Podcasts about petya notpetya

  • 12PODCASTS
  • 13EPISODES
  • 47mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 19, 2019LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about petya notpetya

Latest podcast episodes about petya notpetya

Craig Peterson's Tech Talk
Facebook, Google or Apple?, DNA Databases and the Legal Implications, Businesses and Security: AS HEARD ON WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Jun 19, 2019 15:22


Craig is in the WGAN Morning News with Ken and Matt. This morning,  we touched on a whole bunch of topics in the news. We discussed Apple's newly announced single sign-on and what they are doing that makes it different.  We delved into DNA testing and some of the legal implications that are currently in the news. We talked about the NSA and the unprecedented step they took to warn everyone about the latest Microsoft vulnerability and why we must take it seriously.  I gave  Ken, a tongue-in-cheek explanation as to how he could fix the problems he is experiencing with his MacBook Pro keyboard.   These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: CEOs and Business Owners Aren't Taking CyberSecurity Seriously - And Are Facing Huge Penalties Week After Week Vulnerability After Vulnerability   Multiple Logins The Bane of Modern Online Life Technology and Database have Murderers and Rapists Crying Foul --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 06/19/2019 Apple keyboard Issues, Legal implications of DNA databases, Apple's new Single Sign-on, NSA Warnings on latest Microsoft vulnerabilities, --- Craig Peterson Hey, good morning, everybody. Craig Peterson, here. This morning, I got to talk with Ken and Matt a little bit. We discussed Ken's problem with his Apple keyboard, and I gave him a couple of solutions. His MacBook Pro. We reminisced a bit of a few things today, in fact, even with Matt. We did finally get to talk about some of the security problems that are out there., right now, There are some things you might want to be sure to give serious attention. We also went into some depth on Apple's new service that even Google is praising and is going to be a major competitor of theirs, right there in the same arena. So here we go with Ken and Matt. Matt Gagnon It is 738 on a Wednesday morning, which means it is time to talk to Craig Peterson who joins us now. Craig, how are you this morning? Craig Peterson Hey, it is, he does, and I'm doing well this morning. Matt Gagon Welcome back to the program. Ken Altshuler Craig my keyboard on my MacBook Pro keyboard keeps falling off. I am getting quite irritated. I'm going to bring it back, and they're going to have to send it to get fixed with a whole new keyboard. I'm not getting my computer back for a week. It has got to stop this insanity. It's got to stop. Craig Peterson Ken such a first world problem. Apple has, I think they still do, have a program for businesses, they had a program you would pay them a few hundred bucks per year. And they would give you loners and everything else if your machine had a problem. Ken Altshuler That is okay I could use Dropbox, and I could probably access it remotely. But you see Craig, nobody uses Word Perfect but me, anymore. Craig Peterson I was about to say that. Yeah, I'm glad you said it. Not me. No word perfect. There are still some lawyers out there that do that. Ken Altshuler It's the greatest ever made. Why would anybody use MS Word, it just sucks? Craig Peterson Well, I yeah, I was a big fan of WordStar to Ken Altshuler I used WordStar, too. Craig Peterson Yeah, I used to like that a lot. Then WordPerfect came along was perfect for attorneys. A lot of attorneys adopted it. Then I moved into Emacs. But I'm a geek. And it's not really for text editing. And I've used some others like TeX and LaTeX and Roff, and man all kinds of different typesetting tools and stuff over the years. I get you like that WordPerfect for your work again. Well, back to your keyboard. You've got that first generation of Apple's butterfly keyboard. Ken Altshuler That's correct. They'd said that they are not on the fourth version of it. Craig Peterson Yeah, they keep making changes to try and fit. What they did is they that they designed it so it would be small and light and narrow. They keep making this thing smaller. My son has one of these, and I think it's a second or third generation of a butterfly keyboard. I tried it, and I don't like it. I didn't feel of it. Right. But there's a certain point where they have to cut their losses. You know I learned on mechanical typewriters, right. 100%. Mechanical. Then a teletype, TTY 33. Back in the day. I liked the motion. I enjoy the click-clack, and it's big deep motion. I don't know, I think it's these kids, it's Matt's generation. Ken Altshuler It is magic. Matt Gagnon I don't know anyone, if you call me that, again, I'm going to come over there and punch you in the face with a baseball bat. Ken Altshuler See how angry they are? That generation. I do have a portable Bluetooth keyboard. However, the problem with that is, when you use it with the MacBook Pro, you have to put it so far out, that you can't see what you're typing because it's so far away. Matt Gagnon Nobody knows what you mean Craig Peterson You need to go to the dollar store and get a different pair of glasses. That will work for you. I have three different pairs of reading glasses, three different strengths, depending on how far