Podcasts about weak passwords

  • 22PODCASTS
  • 23EPISODES
  • 35mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 12, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about weak passwords

Latest podcast episodes about weak passwords

Tech Talk with Mathew Dickerson
Blue Batteries for Baby Safety, Banning Weak Passwords, AI Saving Lives and a Massive 3D Printer.

Tech Talk with Mathew Dickerson

Play Episode Listen Later May 12, 2024 50:41


Blue Batteries for Baby Safety: A Colourful Caution against Coin Cells.  Printed Perfection: Pioneering Progress in Polymer Palaces.  AI Alert Advances: Saving Lives with Smart Technology.  Password Protection Paradigm: UK's Pioneering Policy.  Rapid Rails: Revolutionising US Travel with Speed and Sustainability.  Phishing Fiasco: Foiling a Formidable Fraudulence Factory.  Solar Splendour: Scientists Spin Stretchable Solar Cells for Smart Wear.  Outage Outcry: Protecting Triple-0 in Telecom Turmoil.  Google's Gemini Galore: Gearing up with Generative AI. 

Cybercrime Magazine Podcast
Security Nudge. UK Bans Devices With Weak Passwords. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later May 7, 2024 1:31


Are you prone to using easy-to-remember passwords? If you live in the UK, it's time to change your habits: a new law has made the country the first place in the world where it is actually illegal to use weak passwords on connected devices. According to The Guardian, the new laws mean all manufacturers of smartphones, TVs, smart doorbells, and other devices must protect their connected devices by prompting users to change any default or common passwords. Whether you live in the UK or not, changing default passwords on your devices is an important first step during the setup process. Leaving these passwords unchanged, or setting them to something that is easily guessable, such as 12345 or ‘password', is like leaving your front door open for cyber criminals. And once they get in, those criminals can take over your devices and use them to hack others, send spam emails, and conduct the aggressive denial of service campaigns that regularly bring down company websites. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

The technology blog and podcast
TSB 148: Nation-State Actors go after cloud providers who have customers that have weak passwords

The technology blog and podcast

Play Episode Listen Later Jun 15, 2023 145:34


Welcome to the security box, podcast 148. On this podcast, I may have a complete moron with a company, we'll have news, notes and more. The topic deals with passwords and it isn't looking that great. Morons We stand in solidarity with you, Reddit users. Reddit is taking advantage of the situation just like Twitter did so many months before. Apparently, Reddit has decided to do the same thing. One article says they're only charging $0.24 per 1,000 calls to their API, but people indicate its much different. The cost is $12,000 per month or roughly up to $20 million per year according to some estimates. Here are the blog posts as of writing in regards to Reddit. Accessibility apps will be free for API use on Reddit Reddit communities to go dark on June 12th, setting themselves to private Reddit to charge $12k for 50k calls to API? Its Official, Apollo shutting down Here's an ars article on Apollo Van Nuys is not too far from where I live in a town called Woodland Hills. I go through there every time I take the bus. According to a KNX article which is very short, it says a guy from there was caught selling drugs on the dark web. Here is the blog post from the tech blog titled Van Nuys man pleads Not Guilty to selling drugs online which links to the KNX article. In Case you Missed it In Case you missed it, I finished Tracers in the Dark. It was a very interesting book, one I didn't want to put down until I did. Book Review: Tracers in the dark, by Andy Greenberg is the blog post and I'm not giving anything away. Our Topic: Weak Passwords Our topic comes to us from Cyberscoop. It was an interesting read. The article is title Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says and I found it interesting. This proves again that we need to make sure that our users are using strong passwords or pass phraises. Don't worry, Cyber Security Awareness Month is coming up, so TSB will be starting all over again with basic stuff when it comes to your security. I hope that every single person will enjoy today's program, and thanks so much for listening! Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.

Google Workspace Recap
Google Chat is Catching Up To Slack with New Features including Announcement Only Rooms

Google Workspace Recap

Play Episode Listen Later Apr 19, 2023 64:17


A monster episode this week with updates to Chat, Cloud Search, Sites, Access Approvals, Classroom, Drive, and more. Over Passover, I was offline a lot and had the chance to catch up on some reading and I absolutely tore through Losing the Signal which is the story of the epic rise and eventual fall of Blackberry. They changed how we communicate and not only got completely blindsided by Apple and then Google, they completely refused to believe this is the future people would want. Now I loved my Crackberrys and had many different models over the years including the touch screen Storm Slider, and the design was getting better but the OS was just trash at that point. This book goes behind the scenes and now I know why. They are releasing a new movie based on this book called Blackberry and if you are anything like me, I recommend reading the book and seeing the movie. It releases May 12th. Blackberry Trailer: https://youtu.be/cXL_HDzBQsM #notsponsored Click here to learn all about the Google ChromeOS Administrator Certification and how to pass it: https://youtu.be/KHPy_n0qVk8

