Two-step verification app
POPULARITY
With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today's guest is Christiaan Brand. Christiaan is the co-founder of Entersekt, a financial services security firm and a key player at Google in their security and identity teams. A respected voice in cybersecurity, Christian co-chairs the FIDO2 technical working group focusing on standardizing robust online security protocols in advancing the use of passkeys. He has been at the forefront of the shift toward more secure, password-free systems. We'll hear his insights on the challenges and opportunities of implementing passkeys to create safer online environments for users and organizations. Show Notes: [00:52] - Christiaan is part of the security team for Google accounts. He's been with Google for 9 years. Prior to that he had a startup. [01:30] - He joined the FIDO Alliance around the same time Google joined in 2013. When he joined Google, he was able to continue with the same type of work. [02:35] - Each of the big tech companies represents a portion of the market when it comes to how we interact with the web and apps. [04:06] - He became interested in security when he started thinking about what could go wrong with new technology solutions. He wanted users to be able to access their financial information in a safe and secure way. [05:06] - 2FA began gaining traction with Google in 2011. It coincided with the launch of Google Authenticator. 2FA was also used by a gaming company. [07:54] - Usability is important, that's why having an app that displays the codes was one of the first forays into making the technology more accessible. [08:34] - Passkeys allow us to move beyond passwords, leaving the extra hassle of traditional multi-factor authentication behind. [11:05] - Key fobs were one of the earlier ways to try and bring usability to security. Now the technology is being moved to smartphones. [12:33] - Passkeys are a replacement for a password manager. [13:35] - Passkeys are extremely long and asymmetric in nature. You and the site you're going to both have the passkey. [14:27] - The service will have the public part of the passkey, and you'll have the private part. Even if the public part leaks out, your passkey will still be secure. Passkeys can never be revealed to phishing sites. [15:47] - FIDO brings the second authentication step in. The service also has to identify themselves. [20:04] - Password managers try to balance security and convenience. Logging in or accessing a passkey is a unique challenge for providers. [22:20] - Phone numbers are a way to get users back into their accounts. [25:19] - Single device users have extra challenges. [26:08] - There are pros and cons to external sources of identity. [29:44] - The FIDO website has many certified solutions. [33:21] - To get passkeys into daily users' lives, we need to start using them on daily applications where we log in frequently. [35:49] - Hopefully this passkey solution will stand the test of time. [37:34] - Attacks are beginning to shift to session hijacking. [38:24] - DBSC or device-based session credentials is a new standard parallel to FIDO. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Entersekt Christiaan Brand on LinkedIn Christiaan Brand on Twitter Christiaan Brand on Facebook FIDO2 Technical Working Group Learn More About Passkeys Passkeys.Dev FIDO Alliance Passkeys
Dr. Daniel Daniel is the crypto trainer that investors new to crypto deserve. ================ All Episodes can be found at www.thecryptopodcast.org All about Roy / Brain Gym & Virtual Assistants at https://roycoughlan.com/ ------------------ About my Guest Dr. Daniel Daniel : Dr. Daniel Daniel is the crypto trainer that investors new to crypto deserve. With a keen focus on breaking down the barriers to entry, Dr. Daniel is committed to demystifying crypto investing and streamlining new investors to safely and lucratively invest in crypto after just 7 days. Drawing on his extensive experience in teaching, training and a deep understanding of cryptocurrency investment, Dr. Daniel has developed "The Bull Run Method", his own advanced strategy he uses to successfully invest himself. From buying crypto on centralized exchanges to understanding various crypto investment strategies, Dr. Daniel's training program is truly one of a kind. His unique standing as a trainer lies in his ability to simplify the complicated world of crypto investing, saving crypto investors years of trying to learn it on their own. What we Discussed: - Who is Dr. Daniel Daniel and how he got into Crypto ( 2 mins) - What are ETF's in Crypto (5:30 mins) - Bear & Bull Markets ( 8 mins) - Always take profits (14 mins) - Crypto is all about Timing ( 17 mins) - 95% of Influencers do not know what they are talking about (23:30 mins) - How I got scammed (30 mins) - Ponzi Schemes ( 32 mins) - We should look a t Crypto like a Ponzi scheme (34 mins) - How Daniel got scammed (35 mins) - Mark Cuban got scammed (38:30 mins) - Hawk Tuah Scam (40 mins) - When I got 5 numbers in the lottery (46 mins) - What is a Rug Pull (47 mins) - What is a Meme Coin (48:20 mins) - Its a game of chicken (50 mins) - DOGE coin from Musk (52 mins) - Knowing what to invest in (56 mins) - Wallets specific to a certain crypto (1 hr 4 mins) - Protecting your seed phase (1 hr 7 mins) - Google Authenticator dangers (1 hr 11 mins) - Deep Fakes for fraud (1 hr 16 mins) How to Contact Dr. Daniel Daniel : https://danieldanieldentistry.com/ https://www.instagram.com/iamdr.daniel https://www.linkedin.com/in/drdanieldaniel https://www.youtube.com/@iamdrdaniel ------------------ All about Roy / Brain Gym & Virtual Assistants at https://roycoughlan.com/ ------------------
Episode 444: Guess the Culprit of the Latest HIPAA Penalty: It's MFA and Phishing Scams Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we dive into the importance of secure phone communications for therapy providers. We discuss: Instances of monetary HIPAA penalties Sharing login credentials between workforce members vs with unauthorized third parties The importance of multi factor authentication Using the Google Authenticator app for MFA Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources: About the violations & penalty: HHS Office for Civil Rights Imposes a $548,265 Penalty Against Children's Hospital Colorado for HIPAA Privacy and Security Rules Violations PCT Resources: Related Training (non-CE): Security Awareness Grab-Bag A collection of three short courses helping you and your staff maintain your security awareness through better handling of PHI in public, avoiding inappropriate disclosures, and preventing phishing and social engineering attacks. Referenced podcast: Episode 440: MFA Made Easy with Google Authenticator Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.
Cześć!Witajcie w podcaście "Neuromarketing na Allegro". Dzisiaj porozmawiamy o kluczowych krokach, które możecie podjąć, by zwiększyć bezpieczeństwo IT w swoich firmach. Podzielę się z nami historią swojego znajomego Marka, omówię jak tworzyć silne hasła, korzystać z menadżerów haseł i dwustopniowego uwierzytelniania, a także jak skutecznie zarządzać kopią zapasową danych np. dzięki usługom chmurowym. Poruszymy również kwestię aktualizacji systemów, edukacji pracowników w zakresie bezpieczeństwa oraz ochrony urządzeń mobilnych. Gotowi na zwiększenie bezpieczeństwa swojej firmy? Zapraszamy do słuchania!Przydatne linki: logowanie dwuetapowe na Allegrohttps://help.allegro.com/sell/pl/c/logowanie#LR8WwMOzztVAplikacje generujące kody: Google Authenticator lub Microsoft AuthenticatorDaj nam znać, czy przedstawiane przez nas metody sprawdzają się w Twojej działalności. Dołącz do naszej grupy na Facebooku, gdzie wymieniamy się wiedzą i pomysłami na rozwój sprzedaży online: https://www.facebook.com/groups/neuromarketing.na.allegro
Karen and Bob AI Corner, Academic papers yanked because they used unlicensed software, China Linked hackers stole wire-tap data from Telcos, How do I disable the touchpad on my laptop? Motorola Smartphone streaming issues, Can CISA help my Town with cybersecurity? Should I use a federated connection to log-in in web-services and Google Authenticator discussion, My Dell laptop is very old, Also where does my stuff go when I save it on my Android?
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're chatting about multi-factor authentication for group practices. We discuss: What multi-factor authentication is and why it's important Different types of factors for authentication What Google Authenticator is and how it works What accounts you can use Google Authenticator for HIPAA considerations for using Google Authenticator Using Google Authenticator appropriately in a group practice context Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources Google Help: Get Verification Codes with Google Authenticator Tech Target: What is Google Authenticator TherapyNotes: Setting Up & Using 2 Factor Authentication (Including Google Authenticator) PCT Resources Related Training (non-CE): Security Awareness Grab-Bag A collection of three short courses helping you and your staff maintain your security awareness through better handling of PHI in public, avoiding inappropriate disclosures, and preventing phishing and social engineering attacks. Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.
