Podcasts about hackers

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Share on LinkedIn
Copy link to clipboard

Computing term

  • 5,926PODCASTS
  • 15,437EPISODES
  • 43mAVG DURATION
  • 6DAILY NEW EPISODES
  • May 19, 2022LATEST

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about hackers

Show all podcasts related to hackers

Latest podcast episodes about hackers

Love Your Work
279. Summary: Industrial Society and Its Future (The Unabomber Manifesto)

Love Your Work

Play Episode Listen Later May 19, 2022 16:59


Industrial Society and Its Future, is otherwise known as “The Unabomber Manifesto,” written by Ted Kaczynski. Kaczynsnki is a terrorist who killed three people, and injured twenty-three others, by sending bombs through the mail, between 1978 and 1995. He used his terror campaign to exploit the negativity bias of media and pressure the Washington Post and New York Times into publishing his 35,000-word anti-technology manifesto. Obviously, what Kaczynski did was horrible, but his manifesto is a thought-provoking, albeit extreme, perspective on technology. And so here is my summary of Industrial Society and Its Future. Leftism creeps towards totalitarianism The manifesto begins with a seemingly out-of-place rant about leftism creeping toward totalitarianism: According to Kaczynski, leftists have low self-esteem, are defeatist, and hate themselves. They hate success, and feel the groups they try to protect are inferior. They are overburdened by guilt over their natural drives, and so want to turn into issues of morality things that don't have anything to do with morality, such as policing the use of words to which they themselves have applied negative connotations. Anti-left is not far-right When people hear anti-leftism, they tend to assume the person with those views is far-right. But it's worth noting that's not Kaczynski's view. A quote, for example: [Leftists] want to preserve African American culture. But in what does this preservation of African American culture consist? It can hardly consist in anything more than eating black-style food, listening to black-style music, wearing black-style clothing and going to a black- style church or mosque. In other words, it can express itself only in superficial matters. In all ESSENTIAL respects most leftists of the oversocialized type want to make the black man conform to white, middle-class ideals. In sum, Kaczynski is anti-left, because ultimately leftists still work to preserve the industrial system. This appears to come out of “left-field,” but the meat of the manifesto is more coherent, and later we'll better understand why he brought up his views on leftism. Industrial society robs us of the “Power Process” As industrial society progresses, Kaczynski says, people lose more and more freedom. This makes them miserable, because it robs them of what he calls the “power process.” The power process consists of four main elements: A goal Effort put forth toward that goal The attainment of that goal Autonomy in pursuit of that goal To be happy, a person needs goals that require effort, a reasonable rate of success in achieving those goals, and personal control throughout that process. We replace the power process with “surrogate activities” You might think we, in industrial society, have many goals we pursue and attain through effort, but Kaczynski says we merely pursue what he calls “surrogate activities.” Surrogate activities are artificial goals, because they aren't for the purposes of meeting our basic biological needs, and so aren't totally fulfilling. He says we merely think surrogate activities, such as our jobs, are fulfilling, because we have to do very little in industrial society to meet our basic biological needs – such as eating, or having shelter. So, we've never felt true fulfillment. All we do is either easy or impossible He says there are three kinds of drives we experience in the pursuit of goals: 1) minimal effort, 2) serious effort and 3) impossible. The power process, he says, is more about group two, or serious effort. Our surrogate activities require minimal effort. But at the same time, many other things are impossible in industrial society, because we don't have control over them. For example, our security depends upon decisions made by others, such as safety standards at a nuclear power plant, how much pesticide is in our foods, and how much pollution is in our air. Somebody else makes these decisions for us, and in many cases we can't even know if what we're being told is true. As technology grants freedoms, it takes them away He points out that technology seems to grant us freedoms, but it really takes them away. As each advance in technology is collectively accepted, we lose control in some new area. Cars have become so ubiquitous you can't walk in many places. So you need to get further integrated into the industrial system by getting a drivers' license, insurance, and registration. Or, you can take the bus and have even less freedom. As we're increasingly able to alter our genes, it will become harder to enforce a code of ethics. First, genetic engineering will be used to treat genetic diseases, then further alterations will be seen as “good.” The upper class will decide what's good or not, until we have a genetically-engineered upper class, and a distantly-lower class taking genetic rolls of the dice. (This is already happening, as gene splicing is being used to treat diseases such as sickle-cell anemia, meanwhile a scientist in China crossed the agreed-upon ethics line and genetically-engineered children.) We'll outsource decisions to computers, until we no longer understand ourselves the decisions the computers are making. So we'll keep them running to keep the system afloat. At that point, the machines will be in control. Kaczynski thinks mood-altering drugs are over-prescribed, often just to deal with the psychological stress of living in industrial society. If more people need, say, antidepressants to tolerate living in a depressing world, that world is then allowed to get even more depressing, until the drugs are a requirement. (This reminds me of the soma everyone in modern society takes in the dystopian science-fiction book, Brave New World. That book has also been made into a series.) My thoughts: Coronavirus and the power process I couldn't help but think about this loss of control Kaczynski describes as I watched people's behavior during the coronavirus pandemic. While I personally chose to follow protocols and get a vaccine, it was an interesting moment when industrial society clashed with individual autonomy. To sustain industrial society – which is so ubiquitous it's impossible to “opt-out” – institutions deemed it necessary to make blanket decisions on the behalf of individuals. Some people weren't cool with that. Whether their reasoning made logical sense was irrelevant – the emotional roots of their reactions were understandable. Industrial society and the gig economy One thought-provoking quote from the manifesto sounds like a prediction of the gig economy. It has been suggested, for example, that a great development of the service industries might provide work for human beings. Thus people would spent [sic] their time shining each other's shoes, driving each other around in taxicabs, making handicrafts for one another, waiting on each other's tables, etc. This seems to [me] a thoroughly contemptible way for the human race to end up, and [I] doubt that many people would find fulfilling lives in such pointless busy-work. They would seek other, dangerous outlets (drugs, crime, “cults,” hate groups) unless they were biologically or psychologically engineered to adapt them to such a way of life. Industrial society makes us fear mortality Your immediate reaction might be that industrial society is worth the lack of control. It increases average lifespan, and prevents early deaths from infant mortality, disease, or relatively easy fixes, such as an appendicitis. Kaczynski says our obsession with longevity and staying youthful is a symptom of our lack of fulfillment, due to the disruption of the power process. If we lived lives full of autonomous struggle toward goals that directly met our biological needs, we would be more at peace with aging and death. A quote: It is not the primitive man, who has used his body daily for practical purposes, who fears the deterioration of age, but the modern man, who has never had a practical use for his body beyond walking from his car to his house. Activism is a surrogate activity He then ties the disruption of the power process back to his criticism of leftism. He says leftists' surrogate activity is activism, or joining social movements. They have a goal, and struggle toward achieving that goal, but they'll never be satisfied. This, he says, is how leftism creeps toward totalitarianism. Once one goal is achieved, another will be invented. The proposed plan: let the system destroy itself His entire manifesto is written from the perspective of “we.” He poses as a group of people called “FC,” standing for “Freedom Club,” and presents a strategy for his goal of destroying industrial society, and replacing it with primitive society. Kaczynski points out that modernity separates us from our local communities. We break ties to family and move, so we can work a job, in the name of efficiency. He advocates for living in small groups, and growing his anti-technology movement by having as many children as possible. The conflict line: masses vs. power-holding elites Interestingly, he says to draw the conflict line in this movement between the masses and the power-holding elites, and cautions specifically against turning it into a conflict between those who are revolutionaries and those who are not. This is some impressive strategic thinking, as it was also mentioned in the book, Blueprint for Revolution. I interviewed the author, Srdja Popovic, on episode 179. Popovic pointed out, for example, that Occupy Wall Street was a poorly-branded movement, because it drew a conflict line between those who could participate by camping out in the financial district, and those who could not. Calling it “the 99%” would have drawn a more effective conflict line. Don't strive for political power Counterintuitively, Kaczynski advises to not try to gain political power. He says that if the “green” party were to get voted into office, it would cause massive unemployment, they would get voted out of office, and it would turn people off to the party. He supported free trade agreements such as NAFTA, because he felt it would further integrate the industrial system, making it more likely it would collapse, and causing such a collapse to be more widespread. He says to be anti-left – and this is where we start to see the motives behind his seemingly-out-of-place opening rant. He doesn't want to see leftists take over his movement, because he thinks they would replace the goal of eliminating modern technology with their own goals. He says leftists will never give up technology because ultimately they crave power. Basically, he doesn't want to work within any existing structures of industrial society. He instead wants to see living in industrial society get so bad that the hardships can only be blamed on the system. Small-scale technology is more robust than large-scale He says small-scale technology is robust to shocks – local things such as planting crops, raising livestock, or making clothes. He points out that when the Roman Empire fell, people in villages could still make a water wheel or steel. But the aqueducts were never rebuilt, their road-construction techniques were lost, and urban sanitation was forgotten. Media manipulation, aka, why the Unabomber killed people Many people these days are surprised to find out that the Unabomber Manifesto contains intelligent and coherent ideas. They merely think of Ted Kaczynski as a mentally-ill murderer. If he's so intelligent, why did he kill people? In the manifesto itself, Kaczynski explains that he felt this was the only way to get his message out. He reasons that if he had merely submitted his writings to a publisher, they would have been rejected. If they had been published, they wouldn't have attracted readers, because everyone is too distracted by entertainment. So, he says, “In order to get our message before the public with some chance of making a lasting impression, we've had to kill people.” Our obsession with violence caused violence As explained in my Trust Me, I'm Lying summary, humans have a negativity bias, and so media has a negativity bias. Ironically, this is a case where our paranoia about negative events apparently caused negative events. Newspapers and news shows covered Kaczynski's terror campaign for more than fifteen years, until he sent his manuscript, typed on a typewriter, to several newspapers, essentially saying: Publish this, and I'll stop killing people. What Kaczynski did to get coverage makes the tactics Ryan Holiday confessed to look like actions of a saint. His bombings were “pseudo-events” with very real consequences. Assuming this was truly Kaczynski's strategy – and not a backwards-rationalization he came up with after doing what he simply wanted to do – was it an effective strategy? His reputation precedes him, such that people resist taking his manifesto seriously, given what he did. While he got his words published, even nearly thirty years after his last bombing, it's hard to see his words through the dark cloud of his crimes. The manifesto helped catch the Unabomber Publishing the manifesto was an effective strategy for law enforcement in catching Kaczynski. Attorney General Janet Reno gave the okay for the Post and Times to publish the manifesto. This put it in front of enough people the FBI was finally able to identify the anonymous killer. Kaczynski's brother's wife recognized him from what he said in the manifesto. Was this the explosion before the implosion? Reading Kaczynski, I can't help but wonder, If he could have held off a little longer or been born in a different time, might he might have been able to tolerate society? Kaczynski's terror campaign spanned a peak in what Marshall McLuhan calls “mechanical technology.” As his campaign was ending, in 1995, the internet was proliferating – an “electric technology.” This was a world where having a job meant commuting to an office, following a dress code, and working within a hierarchical organization. Once you were home, your only contact with others besides your family or people you called on the phone was media fed to you through your television or radio, or through objects that had to be transported, such as paper books, magazines, records, or VHS tapes. The internet has de-mechanized our world But the internet has further de-mechanized our world. More creators, such as myself, work with near-complete autonomy, outside of traditional hierarchies. People connect with one another around interests. We communicate without borders. As Marshall McLuhan described in Understanding Media (which I summarized on episode 248), mechanical technology “explodes” our world – an unfortunate but apt metaphor in this context. Mechanical technology compromises our individuality to turn us into cogs that fit together, while electric technology “implodes,” allowing our individuality to once again blossom. In 1998, the Washington Post reported that Kaczynski nearly confessed to a psychologist, in the late 60s, that he fantasized about being a woman. He didn't confess, and later cited that as the moment he decided to become violent. Maybe if his gender dysphoria had been more acceptable, his path may have been different? Today's society may not be the small-scale society Kaczynski envisioned, and this electric implosion certainly has its problems, especially as it conflicts with the structures in place from the mechanical world. But, maybe it would be just a little less pressure, so as to prevent trying to blow up the place. About Your Host, David Kadavy David Kadavy is author of Mind Management, Not Time Management, The Heart to Start and Design for Hackers. Through the Love Your Work podcast, his Love Mondays newsletter, and self-publishing coaching David helps you make it as a creative. Follow David on: Twitter Instagram Facebook YouTube Subscribe to Love Your Work Apple Podcasts Overcast Spotify Stitcher YouTube RSS Email Support the show on Patreon Put your money where your mind is. Patreon lets you support independent creators like me. Support now on Patreon »       Show notes: http://kadavy.net/blog/posts/industrial-society-and-its-future-summary/

