpenWrt and PFSense/OPNSense Netgate SG1100 Designed to be used as a personal server Preinstalled with Casa OS PFSense Install Guide (https://www.martinrowan.co.uk/2022/05/installing-pfsense-2-6-on-zimaboard/) 20:00 Gov Buys Your Data EFF (https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data) Apps and Data Brokers Follow the money 3rd Party Doctrine Companies are secretive about data collection and sale Many apps are 'required' today Venntel, subsidiary of Gravy Analytics 30:40 K9 Mail to Become Thunderbird for Android Thunderbird (https://blog.thunderbird.net/2022/06/revealed-thunderbird-on-android-plans-k9/) ArsTechnica (https://arstechnica.com/gadgets/2022/06/email-client-k-9-mail-will-become-thunderbird-for-android/) Had to be Open Source Have Power User features Respect the user Blue Mail (https://bluemail.me/) Contribute Here (https://mzla.link/k9-give) 34:00 Element Call Beta 2 Matrix Blog (https://matrix.org/blog/posts) Everything is now E2E Experimental Spatial Audio Rendering Walkie-Talkie Mode (PTT) 37:00 Mozilla Enables Firefox Total Cookie Protection by Default 9 to 5 Linux (https://9to5linux.com/mozilla-enables-firefoxs-total-cookie-protection-privacy-feature-by-default-on-desktop) Firefox is leaving Chrome and Edge in the dust! 39:00 KDE Plasma 5.25 is Out! [KDE Plasma Blog]https://kde.org/announcements/plasma/5/5.25.0/ New "Floating Mode" for panels (Dock) Tablet Mode Improved input KDE Neon (https://neon.kde.org/) 43:00 2022 SELF Wrap Up Huge Thank You to the entire team People come on their own time and dime Family Friendly went well, more next year Diverse level of skill sets Where Technology is headed -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/290) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)

Linux Action News
Linux Action News 244

Linux Action News

Play Episode Listen Later Jun 9, 2022 14:53


SUSE Enterprise is already switching to the new NVIDIA open kernel driver, a Matrix-powered Walkie-Talkie, and the details on Apple's Rosetta for Linux.

Federal Drive with Tom Temin
If you thought encryption was complicated now, wait 'til quantum computing

Federal Drive with Tom Temin

Play Episode Listen Later Jun 7, 2022 20:17


The big fear in the data encryption community is the advent of quantum computing. Computers so powerful they can crack any algorithm. The National Institute of Standards and Technology is in the midst of choosing among algorithms those its experts deem most resistant to quantum, as it develops post-quantum cryptography standards. Here with some pointers for federal IT security practitioners who want to better understand this technology, Federal News Network's Tom Temin spoke with the head of quantum cybersecurity at a company called Quantinuum, Duncan Jones.

Digging Deeper with Brian Hale
#565 - A New Era at Scotts Bluff County Scanner

Digging Deeper with Brian Hale

Play Episode Listen Later May 29, 2022 7:03


As many of our readers and listeners already know, the Scotts Bluff County Scanner has been broadcasting over the internet since 2009 and has gone through lots of changes over the years.Scanner enthusiasts, and law enforcement officials both know that eventually the publicly available scanner signal could, and likely will, go encrypted. This means that the general public would simply not be able to get the signal. Only official media outlets will have access to it and they are not allowed to re-transmit it during the live event. There are varying laws as to how much they can use from an archived event in their reporting after the fact.So, someday you will not be able to listen to the Scotts Bluff County Scanner.HOWEVER, that day is not here yet and has not been voted on at the County level.– per scotts bluff county commissionersThe expense to change to all encrypted is enormous, and Scotts Bluff County ALREADY has ENCRYPTED channels installed for both SWAT and WING. The police officers also use their cell phones on many occasions when they don't want something broadcast over the scanner. IF the County would decide to move forward on a proposal of this nature, we predict there would be a large uprising against this huge, seemingly unnecessary expenditure, especially if we already employ encryption and other secure communications techniques.That's GOOD NEWS for those who follow the scanner for various reasons. Many of us believe it should remain classified as public information and encryption should only happen when the officers deem it necessary. We trust their judgement on that call, but the public information should remain public, inasmuch as it does not AID a criminal in the COMMISSION of a CRIME.It should also go without saying too many times, “PLEASE STAY AWAY FROM ANY SCENE WHENEVER POSSIBLE” and “PLEASE YIELD TO ALL EMERGENCY PERSONNEL”.Although the “Scotts Bluff County Scanner” volunteer group is NOT associated with the county or any government agency, we have always had a good working relationship with the county. We have informed them of our full cooperation on the reporting of individuals that are found to be obstructing the scene of any crime, accident or otherwise.If anyone is cited for obstruction, or any other charge related to getting in the way of our dedicated officers, firemen and volunteers, they will earn for themselves a lifetime ban from our facebook page, twitter feed, instagram feed, website and all other @sbcoscanner properties.Now, we titled this article a new era because we have alot going on behind the scenes for you. In case you missed it, we do have a small but growing scanner gear merchandise store where you can purchase T-shirts, Coffee Mugs and Totes. We'll be adding Hats, Hoodies, Tumblers and other cool items in the near future.We are also working hard on a business plan to increase our team and improve our service to the community. For instance, not only do we have a full website for the scanner, but it includes a SPONSORS section that will soon be filling up. That means YOUR BUSINESS could advertise on this fastest growing news service in the valley – The Scotts Bluff County Scanner!If you would like to volunteer to contribute local news to us, please let us know by sending an email through our parent company to Brian Hale, Business Manager at brian@halemultimedia.com directly.Look for more improvements and changes and thank you for following, sharing and listening to the Scotts Bluff County Scanner!