איך לאפשר אימות דו שלבי לאבטחת החשבון פייסבוק שלכם מהאקרים שלא יפרצו לכם: איתי ורצ'יק IVBS SEO / PPC רוצים להגן על חשבון הפייסבוק שלכם מפני האקרים? בסרטון הזה, אראה לכם איך להפעיל אימות דו-שלבי (2FA) בפייסבוק כדי להוסיף שכבת אבטחה נוספת ולמנוע גישה לא מורשית. אימות דו-שלבי הוא אחד מהכלים החזקים ביותר לאבטחת החשבון שלכם, ודורש גם סיסמה וגם קוד שנשלח ישירות לטלפון שלכם כדי להתחבר. נלמד כיצד להפעיל את האימות הדו-שלבי בקלות, בין אם אתם מעדיפים לקבל קוד ב-SMS, להשתמש באפליקציית אימות כמו Google Authenticator, או אפילו להוסיף מפתח אבטחה פיזי. בנוסף, אסביר למה חשוב להפעיל את האימות הדו-שלבי, במיוחד אם אתם מתחברים לחשבון שלכם ממכשירים שונים. בסיום הסרטון, החשבון שלכם יהיה מוגן טוב יותר מפני פריצות, והסיכוי שלכם להיפגע מהאקרים יפחת בצורה משמעותית. איך לאפשר אימות דו שלבי לאבטחת החשבון פייסבוק שלכם מהאקרים שלא יפרצו לכם: https://itayverchik.co.il/facebook-two-step-verification/ אל תשכחו להירשם לערוץ וללחוץ על הפעמון כדי לקבל עדכונים על מדריכים נוספים לאבטחת חשבונות ורשתות חברתיות. אם הסרטון עזר לכם, תנו לייק ושתפו אותו עם חברים! בסרטון זה תלמדו: איך להפעיל אימות דו-שלבי בחשבון הפייסבוק שלכם. מהן האפשרויות השונות לאימות דו-שלבי (SMS, אפליקציית אימות, מפתח אבטחה). למה חשוב להפעיל אימות דו-שלבי ולהגן על החשבון שלכם מפני האקרים. אל תפספסו סרטונים נוספים בערוץ: https://www.youtube.com/c/ItayVerchik?sub_confirmation=1 להרשמה למערכת לקידום אתרים: https://say-v.com/ הצטרפו עכשיו לקהילה של בוני ומקדמי האתרים הטובים בישראל בחינם: https://www.facebook.com/groups/israelwp לרכישת אלמנטור פרו, מעצב העמודים בוורדפרס הטוב בעולם: https://trk.elementor.com/2500 אין לכם עדיין חשבון אחסון אתרים או שאתם לא מרוצים מהאחסון הקיים שלכם? קבלו הנחה לאחסון אתרים קלאודוויז 25% ל-3 חודשים ראשונים: https://platform.cloudways.com/signup?id=314159&coupon=VERCHIK תודה שצפיתם! אם יש לכם שאלות או הצעות לנושאים נוספים שתרצו שנדבר עליהם בסרטונים הבאים, כתבו לי בתגובות למטה ואני אשמח לעזור.
On this episode of The Founder's Sandbox, Brenda speaks with Eli Farhood, Chief Executive Officer at Katsh Digital ID. Hailing from Greece, Eli is a prior financial services executive and, with Katsh, a second time Founder. After experiencing fraud first hand, he pivoted a business in the making to create Katsh; separating one's device from the need for authentication. Katsh aspires to democratize identify protection. For the month of October, they speak about cybersecurity and how to structure resilience into your company. You can find out more about Eli at: https://www.linkedin.com/in/efarhood/ https://www.buzzsprout.com/2228414/episodes/15385106-stop-using-insecure-passwords-with-eli-farhood https://missionmatters.com/defending-digital-frontiers-meet-the-hosts/ You can subscribe to Next Act Advisors at https://nextactadvisors.com/product/subscriptions/ and be sure to use the special discount code "sandbox25" for friends of The Founder's Sandbox for 25% off your subscription. Transcription: 00:04 Hi, I'm pleased to announce something very special to me, a new subscription-based service through Next Act Advisors that allows members exclusive access to personal industry insights and bespoke 00:32 corporate governance knowledge. This comes in the form of blogs, personal book recommendations, and early access to the founder's sandbox podcast episodes before they released to the public. If you want more white glove information on building your startup with information like what was in today's episode, sign up with the link in the show notes to enjoy being a special member of Next Act Advisors. 01:01 As a thank you to Founders Sandbox listeners, you can use code SANDBOX25 at checkout to enjoy 25% off your membership costs. Thank you. 01:22 Welcome back to the Founder's Sandbox. I am your host, Brenda McCabe. We're now into our third season and over 38 episodes. This monthly podcast, it reaches entrepreneurs and business owners who like building and learning about resilient, purpose-driven and sustainable businesses with great corporate governance undergirding them. At the Founder's Sandbox and in my work, 01:52 I have a very simple mission, and I want to help build the scalable, well-governed and resilient businesses. The guests that come to the podcast are founders, business owners, corporate board directors, investors and professional service providers who, like me, want to use the power of the enterprise, small, medium or large, to effect change for a better world. 02:17 Through storytelling with each of my guests, we're gonna touch on topics on their own journey that includes resilience, purpose-driven enterprises and sustainable growth. And my goal is to provide a fun environment in a sandbox where we can equip one founder at a time to build a better world through great corporate governance. Today, I'm absolutely delighted to have as my guest, Eli Farhoud. Eli is joining the podcast today. 02:47 in many roles, but primarily he is chief executive officer of Catch Digital ID. This is his second company that he's founded. And he also is an immigrant. So we're gonna touch on several of his stories while we go into this podcast. So thank you, Eli, for joining me today. Hi, Brenda, thank you for having me. I'm really glad to be here. Excellent. 03:13 So again, to my guest, you know, you can find this podcast on any major platform. And I do like to choose jointly with my guest a title. And Eli and I settled upon resilience. And it's gonna be about his team, the company, and the resiliency that's necessary when you're building a company. And we're specifically gonna go into what Catch Digital ID does, cybersecurity. 03:42 and democratizing. So I want to go back to my own journey before I get to your tagline, Eli. My work at Next Act Advisors, which is my consulting arm, and the Founder Sandbox is yet another channel to get to my guest and my clients, I was undeniably influenced by a major life change and moving back to the United States after living 25 years or more in Europe. 04:12 And I talk about being really purpose-driven, scalable, and resiliency in my own journey. So what would your tagline, Eli, be? I share that tagline with you. Resilience is everything. If we don't have resilience, we give up quickly. We don't keep pushing. We don't stay on foot. We don't build the foundation that will help us get there. Resilience is, in my view, I put it under, 04:42 know, being tenacious, having that tenacious and being tenacious and not giving up. And yeah, resilience is very, very important, not just in business. I think on a personal level, resilience brings success to your life. And with respect to the current company that you are leading, Catch Digital ID, does it also have a tagline? 05:10 Yeah, I would say resilience also matches. We're purpose-driven, but resilience definitely matches because most of our team members have had fraud in some shape or form in their life. And that was giving us the energy to keep pushing. For example, our marketing manager had her social accounts hacked multiple times. I was a victim for fraud twice, financial fraud. So... 05:36 My team members also, you know, they're coming from multinationals like IBM and the Raytheon and Symantec. And, you know, they've dealt with, you know, all the identity security, and they know the market very well. So they also understand how to be secure, you have to be very careful about yourself, about your information. And they've seen it over and over in those businesses, you know. 06:03 I mean, IBM sells identity products, semantic cells, and a virus, right? And Raytheon also does great weapons and other stuff, but basically they were working on the security, they've seen it all. And so resilience definitely, you know, is, it has to be, every one of us is an entrepreneur, let's put it this way, and you have to be resilient. That really is a great segue to, you touched on the resiliency of the teammates that, you 06:33 come with very large logos where they've served. They've also been as yourself victims of fraud. So what was your mission when you actually established the company Catch? So we want to really democratize access for everyone. This is basically the goal. We want to have Catch IT in the hands of most people for free. Okay. 07:02 the end user, the consumer. And the reason why is, well, A, we're able to do that. And B, that's how you provide or democratize access. If everyone has a digital ID that can protect their sensitive information from abuse, then you're onto a thriving digital economy. And you're able to unlock a lot of value there where people can exchange goods. 07:31 services, send money to each other, share payments, they can do a lot of things. And some of the things that today we have to do in person, because we're concerned that it's not secure to do that online. So how about if we're able to bring that security to the online world, you would think, like we once tried to imagine how people can use our product and it was so many like venues there. 08:01 You know, we're going to get to how you're raising funds right now. And I can't ask you, you want to not only democratize, but actually provide this for free. So we're going to get into this a little bit later. But there are a lot of cybersecurity products out there. Why is your solution different? And is it enterprise grade, or is it really for individuals, right, citizens? And that's that. 08:30 that leads to how you're raising money. Talk to me about how your solution is different. That's a great question. When we first built Catch, it wasn't Catch. Catch became Catch after I fell victim for fraud. But it was an identity solution to the military. So we wanted to build something military-grade, that the military community can use, can rely on, a reliable product. 09:01 And when we looked at biometrics out there today, all the biometric systems that are available, we noticed that the most reliable ones are dependent on a device, like clear at the airport, for example, your face ID on your iPhone, perhaps Amazon one at the Whole Foods and maybe other brands that I maybe don't know of. And that was the handicap, if you want, of biometric technologies. 09:29 is that requirement that hardware need, right? Yes. If you need a special hardware to operate a biometric system, then it's only convenient where the hardware is available. Got it. And not just that, you would still need to have to use passwords. And when I fell victim to fraud, the big lesson I learned is that fraudsters today can leverage data breaches. 09:59 use that information to their advantage, they can hack our devices, they can hack our identities and hack our accounts. So, and history also has shown, you know, when you see the likes of Microsoft being compromised, you know, hundreds of millions of accounts, AT&T just a few weeks ago, 70 million accounts, 3 billion social security numbers. We were talking about large numbers here. It's not a joke. 10:27 when you see those data breaches and cannot be stopped even by Microsoft, then what can the average Joe do here to protect themselves, right? These are 20 dollar companies who keep pockets, they have teams of engineers, I mean, they have all the resources they want and they're still getting compromised. So we came to that conclusion, like it's really hard. Once information is available on the public domain, it cannot be protected. 