away my screen is away. And so on might be all you have to do is you need a prescription. Thank God I don't need a glasses prescription. I need reading glasses. I have like one and a half, one and three quarters and twos. Sometimes I have to put two or three pair at the same time. If I need to read, the faintly printed model number on the back of a Mac. Ken Altshuler I take a picture of it and then enlarge it, to read those. Craig Peterson I've got a magnifying app. Matt, you can go away for a while. Ken Altshuler What's the name? Because I could use one. Craig Peterson I don't remember. I type in magnifier, and then it comes right up. But It's fantastic. It just it goes into super zoom mode and makes it easy to see. But you know that the high tech problems we have Apple are now kind of admitted they have a problem with a keyboard but not totally. But try some different reading glasses. That's what I do. Ken Altshuler I have to get the keys fixed. I've got an appointment at the Genius Bar tomorrow. The heart of geniuses I must say, and speaking of geniuses, why are murderers and rapists upset at technology, prey tell? Craig Peterson Yeah. What do you know about the Golden State Killer? You guys everybody's pretty much familiar with the this is the case of out in California. In California, where they had several murders, this was decades ago. They were never able to solve them. Then what the police did is that they went online, as many of us have done, to one of these DNA testing companies. I've done it, and my family's done it. Well, what happened is that when people have done it. In many cases they have shared their DNA information to find family members. And frankly, that's kind of cool. Sometimes, you'll find second, third, fourth, fifth cousins. Anyway, they go into these public databases, and the terms of views allow anyone to go in and search and try and find family members. Well, in the case of the Golden State killer, they found that it was an ex-cop responsible for the killings. At least, I think that that's might still be an allegation. I don't know, if he's actually been convicted, yet. Well, now we're seeing the same thing happening in another case. But in this case, both parties have conceded that okay, you're, you're obtaining of the evidence was legal. But Ken, this is a really, interesting question because the police used one of these public databases of DNA that people are using to share to find other family members. From that public DNA database that gave them a clue as to where to look. When they started looking more closely at this family because the DNA indicated that it was someone within you know, a few relatives of the suspect and narrowed it down to this one guy. They were able to get, I think it was like like a coffee cup or something, that was discarded by the guy at the crime scene. They pulled the DNA off of that and found it to be an exact match from you know, DNA is never like 100 hundred percent, but consider, yeah, an exact match. And so now they pulled him into court. It's a real, exciting case with unique problems, as you know, from the Legal side. How far does it go? Both sides conceded that, okay, that they legally obtained the initial DNA information, so there will be no challenge in court on that point. However, here's another side of this as well, that is the online website that the police used has since hanged their terms of service. Now they are no longer allowing police to do searches for DNA matches. Ken Altshuler Why? It makes no sense. Craig Peterson They're afraid that people are not going to put their DNA up or do searches any longer, for fear that the police might get involved or their DNA might get used for solving a crime. I agree with you. I don't know why you wouldn't, but, but that's why. It is one of the most significant sites out there for this public sharing of DNA information. They changed the terms of use two days after the police, apparently used it to find this guy. That brings up an interesting question. And I agree with you can I don't know what Matt saying, but you know, why would they do that? But should there? Should there be a law? Reminds me of something my dad always used to say. "there ought to be a law against that," or for that, or whatever. It will put a little bit of a kink into some of these police investigations. Matt Gagnon All right, Craig Peterson, our tech guru. He joins us now as he always does at this time on Wednesdays, Craig, the other day, I was signing my son up for soccer, whatever, and I couldn't for the life of me remember the login thing that I had created last year for the site. Like the week before that I had to log into something else that I hadn't logged into in a year. It happens to me pretty frequently. I just had to change my stupid password on this dumb computer. I have about thousand 1000 logins that I need, you know, in my head at any given time, and they are continually making me change my passwords and everything else. I can never keep it all straight. Is someone going to save me? Craig Peterson No. You're doomed? Matt Gagnon Oh, no, that's not the right answer. Craig Peterson Well, you already know about Facebook? Are you've seen sites that say to click here to login, with Facebook. And you've seen websites that do the same thing with Google, you know, use your Google login. There's a few of those out there. I have used them once or twice to see how they worked. I