POPULARITY
Categories
This week, Chris and Hector tackle a massive breach at Coinbase, insider threats in India, and a shady delay in reporting. They also explore how state actors are silently hijacking home routers, and why LexisNexis is the latest data broker to drop the ball. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
At NAB Show in Las Vegas, Casper Hanney, the Founder of Ghost Kits introduces a hybrid Wi-Fi router and cellular hotspot designed for camera-to-cloud workflows. Compatible with any Wi-Fi-enabled camera or device, Ghost Kits ensures seamless cloud uploads—even in remote areas—by automatically switching networks. With flexible data plans, 6–12 hour battery life, and pre-orders now open, it's a versatile tool for modern video production. Show Notes: Chapters: 00:07 Introduction to Ghost Kits 02:26 Device Features and Compatibility 03:32 Subscription and Data Plans 04:28 Battery Life and Usage 05:22 Availability and Pre-Order Details Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Router von Asus haben eine Backdoor, die auch ausgenutzt wurde. Das Problem: Die Lücke ist zwar schon per Update geschlossen, bei betroffenen Geräten reicht ein Update allein aber nicht, man muss sie auf Werkseinstellungen zurücksetzen. Bisserl nervig, aber nicht weiter schlimm. Nach der Meldung zu SteamOS überlegte Mike, auch sein Asus ROG Ally damit zu versehen, wollte dann Windows doch noch einmal eine Chance geben: Es ist immer noch ein Krampf. Das scheint Microsoft auch so zu sehen und stellt den eigenen Xbox-Handheld vorerst zurück, um in der Zwischenzeit Windows für Gaming (-Handhelds) zu optimieren. Es ist nötig. Aber nicht nur für Gaming hat Microsoft große Pläne: Mit der sog. Windows Update orchestration platform soll es in Zukunft möglich sein, jede Software zentral zu verwalten und zu aktualisieren, nicht nur Windows- bzw. Microsoft-eigene. Primär zielt es auf Business-Kunden und Administratoren ab, aber auch für uns normale Nutzer soll es Vorteile bringen. Wir haben gespielt: Gedonia 2, ein Open World Indie Sandbox Co-Op Rollenspiel nach Art eines MMO? Clunky, aber faszinierend und extrem ambitioniert. Und sehr Early Access. Außerdem Blades of Fire von Mercury Steam (Castlevania: Lords of Shadow, Metroid Dread), 3rd Person Action Adventure, das God of War (2018) mit kleinen Soulslike-Elementen vereint und das Schmieden von Waffen und deren Verschleiß zu dem zentralen Element erhebt. Das funktioniert besser, als man meinen sollte. Viel Spaß mit Folge 258! Sprecher: Meep, Michael Kister, Mohammed Ali DadAudioproduktion: Michael KisterVideoproduktion: Mohammed Ali DadTitelbild: MeepBildquellen: Aufnahmedatum: 30.05.2025 Besucht unsim Discord https://discord.gg/SneNarVCBMauf Bluesky https://bsky.app/profile/technikquatsch.deauf TikTok https://www.tiktok.com/@technikquatschauf Youtube https://www.youtube.com/@technikquatschauf Instagram https://www.instagram.com/technikquatschauf Twitch https://www.twitch.tv/technikquatsch RSS-Feed https://technikquatsch.de/feed/podcast/Spotify https://open.spotify.com/show/62ZVb7ZvmdtXqqNmnZLF5uApple Podcasts https://podcasts.apple.com/de/podcast/technikquatsch/id1510030975 00:00:00 Themen: Backdoor in Asus-Routern Backdoor, Update alleine reicht nicht; Microsoft stellt eigenen Xbox-Handheld zurück, möchte vorher Windows für Gaming optimieren; Microsoft führt Windows Update Orchestration Platform ein und möchte darüber zentral Updates für möglichst jede Software verwalten; Gedonia 2 und Blades of Fire gespielt 00:01:58 Stromausfall bei Mo 00:07:58 Windows immer noch furchtbar auf Handhelds 00:11:59 Backdoor in Asus Routern: Update allein hilft nicht, müssen auf Werkszustand gesetzt werdenhttps://www.heise.de/news/Neustart-und-Firmware-Update-zwecklos-Tausende-Asus-Router-kompromittiert-10420221.html#google_vignette 00:24:09 Microsoft stellt eigenen Xbox-Handheld zur Seite, möchte Windows erst optimierenhttps://www.windowscentral.com/gaming/xbox/exclusive-xboxs-handheld-pembrooke-has-been-sidelined-for-now-as-microsoft-doubles-down-on-windows-11-pc-gaming-handheld-optimization 00:43:15 Microsoft möchte jede Software über Windows Update orchestration platform aktualisierenhttps://www.heise.de/news/Microsoft-will-alle-Anwendungen-per-Windows-Update-aktualisieren-10418812.htmlhttps://techcommunity.microsoft.com/blog/windows-itpro-blog/introducing-a-unified-future-for-app-updates-on-windows/4416354 01:00:38 Angespielt: Gedonia 2 https://store.steampowered.com/app/2566340/Gedonia_2/Transparenzhinweis: Wir haben vom Publisher/Entwickler einen Steam-Key erhalten. 01:16:15 Angespielt: Blades of Fire https://store.epicgames.com/de/p/blades-of-fire-f8178fTransparenzhinweis: Wir haben vom Publisher einen Key für den Epic Store erhalten. 01:42:07 gaslighted by AI
While the AppJS is about to kick off, we talk about some cool new packages and updates around Reanimated and a new solution for local-first apps!Also in this episode:- New React Native Essentials - Apple still doesn't like my app- New Expo Router v5 Course- Are you VibeCoding?