10:54 one way or another one day, it's going to be compromised. And so our solution was to eliminate credentials from the security equation. Can you say that again? So it's you're eliminating credentials? We are eliminating credentials from the security of our identities so that hackers have nothing to compromise or to steal anymore. Is that the same as in HIPAA where it is sanitized or it's 11:22 that the private data is disassociated from the health record? No, it's not. Because you're eliminating a credential that existed, and now it no longer exists. We're placing that credential with a hand biometric, but a strong security hand biometric. I can't emphasize enough on strong security, because if you ask people to replace their passwords 11:52 it has to provide a better security than password. You know, the beauty about password is that if it's compromised, I can change it. But can you change your biometric? No. You cannot. And accordingly, it has to be really strong security so that people can trust that technology or that product and use it. And this is really the genesis of cache is that we wanna provide that convenience on any device 12:21 using your hand or we call it palm, right? And it's a strong technology because it involves a lot of technicalities, we can discuss that later, but basically it's a very strong technology that even if a copy of your hand, a picture of your hand, or even a video of your hand has been compromised, that won't affect you or affect your identity security. And this is our promise to our consumers. And it's probably your secret sauce. 12:50 It is a process, but we can go over that quickly. Yeah. Yes, we can get into that. I like that it's independent of device, right? So device agnostic, right? And you eliminate the credentials. So it's fascinating. Fascinating. Got lots of ideas to explore. Because we know credentials are a pain. Absolutely. Right? Who doesn't manage hundreds of passwords? Yeah. That's on an individual level. Let's see in the enterprise world. 13:19 they even have a stronger pain there. As an employee, you have to keep changing those credentials, take care of this, they keep them in a secure place. Enterprise are spending hundreds of millions of dollars just to store that credentials and keep it away from the hackers. So this is a strong pain and it's not efficient. They go back to the sustainability, it's not sustainable. So if we were to go back up a little bit. 13:48 What have been the shortfalls or continue to be the shortfalls of cybersecurity? That's a great question. Yeah. Yeah. It's a big one, right? We know that 80% of fraud globally stems from stolen ID credentials. That's a whopping big number. I've been a victim. That's a big number. Right. And then they send you, you know, 14:16 crawl or experience and for a year it's free, but then you get another hack like that of Microsoft or Blue Shield, all right? So what have been the shortfalls of cybersecurity and perhaps we'll continue to have shortfalls that that catch can eliminate? Yeah, the shortfall like this big headline is that 80% of fraud globally stems from stolen credentials and. 14:42 That's how we came about this approach. Like, how do you solve this? Okay, we need to eliminate credentials. This is not sustainable. It can just keep rolling like this. The biggest shortfall is that we're aren't able to protect our data. I remember maybe eight, nine years ago, I hear of a data breach maybe once a year. Right. Maybe every other year. Now every other week, I hear of a data breach. 15:12 And this is not a surprise to, it's not surprising to us because we know that back in the days also fraudsters and scammers didn't have the technology on hand to conduct those preaches. Now they have access to the latest technologies as we do as well. And so they have access to AI, they have access to that automation that can make their job really efficient. You know, scamming or being a fraudster is a business. It is. 15:42 it is a business. And so they actually study, they do an economic study, like, how much are we going to spend to hack that database and how much we're going to make money out of the database. And the moment you make it extremely expensive for them to hack a database, this is where you're starting, you know, your, your, your, your goal to reach your goal of getting some security. The problem is that history shows, like I said earlier, 16:12 we couldn't just stop these data breaches. And now they're becoming more often, more often than ever. I can give you something a little scary. Like sometimes you can input ideas in a chat bot and it can give you a solution on how you hack a network. Think of just like a fraudster that has a lot of experience. He's asking AI how to hack a network. And I know AI will sometimes respond, I don't do this, like this is not ethical. But there's a way to actually rephrase the question. 16:42 and get the answer. And so now they have that artificial brain that is helping them, automating things for them. And now we can see it, you know, it's around us. And this is really the shortfall. We're not able to stop data breaches and they're providing access to fraudsters to our account. And that's why we need to do something. So can you walk us through 17:12 How you, I wanna download CatchID. How do I do this? Is it available in the market today? Where are you? Because it sounds like it can potentially be ubiquitous or is it you need to do the crowdfunding first? Walk me through some of the features and some of the data that you have already because I'm certain you have beta testing done, please. 17:40 Yeah, so we're made a testing right now with some clients. It is not available to the public, unfortunately. We're trying to get that availability in 2025. At this point, we're trying to validate also if there's any psychological barrier from an end user point of view. You know, sometimes users can be paranoid of biometric technologies. That's right. And that could be a barrier for market entry. So... 18:08 The reason why we launched the crowdfunding is that we wanted to validate. Do people want to choose convenience over passwords, which is already not providing the security that it's aimed for, the stuff they're trying to. Because the fact, the matter of fact is that in cybersecurity, if you ask anyone in the community, they will tell you that if your device is compromised, nothing can save you. Face ID can be bypassed. 18:38 One-time codes can be caught there. Google Authenticator can be accessed. So basically, if your device is compromised, which is a very common thing, by the way, a lot of people do not realize that their device is already compromised and someone has a back door and is able to track every move they do on those devices. I'm not trying to freak people out, but this is a fact. And I have to say things as they are. And so... 19:04 Once that scammer gathers enough information about you, or they need a piece of the puzzle, they can also visit the dark web and get the complete set of data from your social security to your email, to your phone number, and then what? They have that puzzle available now, and they have a fully-fledged identity that they can use to create an account. So I also get this question a lot, and I'm happy to share that with your audience. 19:34 Some people tell me, well, I'm not Elon Musk or like I have $0 in my bank account. I don't care if someone takes my private information. Guess what? Most fraudsters don't want to steal money from you. In fact, they want to use your name to create a fake account and funnel illicit activities using your name. That's the big goal. Some of them obviously they want to steal money but others... 20:03 They want to just use your name. And the thing is when they fall, you're falling, not them. You're basically, they're piggy-bagging on your identity. Identity, right? Right. So that's in the financial world, in the medical world, I mean, our healthcare system, sometimes you can just know that someone conducted a surgery using your account. When you get the co-payment, you didn't know about it, but you learned then. 20:32 Taxi then also. Oh yeah absolutely. Absolutely. And so that brings you back to the core reasons on like why we approached finding a solution. Today you're using password, you think you can't change it, but then hey you're at risk, you're vulnerable. We recommend you try something else. If you're not convinced with our concept, that's perfectly fine. But try something else. Maybe you want to use two-factor authentication or three-factor authentication. 21:02 It can be really complicated at this point, right? You just hear stuff, but it's something you should do. Just don't rely on passwords. That's our advice. All right, so you are currently crowdfunding, as well you're testing also, beta testing with different user groups for a 2025 launch. How is the crowdfunding going? Are you doing on Kickstarter? Where are you doing the crowdfunding? 21:32 Another question is how has that fundraising journey been? Because today there is no longer a stigma associated to crowdfunding. Whereas 10 years back, I was like, ah, didn't want it to go that way. But more and more, there are more and more crowdfunding platforms that are truly enabling, particularly in the past two years, it's been incredibly hard to raise early stage money. 21:58 Can you, I know that's a loaded question. That's two questions. So what is your experience with crowdfunding and how soon will that get catched to the market to have it in our hands? No pun intended. Yeah, I mean crowdfunding, yeah, it did transform over several years in the past. So it had this bad connotation, but no, actually I've seen great products, growing and starting with crowdfunding. 22:28 And we've taken that course because we were interested in that aspect, validating that consumers want that. Um, we, we didn't, we didn't find problems selling this to businesses, to be honest, because there's a strong pain for them there, especially on an employee level, right? Because employees are our first market, to be honest with the enterprise, not the end user. But when they come to sell it to their end users, we wanted to make sure that 22:57 and users also want that, right? At the end of the day, I was offered voice verification at my bank. I refused it, right? Like many, the reason why, we've heard it before, right? How AI can synthesize your voice and someone can maybe use my synthetic voice to access my account, so I wouldn't do it. And so again, banks cannot force you to use one technology, they can offer it for you. 23:23 And if you're not convinced, you're not going to use it. So we wanted to validate both ends of the market. So far it's going well. We raised about $30,000 in the first six weeks. And now we're extending our campaign to raise more to get more validation there. But again, our customers now are not, like I said, end users. Our customers are enterprise and they're employees. 