don't personally use those. Well, now Apple has come out with their login. It's a multiple login service, and you know by now that I like almost everything Apple is doing nowadays. They are trying to show "Hey, listen, we're going to keep your data safe, we're not going to keep it, we're not going to share it because we don't have it." "We're going to keep that information other than enough information that's required to get you logged in." I think that the fascinating thing about this is that with this multiple logins, single sign-on thing, that Apple's come up with, oh, btw, it's not quite available yet, but it will be. Apple has deals in place with almost everybody. It is going to be very big. Their concept is better than some of the others. Google has come out and said, "Hey, listen, we don't keep that information, either." Well, this is a company that used to say don't be evil, right, Google said. Google came up with a tacit recommendation for the Apple sign-in service saying, "Hey, listen, this is a read going to be a very, good thing for the internet although we don't share our information." They think this is going to be better, much better than normal logins. Not only do people forget them, and of course, many people misuse it them by using the same password, the same email on multiple systems. It's a bit of a problem. I think that you know if I was going to use one, once the Apple ones when it comes out, that's what I'd use. Under no circumstances would I trust Facebook at all with my data. I never use the Facebook Single Sign-On, on other sites. I don't use the Google Sign on, because frankly, they're trying to collect all of the data they can in the world and I don't trust them. The bottom line with Apple, If I am going to trust somebody at this point. They're the guys I trust, today. Ken Altshuler We're talking to Craig Peterson, our tech guru, who joins us every Wednesday at 738. You know, the people on our radio station makes us take a security test all the time. Now, are all the CEOs and business owners that conscientious? Matt Gagnon Are we way ahead of the curve? Ken Altshuler Well said. Craig Peterson Matt, Is that true? Or are they just giving Ken the test? Matt Gagnon Sadly, Craig, I have to report that they give it to me as well. Craig Peterson Well, I'm glad to hear that. The techniques and bad guys are using keep changing, and frankly, we have got to keep our employees up to date. Matt Gagnon Okay, that's fair enough, Craig. But there's a man in a gorilla suit in the video. Craig Peterson Really? Matt Gagnon And I can pass the quiz without watching the videos. Craig Peterson Or in a Bunny Suit, one of the two, right? Yeah, you know, we got to get back to the brass tacks of security and making sure employees are up to date at that is a good start. You don't want to overburden them by continually doing some of these pieces of training. I've seen a lot of them. We signed up for a company that provided us with training videos that we could provide your customers. I watched them and about pulled my hair out and stabbed by eyeballs out. They were so bad. We stopped using them. Now we send out a little notification email. Okay, guys watch out for this with a couple of samples, and maybe once in a while a short one to two-minute video explaining it. However, we need to get back to the brass tacks, everybody. That's the bottom line. And that means, the password stuff. Now we've got the NSA doing though this is the first time, it is unprecedented. Ken and I and may Matt, I think you're old enough to remember that the NSA used to stand for no such agency because the federal government denied it even existed. Well, now it's gotten to the point where the NSA has a warning out right now about cyber attacks. They are warning that this could be the worst ever worldwide computer shutdown. It's just incredible. It is all about BlueKeep and some other stuff. Why could this be the worst ever? Remember, two years ago, almost now, we had the shutdown to hundreds of thousands of computers around the world because of an attack - WannaCry and Petya/NotPetya. At the time it was worst ever. It all happened because we were not covering the underlying security best practices. We're not doing the brass tacks of security. We're not making sure we've patched our systems. We're not making sure we're following the right schedules. I have yet to go into a company and find that they've got their basics in order. I don't blame them for having you guys take these little tests. I think it's frankly, generally speaking, an excellent idea. Matt Gagnon All right, Craig Peterson, our tech guru, joins us this time every Wednesday. Craig, we appreciate it. As always, thank you so much. We will talk to you again next week, sir. Craig Peterson Take care, guys. Bye. Ken Altshuler Thanks a lot. Alright. So we're going to take a quick break. Craig Peterson Hey, everybody, have a great day. I'll be back Of course, with my weekend radio show, heard in the Northeast and throughout the Northeast. In fact, and it'll be a whole lot of fun. Of course, we will be talking about all the newest tech news out there. As we readily quickly heard, we are working on getting ready for our big summer of security coming up. We're going to do it. Need information, email me at Craig Peterson dot com. Have a great day, everybody. Talk to you later. Bye-bye. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553  