Cyber Security Headlines
Google Cloud's weak passwords, pressure on breach disclosure, Discord cooperating on Pentagon leak

Cyber Security Headlines

Play Episode Listen Later Apr 14, 2023 6:48


Weak passwords targeted on Google Cloud Potential IT snitches warned about employment stitches Discord cooperating with leaked document investigation And now a word from our sponsor, AppOmni  Can you name all the third party apps connected to your major SaaS platforms, like Salseforce,  Microsoft 365, or Google Workspace? What about the data these apps can access? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk.  With AppOmni, you get visibility to all third party apps and SaaS-to-SaaS connections — including which end users have enabled them, and the level of data access they've been granted. Visit AppOmni.com today to request a free risk assessment. 

First Light with Rachel Smalley
CERT is campaigning for us to upgrade weak passwords to strong and secure passphrases to reduce our risk of falling victim to a cyber threat

First Light with Rachel Smalley

Play Episode Listen Later Jul 19, 2022 5:55


See omnystudio.com/listener for privacy information.

Retirement Lifestyle Show  with Roshan Loungani, Erik Olson & Adrian Nicholson

Today on the Retirement Lifestyle Show, Roshan Loungani, Erik Olson, and Adrian Nicholson break down some of the leading password managers and explain why it might be a good idea to have a password manager. They talk about the reasons why most people don't have a password manager, the risks of reusing similar passwords, and the best password managers for business or family use. [04:30] How to Hack-Proof Your Passwords [06:40] Top Brands in the Password Manager Space [10:23] The Best Password Managers For Businesses [12:00] Key Features of the Keeper Software Manager [13:15] Why Roshan Settled on LastPass Password Manager [15:55] The Reason Why Most People Don't Have a Password Manager [18:27] The Risks Associated with Weak Passwords [21:00] How to Save Your Passwords Automatically [22:51] Password Managers, Browser Extensions, and VPN Use [30:10] Understanding the Google Authentication Tool [32:03] The Trusted Contacts and Family Feature [38:15] Parting Thoughts Roshan can be reached at roshan.loungani@aretewealth.com or at 202-536-4468. Erik can be reached at erik.olson@aretewealth.com or 815-940-4652. Adrian can be reached at adrian.nicholson@aretewealth.com or at 703-915-8905. Follow Us At: Website: https://retirementlifestyleshow.com/ https://www.retirewithroshan.com https://youtu.be/hKVzI87v0tA https://twitter.com/RoshanLoungani https://www.linkedin.com/in/roshanloungani/ https://www.facebook.com/retirewithroshan/ https://www.linkedin.com/in/financialerik/ https://www.linkedin.com/in/adrian-nicholson-74b82b13b/ #retirementlifestylepodcast #fire #podcast #FI #Retire #retirewithroshan #BAM #BusinessAsMission #ImpactInvesting All opinions expressed by podcast hosts and guests are solely their own. While based on information they believe is reliable, neither Arete Wealth nor its affiliates warrant its completeness or accuracy, nor do their opinions reflect the opinion of Arete Wealth. This podcast is for general informational purposes only and should not be regarded as specific advice or recommendations for any individual. Before making any decisions, consult a professional.

Beslow Musictalk
Weak Passwords

Beslow Musictalk

Play Episode Listen Later Mar 1, 2022 12:48


I came across this article on CNBC about passwords that are used by people that can't be easily hacked into on this show we help you with what you should not need to do when creating a password and a top 20 passwords used that shouldn't be if you want more you can go to the article by Tom Huddleston @ https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html --- Send in a voice message: https://anchor.fm/joseph-beslow7/message

cnbc weak passwords tom huddleston
The Bid Picture - Cybersecurity & Intelligence Analysis
11: Weak Passwords, Intimate Pictures and Videos, Fake Court Affidavits & a Possible 32-Year Prison Sentence

The Bid Picture - Cybersecurity & Intelligence Analysis

Play Episode Listen Later Mar 12, 2021 28:25


In this episode, host Bidemi Ologunde presents an incident where two young men are awaiting sentencing for breaking into female students' university email accounts and then gaining further access into their social media accounts to steal their nude pictures and trade them with their co-conspirators.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).

Real Funny Stories
112: Barista Confessions

Real Funny Stories

Play Episode Listen Later Nov 30, 2020 33:05


Tree Humper, Weird Drive-thru Stories, Weak Punishment, Meat-eating Vegetarian Babysitter, Middle School Pepper Eating Contest, Weak Passwords, Criminal Brings Child to Work, Black Market COVID-19 Tests, Barista Confessions   Join our community here to keep laughing!