23:49 which is something they can enforce. If I'm an employee working for an enterprise and they tell me, well, you have to use your hand, no more passwords, I'll have to do it. I don't have that choice of saying no. And this is where now we're focusing on our niche, to be honest. So it will be enterprise grade, right? And it will be the employees will be substituting. That is the first. 24:17 uh strong pain that we're trying to resolve. And um you've raised 30 000 are you going to continue to do crowd funding through the end of 2024 Eli? Yes it's going to end by November. Okay all right and do you have information that I can provide my listeners later in the show notes in terms of the crowdfunding platform? 24:42 Yeah, we're crowdfunding on net capital. So it's not a Kickstarter just to differentiate. So people who put money in our project, they're investing. So they're capitalizing on this amazing opportunity. They're capitalizing on a strong market. It's an $80 billion market. This market is growing at 17% compounded annual growth rate. So by 2030, this market will turn into a $200 billion market. 25:09 So this is something really important for retail investors or consumers to capitalize on and invest with us, back us. Because by backing us, they're doing two things. A, they're saying, yes, we want to get rid of password. We don't want this vulnerability in our life anymore. So they're giving us validation and we thank them so much. Also, they're capitalizing on that by investing in us and getting shares in our company. So yeah, Kickstarter is different because Kickstarter sells products. We're not selling your product here. You actually... 25:38 buying shares of the company and investing in exactly. Excellent. Right. So let's switch gears. Let's switch to your immigrant founder story. Do you believe that it's even more arduous as a founder to raise money or open those doors that if you were not an immigrant? 26:07 would open more easily. Talk to me about your own journey coming to the United States and working in the finance industry. Yeah, of course. My background is in finance. I worked for more than 20 years in financial services. Before I stopped working in finance, I was a portfolio manager. So I was running portfolios for my clients. We were managing those portfolios in equities, commodities, 26:35 option markets. But again, so as an immigrant, I think that it tends to be equally, you know, I think money is equally available to immigrant as much as if you're local or born in the United States. My first startup, for example, was in Cyprus and I was able to raise money. I wasn't okay. I wasn't in a really good way. So I have a Greek roots. 27:02 But I mean, Cyprus is considered a very kind, so I'm not sure if it falls under. But I wasn't born there. I just started there. So I've been Cyprus is amazing. And it's a beautiful place. And so I raised money there. I didn't face problems. So I'm not sure if you can consider that being an immigrant there. But no, I don't think I don't think immigrants have a better edge unless they have been, you know, obviously, if you have done. 27:29 multiple access in the past, if you've been a serial entrepreneur or you have a lot of success stories, raising money would be definitely much easier than being a second founder or perhaps a first founder. First founders definitely struggle and I've seen it over and over. They struggle to raise money, whether they're immigrants or not. I don't think it's really related, but for some reason I've learned from investors that they like immigrants slightly more. 27:57 And it's for a fact maybe because these people are coming to America and they have a lot of excitement about the move to the land of opportunities. You know, America is called the land of opportunities and it's, it's, I think it's in the heads of every immigrant. Like I want to go to America. I want to take that opportunity and be able to make success. And they're not really 28:26 by money, they're driven more by their story, driven more by their mission, they're driven more by that energy they have. I wanna have a successful story, I wanna change people's life, I wanna make a difference. I think they're driven by that. Why, maybe if I was locally grown here, I was raised here, I might be in a different mindset. I'm just saying, again, I can be in the other person's too, but that's my humble, you know? 28:56 Thank you. So the land of opportunity, right? And perhaps even a bit, a greater degree of resiliency. And tenacity. Yes, that's true. That's true. Excellent. So I'd like to give you an opportunity, Eli, to provide to my guests where they may find information about yourself, Eli Farhoud. And is it your LinkedIn and your website? How else can listeners that want to contact you get in touch? 29:25 contact with you. Sure. I'm happy to connect with anyone who wants to learn more about the patch. So they can definitely visit our website, where all the links are available there. So that would be k-a-t-s-h-i-d.com. So it's a k-a-t-s-h-i-d.com. If you visit our website, there's an Invest button. 29:54 If they click on that, it takes them to our crowdfunding page. They can learn more about our story, how we started this, about our mission and vision, what are we trying to achieve there. If they can learn about the opportunity, the market, our team, they're mostly veterans in their space. And so we're very excited actually. I'm actually very fortunate that I have a strong team, a team that has a lot of experience on hand. 30:22 And they're really helping me so much to get catch to the market and commercialize market. That's why I'm very excited about the stage we're in now. Right. And when did you actually form the company? What year was that? We started, so the company was incorporated in 2016. We were building actually a social platform back then. 30:47 I'll tell you quickly about it. That was really cool experience. So we were building a social platform that solves the problem of fake accounts. And the concept we had in mind was very simple. How about if people start connecting through a live video? That was basically it. Very simple, you know? No texting, no anything, no attachments, no images. Just connect through a live video. That's the first mean of communication. 31:16 And we thought, okay, that would be cool. You know, if people can connect through live video, it's obviously not a scammer, right? It's the same way they show in the picture and we can eliminate fake accounts. Now that doesn't work today because they can use AI to create deep pics, unfortunately, right? So just to show you the fortunes of how technology is a gateway to opportunity, the same way, if you can't reinvent yourself, you will end up, you know, 31:47 not doing any achievements there. So unfortunately back then though the broadband availability was very limited. We're talking in 2012. That's when we started this company. And we kept growing it until 2015 where we faced that problem that the user experience was really bad. Yeah. 32:16 limited availability of broadband, the user experience was not good, the video footage was not also very satisfying. And obviously people were turned off by that and we started dwindling down and our company failed big time. We learned that timing is so important. Yes, underline technology, yeah, that's available. Absolutely, you can have the best technology in the world, but if it does not align with a pain point or with time 32:46 If there's no need at this point, the strong need for it, and you're not able to provide that value, it's probably going to fail. And so that's why we're excited also about Catch because we think that timing is right now for biometrics to replace this credential problem we have, all the data breaches that are happening that will not season our view, that will keep growing and getting bigger and bigger and bigger. Actually, I no longer try to say to my... 33:15 for my personal information from harm, because I know they're already there. Everyone know it, like it's on the dark web, it's probably on someone's drive now. And I just got an email this morning from my bank that my credentials were compromised. So just to give you an idea that I already like took all the precautions on a personal level because I felt obliged to victim, I don't wanna fall a third time. And so, yeah. And then... 33:42 To go back to your question, we started Catch in 2019, 2020. After I have fallen victim, we conducted a lot of market research. We looked at so many competing technologies in the biometric space. We tried to hack those technologies in our lab tests to learn, you know, what is their strength? What are their weaknesses? And that helped us a lot to shape up the product and to create the solution we have today. 34:13 So do you have white hackers on board? We do, actually, yes. Yes, I imagine so. If you started military, great. And the pandemic happened, right? So everybody went, worked from home. We had, again, a lot of data breaches that way. A lot of enterprises were not ready. So there's a lot of data. I mean, the numbers tell you, Brenda, $1 trillion were stolen from that $5 trillion were printed during COVID, or fortune. 34:43 So one trillion or about that was stolen. So what happened then? Right? What happened is that a lot of scammers took advantage. They created fake companies, fake identities, and they started claiming through those programs. Yes, I want this program. I want funds. I want loans. I want... It's insane, right? Knowing that how much money we've paid and lost during COVID. And COVID like also... 35:12 in a way reshaped our mindset and business, to be honest. Like who would meet virtually pre-COVID? Very few people, right? Now it's the norm and people are asking for remote. Who would go to the bank now? Actually, if you go to the banks, most of their branches are like ghost towns. Yes. So that also tells you that COVID has changed a lot of things and that actually why we believe 35:42 know, the time is right also for a product like catch. And it's quite unique. I can't say that I've encountered a biometric that uses your palm, right? Your hand, the immutable, unique, biometric measure, right? Yeah. Well, interesting. Interesting. All right. I wish you further resilience as you come into the last quarter. 