Forecast = Mostly cloudy with a chance of rogue SSH access—keep your patches up to avoid a phishy forecast! Welcome to Storm⚡️Watch, where we unpack the latest in cybersecurity threats, research, and the tools that keep the digital world safe. In this episode, we invite GreyNoise Security Architect and researcher Matthew Remacle (a.k.a., Remy) to kick things off with a deep dive into a fascinating and highly sophisticated botnet campaign targeting ASUS routers—a story that starts with a little help from machine learning and ends with some hard lessons for defenders everywhere. GreyNoise researchers spotted this campaign using SIFT, their AI-powered network traffic analyzer, which sifted through more than 23 billion network entries and managed to flag just 30 suspicious payloads targeting ASUS routers. What made this botnet stand out was its surgical precision and stealth—far from the usual noisy, attention-grabbing attacks. The attackers knew exactly what they were doing, focusing on disabling TrendMicro security features embedded in the routers, essentially breaking in by first turning off the alarm. The attack chain reads like a masterclass in persistence: brute force and clever authentication bypasses got them in the door, a null byte injection tricked the router's authentication system, and a command injection vulnerability allowed them to manipulate logging features in a way that opened up even more attack paths. The real kicker? The final backdoor was installed using legitimate ASUS features, meaning it could survive firmware updates and stay hidden from traditional detection methods. This campaign affected thousands of routers globally, with over 4,800 compromised devices detected and counting. Even after ASUS released a patch—adding character validation rather than fixing the underlying flaw—researchers found that the fundamental vulnerability remained, and attackers could potentially work around the patch. This story highlights the ongoing challenges in IoT security: complexity breeds vulnerability, persistence is a nightmare to detect and remove when attackers use legitimate features, and patches often address symptoms rather than root causes. It's a reminder that traditional signature-based detection is no longer enough—behavioral analysis and AI-driven anomaly detection are now essential for spotting these advanced threats. We also touch on the bigger picture: the evolving cat-and-mouse game between attackers and defenders, the importance of defense in depth, and why understanding normal network behavior is more critical than ever. Plus, we look at the human element—attackers who are patient, technically sophisticated, and deeply aware of how to evade detection. For organizations, the takeaways are clear: defense in depth, behavioral monitoring, asset management, and patch management are all non-negotiable. And for everyone else, it's a reminder that the devices we trust to protect us are themselves complex and potentially vulnerable computers. Later in the episode, we take a closer look at vulnerability scoring systems—CVSS, EPSS, and SSVC—and why reading between the scores is so important for risk management. We also highlight the value of fresh, actionable data from sources like Censys and VulnCheck, and round things out with a nod to the ongoing conversation happening on the GreyNoise blog. Thanks for tuning in to Storm⚡️Watch. Stay vigilant, keep learning, and remember: in cybersecurity, the difference between safe and compromised can be as subtle as a single null byte. Storm Watch Homepage >> Learn more about GreyNoise >>
Episode 251Special Guest:Meghan SundermeierOmaha Wood Co.https://www.instagram.com/omahawoodco/ Sponsors:Onefinity CNC:The industry standard for at home production CNCs. Ball screw and linear rail construction - No beltsCompatible with all popular software, 15 minute setup, infinitely upgradable, and world class tech support!And its made in Canada. Which means Maple Glazed Rails!One Machine - Infinite possibilitieshttps://www.onefinitycnc.com/Sign up for Patreon for Early access, and special Patreon-only content:https://www.patreon.com/anotherwoodshoppodcastJoin us for the AWP Mid-West MAYker Meetup - May 17 2025RSVP: http://midwestmaykermeetup.com PATREON GIVEAWAY!Donate to Maker's For St. JudeEvery $5 earns you an extra entry in the January Patreon Giveaway (Paid Patrons Only)http://fundraising.stjude.org/goto/anotherwoodshoppodcast Questions:Alex AdamsType A FurnitureCan you recommend any way to get cat poop out of wooden chisel handles? Nick MiddlecampNSM WoodcraftI have a dilemma. My current shop setup is split across two locations 3 miles apart. I have Thunder Bolt laser and a 4ft by 2ft CNC (not an Onefinity) in a climate controlled shed at my house. The other location is a storage unit, I have all of my traditional larger shop tools there. Cabinet table saw, Miter