Curiosity Daily
The 3-Encounter Rule, Why Weak Passwords Survive, and Saturn’s Rings Aren’t as Old as We Thought

Curiosity Daily

Play Episode Listen Later Jan 15, 2020 10:49


Learn about how your weak passwords can get approved even when they shouldn’t; why Saturn’s rings might not be as old as we thought; and how much time you should spend with someone to know if you really enjoy their company. Sources: The Top 100 Worst Passwords of 2019 | SplashData — https://www.teamsid.com/100-50-worst-passwords-2019/  'Inconsistent and misleading' password meters could increase risk of cyber attacks | EurekAlert! — https://www.eurekalert.org/pub_releases/2019-12/uop-am121819.php  2019 Data Breach Investigations Report | Verizon — https://enterprise.verizon.com/resources/reports/dbir/  Password meters: inaccurate advice offered inconsistently? | Computer Fraud & Security, Volume 2019, Issue 11, November 2019 — https://www.sciencedirect.com/science/article/abs/pii/S1361372319301162?via%3Dihub  Ancestor of Humans Lived With Dinosaurs | Seeker — https://www.seeker.com/ancestor-of-humans-lived-with-dinosaurs-1768223125.html  Are Saturn’s Rings Really as Young as the Dinosaurs? | Quanta Magazine — https://www.quantamagazine.org/are-saturns-rings-really-as-young-as-the-dinosaurs-20191121/  The origin of Saturn's rings and moons | Science — https://science.sciencemag.org/content/364/6445/1028  Measurement and implications of Saturn’s gravity field and ring mass | Science — https://science.sciencemag.org/content/364/6445/eaat2965  The 3-Encounter Rule | The Art of Manliness — https://www.artofmanliness.com/articles/the-3-encounter-rule/  Relational mate value: Consensus and uniqueness in romantic evaluations. | Journal of Personality and Social Psychology — https://psycnet.apa.org/record/2014-08116-001 Relational Mate Value: Consensus and Uniqueness in Romantic Evaluations | Journal of Personality and Social Psychology (PDF) — https://static1.squarespace.com/static/504114b1e4b0b97fe5a520af/t/536558a7e4b00d4ffa0c60a0/1399150759190/EastwickHunt2014JPSP.pdf  Amazon smart speaker users: you can listen to our podcast as part of your Amazon Alexa Flash Briefing! Just click or tap “enable” here: https://curiosity.im/podcast-flash-briefing. 

ProactiveIT
ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware

ProactiveIT

Play Episode Listen Later Dec 20, 2019 71:01


This is the ProactiveIT Podcast.  This Week: The latest in IT and Cyber Security news plus Weak Passwords, schools targeted by ransomware and HIPAA Right of Access Explained. This is... The post ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware appeared first on Nwaj Tech - Information Tech & Cloud Support.

AT&T ThreatTraq
10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq

AT&T ThreatTraq

Play Episode Listen Later Oct 11, 2018 23:42


10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq

Paul's Security Weekly
Hack Naked News #192 - October 9, 2018

Paul's Security Weekly

Play Episode Listen Later Oct 9, 2018 24:32


This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News!   Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly 

Hack Naked News (Audio)
Hack Naked News #192 - October 9, 2018

Hack Naked News (Audio)

Play Episode Listen Later Oct 9, 2018 24:32


This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News!   Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly 

Hack Naked News (Video)
Tenable, Google+, and Weak Passwords - Hack Naked News #192

Hack Naked News (Video)

Play Episode Listen Later Oct 9, 2018 24:41


Tenable Researcher Reveals Extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, Weak passwords are being banned in California, and Code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit http://hacknaked.tv to get all the latest episodes!

All JavaScript Podcasts by Devchat.tv
JSJ 294: Node Security with Adam Baldwin

All JavaScript Podcasts by Devchat.tv

Play Episode Listen Later Jan 4, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

JavaScript Jabber
JSJ 294: Node Security with Adam Baldwin

JavaScript Jabber

Play Episode Listen Later Jan 3, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

Devchat.tv Master Feed
JSJ 294: Node Security with Adam Baldwin

Devchat.tv Master Feed

Play Episode Listen Later Jan 3, 2018 68:31


Panel:  Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is  the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security  Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot  convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck

Professionally Evil Perspective
Default or Weak Passwords and Other Mis-configurations

Professionally Evil Perspective

Play Episode Listen Later Apr 15, 2013 23:59


In this Episode, Kevin, James and Jason discuss implications of using default or weak credentials on systems and applications.  In addition, they discuss some other mis-configurations regarding HTTP Methods and Web Server file accessibility (web.xml).