36:11 of 2024 and a launch in 2025 with enterprise companies and their employees that can bring this new solution into credential management, right? Absolutely. We're very excited to it. That's very exciting. I always like to take my guests back to the sandbox and ask a round of. 36:38 questions, which is around what the type of work that I do. And they the words resilience, purpose driven enterprise, and sustainable growth, what resiliency you've talked to me about it, what's the meaning your tenacity? Do you want to add anything else to that? What's that, you know, meaning to you? Perhaps as founder, immigrant? You like please? Yeah, you know, 37:07 You want to have a lot of ethics as well. You want to make sure that you're being very transparent with your clients, especially with your clients, because they're your success story. They're the ones who are going to become the beacon for you. They're going to talk about you. I remember back in the days, this is just a great example, how my friend convinced me on using an iPhone where I was stuck with my... 37:34 physical keyboard and I was like no way I am not using an iPhone and he was literally an ambassador for Apple. Even though he never worked for them. Just because he was excited. Like the product was so amazing for him. It was so easy to use. It provided so much value and he was like, you know, you have to use this. Like you have to just give it a try. If you don't like it, just give it a try. And the first time I put my hand on the phone, I loved it. 38:04 So this again tells you a lot about being transparent with your clients, being very ethical, make sure that you're providing value on a long-term basis. Yes. The only way to do that is not just to be of course transparent and ethical, but also to provide sustainable products that can work for the long run. And of course, we have to be obviously, you know, making money and profitable because sustainability is part of that, right? Right. 38:34 But having a success story for the long term requires that ethical part and being very honest with your clients. I remember like I've been sold a lot of products that were very deceptive. And I know how I'm sure a lot of people did too, right? But that deception feeling you get when you're sold something, it's so harming to that brand, to that product. And actually it's harming also for the good guys. 39:03 It makes you just on anything else. No, I'm not going to try this anymore. I've been there. No, I've seen this before. Right. That's these we're trying to be that person that not just cause harm to their own brand, but also cause harm to other people that are trying to make a difference in the ecosystem. What about purpose driven enterprise? You began catch out of your own mission. Right. But what is purpose driven in general? Right. Mean to you. 39:33 Eli. I'm driven by my experience with fraud. Identity for me is very personal. It's very personal. And I'm not going to allow it to happen again. Right. So you're out on a small story. Yes. You're doing something about it. Exactly. I'm doing something about it. And I'm very happy that many of our team members also are purpose-driven on the same problem they face, like I did, in different ways, of course. 40:02 Identity theft can take several shapes and forms. Sometimes it's as simple as an unauthorized transaction on your credit card, which is something maybe you can absorb and manage and deal with, which happened to me last year, actually, and it can be sometimes something very big where someone accesses your checking account and now you're kind of like going through a two or three year process to clean your records. 40:32 move your innocence and you become a risk to everyone. No one wants to do business with you because you've had an identity theft. It's just not a joke. And, you know, now it's probably gonna happen more often than ever, unless products, not just cash, but anything like cash can help us secure our credentials. And, you know, it's also about taking back control. 40:59 This is very important. Maybe we didn't focus on that so much, but I wanna mention this. We wanna take back control over our information so that a third party can just use it behind our backs. 41:14 very important and therefore democratization, right? Right, right. We wanna bring that to the market, democratize access and allow people to decide who can use their information, when they can use it and why they're using it. Because this is very important today, identity or personal identifying information is used all over the world. This information represents who you are. And now, 41:44 that information and other information about us, our lives, are being sold day and night from enterprise to, I mean, we've all heard it about how Facebook or other firms were selling our information, they're making money off our information. We don't wanna change that. We want to bring that control back to you. You own your own information and you decide who can use it and who, and no one can send it. The access. Yes. 42:12 That's really important in our view. And that's what we're trying to achieve. Very exciting. Finally, sustainable. What does sustainable growth mean to you? Sustainable growth is the growth actually that just can be a normal, I would call it a normal mathematical equation. I'm making being full of philosophic here, but it's really when... 42:38 when you're growing organically because people see the value, this is a sustainable growth. It's also sustainable because you're not harming others, you're not harming the environment when you do this. You're not harming, or sometimes business requires that someone is using for you to gain. And that's not sustainable. We don't want that sustainability. We want a sustainability where it's a win-win situation. 43:05 And that's what we're trying to achieve at Catch. Of course, I can't tell you enough about the environment. Like if you think about just plastic cards we use for our credit cards, they are piling somewhere every year, all those cards that are being stolen and thrown in a dumpster. Or if you think about like digital identities can have a strong effect on the environment as well. Because... 43:33 If you're able to do things more remotely, virtually, instead of spending time, gas, miles, or using plastic cards, which I think plastic is toxic, it should be out of our life totally, especially in the food chain. That's a separate discussion. But yeah, technologies like these can have a very positive impact on the environment and sustainability itself as well. 44:00 I like the philosophical approach and very global, how you're thinking about removing the carbon footprint, right? Right. Lack of reducing the use of plastic. Right. Yeah, that's very, very beautiful. Thank you, Eli. The last and final question. Did you have fun in the sandbox today? 44:29 Did you have fun in the sandbox today, Eli? I loved it. And thank you for all your very meaningful questions. I mean, they were, you're trying to hit on most important aspects of what we do. And I think we did a great job here. So again, thank you so much for having me. And it was such a fun conversation. And I hope we were able to tell your audience something new. They learned something new about identity security. 44:58 Absolutely. To my listeners, if you like this episode with Eli Farhoud, sign up for the monthly release where founders, business owners, directors, and professional service providers share and also learn how to build with strong governance, sustainable, resilient, and purpose-driven companies to make profits for good. Signing off, talk to you next month. Thank you very much.
The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There's a critical vulnerability in Bitdefender's GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn't the buzzword you think it is. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest David Moulton, host of Palo Alto Networks' podcast Threat Vector and Director of Thought Leadership, discussing the evolution of his show and what we can expect to see coming next. You can catch the latest episode of Threat Vector where David welcomes Palo Alto Networks Founder and CTO Nir Zuk here. Selected Reading Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols (The Record) CrowdStrike sued by shareholders over global outage (BBC) Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks (GB Hackers) BingoMod Android RAT Wipes Devices After Stealing Money (SecurityWeek) Google being impersonated on Google Ads by scammers peddling fake Authenticator (Cybernews) Western Sydney University reveals full scope of January data breach (Cyber Daily) Maryland becomes first state to pass law against gift card draining (CBS News) More than 7,000 NSA analysts are using generative AI tools, director says (Defense One) Study Finds Consumers Are Actively Turned Off by Products That Use AI (Futurism) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about the Cadillac CELESTIQ displays that are showing up in newer Cadillac vehicles and how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about the Cadillac CELESTIQ displays that are showing up in newer Cadillac vehicles and how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/total-leo
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about the Cadillac CELESTIQ displays that are showing up in newer Cadillac vehicles and how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/total-mikah
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/total-leo
Is there an easy way to convert an email into an audio file? Why can't I back up my files using both iDrive and iCloud? Why aren't banks using proper two-factor authentication methods? Plus, Sam Abuelsamid talks about the Cadillac CELESTIQ display and how manufacturers are leaning in more to software-driven features. FTC fires a warning shot at eight companies over 'Right To Repair' violations. Goldman Sachs: AI is overhyped, wildly expensive, and unreliable. This is the fastest object ever made by humans, and it's not slowing down. Toll of Snowflake hack widens with theft of AT&T text, calling data. Micah from the Airplane Geeks podcast calls in to ask if there's a proper lightning to USB-C adapter that he can use with his Shure microphone, which has a lightning connection and no USB-C connection. Dan emails the show asking for alternatives to Amazon Echo devices for his parents, who aren't very tech-savvy, that can stream music throughout the home on various devices. Sam Abuelsamid joins Leo and Mikah on the show this week. Sam talks about the Cadillac CELESTIQ displays that are showing up in newer Cadillac vehicles and how car manufacturers are utilizing more software-driven features in their vehicles. Genet writes in, wondering what it means to "Sign In with Apple" on various websites and if it's safe to use this. Miakh explains how "Sign In with Apple" works. Patch has a 2015 MacBook Pro, and the battery is nearing its end of life, which is affecting some of its laptop functions. What can he do about the battery issues? Jay writes in, wondering if there's an app that can translate an email into an audio file for his mother. Charles calls in with a follow-up to Jay's question and suggests using Siri's VoiceOver function on the iPhone / iPad to do exactly what Jay is looking for. Ken is wondering why he's getting errors when trying to backup his files through both iDrive and iCloud, as he's trying to back up his files to multiple locations. Mel is in the market for a new computer for general computing needs, such as email and document writing, and is wondering what Mikah and Leo would recommend. Aaron has a simple question for the Tech Guys: why do the banks continue to avoid using 2FA applications like Google Authenticator? Hosts: Leo Laporte and Mikah Sargent Guest: Sam Abuelsamid Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2033 Download or subscribe to this show at: https://twit.tv/shows/total-mikah