TechStuff
The Illegal Number

TechStuff

Play Episode Listen Later May 24, 2022 34:12 Very Popular


Listener The Gregolas asked if I might explain The Illegal Number. What makes a number illegal? Can numbers actually be illegal? Isn't that absurd? YES! See omnystudio.com/listener for privacy information.

Paul's Security Weekly TV
Evil Encryption, CyberSec Funding, Market Downturns, & Crypto Muggings - ESW #274

Paul's Security Weekly TV

Play Episode Listen Later May 21, 2022 39:35


In the Enterprise Security News: The latest cybersecurity fundraising, We discuss the impact of the market downturn on the cybersecurity startup industry, Crypto muggings, Security researchers researching researchers simulating attackers, & Evil Encryption!    Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw274

Privacy is the New Celebrity
Cory Doctorow on the Fight to Legalize Encryption, Anti-Trust Law, and Holding Power to Account - Ep 25

Privacy is the New Celebrity

Play Episode Listen Later May 19, 2022 43:59


In this episode Josh interviews Cory Doctorow, science fiction author, activist and journalist. Cory has written dozens of books including the bestselling Little Brother and the critically acclaimed How To Destroy Surveillance Capitalism. Josh and Cory have a wide-ranging conversation diving into everything from anti-trust law to secure hardware in computing to Cory's years-long activism fighting for transparency and accountability in tech. Cory also shares what it was like working at the Electronic Frontier Foundation during the thick of the battle to legalize encryption, a technology that many of us now take for granted.

Cybercrime Magazine Podcast
Quantum Computing. Stronger, Simpler Encryption. David Williams, CEO at ARQIT.

Cybercrime Magazine Podcast

Play Episode Listen Later May 19, 2022 10:15


David Williams is the Founder, Chairman, and CEO at Arqit. In this episode, David joins host Steve Morgan to discuss why Arqit was started, what the company offers, who benefits most from their technology, and more. Arqit supplies a unique quantum encryption Platform-as-a-Service which makes the communications links of any networked device secure against current and future forms of attack – even from a quantum computer. Arqit's product, QuantumCloud™, enables any device to download a lightweight software agent of less than 200 lines of code, which can create encryption keys in partnership with any other device. The keys are computationally secure, one-time use and zero trust. QuantumCloud™ can create limitless volumes of keys in limitless group sizes and can regulate the secure entrance and exit of a device in a group. The addressable market for QuantumCloud™ is every connected device. To learn more about our sponsor, visit https://arqit.uk/

Linux Action News
Linux Action News 239

Linux Action News

Play Episode Listen Later May 6, 2022 16:06


New firmware superpowers are coming to a future Linux kernel, why Google is working on encrypted hibernation support, and a sneak peek at SteamOS 3.

Command Line Heroes
Ruthless Ransomers

Command Line Heroes

Play Episode Listen Later May 3, 2022 22:09 Very Popular


It's a strange situation when someone can hold something hostage from halfway around the world. It's tragic when your own pictures and files are remotely encrypted. But when it's a hospital's system? Ransomware becomes a problem about life or death. Eddy Willems recounts his involvement in defeating an early ransomware attack that targeted AIDS researchers. At the time, there was a way to discover the encryption key. But as Moti Yung warned, asymmetric encryption would change everything. In the years since, ransomware attacks have become much more popular—thanks in part to the rise of cryptocurrencies. While criminals think it's an anonymous way to collect payment, Sheila Warren tells us that the opposite is actually true.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.