station, Joiner, Planer, Router table and an array of bench top sanding equipment. The situation is not ideal but is currently my only option. I have made some duplicate purchases of my smaller cordless tools to put them at both locations, but where do I stop? What tools are an absolute must have for that immediate post processing of CNC'd items.You can send in your question to get answered on the podcast! Record your question or comment on your phones voice memo app and email it to anotherwoodshoppodcast@gmail.comYou can follow us all and the podcast on Instagram and YouTube!Podcast:https://www.instagram.com/anotherwoodshoppodcast/https://www.youtube.com/anotherwoodshoppodcast https://www.etsy.com/shop/awpstore Pete:https://www.instagram.com/ptreesworkshop/ https://www.youtube.com/ptreesworkshophttps://www.etsy.com/shop/pTreesWorkShop Dan:https://www.instagram.com/danieldunlap.woodworks/ https://www.youtube.com/danieldunlap https://www.etsy.com/shop/ddwwstore Braden:https://www.instagram.com/littlebugwoodworking/ https://www.youtube.com/@littlebugwoodworking https://littlebugwoodworking.com/ Support the show
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.
We look at the Acer Connect X6e router, see more about it here. Acer Connect X6e router reviewed This product came out last year, but still might not be on your radar in terms of an option for your next router, depending on whether you knew that Acer are making more than just laptops. It is relatively heavy, but, once sited and set up, this may give it a bit more durability than some of the flimsier models on the market. For our testers one of the use cases is the ability to transfer it from various locations depending on where they will be based next. This model's solidity and heft actually stood it in good stead compared to some other options which tended to get a bit damaged in transit. With this model there are less delicate, moving parts and this actually works quite well, and was a positive aspect to the router. Out of the box the device worked well, and it has good security protocols too, you just need to remember to set them up of course. Maybe it will even play better with your laptop if it is an Acer too, but it worked well with all devices that came within range of it. Accessibility to ports is good for all options apart from the one on the underneath of the base, maybe that one is for when it is attached to a wall, or floating in space perhaps. That to one solid, the weight and solidity work well in terms of avoiding cat, children or just clumsy operators. Our testers liked it, and are hopeful that they can get their hands on some of the newer Acer products that have caught their eyes next, especially the outdoors charging rigs. Now that could be interesting… More about the device Acer 5G Router | Connect X6E Ref. FF.G2KTA.002 Experience lightning-fast 5G speeds powered by the Qualcomm Snapdragon Processor (3GPP R16) with AI Signal Boost Enjoy super fast, multi-device capability with Wi-Fi 6E and 4 x 4 MU-MIMO technology Supports up to 128 connected devices for a seamlessly connected home or mobile workspace Simultaneous 5G and WAN dual connectivity for better load balance and fail over Share Internet access as quickly with a simple wave their devices near Acer Connect X6E 5G CPE Make and receive crystal-clear phone calls with built-in telephony, which supports VoLTE / VolP1 calling More about Acer Founded in 1976, Acer is one of the world's top technology companies with a presence in more than 160 countries. The company continues to evolve by embracing innovation across its product offerings including computers and displays, while branching out to new businesses. Acer is also committed to sustainable growth, exploring new opportunities that align with its environmental and social responsibilities. The Acer Group employs over 9,000 people globally who contribute to the research, design, marketing, sales and support of products, solutions, and services that break barriers between people and technology. Acer Group to reach 60% renewable electricity usage RE100 reached by 2035 45% reduction in average computer energy consumption in 2025, compared to 2016 80% of critical suppliers committed to RE100 or set carbon reduction SBTs See more reviews here.
Expo Router v5 was released, which dramatically improves authentication flows and finally allows to use RSC in production - although still in beta. Beyond that William Candillon shared epic updates about Skia and WebGPU, making even more powerful React Native apps possible in the future.Also in this episode:- Galaxies Lifetime pricing with one-time payment- Receiving Feedback on Podcast & Apps- Sharing my next app projects- Flutter devs love React Native
Jeff Carney from Darkhorse IT explains why the FBI Warns of Outdated Devices Being Exploited:See omnystudio.com/listener for privacy information.