Topics covered in this episode: Vendorize packages from PyPI A Guide to Python's Weak References Using weakref Module Making Time Speak How Should You Test Your Machine Learning Project? A Beginner's Guide Extras Joke Extras Joke Watch on YouTube About the show Sponsored by Code Comments, an original podcast from RedHat: pythonbytes.fm/code-comments Connect with the hosts Michael: @mkennedy@fosstodon.org Brian: @brianokken@fosstodon.org Show: @pythonbytes@fosstodon.org Join us on YouTube at pythonbytes.fm/live to be part of the audience. Usually Tuesdays at 10am PT. Older video versions available there too. Finally, if you want an artisanal, hand-crafted digest of every week of the show notes in email form? Add your name and email to our friends of the show list, we'll never share it. Michael #1: Vendorize packages from PyPI Allows pure-Python dependencies to be vendorized: that is, the Python source of the dependency is copied into your own package. Best used for small, pure-Python dependencies Brian #2: A Guide to Python's Weak References Using weakref Module Martin Heinz Very cool discussion of weakref Quick garbage collection intro, and how references and weak references are used. Using weak references to build data structures. Example of two kinds of trees Implementing the Observer pattern How logging and OrderedDict use weak references Michael #3: Making Time Speak by Prayson, a former guest and friend of the show Translating time into human-friendly spoken expressions Example: clock("11:15") # 'quarter past eleven' Features Convert time into spoken expressions in various languages. Easy-to-use API with a simple and intuitive design. Pure Python implementation with no external dependencies. Extensible architecture for adding support for additional languages using the plugin design pattern. Brian #4: How Should You Test Your Machine Learning Project? A Beginner's Guide François Porcher Using pytest and pytest-cov for testing machine learning projects Lots of pieces can and should be tested just as normal functions. Example of testing a clean_text(text: str) -> str function Test larger chunks with canned input and expected output. Example test_tokenize_text() Using fixtures for larger reusable components in testing Example fixture: bert_tokenizer() with pretrained data Checking coverage Extras Michael: Twilio Authy Hack Google Authenticator is the only option? Really? Bitwarden to the rescue Requires (?) an update to their app, whose release notes (v26.1.0) only say “Bug fixes” Introducing Docs in Proton Drive This is what I called on Mozilla to do in “Unsolicited Advice for Mozilla and Firefox” But Proton got there first Early bird ending for Code in a Castle course Joke: I Lied
In this episode of CafeBitcoin, we had the pleasure of hosting Jeremy from Cloaked Wireless to discuss their innovative eSIM product. Jeremy shared insights into the challenges of running a telecom business and the importance of privacy in the digital age. Cloaked Wireless offers a solution to SIM swap attacks, allowing users to have secure and private connectivity. The company provides the option to use a second SIM for enhanced security and privacy, with the convenience of using it indefinitely. Additionally, Jeremy highlighted the ease of transitioning to Cloaked Wireless from traditional providers and the seamless integration with iPhones. The discussion also touched on the simplicity of setting up the service and the benefits of dual SIM functionality. Overall, the episode provided valuable information on the importance of privacy and security in the wireless industry.Connect with "Cloaked Wireless" - https://www.cloakedwireless.com“Use discount code “Swan” at checkout for 25% off of your first months service”Timestamps:00:00:00 - Warren Buffett's Berkshire Hathaway Stock Plunge00:05:22 - Software Glitch Impacting Stock Exchange00:06:29 - Australia's First Bitcoin ETF Launch00:10:30 - Implications of Warren Buffett's Treasury Bill Holdings00:20:26 - Dante's Insights from Business Group Meeting00:26:13 - Introduction to Cloaked Wireless00:33:08 - Challenges of Running a Telecom Business00:40:13 - Ownership of Data on Wireless Devices00:46:24 - Duration and Flexibility of Cloaked Wireless Numbers Use code “CAFE” for a discount to https://www.pacificbitcoin.com "Welcome to Bitcoin" A FREE 1-hour course hosted by Natalie Brunell, perfect for helping you to orange-pill family members over the holidays at https://Swan.com/welcome Swan Team Members:Sam Callahan: https://twitter.com/samcallahTomer Strolight: https://twitter.com/TomerStrolightJohn Haar Twitter: https://twitter.com/john_at_swanDante Cook: https://twitter.com/Dante_Cook1Produced by: https://twitter.com/Producer_Jacob Swan Bitcoin is the best way to accumulate Bitcoin with automatic recurring buys and instant buys from $10 to $10 million. Get started in just 5 minutes. Your first $10 purchase is on us: https://swanbitcoin.com/yt Download the all new Swan app! iOS: https://apps.apple.com/us/app/swan-bitcoin/id1576287352 Android: https://play.google.com/store/apps/details?id=com.swanbitcoin.android&pli=1 Are you a high net worth individual or do you represent corporation that might be interested in learning more about Bitcoin? Swan Private guides corporations and high net worth individuals toward building generational wealth with Bitcoin. Find out more at https://swan.com/private Get paid to recruit new Bitcoiners: https://swan.com/enlist Connect with Swan on social media: Twitter: https://twitter.com/Swan
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-mikah Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-mikah Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
WARNING: Don't Get Your Ad Account Hacked In the digital landscape, protecting your ad account from potential security threats is paramount to safeguarding your brand reputation and financial assets. With cyberattacks becoming increasingly sophisticated, it's essential to implement robust security measures to prevent unauthorized access and potential breaches. Here's a comprehensive guide to help you secure your ad account and mitigate the risk of hacking: Complexity is Key: Use a combination of uppercase and lowercase letters, numbers, and special characters to create a strong, unique password for your ad account. Avoid Common Phrases: Steer clear of using easily guessable passwords such as "password123" or common phrases related to your business. Additional Layer of Security: Implement 2FA to add an extra layer of protection, requiring verification via a secondary device or method during the login process. Authentication Apps: Use authentication apps like Google Authenticator or Authy for secure and convenient verification. Stay Vigilant: Monitor your ad account regularly for any unusual or unauthorized activity, such as unfamiliar login locations or suspicious changes to campaign settings. Review Access Permissions: Regularly review and update access permissions for users associated with your ad account, ensuring only authorized personnel have access. Exercise Caution: Be wary of unsolicited emails or messages requesting sensitive information, such as login credentials or account details. Verify Sources: Always verify the legitimacy of communications from ad platforms or service providers by contacting them directly through official channels. Update Software: Keep your devices, operating systems, and security software up to date with the latest security patches and enhancements. Secure Network Connections: Use secure, encrypted connections, such as Virtual Private Networks (VPNs), especially when accessing your ad account on public Wi-Fi networks. Backup Contact Information: Ensure your ad account is linked to a secure email address and phone number for account recovery purposes. Set Up Trusted Contacts: Establish trusted contacts within your organization to assist with account recovery and verification processes if necessary. Security Awareness: Educate your team about the importance of cybersecurity and best practices for maintaining a secure ad account. Training Programs: Conduct regular training sessions and workshops to equip your team with the knowledge and skills to identify and respond to potential security threats effectively. Limit Access: Implement role-based access controls to restrict access to specific features and functionalities within your ad account, based on individual roles and responsibilities. Monitor User Activity: Track and monitor user activity within your ad account, ensuring compliance with security policies and identifying any suspicious behavior promptly. Protecting your ad account from potential hacking threats requires a proactive approach, encompassing robust security practices, continuous monitoring, and comprehensive training for your team. By implementing these essential security measures and maintaining vigilance against evolving cyber threats, you can fortify your ad account's defenses and safeguard your business's integrity and assets in the digital realm. Stay informed, stay secure, and prioritize cybersecurity to mitigate risks and ensure peace of mind in your advertising endeavors. 1. Create Strong Passwords:2. Enable Two-Factor Authentication (2FA):3. Regularly Monitor Account Activity:4. Beware of Phishing Scams:5. Secure Devices and Networks:6. Implement Account Recovery Measures:7. Educate and Train Your Team:8. Implement Role-Based Access Controls:Conclusion: --- Support this podcast: https://podcasters.spotify.com/pod/show/yousif-alias3/support
On this week's show Patrick Gray, Adam Boileau and Lina Lau discuss the week's security news. They cover: Microsoft's 38TB oopsie MGM's Okta compromised, was this what Okta was warning us about? Why we need a cyber knife fight Google Authenticator sync abused in the wild Much, much more This week's show is brought to you by Push Security. Co-founder Adam Bateman is this week's sponsor guest. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Microsoft AI researchers exposed sensitive signing keys, internal messages | CyberScoop Wiz on X: "