1010XL Jax Sports Radio
Hacker After Dark 5-18-22

1010XL Jax Sports Radio

Play Episode Listen Later May 19, 2022 85:35


Hacker After Dark 5-18-22 by 1010 XL Jax Sports Radio

Weird AF News
Mastercard allows you to pay using your face. FBI says don't hire any North Korean hackers please.

Weird AF News

Play Episode Listen Later May 18, 2022 25:09


Real kissing is finally possible in Virtual Reality. FBI wants you to please not hire any North Korean hackers. Mastercard is about to let you pay using your own face. // Weird AF News is the only daily weird news podcast hosted by a comedian and recorded in a closet. Show your SUPPORT by joining the Weird AF News Patreon where you'll get bonus episodes and other weird af news stuff http://patreon.com/weirdafnews  - WATCH Weird AF News on Youtube - https://www.youtube.com/weirdafnews - check out the official website https://WeirdAFnews.com and FOLLOW host Jonesy at http://instagram.com/funnyjones or http://twitter.com/funnyjones or http://facebook.com/comedianjonesy or http://Jonesy.com

WIRED Security: News, Advice, and More
The Hidden Race to Protect the US Bioeconomy From Hacker Threats

WIRED Security: News, Advice, and More

Play Episode Listen Later May 18, 2022 5:17


A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.

The President's Daily Brief
May 18th, 2022. North Korean Super Hackers. US Intel Community Failures in Ukraine. Student Loan Forgiveness?

The President's Daily Brief

Play Episode Listen Later May 18, 2022 21:05


It's May 18th. You're listening to the President's Daily Brief. I'm your host and former CIA Officer Bryan Dean Wright. Your morning intel starts now. First up, North Korea is sending out the troops this morning. But not the ones you'd expect. We're talking cyber warriors. We'll discuss the latest and why you should care. Your second brief, The US intelligence community is admitting that it botched key predictions in both Ukraine and Afghanistan over the past year. We're going to talk about what happened and why it's so important. And as always, I'm keeping an eye out for developing stories. Put this one on your radar. Joe Biden wants to forgive student loans, but a new survey shows that students don't actually need it. I'll explain. All up next on the President's Daily Brief. ------ Please remember to subscribe if you enjoyed this episode of the President's Daily Brief. Learn more about your ad choices. Visit megaphone.fm/adchoices

This Week in Health IT
Reverse Engineering a Hackers Approach to Breaking into Healthcare

This Week in Health IT

Play Episode Listen Later May 18, 2022 48:55


May 18, 2022: What do hackers want from healthcare? Join us for a special episode. Reverse Engineering, a Hackers Approach. https://www.linkedin.com/in/guidogrillenmeier/ (Guido Grillenmeier), Chief Technologist at Semperis and https://www.linkedin.com/in/mattsickles/ (Matt Sickles), Solutions Architect at Sirius Healthcare walk us through Semperis Purple Knight. A free tool to help you find your most dangerous vulnerabilities. AD is typically a weak point for HC organizations. 90% of attacks exploit AD. It is very difficult to gain an understanding of where your AD is at risk. Purple Knight maps those indicators to the MITRE ATT&CK Framework and provides guidance on how to fix the issues. As hackers, what defenses do we have to be concerned about? What will cause us to choose a different target? If we are detected will that just move our timeline up or will we move on? How long do we need access to the compromised AD to know if we can get to our target hack? How much time do we need in the target system? And flipping back to the other side, what can a CIO do today to ensure their health system is ready for an attack on their Active Directory?  Key Points: AD is typically a weak point for HC organizations, 90% of attacks exploit AD It is very difficult to gain an understanding of where your AD is at risk You cannot secure older operating systems the same way as newer ones What is the state of active directory right now? Download https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.purple-knight.com%2F%3Futm_medium%3Dpd%26utm_source%3Dtwih%26utm_campaign%3Dss%26utm_content%3Dpk&data=05%7C01%7Cthomasl%40semperis.com%7Cbeaaa05a46754ed180af08da386f965b%7C994bd4e175044e39989148149b5eccf2%7C0%7C0%7C637884349292308349%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cdC0fGGJe7XI%2FrFBntBDKIZJb1blQCige7biI9ai5go%3D&reserved=0 (Semperis Purple Knight) now