InSecurity
BlueKeep: It’s Not Just About The Worm

InSecurity

Play Episode Listen Later Jun 13, 2019 70:48


BlueKeep: It’s Not Just About The Worm In the last week, you have likely heard and read stories about the security vulnerability BlueKeep. It has been said to be capable of being exploited for the initiation of self-replicating worm as destructive as WannaCry. As of June 1, over 1M computers may be at risk. But is the danger really about The Worm? Or is it more about millions of endpoints providing direct ingress into networks worldwide? “The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats.  Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the internet. We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact and are seeking to motivate increased protections against this flaw. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches. This is critical not just for NSA’s protection of National Security Systems but for all networks.”  -- NSA Cybersecurity Advisory - Patch Remote Desktop Services on Legacy Versions of Windows In this Very Special Episode of InSecurity, Matt Stephenson rounded up a cast of experts to discuss BlueKeep… What is it? Where did it come from? Can it be stopped? Maybe a better question is… can it be prevented? After WannaCry and Petya/NotPetya… why is this happening again? We are joined by best-selling Cybersecurity author and Kip Boyle, Automox’s Richard Melick and BlackBerry|Cylance’s Scott Scheferman to take good hard look at BlueKeep. There’s a Bad Moon on the Rise… make sure you are ready for it. About Kip Boyle   Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. Fire Doesn’t Innovate Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.  Cybersecurity is not just a technology problem, it's a management opportunity. Learn how to manage cyber risks and ensure your company is cyber resilient now, and remain in the game no matter what the future holds.  About Richard Melick Richard Melick (@RCMelick) is a Sr. Technical Product Marketing Manager at Automox. He has over a decade of experience in Cybersecurity and Antivirus Software, working in various career functions in the industry that have taken him all over the world.  About Automox Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint and software, regardless of location, meets regulatory and operational security requirements. About Scott Scheferman   Scott Scheferman (@transhackerism) wears many hats at BlackBerry|Cylance, working between the white spaces on the org chart to ensure timely delivery of Consulting Services, effective messaging around the value of predictive AI in the context of cybersecurity operations and risk, research around how the Temporal Predictive Advantaged (TPA) ofBlackBerry|Cylance’s AI affects the broader malware economy, and public speaking at conferences and seminars around the country.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV  Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