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
The panel analyzes Tim Cook's recent comments on Siri and Apple Intelligence from the latest earnings call, debating whether Apple overpromised on AI capabilities. Chuck Joiner, David Ginsburg, Marty Jencius, Mark Fuccio, Eric Bolden, Jim Rea, and Jeff Gamet also revisit Apple's discontinued router line and the likelihood of a comeback in today's competitive market. The episode wraps with a discussion about Duolingo's decision to replace human content creators with AI, exploring both the potential educational value and the broader implications for language learning and job displacement. MacVoices is supported by CleanMyMac Business, Centralize remote Mac fleet maintenance for your business. Try CleanMyMac Business for 14 days free for up to 30 devices. https://clnmy.com/MacVoicesCleanMyMacBusiness Show Notes: Chapters: 00:03 Tim Cook's Siri Comments 13:33 AI in Language Learning 23:53 The Future of AI in Education 29:27 Panel Sign-Off Links: Tim Cook addresses Apple's delay of personalized Siri features https://9to5mac.com/2025/05/01/tim-cook-addresses-apples-delay-of-personalized-siri-features/ A new petition is asking for Apple to resume updates for its discontinued AirPort routers A new petition is asking for Apple to resume updates for its discontinued AirPort routers https://appleworld.today/2025/04/a-new-petition-is-asking-for-apple-to-resume-updates-for-its-discontinued-airport-routers/ Duolingo will replace contract workers with AI https://www.engadget.com/ai/duolingo-will-replace-contract-workers-with-ai-for-content-creation-123058970.html Guests: Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK's Cyber Centre says AI promises to make things much worse. A bunch of great feedback from our great listeners, then: Is true end-to-end encryption possible when records must be retained? Show Notes - https://www.grc.com/sn/SN-1025-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now uscloud.com hoxhunt.com/securitynow canary.tools/twit - use code: TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger botnets taking advantage of unpatched routers. Many of these routers are end-of-life, and no patches are available for the exploited vulnerabilities. The attackers are turning the devices into proxies, which are resold for various criminal activities. https://www.ic3.gov/PSA/2025/PSA250507 ASUS Driverhub Vulnerability ASUS Driverhub software does not properly check the origin of HTTP requests, allowing a CSRF attack from any website leading to arbitrary code execution. https://mrbruh.com/asusdriverhub/ RV-Tools SEO Poisoning Varonis Threat Labs observed SEO poisoning being used to trick system administrators into installing a malicious version of RV Tools. The malicious version includes a remote access tool leading to the theft of credentials https://www.varonis.com/blog/seo-poisoning#initial-access-and-persistence
Esiste un router che ha moltissime funzioni, in modo veramente facile e intuitivo e che può tornare utile in moltissime occasioni. È piccolissimo, consuma poco e costa una cifra ridicola, in rapporto a quello che fa. È il router giallo di GL-inet. La vecchia puntata di Geekcookies dove ne abbiamo parlato GL-inet Mango Tutti i GL-inet che si trovano su Amazon Il sito ufficiale di GL-inet La Tigre, podcast di Chora Media Pillole di Bit (https://www.pilloledib.it/) è un podcast indipendente realizzato da Francesco Tucci, se vuoi metterti con contatto con me puoi scegliere tra diverse piattaforme: - Telegram - BlueSky - Il mio blog personale ilTucci.com - Il mio canale telegram personale Le Cose - Mastodon personale - Mastodon del podcast - la mail (se mi vuoi scrivere in modo diretto e vuoi avere più spazio per il tuo messaggio) Rispondo sempre Se questo podcast ti piace, puoi contribuire alla sue realizzazione! Con una donazione diretta: - Singola con Satispay - Singola con SumUp - Singola o ricorrente con Paypal Usando i link sponsorizzati - Con un acquisto su Amazon (accedi a questo link e metti le cose che vuoi nel carrello) - Attivando uno dei servizi di Ehiweb Se hai donato più di 5€ ricordati di compilare il form per ricevere i gadget! Il sito è gentilmente hostato da ThirdEye (scrivete a domini AT thirdeye.it), un ottimo servizio che vi consiglio caldamente e il podcast è montato con gioia con PODucer, un software per Mac di Alex Raccuglia
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-475
Ali Hackalife und Basti sprechen über Themen der letzten Tage die auch interessant sind. Ali stellt ein Buch über interna bei Facebook vor. Es geht um schlechte Umweltapps, einen neuen Router, die ePA und den PELOSI Act.