1010XL Jax Sports Radio
Hacker After Dark 5-17-22

1010XL Jax Sports Radio

Play Episode Listen Later May 18, 2022 85:23


Hacker After Dark 5-17-22 by 1010 XL Jax Sports Radio

mixxio — podcast diario de tecnología
En Internet nadie sabe que eres norcoreano

mixxio — podcast diario de tecnología

Play Episode Listen Later May 18, 2022 12:51


Gmail con dominio propio gratis / Cohetes chinos caen en India / Rusia no se desconectará de Internet / Cambios en las suscripciones de Apple / La Primera Web como Patrimonio de la Humanidad Patrocinador: El CTO Summit de GeeksHub vuelve con más fuerza que nunca. El evento clave para todos los responsables de equipos de IT se celebra el 24 y 25 de junio en Valencia, y este año va a ser impresionante por la calidad de las ponencias, las charlas y en general un programa lleno de cosas interesantes. — Con el código MIXX45 consigue tu entrada con un 45% de descuento. Gmail con dominio propio gratis / Cohetes chinos caen en India / Rusia no se desconectará de Internet / Cambios en las suscripciones de Apple / La Primera Web como Patrimonio de la Humanidad

The Lance Wallnau Show
Lance Exposes Criminal Hackers

The Lance Wallnau Show

Play Episode Listen Later May 17, 2022 21:27


Lance Exposes Criminal Hackers and reveals some intensely personal information about men wearing makeup. But before that he gets to the real purpose of the broadcast… Lance needs YOU to tell him what to say on Flashpoint tomorrow night when Gene Bailey asks Lance about the Second Passover and the Blood Moon phenomena. What have you got?

TechStuff
Tech News: Musk's Twitter Deal On Hold

TechStuff

Play Episode Listen Later May 17, 2022 34:22


Elon Musk says unless Twitter can prove its claim that less than 5% of all monetizable accounts are bots, the acquisition deal won't progress. A security researcher shows it's possible to unlock and start a Tesla vehicle through hacking. And how many times is your data traded online every day? See omnystudio.com/listener for privacy information.

Security Happy Hour
Building Your Community

Security Happy Hour

Play Episode Listen Later May 17, 2022 61:41


Building your community in IT/Cyber/InfoSec can seem like a daunting task. However, it is necessary and extremely beneficial not only to find work, but also collaborating on ideas, mental health, and learning.Tonight's guest is Robert NotarfrancescoBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Robert Notarfrancescohttps://twitter.com/RetweetableN14Bio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#cybersecurity#securityhappyhour#cyberwarriorstudios#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security#cyberawareness#securitychampions#Networking#SocialNetworks#CareersSupport the show

Security Happy Hour
Cyber Career Talk with Mike Miller

Security Happy Hour

Play Episode Listen Later May 17, 2022 71:00


Navigating the cyber world and finding a career can be difficult. Tonight we will discuss Mike's journey and how you can best find your path to the field.Tonight's guest is Mike MillerBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Mike Millerhttps://twitter.com/totalmikedotcomhttps://linkedin.com/in/mikesportfolio/Bio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#cybersecurity#securityhappyhour#cyberwarriorstudios#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security#cyberawareness#securitychampions#Networking#SocialNetworks#CareersSupport the show

Der ichbindochnichthierumbeliebtzusein.com PodCast - Technik, Gadgets, Meinungen und aktuelle Themen, die das Netz und die We
#209 Was denn? Schon wieder Passwort-wechsel-Tag? Ja, wie alle Jahre am ersten Donnerstag im Mai, also am 05.05.2022, ist World Password Day!

Der ichbindochnichthierumbeliebtzusein.com PodCast - Technik, Gadgets, Meinungen und aktuelle Themen, die das Netz und die We