On this week's show Patrick Gray, Adam Boileau and Lina Lau discuss the week's security news. They cover: Microsoft's 38TB oopsie MGM's Okta compromised, was this what Okta was warning us about? Why we need a cyber knife fight Google Authenticator sync abused in the wild Much, much more This week's show is brought to you by Push Security. Co-founder Adam Bateman is this week's sponsor guest. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Microsoft AI researchers exposed sensitive signing keys, internal messages | CyberScoop Wiz on X: "
This week on Hacker And The Fed your lightbulbs may be giving away the location of your house, could Microsoft end ransomware right now? Also, voice authentication may be broken, the latest ransomware attack shows us the important of logistics security, convenience has once again jeopardized Google authenticator security, and a listener shares a wild car theft story. Links from the episode: Your lightbulbs may be giving out your exact location twitter.com/haxrob/status/1676416949499338752 Microsoft Can Fix Ransomware Tomorrow darkreading.com/vulnerabilities-threats/microsoft-can-fix-ransomware-tomorrow Cybercriminals can break voice authentication with 99% success rate helpnetsecurity.com/2023/07/06/voice-authentication-insecurity/ INTERPOL Nabs Hacking Crew OPERA1ER's Leader Behind $11 Million Cybercrime thehackernews.com/2023/07/interpol-nabs-hacking-crew-opera1ers.html Japan's biggest port, Nagoya, hit by suspected cyberattack asia.nikkei.com/Business/Technology/Japan-s-biggest-port-Nagoya-hit-by-suspected-cyberattack Raising concerns over Google Authenticator's new features techradar.com/pro/raising-concerns-over-google-authenticators-new-features Trinidad and Tobago facing outages after cyberattack therecord.media/trinidad-tobago-hit-with-cyberattack Listener Questions ksltv.com/563455/police-release-images-of-suspect-who-broke-into-familys-car-at-airport-then-their-home/ Support our sponsors: Go to JoinDeleteMe.com/FED and use the code FED20 for 20% off Go to drata.com/partner/hacker-fed and get 10% off Drata and waived implementation fees
Picture of the Week. The Encryption Debate. Age does matter... Age Verification. WhatsApp: Rather be blocked in UK than weaken security. Exposing Side-Channel Monitoring. Closing the Loop. A new UDP reflection attack vector. Google Authenticator Updated. Does Israel use NSO Group commercial spyware? A Russian OS? TP-Link routers compromised. A pre-release security audit. Another Intel side-channel attack. Windows users: Don't remove cURL! AI comes to VirusTotal. Show Notes https://www.grc.com/sn/SN-921-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twittv drata.com/twit
Picture of the Week. The Encryption Debate. Age does matter... Age Verification. WhatsApp: Rather be blocked in UK than weaken security. Exposing Side-Channel Monitoring. Closing the Loop. A new UDP reflection attack vector. Google Authenticator Updated. Does Israel use NSO Group commercial spyware? A Russian OS? TP-Link routers compromised. A pre-release security audit. Another Intel side-channel attack. Windows users: Don't remove cURL! AI comes to VirusTotal. Show Notes https://www.grc.com/sn/SN-921-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twittv drata.com/twit
Picture of the Week. The Encryption Debate. Age does matter... Age Verification. WhatsApp: Rather be blocked in UK than weaken security. Exposing Side-Channel Monitoring. Closing the Loop. A new UDP reflection attack vector. Google Authenticator Updated. Does Israel use NSO Group commercial spyware? A Russian OS? TP-Link routers compromised. A pre-release security audit. Another Intel side-channel attack. Windows users: Don't remove cURL! AI comes to VirusTotal. Show Notes https://www.grc.com/sn/SN-921-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twittv drata.com/twit
Picture of the Week. The Encryption Debate. Age does matter... Age Verification. WhatsApp: Rather be blocked in UK than weaken security. Exposing Side-Channel Monitoring. Closing the Loop. A new UDP reflection attack vector. Google Authenticator Updated. Does Israel use NSO Group commercial spyware? A Russian OS? TP-Link routers compromised. A pre-release security audit. Another Intel side-channel attack. Windows users: Don't remove cURL! AI comes to VirusTotal. Show Notes https://www.grc.com/sn/SN-921-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twittv drata.com/twit
NSA Cybersecurity Director Says 'Buckle Up' for Generative AI As sea levels rise, the East Coast is also sinking Russian Bank Releases a ChatGPT Rival Google's New Cloud-Based Authentication Isn't End-to-End Encrypted Yet The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say High-Severity SLP Flaw Can Amplify DDoS Attacks up to 2,200 Times John Brisco, CEO and Co-Founder of Coherent talks about a SAS service to unlock the data in your spreadsheets. Hosts: Louis Maresca and Brian Chee Guest: John Brisco Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit lookout.com
This week, Marques launched his own sneaker in collaboration with Atoms! It's called the M251 and Marques gets into how it all came to be towards the end of the podcast. Before that, there was a ton of news! Marques, Andrew, and David discuss Samsung rumors, AI, the new Xiaomi 13 Ultra, the Lucid Gravity EV, and features that should've come to Google Authenticator and WhatsApp a long time ago. Then we wrap it all up with some trivia questions! Links: Samsung S24 batteries: https://bit.ly/samsungs24wvfrm AI Pizza commercial: https://bit.ly/PizzaAIcommercial Google Authenticator update: https://bit.ly/googleauthwvfrm WhatsApp update: https://tcrn.ch/3LCW8mC Lucid Gravity: https://bit.ly/lucidgravitywvfrm List of M251 videos: https://bit.ly/M251Videos Shop the merch: https://shop.mkbhd.com Twitters: Waveform: https://twitter.com/wvfrm Marques: https://twitter.com/mkbhd Andrew: https://twitter.com/andymanganelli David: https://twitter.com/DurvidImel Adam: https://twitter.com/adamlukas17 Ellis: https://twitter.com/EllisRovin Instagram: https://www.instagram.com/wvfrmpodcast/ TikTok: https://www.tiktok.com/@waveformpodcast Join the Discord: https://discord.gg/mkbhd Music by 20syl: https://bit.ly/2S53xlC Waveform is part of the Vox Media Podcast Network. Learn more about your ad choices. Visit podcastchoices.com/adchoices
iPhone 15 Pro's design, colors, and feature rumor roundup, potential tweaks for Wallet and Find My in iOS 17, possible limitations on sideloading. Apple's plans to expand their health services with mood tracking and a new journaling app.Contact our hosts@stephenrobles on TwitterStephen on Mastodon@Hillitech on TwitterWes on MastodonSponsored by:Headspace: Get a FREE one-month trial with access to the entire Headspace library! Visit headspace.com/appleinsider30 to learn more.Notion: Try out the incredible power of Notion AI today! For a limited time, try Notion AI for free when you visit: notion.com/appleinsiderLinks from the showApple might limit iOS sideloading when it releases in iOS 17iOS 17 might have tweaks for Wallet and Find MyApple's iOS 17 changes will affect the lock screen againRumor: iPadOS 17 will have a special version for larger iPadsJudge upholds Apple's victory in App Store antitrust ruling iPhone 15 Pro: Rumors, design, colorsApple to expand Health services to include mood and eye trackingMysk Tweet on Google AuthenticatorGoogle adds syncing to its Authenticator security appReview: Apple Watch is beautiful, but rough around the edgesFitness Stats on the App StoreSupport the showSupport the show on Patreon or Apple Podcasts to get ad-free episodes every week, access to our private Discord channel, and early release of the show! We would also appreciate a 5-star rating and review in Apple PodcastsMore AppleInsider podcastsTune in to our HomeKit Insider podcast covering the latest news, products, apps and everything HomeKit related. Subscribe in Apple Podcasts, Overcast, or just search for HomeKit Insider wherever you get your podcasts.Subscribe and listen to our AppleInsider Daily podcast for the latest Apple news Monday through Friday. You can find it on Apple Podcasts, Overcast, or anywhere you listen to podcasts.Podcast artwork from Basic Apple Guy. Download the free wallpaper pack here.Those interested in sponsoring the show can reach out to us at: steve@appleinsider.com (00:00) - Intro (01:50) - iOS 17 Rumors (10:21) - iOS 17 Sideloading (17:48) - iCloud Drive Wish (22:12) - Sponsor: Headspace (24:27) - iPadOS 17 Leak (29:00) - iPhone 15 Rumors (36:10) - Sponsor: Notion (38:15) - Health + Journaling (52:08) - Google Authenticator (53:30) - Apple Watch Anniversary (57:24) - CarPlay ★ Support this podcast on Patreon ★
Github, FIN7, Banks, Minecraft, Google Authenticator, Qualcomm, TenCent, BlueSky, Derek Johnson talks about China and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn293
Alphabet reports revenue and earnings beat for first quarter. Only 28 legacy verified users signed up for Twitter Blue hours after Elon Musk removed their checkmarks. Elon Musk Figured Out the Media's Biggest Weakness. Facebook Made BuzzFeed, Then Killed It. Jonah and the Whale. Traffic by Ben Smith. Pichai teases AI, Pixel, and Android at Google I/O 2023. Nate Silver Out at 538, ABC News as Disney Layoffs Hit ABC News. These celebrities 'subscribed to Twitter Blue.' Except they're dead. Jean Twenge is ready to make you defend your generation again. Jarvis thread on further research regarding teens and social media. Senators unveil bipartisan legislation to ban kids under 13 from joining social media platforms. Meta Reports First Quarter 2023 Results. Tucker Carlson's Vulgar, Offensive Messages About Colleagues Helped Seal His Fate at Fox News. Look Out, Tesla, There's a Really Tiny Competitor in Your Rearview Mirror. U.S. Supreme Court to decide if public officials can block critics on social media. School Chromebooks are creating huge amounts of e-waste. Tesla wins lawsuit over Autopilot Model S crash. Video of the Pixel Fold. AI-generated Drake song is an insult to the artistry of hip-hop. Grimes invites people to use her voice in AI songs. Google Authenticator finally, mercifully adds account syncing for two-factor codes. Google on why Authenticator sync isn't E2E encrypted, but the option is coming later. Google Messages starts showing end-to-end encryption for RCS group chats out of beta. Google is making it much easier to search for tools in Docs, Sheets, and Slides. Google ups Chromebook privacy with a new camera and mic switch. Google Bard can now write, debug, and explain code. Google Assistant will stop speaking after turning on smart home devices. Picks: Stacey - Aqara Adds Presence Sensor FP2 to its Smart Sensor Portfolio. Leo - Mouthpad: The world's first available hands-free touchpad. Jeff - EXTREMELY ONLINE: THE UNTOLD STORY OF FAME, INFLUENCE, AND POWER ON THE INTERNET by Taylor Lorenz. Jeff - Google median income: $279,500. Ant - My Big Round World: (in a Little Square Book) by Shawn Powers. Ant - Much Respect For Mr. Sharpe and His Work. Hosts: Leo Laporte, Jeff Jarvis, Stacey Higginbotham, and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/this-week-in-google. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twig CDW.com/HPE meraki.cisco.com/twit