We've been diving into the evolving landscape of React app development and why tools like Create TS Router App (CTA) are stepping up to fill the gap left by the deprecation of Create React App (CRA). What we've learned is that SSR (server-side rendering) isn't one-size-fits-all—e-commerce sites need it for SEO and performance, but internal tools and dashboards often don't. That's where CTA shines. It gives us a fast, modern, Vite-powered setup with TanStack Router built in, so we can start small and scale up without committing to heavy frameworks like Next.js from day one.What we love about CTA is how it keeps things familiar (same structure as CRA) while giving us type safety, file-based routing, and the flexibility to add only the features we need—like Clerk, Sentry, or even SolidJS support. Whether we're building a simple prototype or a full-featured app, CTA makes the experience smoother, more intuitive, and future-friendly.Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
Brian becomes a regional IT manager, Justin parties with Substack, two Michael Cohens collide, and Tony the Tiger discourse happens. Plus, "grape" and mugging for the camera during sex. Get an extra episode every week only at https://www.patreon.com/greatnight!
Brian becomes a regional IT manager, Justin parties with Substack, two Michael Cohens collide, and Tony the Tiger discourse happens. Plus, "grape" and mugging for the camera during sex. Get an extra episode every week only at https://www.patreon.com/greatnight!
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können. Mit dabei: Ernst Ahlers, Andrijan Möcker, Christof Windeck Moderation: Jörg Wirtgen Produktion: Gordon Hof
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können.
Die Hardware- und Netzwerk-Spezialisten der c't-Redaktion Ernst Ahlers, Andrijan Möcker und Christof Windeck gehen den Hintergründen auf die Spur: Glasfaser wird zwar an vielen Stellen mit 2,5 Gbit/s ausgebaut, aber schon ihre 1-Gbit/s-Anschlüsse werden die Anbieter im Privatkundengeschäft kaum los. Ähnlich gilt fürs Heimnetz, dass sich Wifi-7 und 6-GHz-Router schlecht verkaufen, und dass beim Kabel-LAN meist 1 Gbit/s reichen. NAS, Boards und Router mit 2G5-Ethernet gibt's zwar immer mehr, aber kaum jemand scheint wirklich Wert drauf zu legen – ganz zu schweigen von schnelleren Kabellösungen. Auch die Nachfrage nach USB-Sticks oder Speicherkarten mit garantiert 20 oder 40 MBit/s bleibt gering. Selbst die PC-internen Schnittstellen stagnieren, beispielsweise verkaufen sich schnelle PCIe-5.0-SSDs kaum, und die fertig spezifizierte PCIe-Schnittstelle für Festplatten als SATA-Ersatz wird von keinem Hersteller implementiert. Spezielle NAS-Festplatten sind vom Markt wieder quasi verschwunden. Anders siehts lediglich für Profi-Hardware aus: Die Rechenzentren haben Bedarf nach schnelleren und größeren Festplatten, besseren Schnittstellen, mehr RAM und leistungsfähigeren Interconnects (sogar der KI-Grafikkarten direkt untereinander). Wieso klafft das so auseinander? Wir spüren dem Bedarf hinterher, schauen in die Zukunft, diskutieren Einsatzgebiete und Gewohnheiten – wie viel Zeit etwa wollen wir in die Pflege einer Smartphone-Fotosammlung stecken? Eine wichtige Grenze sind auch die menschlichen Sinne, etwa was Augen und Ohren wahrnehmen können. Mit dabei: Ernst Ahlers, Andrijan Möcker, Christof Windeck Moderation: Jörg Wirtgen Produktion: Gordon Hof
El Instituto Nacional de Ciberseguridad aconseja seguir ocho medidas básicas para aumentar la seguridad de nuestro router y nuestra red WiFi de casa. ¿Estoy de acuerdo con ellas?