Play Episode Listen Later May 17, 2022 11:32


Was denn? Schon wieder Passwort-wechsel-Tag? Ja, wie alle Jahre am ersten Donnerstag im Mai, also am 05.05.2022, ist World Password Day!Es ist noch gar nicht so lange her, dass ich euch den ersten Februar des Jahres als "Ändere Dein Passwort Tag" vorgestellt habe. Und, ohne Panikmache, habe ich versucht, euch klarzumachen, dass die gängigsten Tricks, die uns die letzten Jahre begleitet haben und uns immerhin ein paar "Merkregeln" für gute Passwörter geliefert haben, nicht mehr gelten. Hacker haben aufgerüstet, die Technik kann mehr als sonst - und das wird hierbei gegen uns angewendet. Echte Sicherheit bietet nur ein zweiter Schlüssel - umso besser, dass Microsoft, Google und Apple vor ein paar Tagen angekündigt haben, auf das Passwort künftig verzichten zu wollen... und ja, zum Wohle der Sicherheit... WAS BITTE? FIDO-Keys in verschiedener Ausführung / Bild-/Quelle: privat Ich hatte auch im jährlichen Blogpost und Podcast zum "Ändere Dein Passwort"-Tag Anfang Februar bereits darauf hingewiesen, dass Phishing, Social Engineering und klassisches Hacken mit höchster IT-Power oder wirklich gute und echt wirkende Spam-Mails in Kombination mit einem deiner schwachen Passwörter ein echtes Risiko für Accounts aller Art darstellen. Vorbei die Zeiten, wo zuerst die E-Mail gehackt wird, um dann bei Versandhäusern die Passwort-Reset-E-Mail abzufordern, ohne dass du es merkst. Heutzutage existieren riesige Datenbestände, die teils aufgedeckt, teils unter dem Darknet schlummern und, rein statistisch, mindestens eine Kombi aus einer deiner E-Mails und dem zugehörigen Passwort im Klartext kennt. Auch werden Anhänge, die sich selbst installieren und jeden Tastendruck in Echtzeit um die Welt schicken oder mittlerweile richtig gut und echt klingende, eben mit den korrekten Deutschkenntnissen ausgestattete Spam-Mails verschickt, die nur auf ihre Opfer warten. Da sollten die Zeiten von 12345 als Passwort vorbei sein - und doch ist es immer noch eins der meistgenutzten und gehackten Passwörter. Dabei, und nun ein kleines Dankeschön an Intel für die Erfindung des Ändere-Dein-Passwort-Tages, immer am ersten Donnerstag im Mai. Also dieses Jahr passenderweise am 05.05. Auch passend dazu haben die drei großen, Google, Microsoft und Apple angekündigt, dass Passwort abzuschaffen. Bleibt entspannt, das ist nichts, was in der Folgewoche live und aktiv geschaltet wird, aber es ist eine sichere, nein, eine sicherere Perspektive, als sich dauernd selbst neue Passwörter zu überlegen. Oder einen Passwortmanager dazu zu verwenden. Und es ist nicht neu. Nur leider wird es noch zu wenig angewandt: der zweite Faktor. Und wie es der Zufall will, haben die drei, also, von zweien, nämlich Google und Microsoft weiß ich es mit Sicherheit, bei Apple... keine Ahnung... bereits mindestens eine Lösung am Start. Microsoft dürfte noch die jüngste Anwendung haben, die auf dem Handy einen Code, der am Rechner angezeigt wird, zur Bestätigung nochmals bestätigt oder eine Zahl von dreien angetippt haben will. In Redmond arbeitet man aber mit Hochdruck daran, die aktuelle App zu einem kompletten Passwortmanager auszubauen. Die App heißt Authenticator. Auch Google hat schon lange einen 2FA-Dienst kostenfrei im Angebot. Auch diese heißt einprägsam Google Authenticator. Hier können neben Google alle weiteren kompatiblen Dienste, sei es dein E-Mail-Anbieter oder auch ein Onlineshop oder ein weiteres Login wie bei WordPress hinterlegt werden. Im Minutentakt ändert sich ein sechsstelliger Code, der auch Service-seitig entsprechend abgeglichen werden kann. Nur so kommst du, neben Eingabe von Nutzername - der übrigens auch mit gewisser Vorsicht und nicht nur "einem für alles" im Netz benutzt werden sollte! - und deinem Passwort einen entsprechenden Code, der dir dann den Zugang zu deinem Dienst oder Account ermöglicht. Da dieser Code für jeden Account nur einmal abgerufen und in eine App gebracht werden kann, muss man dir schon das Handy aus der toten Hand schneiden, wohingegen dein Passwort gephished oder in den meisten Fällen nach ein wenig Social Engineering erraten werden kann. Oder eine Serverfarm von amazon, die man für ein paar Cent mieten kann, hat es in unter fünf Minuten geknackt. Du bist also schon ganz vorne mit auf der sicheren Seite, wenn du neben stetig wechselnden Nutzernamen und individuellen Passwörtern je Login einen zweiten Faktor über eine Authentifikation-App nutzt. Aber legen wir noch eine Schippe drauf, die das Abschaffen des Passworts mit begünstigen wird: der physikalische Schlüssel. Aktuell hat sich FIDO2 als Quasi-Standard schon im Markt etabliert, zwei prominente Vertreter haben so gut wie jedes Format mit jedem erdenklichen Funktionsumfang im Angebot: Yubico, von denen ich seit Jahren drei unterschiedliche Schlüssel benutze oder der direkte Mitbewerber, bei dem ich heute eher zuschlagen würde - aber nur aus persönlicher Präferenz, nicht, weil sie besser wären! -: Trustkey. Ich habe euch bei beiden Anbietern eines der USB-A-Einsteigermodelle verlinkt. Ihr kennt mich, amazon Junkie und so, daher ratet mal, wo die Links hingehen? Genau... wir verstehen uns! Und wer glaubt, dass 30 Euro eine Menge Holz sind, sollte sich die Produktpaletten ansehen: Yubico geht so richtig in teuer, Trustkey kostet zwar nur die Hälfte mit dem Bio-Topfmodell, aber auch da sind über 50 Euro für "nur" einen USB-Schlüssel weg. Allerdings: was für ein Schaden würde dir entstehen, wenn ein Eindringlich sich einen Tag völlig ungehindert in deiner E-Mail, facebook/meta/instadings, amazon Konto, Online-Banking und auch noch in deiner Cloud austoben könnte? Weil du überall den gleichen Nutzernamen hast und das Passwort nur zehn Stellen hat und zum Schluss einfach eine Nummer von 1-6 hochgezählt wird? Also bei mir wären es definitiv mehr als 50 Euro Schaden... andererseits könnte mir der Eindringlich aus Mitleid gerne was aufs Online-Konto packen... aber erfahrungsgemäß passiert sowas leider nie...! Aber zurück zum Thema: Erst das schlechte Gewissen: Wenn du, meinem Blog-Pod vom Februar folgende, deine Passwörter geändert hast, ist JETZT die beste Zeit, es erneut zu tun. Und zwar nach all den Regeln, die ich im Februar geschrieben hatte! Und, wo immer möglich, mit zweitem Faktor aktiv! Und klar ist eine Authenticator-App super! Aber wie wäre es mit einem Schlüssel, der erst deinen Fingerabdruck bestätigen und scannen muss, also, andersrum, aber ihr versteht mich schon, bevor er den Codeschnipsel zur Freigabe des virtuellen Eingangs in deinen Account ermöglicht?! Und ich sage es erneut: auch trotz Stick nicht schludern! Individuelle Benutzernamen und, solange sie noch da sind, moderne Passwörter mit 25 und mehr Zeichen, am besten per Passwortmanager. Und dann warten wir mal ab, was Google, Microsoft und Cupertino noch so alles einfällt, auf dem Weg in die Passwort-freie Zukunft. Und, ich habe da schon so eine Vermutung, wer wieder sein eigenes Süppchen kochen wird. Nichtsdestotrotz wird es auch ohne Passwort sicherer, weil auch hier die menschliche Komponente wieder ein Stückchen rausgenommen wird. Und eben ein fälschungssicherer und auch auf Open-Source basierender USB-Stick die Aufgabe übernimmt. Ich freue mich schon drauf! Also, passt auf eure Passwörter und Zugangsdaten auf. Und beginnt gleich heute noch, die alle mal zu ändern! PodCast abonnieren: | direkt | iTunes | Spotify | Google | amazon | STOLZ PRODUZIERT UND AUFGENOMMEN MIT Ultraschall5 Folge direkt herunterladen

1010XL Jax Sports Radio
Hacker After Dark 5-16-22

1010XL Jax Sports Radio

Play Episode Listen Later May 17, 2022 86:07


Hacker After Dark 5-16-22 by 1010 XL Jax Sports Radio

WDR 5 Neugier genügt - Das Feature
Witten: Wie ein Hackerangriff zum Umdenken führte

WDR 5 Neugier genügt - Das Feature

Play Episode Listen Later May 16, 2022 19:40


Keine Emails, kein Internet, kein Telefon: Ab dem 17. Oktober 2021 ging bei der Stadt Witten zeitweise elektronisch nichts mehr. Hacker waren in die EDV der Stadtverwaltung eingedrungen und hatten das komplette System lahmgelegt. Franz Altrogge über die Konsequenzen. Von Franz Altrogge.

WIRED Security: News, Advice, and More
The Case for War Crimes Charges Against Russia's Sandworm Hackers

WIRED Security: News, Advice, and More

Play Episode Listen Later May 16, 2022 10:49


A group of human rights lawyers and investigators has called on the Hague to bring the first-ever “cyber war crimes” charges against Russia's most dangerous hackers.

GenXGrownUp Podcast
Greatest Movie ABOUT Generation X Tournament: North Bracket

GenXGrownUp Podcast

Play Episode Listen Later May 16, 2022 44:50


Our friends at Project GenX invited us to participate in their 80s movie bracket elimination challenge to see which movie about Generation X will be number one! In this episode, we tackle the Northern bracket of eight films and run through the first two rounds of elimination to select two from our list to move forward in the tournament. Hear the Other Bracket Debates South: Society Owes Me a GenX Podcast pca.st/xt8nhpkn East: Project GenX Podcast pca.st/a82so54p West: GenXmixtape pca.st/tbnhrvti Patreon » patreon.com/genxgrownup Discord » GenXGrownUp.com/discord Facebook » fb.me/GenXGrownUp Twitter » GenXGrownUp.com/twitter Website » GenXGrownUp.com Podcast » GenXGrownUp.com/pod Merchandise » GenXGrownUp.com/merch Shop » genxgrownup.com/amazon Theme: “Grown Up” by Beefy » beefyness.com Apple » itunes.apple.com/us/podcast/genxgrownup-podcast/id1268365641 Google » GenXGrownUp Podcast (google.com) Pocket Casts » pca.st/8iuL Stitcher » www.stitcher.com/s?fid=146720&refid=stpr TuneIn » tunein.com/radio/GenXGrownUp-Podcast-p1020342/ Spotify » spoti.fi/2TB4LR7 iHeart » www.iheart.com/podcast… Amazon Music » amzn.to/33IKfEK Show Notes Round 1 Fast Times at Ridgemont High (1982) » amzn.to/39m8G1b (affiliate)     vs. Before Sunrise (1995) » amzn.to/3woImew (affiliate) Hackers (1995) » amzn.to/39NlaPo (affiliate)     vs. Clueless (1995) » amzn.to/3wa7hnd (affiliate) The River's Edge (1986) » amzn.to/3FFzF3T (affiliate)     vs. Bill & Ted's Excellent Adventure (1989) » amzn.to/38jwOS1 (affiliate) Repo Man (1984) » amzn.to/39fWMWs (affiliate)     vs. Boyz n the Hood (1991) » amzn.to/39fWTkQ (affiliate) Round 2 Fast Times at Ridgemont High (1982)     vs. Clueless (1995) Bill & Ted's Excellent Adventure (1989)     vs. Boyz n the Hood (1991) Visit the host of this bracket, Project GenX » pca.st/y748kot0 Be sure to check out the other participating podcasts! Society Owes Me a GenX Podcast » pca.st/9tqgk2mr GenXmixtape » pca.st/n22hi3no Mail the show » podcast@genxgrownup.com Visit us on YouTube » GenXGrownUp.com/yt Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines

Ukraine CERT-UA warns of new attacks launched by Russia-linked Armageddon APT Microsoft fixes new PetitPotam Windows NTLM relay attack vector Hackers are exploiting critical bug in Zyxel firewalls and VPNs And now let's thank today's sponsor, Torq Myth 1: Automation Is Only a Reactive Part of SecOps Incorrect. Proactive management of security incidents is just as important, like automatically scanning IaC configurations to detect vulnerabilities, automating collaboration between devs, IT ops and SecOps to prevent risks before they're threats. To learn more about the realities of automation, head to torq.io. For the stories behind the headlines, head to CISOseries.com.