DirtySecurity
Tales from Cylance’s Ultimate Road Warrior, Richard Melick

DirtySecurity

Play Episode Listen Later Nov 7, 2018 27:26


Tales from Cylance’s Ultimate Road Warrior Road Shows and Lunch & Learns and Meet & Greets OH MY! For the past 3 years, Richard Melick has traveled all over the world bringing Cylance’s prevention-based endpoint protection to the masses. From the Unbelievable Tour to the UNDRWRLD Tour and beyond, Richard has created 0-Day malware and ransomware in front of thousands of people, then challenged CylancePROTECT to prevent those 0-Days from executing… all live in front of a an audience. There was no safety net. There was no chance to make a second first impression. These events were more than just marketing though. Richard was there to inform and educate his guests on the perils of Ransomware-as-a-Service. Sometimes, there were even headline grabbing events like WannaCry and Petya/NotPetya. In this week’s episode of DirtySecurity, Edward Preston chats with Cylance’s world traveler about the evolution of their live road shows. Find out what we’ve learned from the past, what we’re doing in the present and Cylance’s plans for the future. About Richard Melick Richard Melick(@RCMelick) has over a decade of experience in Cybersecurity and Antivirus Software. Working in various career functions in the industry that have taken him all over the world. His focus is emerging next generation Cybersecurity and Antivirus Software   About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

Symantec Cyber Security Brief Podcast
Special Report: Software Update Supply Chain Attacks

Symantec Cyber Security Brief Podcast

Play Episode Listen Later Jul 12, 2018 28:58


In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 percent between 2016 and 2017, with at least one attack every month in 2017. Dick O’Brien is joined by Symantec threat researchers Candid Wueest and Gavin O’Gorman to discuss this surge in attacks, and also to talk about two high-profile examples of these kind of attacks: the Petya/NotPetya and CCleaner attacks.

Cyber, cyber...
Cyber, Cyber… – 26 – BadRabbit

Cyber, cyber...

Play Episode Listen Later Oct 31, 2017


Cyber, Cyber… – 26 – BadRabbit Zapraszamy do wysłuchania kolejnego odcinka podcastu o bezpieczeństwie teleinformatycznym „Cyber, Cyber…”. Gośćmi dzisiejszego odcinka są: Hasherezade (Malwarebytes), Dawid Osojca (ComCERT.pl) oraz Michał Grzybowski (Fundacja Bezpieczna Cyberprzestrzeń) opowiedzą o najnowszych wydarzeniach ze świata bezpieczeństwa teleinformatycznego.   https://www.cybsecurity.org/wp-content/uploads/2017/10/CC26.mp3 RSS: https://www.cybsecurity.org/feed/podcast/ iTunes: https://itunes.apple.com/pl/podcast/cyber-cyber…/id988807509?mt=2 YouTube: https://youtu.be/_vLKz3PPtC8   Link do artykułu: BadRabbit: a closer look at the new version of Petya/NotPetya   More

cyber bad rabbit cyber cyber petya notpetya
Continuum Podcast Network
MSP Radio #160 - "Spooking" Your Clients Into Buying Cybersecurity Services

Continuum Podcast Network

Play Episode Listen Later Oct 25, 2017 39:30


On this special Halloween edition of MSP Radio, we welcome on Ryan Hesske, Strategic Partner Manager at Continuum, to share best practices for selling cybersecurity services to your clients and prospects. We also discuss a recent article on cyber insurance costs for the Petya/NotPetya ransomware attack, share a random Halloween trivia fact and close with a Halloween-themed small business idea of the week. Tune in now!

WIRED Security: News, Advice, and More
Security News This Week: Russian Security Giant Kaspersky Lets the Feds Review Its Code

WIRED Security: News, Advice, and More

Play Episode Listen Later Jul 11, 2017 6:16


After last month's Petya/NotPetya ransomware outbreak you may be feeling like the next global attack could come at any moment. It hasn't struck yet, but if the ransomware fear doesn't get you, the phishing paranoia might. And don't forget angst about power grid hacks. Reports this week revealed that the FBI and Department of Homeland Security are scrambling to defend multiple US energy companies and manufacturing plants from hackers—including a nuclear power plant in Kansas.