Episodio 312.Ella pensó que yo alegremente iba a hacer un viaje a Filadelfia con el cubano del Lyft así que… ¿Me pueden explicar un poco, en donde me metí? Yo creo que mi problema son los ascensores, pero se alinearon los planetas y todo salió bien.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code templates. https://isc.sans.edu/diary/X-Wiki%20Search%20Vulnerability%20exploit%20attempts%20%28CVE-2024-3721%29/31800 Correction: FBI Image Converter Warning The FBI's Denver office warned of online file converters, not downloadable conversion tools https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam VMWare Vulnerability Broadcom released a fix for a VMWare Tools vulnerability. The vulnerability allows users of a Windows virtual machine to escalate privileges within the machine. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518 Draytek Reboots Over the weekend, users started reporting Draytek routers rebooting and getting stuck in a reboot loop. Draytek now published advise as to how to fix the problem. https://faq.draytek.com.au/docs/draytek-routers-rebooting-how-to-solve-this-issue/ Microsoft Managemnt Console Exploit CVE-2025-26633 TrendMicro released details showing how the MMC vulnerability Microsoft patched as part of its patch tuesday this month was exploited. https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html
Forecast = Router-geddon: Ballista storms brewing with a chance of unforgivable vulnerabilities. Patch umbrella required. In this episode of Storm ⚡ ️Watch, the crew laments the sorry state of modern edge computing through the lens of Steve Coley's 2007 paper on "Unforgivable Vulnerabilities". The discussion examines security flaws that should never appear in properly developed software yet continue to plague systems today. These vulnerabilities demonstrate a systematic disregard for secure development practices and would be immediately obvious to anyone with basic security awareness. The team breaks down "The Lucky 13" vulnerabilities, including buffer overflows, cross-site scripting, SQL injection, and hard-coded credentials, while also exploring how modern AI tools might inadvertently introduce these same issues into today's codebase, and how one might go about properly and safely use them in coding and security engineering. The episode also features an in-depth analysis of the newly discovered Ballista botnet that's actively targeting TP-Link Archer routers through a vulnerability discovered two years ago. First detected on January 10, 2025, this botnet has already infected over 6,000 devices worldwide, with the most recent activity observed in mid-February. The threat actors behind Ballista, believed to be based in Italy, have targeted organizations across multiple sectors including manufacturing, healthcare, services, and technology in the US, Australia, China, and Mexico. The botnet exploits CVE-2023-1389 to spread malware that establishes encrypted command and control channels, enabling attackers to launch DDoS attacks and further compromise vulnerable systems. The team rounds out the episode with updates from their partner organizations. Censys shares insights on JunOS vulnerabilities and the RedPenguin threat actor, along with an investigation into server misidentification issues. RunZero discusses the importance of cybersecurity labeling for end-of-life and end-of-support consumer IoT devices. GreyNoise alerts listeners to a new surge in SSRF exploitation attempts reminiscent of the 2019 Capital One breach and promotes their upcoming webinar on March 24th. As always, the Storm⚡️Watch crew delivers actionable intelligence and expert analysis to help security professionals stay ahead of emerging threats in the ever-evolving cybersecurity landscape. Storm Watch Homepage >> Learn more about GreyNoise >>
Capítulo 2305 del 18 mar 2025 Tras darle muchas vueltas, y aprovechando mi cumpleaños, ya tengo un nuevo router, un modelo mesh de la marca Mercusys, concretamente el Halo H3000X. Si quieres apoyar este podcast, invítame a un café me ayudaras a mantenerme despierto y a los gastos de este podcast. Únete al grupo de telegram del podcast en t.me/daytodaypod. Usa el enlace de afiliado de Amazon para ayudar a mantener el podcast. Soy miembro de la Asociación Podcast. Si te registras y usas el código SP7F21 tendrás 5€ de descuento el primer año. https://www.asociacionpodcast.es/registrarse/socio/?coupon=SP7F21 Date de alta en Curve con este código y conseguiremos 5£: DO6QR47E Ya sabéis que podéis escribirme a @spascual, spascual@spascual.es el resto de métodos de contacto en https://spascual.es/contacto.
Three Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
In this episode of Hacker in the Fed, former FBI special agent Chris Tarbell and ex-black hat hacker turned cybersecurity expert Hector Monsegur discuss GrayNoise's 2025 Mass Internet Exploitation Report, revealing how attackers are exploiting vulnerabilities faster than ever, particularly targeting home routers. The two also cover a shocking backdoor discovery in the Eight Sleep smart mattress, the rising trend of violent crypto-related attacks, and the recent Bybit hack. Hector wraps up with a deep dive into the U.S. Cyber Command's recent decision to halt cyber operations against Russia and what it means for national security. Send HATF your questions at questions@hackerandthefed.com.