Meu Walkman Amarelo
"H" de Hacker e "V" de Vingança com Guilherme Venske

Meu Walkman Amarelo

Play Episode Listen Later May 16, 2022 8:55


Estamos de volta! E continuando a segunda temporada do Meu Walkman Amarelo de hoje com a participação do Guilherme Venske, Nerd assumido e gosto musical forjado no Rock n' Roll, vamos ouvir a fita que ele mandou pra gente!Se curtiu já clica no follow pros episódios novos chegarem no seu feed do Spotify, aproveita e deixa lá o seu feedback, pra participar do programa, dar alguma sugestão, opinião é só mandar um email para meuwalkmanamarelo@hotmail.comInstagram: @alexandrejapa_mwaFicha técnica:O MWA é um projeto idealizado por Alexandre Japa, textos criados por Alexandre Japa, artes gráficas pela ilustradora maravilhosa Clau Souza, edição e publicação Alexandre Japa. See acast.com/privacy for privacy and opt-out information.

The Changelog
Run your home on a Raspberry Pi

The Changelog

Play Episode Listen Later May 13, 2022 80:43


This week we're joined by Mike Riley and we're talking about his book Portable Python Projects (Running your home on a Raspberry Pi). We breakdown the details of the latest Raspberry Pi hardware, various automation ideas from the book, why Mike prefers Python for scripting on a Raspberry Pi, and of course why the Raspberry Pi makes sense for home labs concerned about data security. Use the code PYPROJECTS to get a 35% discount on the book. That code is valid for approximately 60 days after the episode's publish date.

The Hacker Factory
From IT To Cybersecurity | A Conversation With Mark Harvey | The Hacker Factory With Phillip Wylie

The Hacker Factory

Play Episode Listen Later May 13, 2022 43:07


Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity.Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT director to cybersecurity consultant._______________________GuestMark HarveySecurity Engineer at AliasOn LinkedIn | https://linkedin.com/in/mark-a-harvey/______________________HostPhillip WylieOn ITSPmagazine  

Marketing with Purpose
Why Do Hackers Hack?

Marketing with Purpose

Play Episode Listen Later May 13, 2022 10:39


Once, somebody broke into my house. We came back from vacation, and we walked into the house. My oldest daughter, who was two at the time, goes, “Mama, where TV go?” I look over, and sure enough, no TV there. You know what else was gone? All the beer in our fridge. Somebody stole our beer, our TV and my husband's Big 12 championship ring, which was a real stinking bummer. We felt gross, violated and a little unsafe. That's how you feel, with a gigantic dollop of irritation plopped on top, when somebody hacks your stinking website. Why are they doing it anyway? Why do hackers hack? I'm going to tell you. They hack for three main reasons. For a fully-formatted article version of this podcast, head over to our website: https://mayecreate.com/blog/why-do-hackers-hack

RIGGED [against you]
The Crossroads Of Humanity

RIGGED [against you]

Play Episode Listen Later May 13, 2022 24:17


Terry Sacka, AAMS discusses what the series of mega-disasters happening around the world, problems with food production, inflation, natural disasters, war and other events are all leading to one thing...find out what that is.  I saw a wave, a dark wave, come over our nation. And it's not just the election, of course, but this program is going to be all in the name RIGGED because when I, and we formed RIGGED, it was because of the financial system, but RIGGED is now becoming common in America. And it's all RIGGED [against you].Free Silver Investment Guide: Build Wealth with Physical SilverTo Buy Gold Direct or Reach A Cornerstone Wealth Advisor:email:  clientsupport@cammetals.comtelephone: (888) 747-3309Support the show

Indian Rider Radio
IRR - S3E23 - Indian Motorcycle of San Diego's Angel June Hacker joins Caleb Barrett of Woods Indian Motorcycle on making a career out of their passion! Plus, BraveWolf Customs and Instagram's Tropical Bobber drop by

Indian Rider Radio

Play Episode Listen Later May 13, 2022 71:46


Indian Motorcycle of San Diego is home to a dynamic (and might I add, dazzling)  young woman who is one of a new breed of women in the motorcycle industry. Angel June Hacker is the General Manager in San Diego and a star in her own right on Instagram, and for good reason...There  are proud moments that come with working in the motorcycle industry. A former customer of mine is now a successful motorcycle salesman himself. Caleb Barrett was just a young, new rider when he and I first met. Now, he's selling Indian Motorcycles at Woods Indian Motorcycle in Texas. He talks about learning the ropes and what's driving sales these days.Then, friend of the show, Jason Dement of BraveWolf Customs drops in alongside his beautiful bride, Sheila. Jason is the Lilith Challenger, Sheila is the Tropical Bobber - together, this dynamic pair of artists are taking social media by storm...PATREON - SUPPORT THE SHOWBuzzsprout - Let's get your podcast launched! Start for FREE6D Helmets Cutting edge protection technology -. PROMO CODE IRR2021The V-Twin Blog Editor Larry Marshall with up-to-date motorcycle news, information, trends, highlights & advice!Throttle Addikt Ulta-cool, retro garage style wear for the discriminating biker. PROMO CODE IRR2022Bikers Info USA The only app you need! - dealers, events, media and more - Bikers Info USA Find it in the App StoreDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show

The GRID: A Power Rangers Podcast
The GRID Masterpiece Theatre #1: “Forging A Friendship” (Power Rangers Lost Galaxy)

The GRID: A Power Rangers Podcast

Play Episode Listen Later May 13, 2022 28:17


Welcome to yet another new GRID series, GRID Masterpiece Theatre! Today's performance is a dramatic reading of an unused script from #PowerRangers #LostGalaxy, "Forging A Friendship," in which Cassie becomes the Pink Galaxy Ranger instead of Karone. Follow us on TikTok, Twitter & Instagram @TheGRIDPR, and be sure to check out our Linktree for a complete list of where to find us! And if you'd like GRID merch, check out our Redbubble Shop! Recorded on May 6th, 2022. Theme song: “Hackers” by Karl Casey (White Bat Audio). Special thanks to SirStack for the script.

Culture en direct
Miss Kittin : "J'ai toujours été la punk de l'école"

Culture en direct

Play Episode Listen Later May 12, 2022 54:54


durée : 00:54:54 - Affaires culturelles - par : Arnaud Laporte - Reine de l'électroclash, Miss Kittin et sa voix désabusée retrouvent les beats synthétiques de The Hacker pour un troisième album sobrement titré "Third Album". L'occasion de revenir sur le parcours de Miss Kittin, en duo et en solo, de sa jeunesse grenobloise aux plus grandes scènes du monde.  - invités : Miss Kittin

Nessun luogo è lontano
La Finlandia nella NATO, il limbo, le minacce russe e l'esercito di hacker

Nessun luogo è lontano

Play Episode Listen Later May 12, 2022


Abbiamo esplorato i risvolti dell'imminente ingresso della Finlandia nella NATO conAlessandro Politi, direttore della NATO College Foundation. La presidentessa della Commissione europea in visita in Giappone ha incontrato il premier giapponese Fumio Kishida e l'incontro ha generato polemiche sia in Cina che in Russia: ne abbiamo parlato con Giulia Pompili, giornalista della redazione esteri del Il Foglio e autrice di "Sotto lo Stesso Cielo" (Mondadori). Infine abbiamo analizzato la minaccia cyber dei gruppi di hacker russi con Stefano Mele (avvocato esperto di cybersecurity, partner e responsabile della cybersecurity dello Studio Gianni&Origoni, Presidente della Commissione Sicurezza Cibernetica del Comitato Atlantico Italiano).

Denver Real Estate Investing Podcast
#372: Lessons Learned from First Time House Hackers in an Englewood Duplex

Denver Real Estate Investing Podcast

Play Episode Listen Later May 12, 2022 33:56


In this episode of House Hack Masterminds, Ben and Jeff sit down Kyle and Tiffany, who bought their first house hack in Englewood. They're adept at pivoting when faced with a challenge, from the city reclassifying their single family home to a duplex during closing, to shifting to a medium term rental strategy. Listen to the episode to hear their story and what they learned for their next property.