Alphabet reports revenue and earnings beat for first quarter. Only 28 legacy verified users signed up for Twitter Blue hours after Elon Musk removed their checkmarks. Elon Musk Figured Out the Media's Biggest Weakness. Facebook Made BuzzFeed, Then Killed It. Jonah and the Whale. Traffic by Ben Smith. Pichai teases AI, Pixel, and Android at Google I/O 2023. Nate Silver Out at 538, ABC News as Disney Layoffs Hit ABC News. These celebrities 'subscribed to Twitter Blue.' Except they're dead. Jean Twenge is ready to make you defend your generation again. Jarvis thread on further research regarding teens and social media. Senators unveil bipartisan legislation to ban kids under 13 from joining social media platforms. Meta Reports First Quarter 2023 Results. Tucker Carlson's Vulgar, Offensive Messages About Colleagues Helped Seal His Fate at Fox News. Look Out, Tesla, There's a Really Tiny Competitor in Your Rearview Mirror. U.S. Supreme Court to decide if public officials can block critics on social media. School Chromebooks are creating huge amounts of e-waste. Tesla wins lawsuit over Autopilot Model S crash. Video of the Pixel Fold. AI-generated Drake song is an insult to the artistry of hip-hop. Grimes invites people to use her voice in AI songs. Google Authenticator finally, mercifully adds account syncing for two-factor codes. Google on why Authenticator sync isn't E2E encrypted, but the option is coming later. Google Messages starts showing end-to-end encryption for RCS group chats out of beta. Google is making it much easier to search for tools in Docs, Sheets, and Slides. Google ups Chromebook privacy with a new camera and mic switch. Google Bard can now write, debug, and explain code. Google Assistant will stop speaking after turning on smart home devices. Picks: Stacey - Aqara Adds Presence Sensor FP2 to its Smart Sensor Portfolio. Leo - Mouthpad: The world's first available hands-free touchpad. Jeff - EXTREMELY ONLINE: THE UNTOLD STORY OF FAME, INFLUENCE, AND POWER ON THE INTERNET by Taylor Lorenz. Jeff - Google median income: $279,500. Ant - My Big Round World: (in a Little Square Book) by Shawn Powers. Ant - Much Respect For Mr. Sharpe and His Work. Hosts: Leo Laporte, Jeff Jarvis, Stacey Higginbotham, and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/this-week-in-google. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twig CDW.com/HPE meraki.cisco.com/twit
Alphabet reports revenue and earnings beat for first quarter. Only 28 legacy verified users signed up for Twitter Blue hours after Elon Musk removed their checkmarks. Elon Musk Figured Out the Media's Biggest Weakness. Facebook Made BuzzFeed, Then Killed It. Jonah and the Whale. Traffic by Ben Smith. Pichai teases AI, Pixel, and Android at Google I/O 2023. Nate Silver Out at 538, ABC News as Disney Layoffs Hit ABC News. These celebrities 'subscribed to Twitter Blue.' Except they're dead. Jean Twenge is ready to make you defend your generation again. Jarvis thread on further research regarding teens and social media. Senators unveil bipartisan legislation to ban kids under 13 from joining social media platforms. Meta Reports First Quarter 2023 Results. Tucker Carlson's Vulgar, Offensive Messages About Colleagues Helped Seal His Fate at Fox News. Look Out, Tesla, There's a Really Tiny Competitor in Your Rearview Mirror. U.S. Supreme Court to decide if public officials can block critics on social media. School Chromebooks are creating huge amounts of e-waste. Tesla wins lawsuit over Autopilot Model S crash. Video of the Pixel Fold. AI-generated Drake song is an insult to the artistry of hip-hop. Grimes invites people to use her voice in AI songs. Google Authenticator finally, mercifully adds account syncing for two-factor codes. Google on why Authenticator sync isn't E2E encrypted, but the option is coming later. Google Messages starts showing end-to-end encryption for RCS group chats out of beta. Google is making it much easier to search for tools in Docs, Sheets, and Slides. Google ups Chromebook privacy with a new camera and mic switch. Google Bard can now write, debug, and explain code. Google Assistant will stop speaking after turning on smart home devices. Picks: Stacey - Aqara Adds Presence Sensor FP2 to its Smart Sensor Portfolio. Leo - Mouthpad: The world's first available hands-free touchpad. Jeff - EXTREMELY ONLINE: THE UNTOLD STORY OF FAME, INFLUENCE, AND POWER ON THE INTERNET by Taylor Lorenz. Jeff - Google median income: $279,500. Ant - My Big Round World: (in a Little Square Book) by Shawn Powers. Ant - Much Respect For Mr. Sharpe and His Work. Hosts: Leo Laporte, Jeff Jarvis, Stacey Higginbotham, and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/this-week-in-google. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twig CDW.com/HPE meraki.cisco.com/twit
Google Authenticator finally, mercifully adds account syncing for two-factor codes. BMW brings digital car key support to Android with support for Pixel and Samsung. Android now has a smart solution for crashing apps. Kuba leaks the Pixel Fold. More Google Pixel Fold Specs Leak: It Seems Like a Real Contender For Samsung's Galaxy Z Fold. Google Pixel Tablet pricing starts to leak out. Google's Expensive Pixel Tablet Dock Leaks on Amazon. Motorola officially teases new Razr foldable. Motorola Razr's outer display will measure 3.5 inches as the official teaser comes out. Motorola set to launch two foldables, including the cheaper 'Razr Lite'. OnePlus' first tablet will cost $479. Upcoming Reddit changes may spell the end of free third-party apps. Decentralized Twitter competitor 'Bluesky' now has an Android app. Winamp is coming to Android, but it's not what you think. Flashback: After Over 15 Years Of Service, Winamp Will Cease To Be Available For Download Starting December 20th. JR's tip of the week: JR's final YouTube tips video. Looking for a DUMB smartphone. Has Samsung fixed the Exynos vulnerability yet? Why is Smart Lock not working anymore? Read our show notes here: https://bit.ly/3L2OHDM Hosts: Jason Howell, Ron Richards, and Huyen Tue Dao Co-Host: JR Raphael Subscribe to All About Android at https://twit.tv/shows/all-about-android. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: decisions.com/twit
Welcome to #Millennial, the home of pretend adulting and real cybersecurity talk! On this week's episode, we are joined by cybersecurity professional Voldimmoral! If you're looking for tips to remove your personal information from the internet, check out her Medium article! Your digital footprint can be left even if you're not intentionally disclosing information. Voldimmoral details how in her line of work, digital footprints have enabled her to help solve crimes! Even the most security conscious among us can be vulnerable to personal information getting out online: this is why it's particularly important to help the less web savvy in your life be protected online. On a related note, 2-factor authentication has been in the news a lot lately, with Twitter announcing they would no longer support SMS (text message) 2-factor. What are some more secure 2-factor authentication options? We recommend Google Authenticator or using a Yubikey. Voldimmoral also chats with us about the pros and cons of password manager apps - and the upcoming Passkeys authentication method. This week's recommendations are a real grab bag! Cut resistant gloves (Andrew), Making a donation to Everytown for gun safety (Laura), and Lazarus Naturals (Voldimmoral). And in this week's installment of After Dark, available on Patreon and Apple Podcasts: Voldimmoral hangs out with us to talk cybersecurity fails! We love our parents, but the boomer really does show sometimes... How to dupe Nextdoor into sending hundreds of invitations to an ever expanding radius of neighbors. How to spot a phishing or social engineering scheme. Learn more about your ad choices. Visit megaphone.fm/adchoices
Rich talks about the steps you can take to reclaim your privacy, including creating unique passwords for each account, turning off third party cookies on your web browser, using an ad blocker, setting up a guest network on your Wi-Fi and creating a QR code to help your guests login, reviewing privacy settings on iOS, Samsung and Android, revoking app permissions on iOS and Android, checking connected apps and websites on Google, Facebook and Instagram and backing up your files and turning on two factor authentication.Mike called and asked why his old iPad can't access the internet anymore. Rich says it's time for a new one and you can recycle the old one using Gizmogo.Acropylpse explained; why you should update the software on Pixel phones and be aware of sharing screenshots with personal information on Windows.Lance Ulanoff joined the show to talk about the TikTok hearings.Jamie called and asked about how to learn more about changes in Windows 11. Rich recommended Microsoft tutorials. She also wanted to know how to set up a Windows computer without logging into a Microsoft account, Rich suggested she look for an “offline” login option during setup.If you have a Netgear Orbi it's time to check for a software update because of a security flaw that's been fixed.Rich's first impressions of Google Bard, their answer to ChatGPT.Turtis called in and asked if their new LED lights could be interfering with their TV reception.A visit to Outer Edge LA, a show that focuses on Web3 tech including Blockchain and NFT's.Chris asked about router recommendations, specifically Google's mesh system. Rich recommended looking at Eero and Vilo.Rich talked about people getting hacked on Twitter right now and how the company is changing it so if you don't pay you need to use an app for Two Factor Authentication. Rich recommended Authy, Google Authenticator and Microsoft Authenticator.Susan asked about the Lenovo Chromebook for a friend who is computer phobic.Rich explained how you can get a free 30 days trial of Verizon just by downloading the My Verizon app and using an eSIM on an unlocked phone.Gloria asked about a new phone since her Moto G takes terrible photos and doesn't get good reception. Rich recommended a Pixel 6a unless she can wait for the 7a which is rumored to launch in May.Vivek Pandya from Adobe joined to talk about the latest trends in online shopping.Arthur called to ask about needing a BitLocker code to get into his computer. Rich said to look in his Microsoft Security settings.The wedding website Joy has a new AI tool to help you write wedding speeches, toasts and more.Feedback: Richard wrote in about his HP Instant Ink subscription.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.