Tech Talk Radio Podcast
July 8, 2017 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Jul 8, 2017 59:00


Enabling dual protocol stack in Windows (see both IPv4 and IPv6 websites), restoring deleted texts in iPhone, Food Science (freezing lobsters properly), keeping Bittorrent downloads private (use VPN), troubleshooting Windows (reliability monitor, BlueSceenView, memory diagnostics), Profiles in IT (Bob Bemer, father of ASCII), Petya malware spread via software updates, vaccine for Petya/NotPetya malware, hackers target US nuclear plants, DISA will start encrypting soldiers emails (finally), Google will stop scanning Gmail for ad targeting (they have other ways), using Amazon Echo to make calls, net neutrality Digital Protest Day (controversy revealed). This show originally aired on Saturday, July 8, 2017, at 9:00 AM EST on WFED (1500 AM).

Tech Talk Radio Podcast
July 8, 2017 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Jul 8, 2017 59:00


Enabling dual protocol stack in Windows (see both IPv4 and IPv6 websites), restoring deleted texts in iPhone, Food Science (freezing lobsters properly), keeping Bittorrent downloads private (use VPN), troubleshooting Windows (reliability monitor, BlueSceenView, memory diagnostics), Profiles in IT (Bob Bemer, father of ASCII), Petya malware spread via software updates, vaccine for Petya/NotPetya malware, hackers target US nuclear plants, DISA will start encrypting soldiers emails (finally), Google will stop scanning Gmail for ad targeting (they have other ways), using Amazon Echo to make calls, net neutrality Digital Protest Day (controversy revealed). This show originally aired on Saturday, July 8, 2017, at 9:00 AM EST on WFED (1500 AM).

Tech ONTAP Podcast
Episode 95 – Quarterly Security Update: WannaCry and Petya

Tech ONTAP Podcast

Play Episode Listen Later Jul 7, 2017 67:47


This week on the podcast, we kick off a series of quarterly security update episodes to reflect the ever-changing security and vulnerability landscape. We cover WannaCry, Petya/NotPetya and basic security best practices you can follow to help protect against threats. We join some of the NetApp security team, including Kevin Ryan from PSIRT at NetApp and Security TME Andrae Middleton, as well as esteemed NetApp A-Team member, Paul Stringfellow. Paul is the technical director at Gardner Systems in the UK. You can find his blog and podcast at https://techstringy.wordpress.com/.

IT-Keller
ITK024 nix.gif

IT-Keller

Play Episode Listen Later Jul 4, 2017 88:03


30 Jahre GIF; 20 Jahre WLAN; 10 Jahre iPhone; ARKit; DHMTL; Cinemagraphs; Animated PNG; Microsoft Bot Framework; Google Cast; Binge Watching; SWR2 Forum - Diktatur 2.0; Petya/NotPetya; HMS Elizabeth: Neuer Flugzeugträger läuft mit Windows XP; TED Tele-Dialog; Großes scharfes S; Die Rollen-Taste; IGP IndustrieGruppe Pflanzenschutz; IGP-Faktencheck deckt Fake News von Global 2000 auf; Glyphosat; Vertical Farming; Top 5 Handys; Hamburger-Menü Gäste: Bernhard und Ulrich

Grumpy Old Geeks
216: Lunchroom of Effervescent Healing

Grumpy Old Geeks

Play Episode Listen Later Jul 3, 2017 101:53


The Dumb Ages; misogynist silicon valley losers; Google’s $2.7b fine; Kiwi coders; 10 years of iPhones; drop in on Alexa; hackintoshes; YouTube TV fails; is vinyl back, no; Eddie Izzard; Petya NotPetya; InspiroBot; scamming Nigerians; stupid Jenners. Full show notes at http://gog.show/216

InfoSec Weekly Podcast
30 June Weekly podcast: The AA, MPs’ emails and Petya/NotPetya

InfoSec Weekly Podcast

Play Episode Listen Later Jun 29, 2017 5:54


This week, we discuss a password reset at the AA, a cyber attack on parliamentary emails and the NotPetya malware attack.

emails aa notpetya petya notpetya