TRENDIFIER with Julian Dorey
#99 - This Guy Met With Julian Assange & Edward Snowden | Andy Greenberg

TRENDIFIER with Julian Dorey

Play Episode Listen Later May 12, 2022 179:10


(***TIMESTAMPS & Book Links in description below) ~ Andy Greenberg is an award-winning reporter, author, and hacking expert. Currently, Andy is a senior writer for WIRED, covering security, privacy, and information freedom. Throughout his career at Wired (and Forbes before that), Greenberg has been the go-to reporter on major international news stories including: Julian Assange & Wikileaks, Ross Ulbricht & Silk Road, Government-Sponsored hacking in Russia, China, & North Korea –– and the underworld of cryptocurrency. He's the author of “Sandworm” and “This Machine Kills Secrets” –– as well as the forthcoming book “Tracers in the Dark.” Furthermore, he was a main feature in the 2015 Documentary, “Deep Web,” about the downfall of Silk Road. “Sandworm” by Andy Greenberg: https://www.amazon.com/dp/B07GD4MFW2/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1  “This Machine Kills Secrets” by Andy Greenberg: https://rb.gy/4k2suv  ***TIMESTAMPS*** 0:00 - Intro; Andy remembers his first book about Wikileaks; The 2010 Collateral Murder Wikileaks drop; The Cypherpunks 18:03 - Andy talks about when Wikileaks came on his radar; How Andy got into contact with Julian Assange and landed 2010 in person interview with him in London; Andy talks about his sitdown Assange and what he thinks of him; How Wikileaks operates 43:54 - US Bias in Wikileaks reporting?; Assange and his impact on the 2016 election with the DNC email hack; Did Assange know who the source of the hack was?; Guccifer and how the DNC hack went down; The “religious” nature of the hacking argument 1:02:03 - How Andy came to discover the Sandworm story and begin reporting on it; The Ukrainian Power Grid takedowns of 2015 and 2016 and how it went down; The three agencies in Russia and where Sandworm fits in 1:23:57 - Andy explains NotPetya and the Ransomware attacks that groups like Sandworm in Russia utilized to hack and create chaos; The Equation Group hackers at the NSA; Zero Day explained; The Shadow Brokers and Eternal Blue; How Sandworm got into Ukraine's power systems in 2015 1:37:48  - Andy tells the story of the 2017 Maersk global NotPetya attack; The downstream effects across many industries from the Maersk attack; The sobering reality of our modern day all-tech world; Andy explains what happened with the NSA's Stuxnet attack on Iranian Nuclear Centrifuges 2:03:30 - Debating the Mutually Assured Destruction argument with respect to the cyberwar; China's activity in international hacking; “If Russia is a hurricane, China is climate change”; North Korea's criminal hacking teams; The White House just put a bounty on Sandworm 2:22:38 - We need a Geneva Convention for Cyber Warfare and Cyber crimes; The Obama and Trump Whitehouse positions on Russian hacking; Andy's conversation about Sandworm with Obama's Cybersecurity Czar J. Michael Daniel 2:39:22 - Boots on the ground  vs cyber on the ground in Ukraine Russia War?; China's place in the Russia Ukraine Conflict; Andy talks about sitting with Edward Snowden in Russia for an interview ahead of his book, “Sandworm”; What's Snowden like? ~ YouTube EPISODES & CLIPS: https://www.youtube.com/channel/UC0A-v_DL-h76F75xik8h03Q ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “TRENDIFIER”): https://eight-sleep.ioym.net/trendifier   PRIVADO VPN FOR $4.99/Month: https://privadovpn.com/trendifier/#a_aid=Julian Julian's Instagram: https://www.instagram.com/julianddorey ~ Beat provided by: https://freebeats.io Music Produced by White Hot

Hackers Podcast
Hackers Podcast #222

Hackers Podcast

Play Episode Listen Later May 12, 2022 61:41


Episode #222 5.11.2022 Iridium Satellite Hacking.. Live from Florida

Indie Hackers
#253 – Mother's Day, Unscrupulous Cofounders, and Why You Should Never Retire

Indie Hackers

Play Episode Listen Later May 11, 2022 36:31


Long-time listener, first-time guest — Courtland (@csallen) and Channing's (@ChanningAllen) mom, Eva, joins the pod to talk raising twins, buying gifts, selling computer parts, co-founder theft, an Indie Hackers quiz for moms, and why you should never retire.

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001
Historically Significant Hacks and How YOUR Business Can Avoid This List

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

Play Episode Listen Later May 11, 2022 41:31


We've all seen the news and read the headlines - Hackers aren't going anywhere anytime soon! In fact, quite the opposite is true... So what can YOU do to keep your company's name out of the papers? Listen in and find out!Hosts: Erin and BlakePlease like, subscribe and visit all of our properties at:YouTube: https://www.youtube.com/channel/UC8Hgyv0SzIqLfKqQ03ch0BgYouTube: https://www.youtube.com/channel/UCa9l3tgOOHMJ6dClNn8BiqQ Podcasts: https://petronellatech.com/podcasts/ Website: https://compliancearmor.comWebsite: https://blockchainsecurity.comLinkedIn: https://www.linkedin.com/in/cybersecurity-compliance/ Please be sure to Call 877-468-2721 or visit https://petronellatech.com

Easy Prey
Hackers Don't Wear Hoodies with Lisa Plaggemier

Easy Prey

Play Episode Listen Later May 11, 2022 42:25


Everyone is at risk when they're online. But there are simple security measures that you can implement that will make it more difficult to be hacked. Today's guest is Lisa Plaggemier. Lisa is the Interim Executive Director for the National Cybersecurity Alliance. She has held executive roles with Ford Motor Company, InfoSec, and Media Pro. She is also a frequent speaker at major events and is a thought leader for innovative security trainings and awareness programs.  Show Notes: [1:05] - The National Cybersecurity Alliance has a mission to enable a more secure interconnected world. [1:45] - Lisa was working in sales and marketing with Ford Motor Company, but shares an experience that changed her career trajectory. [4:27] - Lisa created a series of videos that became popular with viewers. [5:58] - Security professionals are well intentioned, but when educating people who are not technologists, you want to give just enough to stay interested. [7:21] - People use technology to enhance their lives. The internet was never built to be secure. [9:30] - Doing things securely doesn't always mean that the user should be frustrated. [11:04] - With keeping track of passwords, Lisa reveals the common misconception of password management sites. [12:28] - Another problem is with business accounts and corporations where employees think the company handles security. [14:23] - Unfortunately, there are some sites that don't make using a password manager easy. [15:31] - It really isn't necessary to change your password every 90 days as was previously important to do. [16:46] - It is important for people to research a company and their possible security breaches before doing business. [17:57] - Part of many sites are requiring two factor authentication as a part of the setup process. [19:27] - What if everyone did two factor authentication? [21:46] - Lisa shares some stereotypes of hackers and phishing emails. But they aren't like that anymore. Hacking has become very sophisticated. [24:42] - Advertising and stock images feed this stereotype. [26:24] - Organized crime is structured just like a professional organization. [28:40] - People involved with organized crime look at what they are doing as just their job. [30:04] - Lisa's prediction in cybersecurity will get worse before it gets better. [31:54] - In the security world, security professionals are improving their ability to educate the populace. [33:52] - If we don't report things, trends will not be noticed. [35:31] - Always keep your software and apps updated. Updates are usually security driven. [36:47] - The language barrier between employees of a company and the IT department is something that needs to be bridged. [39:31] - There are a lot of free resources available on the National Cybersecurity Alliance's website. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Lisa Plaggemier on LinkedIn National Cybersecurity Alliance Website

Town Hall Seattle Civics Series
287. Robert W. Gehl and Sean T. Lawson: Propaganda, Deception, and the Manipulation of Information

Town Hall Seattle Civics Series

Play Episode Listen Later May 10, 2022 61:59


The United States is awash in manipulated information about everything from election results to the effectiveness of medical treatments. Corporate social media is a particularly effective channel for manipulative communication — Facebook being a particularly willing vehicle for it, as evidenced by the increased use of warning labels on false or misleading posts. Not to mention the inconsistent, confusing, and controversy-stirring ways that comments and posts are moderated in social media spaces. While the methods of distributing misinformation have shifted with technological advancement, the principles of manipulative communication are nothing new. In Social Engineering, authors Robert Gehl and Sean Lawson explored how online misinformation is rooted in earlier techniques: mass social engineering of the early twentieth century and interpersonal hacker social engineering of the 1970s. The two methods converge today into what they call “masspersonal social engineering.” Through a mix of information gathering, deception, and truth-indifferent statements, the practice has one goal: to get people to take the actions desired by the social engineer. Are there better ways to understand the manipulation methods at play instead of reducing all information to a true/false binary? Together, Gehl and Lawson discussed manipulative communication of the past and present and how we might improve the ways that information is shared and consumed in the future. Robert W. Gehl is F. Jay Taylor Endowed Research Chair of Communication at Louisiana Tech University and the author of Weaving the Dark Web. Sean T. Lawson is Associate Professor of Communication at the University of Utah, Non-Resident Fellow at the Brute Krulak Center for Innovation & Future Warfare at the Marine Corps University, and author of Cybersecurity Discourse in the United States. Buy the Book: Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication from Elliott Bay Books Presented by Town Hall Seattle. To become a member or make a donation click here. 