Sign up for my daily deal emails - https://mailchi.mp/731woodworks/daily-tool-dealsTop Tool Deals at Home Depot, Lowe's, Amazon and more for March 2025! All Tool Deals - https://www.731woodworks.com/tool-dealsPLANS: https://www.731woodworks.com/storeGreatest Free Gift I've Ever Received: http://story4.us/731WoodworksI get commissions for purchases made through links in this post. This helps my website and allows me to keep finding these amazing deals!Tools Deals in this video:Join Team 731 in the $500 Bracket Challenge! https://www.731woodworks.com/tool-deals/last-brand-standing-team-731 USE Referral Code 731 to join my team!Japanese Hand Saw - https://amzn.to/3Derdf3Milwaukee Track Saw Deal - https://thetoolnut.sjv.io/k02yGxFestool Domino Limited Edition - https://thetoolnut.sjv.io/bOVKY6CRAFTSMAN Workbench DEAL - https://shoplowes.me/4kn4oXkKOBALT Workbench / Tool Box - https://shoplowes.me/41ssc3wHardwood Lumber Kits FREE SHIPPING - https://www.ollogginsawmill.com/collections/wood-kitsDeWALT 3Ah 4-Pack - https://amzn.to/4ijcQoyDeWALT POWERSTAACK Combo with Router - https://homedepot.sjv.io/LK21LMSKIL Router Combo - https://shoplowes.me/43BD2XFDeWALT Drill with Free 8Ah Battery - https://shoplowes.me/4kkdowaMakita 40v Drill/Impact Combo - https://acmetools.pxf.io/yqkQj2Harbor Freight New Trailer - https://www.731woodworks.com/tool-deals/harbor-freight-trailer-3-4-25RYOBI 80v Riding Mower Combo - https://homedepot.sjv.io/RGbKONEGO 42” Zero Turn Deal - https://amzn.to/4bsU8IM
Mac talk continued, Old Acer win 7 how do I get past the Admin password? I think I was scammed, Need to share data with the wife…NAS, Should I get my own Router? We fixed a guys mouse issue, Quickbooks issue it's costing me a arm and leg! Fiber they want me to purchase 1000mpbs….i'm only at 3mbps now.
Jon and David argue about how long it would take to walk to Sunrise Biscuit Kitchen from Jon's apartment. Support us on Patreon http://bit.ly/Ipatreon Send questions and comments to contact@electionprofitmakers.com Follow Jon on Bluesky http://bit.ly/bIuesky Watch David's show DICKTOWN on Hulu http://bit.ly/dicktown
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Microsoft Edge adds tech support scam detection https://www.bleepingcomputer.com/news/microsoft/microsoft-tests-edge-scareware-blocker-to-block-tech-support-scams/ https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen/ Patient monitors send data to China https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/ Magic packet compromises Juniper routers https://www.darkreading.com/endpoint-security/black-magic-enterprise-juniper-routers-backdoor https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/ https://www.crn.com/news/networking/2025/doj-sues-to-block-hpe-s-14b-acquisition-of-juniper-networks-deal-5-things-to-know January challenge results https://www.wsj.com/finance/regulation/prediction-market-bets-test-limits-c52f556d Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Victor - https://www.linkedin.com/in/victordeluca/
This Episodes Questions: Brians Questions: I am making a toy box for my grandson out of white oak. The dimensions will be 38” width, 18” depth, and 30” high. The front will be 4/4 quarter sawn, while the back and sides will be 4/4 flat sawn lumber. I plan to attach the front and sides, and the back and sides via dovetails. Since quarter sawn wood will move less than flat sawn, should I be concerned about the wood moving at different ratios? Also, can you recommend hinges that will prevent the top of the toy box from crashing down on my grandson's fingers? Mike My question concerns the router table that I built myself out of out of MDF and 2x4s last year. I'm pretty satisfied with it overall. I am by no means an expert, but I'd have to say having the router in a table seems to be roughly 1,000% more effective than using the router freehand. Having said that, I've been struggling with the fence, especially When I'm trying to edge join a board. My approach for securing the fence has been to clamp down each end of it with a trigger clamp, placing an additional clamp on the support frame or what have you at the rear of the router table. I've included a picture of my setup for this as well for clarity's sake. Here's the problem I'm running into: I position the fence, clamp it down, then check it again to make sure it hasn't come out of alignment. When I initially begin running boards over the router table, it works great. However, before too long, sometimes as soon as the second board, I find the fence is no longer properly aligned. When I check it I always find that the fence has shifted back towards the far end of the router table, usually by a 32nd of an inch or so. As you are all aware, this small difference has a pretty significant impact on how my boards come out, particularly when edge joining. My assumption is that this shift is due to my exerting pressure against the fence while feeding material through to keep the work piece tight against it. Do any of you have any suggestions regarding how I can secure my fence more effectively? Part of me wonders if I am just applying too much sideways pressure to my work pieces, but I also feel like I am applying just enough pressure to keep it from wandering away from the fence when passing the bit. Zach Owens Guy's Questions: I'd also like to hear about your process for organizing your shop space and how often you revisit the layout of your shop. As a follow-up to each question, I'd be curious if organizing and maintaining a shop are aspects of woodworking that you enjoy? Or loathe? Or maybe just