Cyber and Technology with Mike
10 May 2022 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later May 10, 2022 9:33


In today's podcast we cover four crucial cyber and technology topics, including: 1.Hackers disrupt Russian TV programming on Victory Day 2.Ukrainian CERT  finds “chemical attack” themed phishing 3.Lincoln College closes due to financial impact of Covid, Ransomware 4.U.S. may fine Colonial Pipeline due to lack of physical controls I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

Engadget Morning Edition
Hackers are defacing Russian smart TVs to display anti-war messages

Engadget Morning Edition

Play Episode Listen Later May 10, 2022 3:41


Today's tech headlines: Hackers are defacing Russian smart TVs to display anti-war messages, NFTs are coming to Instagram this week, Sony has now sold over 19 million PS5s.

Engadget
Hackers are defacing Russian smart TVs to display anti-war messages

Engadget

Play Episode Listen Later May 10, 2022 3:41


Today's tech headlines: Hackers are defacing Russian smart TVs to display anti-war messages, NFTs are coming to Instagram this week, Sony has now sold over 19 million PS5s.

Communism Exposed:East and West
Chinese Hackers Steal Trillions of Dollars of Intellectual Property

Communism Exposed:East and West

Play Episode Listen Later May 9, 2022 25:57


Chinese Hackers Steal Trillions of Dollars of Intellectual Property

107.7 The Bone
Hackers Change Amber Heard's Name To Amber Turd On Her IMDb Page

107.7 The Bone

Play Episode Listen Later May 9, 2022 1:47


It was quite a weekend for Amber Heard. On Saturday, somebody hacked into the major Hollywood website, IMDB and changed Amber's official name to "Amber Turd.” So, when someone would try to Google "Amber Heard" - along with the titles of her films – “Amber Turd” would automatically pop up as the number one search result. And this gave us reason enough to return to one of our classic songs. Listen to Lamont & Tonelli Monday through Friday, 5-10am, on 107.7 The Bone in the San Francisco Bay Area. Follow Lamont & Tonelli: Website: http://www.landtradio.com/ Facebook: http://www.facebook.com/lamontandtonelli Twitter: http://www.twitter.com/landtshow Instagram: http://www.instagram.com/landtshow See omnystudio.com/listener for privacy information.

La Encerrona
#LaEncerrona La PNP expuesta (en todo su terruqueo) por hackers rusos

La Encerrona

Play Episode Listen Later May 9, 2022 21:30


Nuestra policía terruquea incluso a otras instancias del propio Estado peruano. ¿Cómo lo sabemos? Gracias a unos hackers que estuvieron chantajeando a la DIGIMIN. El Colegio de Nutricionistas del Perú recibió más de 300 mil soles de Gloria para "avalar" su leche en tarro azul... mirando solo la etiqueta. ADEMÁS: El asesor de la tesis plagiada de Castillo... no asesoró. Si quieres aprender sobre fundraising, movilizar fondos para una causa social, aquí hay un curso desde España con descuento encerroner. **** ¿Te gustó este episodio? ¿Buscas las fuentes de los datos mencionados hoy? Entra a http://patreon.com/ocram para acceder a nuestros grupos exclusivos de Telegram y WhatsApp. También puedes UNIRTE a esta comunidad de YouTube aquí https://www.youtube.com/channel/UCP0AJJeNkFBYzegTTVbKhPg/join **** Visita a Tkambio en sus redes sociales: Facebook: https://bit.ly/3mAqABP Instagram: https://bit.ly/3Drkj19 Youtube: https://bit.ly/2XXFmYV Y obtén el mejor tipo de cambio de verdad.

Komando On Demand
CEO passwords, jobfishing scams, new hacker schemes

Komando On Demand

Play Episode Listen Later May 9, 2022 39:23


Need to recover deleted files? Want to trade in old gear for Amazon cash? I've got you. Plus, I'll share a photography tip you can use to get the best action shots. In this episode, I'll share new hacking and scamming strategies to watch out for as well as the most common CEO passwords. (You won't believe how silly some of them are.) Learn more about your ad choices. Visit megaphone.fm/adchoices

I Like To Movie Movie
218 - Interview w/ Costa Botes, writer/director of FORGOTTEN SILVER

I Like To Movie Movie

Play Episode Listen Later May 8, 2022 79:13


You'll remember a few episodes back when we discussed the film Forgotten Silver, the faux-documentary delight from New Zealand by filmmakers Costa Botes and Peter Jackson. By some magic of blind luck, divine intervention, and/or SEO, the episode managed to come across the ears of Costa Botes himself, who was kind enough to join me for chat. In a historic feat of logisiics, I was able to calculate the time zone difference between Philadelphia and New Zealand and schedule a Zoom call that suited both of our schedules. In a downright heroic feat of tech savvy, I was able to cut out a portion of the interview where the free Zoom ran out of time and we had to restart. I feel like Angelina Jolie in Hackers. You do not want to miss Forgotten Silver, which you can check out here: https://vimeo.com/ondemand/forgottensilver Check out the trailer for Costa Botes' upcoming When the Cows Come Home here: https://vimeo.com/591323112 --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/moviemoviecast/support

The Hacker Factory
Mom, Electrical Engineer And US Air Force Vet Turned Pentester | A Conversation With Jennifer Bate | The Hacker Factory With Phillip Wylie

The Hacker Factory

Play Episode Listen Later May 8, 2022 45:18


Jennifer an Air Force vet, mom, and electrical engineer shares her journey into offensive security.Jennifer shares her struggles starting a career in offensive security. Not only is she a mother of two and she is the mother of a neurodiverse son. Jennifer tells how she used a targeted approach to networking and job hunting._______________________GuestJennifer BatePenetration Tester - Solution Consultant at Deloitte [@Deloitte]On Twitter | https://twitter.com/jenbattlesOn LinkedIn | https://www.linkedin.com/in/jenniferbate/______________________HostPhillip WylieOn ITSPmagazine  

The Top Entrepreneurs in Money, Marketing, Business and Life
Hacker Buys a SaaS Project for $7,500, Now Does $120,000 in Revenue

The Top Entrepreneurs in Money, Marketing, Business and Life

Play Episode Listen Later May 8, 2022 20:13


Buy & Sell Online Businesses

1010XL Jax Sports Radio
Hacker After Dark 5-6-22

1010XL Jax Sports Radio

Play Episode Listen Later May 7, 2022 87:20


Hacker After Dark 5-6-22 by 1010 XL Jax Sports Radio

The Changelog
Mob programming deep dive

The Changelog

Play Episode Listen Later May 6, 2022 87:15


We're talking with Woody Zuill today about all things Mob Programming. Woody leads Mob Programming workshops, he's a speaker on agile related topics, and coaches and guides orgs interested in creating an environment where people can do their best work. We talk through it all and we even get some amazing advice from Woody's dad. We define what Mob Programming is and why it's so effective. Is it a rigid process or can teams flex to make it work for them? How to introduce mob programming to a team. What kind of groundwork is necessary? And of course, are mob programming's virtues diminished by remote teams in virtual-only settings?

1010XL Jax Sports Radio
Hacker After Dark 5-5-22

1010XL Jax Sports Radio

Play Episode Listen Later May 6, 2022 86:23


Hacker After Dark 5-5-22 by 1010 XL Jax Sports Radio

Love Your Work
278. Summary: The Elements of Eloquence: Secrets of the Perfect Turn of Phrase

Love Your Work

Play Episode Listen Later May 5, 2022 11:48


There are some invisible structures in language, and using them can be the difference between your message being forgotten or living through the ages. These are The Elements of Eloquence, which is the title of Mark Forsyth's book. I first picked this up a couple years ago, and have read it several times since then. I think it's one of the best writing books, and has dramatically improved my writing. Here is my summary of The Elements of Eloquence: Secrets of the Perfect Turn of Phrase. How powerful could this stuff be? Can hidden patterns in language really be the difference between being remembered and forgotten? The technical term for the study of these patterns is “rhetoric,” and yes, it can make a big difference. Misremembered phrases While it's hard to find data on what has been forgotten – see 99.9% of everything ever said or written – there are examples of things that have been misremembered. You've heard the expression, “blood, sweat, and tears.” That comes from a Winston Churchill speech. He actually said he had “nothing to offer but blood, toil, tears, and sweat.” Remember when, in The Wizard of Oz, the Wicked Witch of the West said, “Fly, my pretties, fly!”? Well, it never happened. She actually merely exclaimed “Fly!” four times in a row. The line remembered as “Hell hath no fury like a woman scorned”, was actually "Heav'n has no rage, like love to hatred turned, Nor hell a fury, like a woman scorned." I'll get into some theories about why these phrases were misremembered in a bit. Non-sensical expressions You can also see evidence of the power of rhetoric in expressions that have spread through culture. Sometimes they don't make literal sense, but have appealing patterns. It “takes two to tango,” but why not “it takes two to waltz”? People go “whole hog,” but why not “whole pig”? Why “cool as a cucumber”? Why “dead as a doornail”? Alliteration You may have noticed these phrases all have alliteration, which is the simplest of rhetorical forms. You're probably already familiar with it. All you have to do to use alliteration is start a couple words in a phrase with the same letter. I've noticed some evidence of the power of alliteration looking at expressions across English and Spanish. For example, if you directly translated “the tables have turned,” which is said often, nobody would know what you were talking about. But they would understand if you directly translated “the things have changed,” which nobody says. In Spanish, that's “las cosas han cambiado.” See? Alliteration. Tricolon So, why was Winston Churchill's quote misremembered as “blood, sweat, and tears.” Forsyth thinks it was probably because the tricolon is more appealing than the tetracolon. A tricolon is when three things are listed, a tetracolon, four. Famous tricolons include, “Eat, drink, and be merry,” and “It's a bird! It's a plane! It's superman.” Barack Obama's short victory speech in 2008 had twenty-one tricolons. Forsyth points out that tricolons seem to be more memorable if the first two things are short and closely-related, and the final thing is longer and a little more abstract. Like, “Life, liberty, and the pursuit of happiness.” Isocolon Tricolon is three things, tetracolon is four, so is isocolon just one? In a way. An isocolon is not one thing, but one structure, repeated two times. For example, “Roses are red. Violets are blue.” Epizeuxis When you do repeat one thing, that's called epizeuxis. So, when the Wicked Witch of the West said, “Fly! Fly! Fly! Fly!,” that was epizeuxis, but it didn't turn out to be memorable. Diacope People think the Wicked Witch of the West said “Fly, my pretties, fly!” That structure is called a diacope, which is essentially a verbal sandwich. It's one word or phrase, then another word or phrase, then that same word or phrase once again. So “Burn, baby burn,” from the song “Disco Inferno” was diacope, and so was one of the most famous lines in film, “Bond. James Bond.” Why do people think the Wicked Witch of the West said, “Fly, my pretties, fly!”? Probably not only because diacope is a more memorable form than epizeuxis, but also because there's other diacope in the film, such as “Run, Toto. Run!” Zeugma So, why did the phrase “Hell hath no fury like a woman scorned,” live on? I notice there's some alliteration in the phrase (“Hell hath...”), but Forsyth doesn't attribute any rhetorical structures to the phrase. However – besides the sweeping generalization about women that can't help but tickle the tribal human mind – the actual, original phrase came in the form of zeugma. Zeugma is using one verb to apply action to multiple clauses. So if you write “Tom likes whisky, Dick vodka, Harry crack cocaine,” you're using the verb “likes” one time for all three clauses, instead of repeating it. So the original phrase was from a seventeenth-century play called The Mourning Bride, and, once again, went “Heav'n has no rage, like love to hatred turned, Nor hell a fury, like a woman scorned.” The having is attributed to both heaven and hell, which makes it a zeugma. Ironically, Forsyth points out, there's a few phrases using zeugma that aren't remembered as such. So zeugma is memorable, but it's not. My personal theory is zeugmas take more attention to process. They make you stop and read it again. That extra attention helps us remember, but our memories are simplistic. This is something I get to see firsthand when people tell me they've read one of my books. You'd be amazed the different variations the human mind puts on simple titles such as The Heart to Start or Mind Management, Not Time Management. Chiasmus We've established that alliteration is pretty powerful for creating memorable phrases, and we've talked about why some short phrases are misremembered. But what about longer pieces of prose? The most powerful rhetorical form for a full sentence has to be the chiasmus. The word chiasmus comes from the Greek letter, “chi,” which is shaped like an X. So, chiasmus is when language crosses over. For example, when the three musketeers said, “One for all, and all for one,” that was chiasmus. The structure is ABBA, which happens to also be the name of a band that didn't do too poorly. Politicians use chiasmus a lot. Hillary Clinton said, in her bid for president, “The true test is not the speeches a president delivers, it's whether the president delivers on the speeches.” Forsyth points out that JFK's inauguration speech was “chiasmus crazy.” Having watched it on YouTube, I have to agree, there's enough chiasmus to make you dizzy. But at least one of those phrases lived on: “Ask not what your country can do for you, but what you can do for your country.” One chiasmus I've noticed – on a more granular level – is in the title of The Four Hour Work Week. It's a chiasmus of assonance – assonance being the repetition of vowel sounds. It goes, E-O-O-O-E: The Four Hour Work Week. Mix that in with a little alliteration (“Work Week”), and a promise you can't ignore (working four hours a week), and you've got a book title with a chance to be a hit. Anadiplosis, Epistrophe, Anaphora A few more rhetorical forms that have to do with the order of words within clauses: anadiplosis, epistrophe, and anaphora. Anadiplosis is repeating the last word or phrase of a clause as the first word or phrase of the next. Yoda used anadiplosis when he said, “Fear leads to anger. Anger leads to hate. Hate leads to suffering.” Malcolm X used anadiplosis of phrases when he said, “Once you change your philosophy, you change your thought pattern. Once you change your thought pattern, you change your attitude.” That's also anaphora, which is starting each sentence or clause with the same words. Anaphora was also used in the Bible: “A time to be born, and a time to die; a time to plant, and a time to pluck up that which is planted,” which just sounds wrong if you're more used to the adaptation of this in the song, “Turn! Turn! Turn!”, by The Byrds. Now, if you end each clause, sentence, or paragraph with the same word or phrase, that's something different. That's called epistrophe. Dean Martin used epistrophe, singing, “When the moon hits your eye like a big pizza pie, That's amore. When the world seems to shine like you've had too much wine, That's amore.” Honorable mention There's of course much more to The Elements of Eloquence. The terms for these rhetorical forms are intimidating and hard to remember, but Mark Forsyth weaves together his descriptions with incredible, well, eloquence. Some other forms that deserve honorable mention: Syllepsis: using a word one time, but in two different ways. “Make love not war,” is a subtle syllepsis. Polyptoton: using a word twice, as both a noun and an adjective. “Please please me” was a polyptoton. Hendiadys: using an adjective as a noun, such as if you were to say, “I'm going to the noise and the city.” Merism: referring to the parts, rather than the whole, such as when you say, “ladies and gentlemen.” Metonymy: using a thing or place to represent something that thing or place is connected to, such as if you were to say, “Downing street was left red-faced last night at news that the White House was planning to attack the British Crown with the support of Wall Street.” There's your Elements of Eloquence summary There's my summary of The Elements of Eloquence. There's a lot more in the book about bringing eloquence to longer passages of text, such as through rhythmical structures like iambic pentameter. Will using these structures automatically make your writing great? No, in fact if you practice these structures, your writing will probably be a little strange at first. But you're probably alrea