tolerate? Marc I think there is a good question about red vs blue. red corner is woodpeckers, the YouTube influencers certified measuring and layout tools. Then there's the poor humans with affordable blue corner igaging. I believe woodpeckers is rated in their accuracy to .002 inch and igaging is .002 inch. So, I wonder if that .001 would make my skills somehow greater?? I think honestly that having a set of tools that I can use without each being a different measurement, as tape measures often would be. I also think about cost, even with a higher shipping fee due to my location I nearly outfitted my shop with all the marking and measuring tools at roughly $300 instead of $300 for one ruler or square. Thanks for the ongoing pod cast hope you all have a great year. Paul Mitchell Huy's Questions: On the face of wood, there is clearly a right and wrong direction to plane. Going the wrong direction causes gouging, chipping, and/or a time tough pushing the plane across the wood. How do you tell the correct direction to go with the plane, without having to risk messing up the piece by potentially going the wrong direction across the face of the wood with your plane? George I just made my first attempt at cutting dovetails for a small box with dividers that my wife asked me to make her for work. I cut them using a router table that I made just for the occasion. It went fairly well, meaning that they all fit and there aren't any unsightly large gaps. Starting with test pieces was definitely the way to go. I did have one issue, however. I'm not sure what the appropriate name for the different pieces of a dovetail are, but when I was cutting the female pieces I kept running into an issue where the router bit would jerk the work piece away from the fence, resulting in a somewhat crooked portion in my otherwise straight dovetail cut. I tried feeding the work piece into the bit from each side to see if one direction worked better than the other, but that didn't seem to help. I know that typically the recommendation is to make several shallow passes, but obviously this is not possible with a dovetail. Do you have any guesses as to what I might have been doing wrong? Should I have been pushing the work piece more firmly against the fence? Thanks in advance for your answers and insight. Can't wait to hear your next episode. Sincerely,Z achary T Owens
Three Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Dennis Fisher. Ryan Naraine (https://twitter.com/ryanaraine) in on work travel.
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Yabing Wang, VP and CISO, Justworks. In this episode: Building a path to action Cracking the EOL conundrum The burning platform question Uncertainty is our only constant Thanks to our podcast sponsor, Entro! Reclaim control of your non-human identities with Entro Security! Our platform securely manages non-human identities and secrets throughout their lifecycle. Detect and prevent unusual activity before it becomes a threat. Trust Entro to safeguard your non-human identities in today's complex digital ecosystem.
TP-Link routers, used by 65% of American homes and even the Department of Defense, are under fire for ties to Chinese cyberattacks and ignored security flaws. Also: Steve Harvey's not dead (thanks, AI), smart glasses might finally be cool, and OpenAI's chatbot hotline.
Is your home internet router about to be banned? The US has a new Chinese tech target. An AI dev kit from Nvidia. Who actually buys the most chips from Nvidia? Hollywood has flip-flopped on the whole theatrical release strategy. And why Instagram is officially king of the hill at Meta.Sponsors:Lumen.me/rideLinks:U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes (WSJ)Nvidia's new $249 AI development board promises 67 TOPS at half the price of the previous 40 TOPS model (TomsHardware)Nvidia's $249 dev kit promises cheap, small AI power (The Verge)Microsoft acquires twice as many Nvidia AI chips as tech rivals (Financial Times)Grubhub to pay $25 million for misleading customers, restaurants, drivers (Reuters)‘Red One' Becomes Most-Watched Prime Video Film Debut Ever With 50 Million Viewers After Modest Theatrical Run (Variety)Here's a Hollywood Twist: Streaming Success Runs Through Theaters (NYTimes)Instagram Expected to Generate 50% of Meta's US Ad Sales in 2025 (Bloomberg)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
On this episode of Hands-On Mac, Mikah answers questions about what to do with old electronics, extracting photos out of downloaded files and maintaining the original photo names, how to properly manage your phone's battery, and a question from a listen about the best way to manage their router setup! Kelli came across some old electronics her father had years ago! She thinks they could be worth something but wonders if she should recycle them instead. Ray has their iPhone wirelessly charging at night while on Do Not Disturb. However, it randomly makes a sound at night! How can he get his phone to stop making that noise? Sean just downloaded their Google photos to back them up on an external drive. How can he keep the photos' original names when he extracts the files? Dan wonders how to manage their phone's battery life best when they keep it plugged in most of the time. Alan has three routers throughout his household in his home network. When he goes to different points in the house, he has to change the SSID to the router closest to where he is. Is there a simpler way of doing this before going to a Mesh router setup? Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: cachefly.com/twit