POPULARITY
Blue Batteries for Baby Safety: A Colourful Caution against Coin Cells. Printed Perfection: Pioneering Progress in Polymer Palaces. AI Alert Advances: Saving Lives with Smart Technology. Password Protection Paradigm: UK's Pioneering Policy. Rapid Rails: Revolutionising US Travel with Speed and Sustainability. Phishing Fiasco: Foiling a Formidable Fraudulence Factory. Solar Splendour: Scientists Spin Stretchable Solar Cells for Smart Wear. Outage Outcry: Protecting Triple-0 in Telecom Turmoil. Google's Gemini Galore: Gearing up with Generative AI.
Are you prone to using easy-to-remember passwords? If you live in the UK, it's time to change your habits: a new law has made the country the first place in the world where it is actually illegal to use weak passwords on connected devices. According to The Guardian, the new laws mean all manufacturers of smartphones, TVs, smart doorbells, and other devices must protect their connected devices by prompting users to change any default or common passwords. Whether you live in the UK or not, changing default passwords on your devices is an important first step during the setup process. Leaving these passwords unchanged, or setting them to something that is easily guessable, such as 12345 or ‘password', is like leaving your front door open for cyber criminals. And once they get in, those criminals can take over your devices and use them to hack others, send spam emails, and conduct the aggressive denial of service campaigns that regularly bring down company websites. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com
Welcome to the security box, podcast 148. On this podcast, I may have a complete moron with a company, we'll have news, notes and more. The topic deals with passwords and it isn't looking that great. Morons We stand in solidarity with you, Reddit users. Reddit is taking advantage of the situation just like Twitter did so many months before. Apparently, Reddit has decided to do the same thing. One article says they're only charging $0.24 per 1,000 calls to their API, but people indicate its much different. The cost is $12,000 per month or roughly up to $20 million per year according to some estimates. Here are the blog posts as of writing in regards to Reddit. Accessibility apps will be free for API use on Reddit Reddit communities to go dark on June 12th, setting themselves to private Reddit to charge $12k for 50k calls to API? Its Official, Apollo shutting down Here's an ars article on Apollo Van Nuys is not too far from where I live in a town called Woodland Hills. I go through there every time I take the bus. According to a KNX article which is very short, it says a guy from there was caught selling drugs on the dark web. Here is the blog post from the tech blog titled Van Nuys man pleads Not Guilty to selling drugs online which links to the KNX article. In Case you Missed it In Case you missed it, I finished Tracers in the Dark. It was a very interesting book, one I didn't want to put down until I did. Book Review: Tracers in the dark, by Andy Greenberg is the blog post and I'm not giving anything away. Our Topic: Weak Passwords Our topic comes to us from Cyberscoop. It was an interesting read. The article is title Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says and I found it interesting. This proves again that we need to make sure that our users are using strong passwords or pass phraises. Don't worry, Cyber Security Awareness Month is coming up, so TSB will be starting all over again with basic stuff when it comes to your security. I hope that every single person will enjoy today's program, and thanks so much for listening! Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.
A monster episode this week with updates to Chat, Cloud Search, Sites, Access Approvals, Classroom, Drive, and more. Over Passover, I was offline a lot and had the chance to catch up on some reading and I absolutely tore through Losing the Signal which is the story of the epic rise and eventual fall of Blackberry. They changed how we communicate and not only got completely blindsided by Apple and then Google, they completely refused to believe this is the future people would want. Now I loved my Crackberrys and had many different models over the years including the touch screen Storm Slider, and the design was getting better but the OS was just trash at that point. This book goes behind the scenes and now I know why. They are releasing a new movie based on this book called Blackberry and if you are anything like me, I recommend reading the book and seeing the movie. It releases May 12th. Blackberry Trailer: https://youtu.be/cXL_HDzBQsM #notsponsored Click here to learn all about the Google ChromeOS Administrator Certification and how to pass it: https://youtu.be/KHPy_n0qVk8
Weak passwords targeted on Google Cloud Potential IT snitches warned about employment stitches Discord cooperating with leaked document investigation And now a word from our sponsor, AppOmni Can you name all the third party apps connected to your major SaaS platforms, like Salseforce, Microsoft 365, or Google Workspace? What about the data these apps can access? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk. With AppOmni, you get visibility to all third party apps and SaaS-to-SaaS connections — including which end users have enabled them, and the level of data access they've been granted. Visit AppOmni.com today to request a free risk assessment.
See omnystudio.com/listener for privacy information.
Retirement Lifestyle Show with Roshan Loungani, Erik Olson & Adrian Nicholson
Today on the Retirement Lifestyle Show, Roshan Loungani, Erik Olson, and Adrian Nicholson break down some of the leading password managers and explain why it might be a good idea to have a password manager. They talk about the reasons why most people don't have a password manager, the risks of reusing similar passwords, and the best password managers for business or family use. [04:30] How to Hack-Proof Your Passwords [06:40] Top Brands in the Password Manager Space [10:23] The Best Password Managers For Businesses [12:00] Key Features of the Keeper Software Manager [13:15] Why Roshan Settled on LastPass Password Manager [15:55] The Reason Why Most People Don't Have a Password Manager [18:27] The Risks Associated with Weak Passwords [21:00] How to Save Your Passwords Automatically [22:51] Password Managers, Browser Extensions, and VPN Use [30:10] Understanding the Google Authentication Tool [32:03] The Trusted Contacts and Family Feature [38:15] Parting Thoughts Roshan can be reached at roshan.loungani@aretewealth.com or at 202-536-4468. Erik can be reached at erik.olson@aretewealth.com or 815-940-4652. Adrian can be reached at adrian.nicholson@aretewealth.com or at 703-915-8905. Follow Us At: Website: https://retirementlifestyleshow.com/ https://www.retirewithroshan.com https://youtu.be/hKVzI87v0tA https://twitter.com/RoshanLoungani https://www.linkedin.com/in/roshanloungani/ https://www.facebook.com/retirewithroshan/ https://www.linkedin.com/in/financialerik/ https://www.linkedin.com/in/adrian-nicholson-74b82b13b/ #retirementlifestylepodcast #fire #podcast #FI #Retire #retirewithroshan #BAM #BusinessAsMission #ImpactInvesting All opinions expressed by podcast hosts and guests are solely their own. While based on information they believe is reliable, neither Arete Wealth nor its affiliates warrant its completeness or accuracy, nor do their opinions reflect the opinion of Arete Wealth. This podcast is for general informational purposes only and should not be regarded as specific advice or recommendations for any individual. Before making any decisions, consult a professional.
I came across this article on CNBC about passwords that are used by people that can't be easily hacked into on this show we help you with what you should not need to do when creating a password and a top 20 passwords used that shouldn't be if you want more you can go to the article by Tom Huddleston @ https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html --- Send in a voice message: https://anchor.fm/joseph-beslow7/message
In this episode, host Bidemi Ologunde presents an incident where two young men are awaiting sentencing for breaking into female students' university email accounts and then gaining further access into their social media accounts to steal their nude pictures and trade them with their co-conspirators.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).
Tree Humper, Weird Drive-thru Stories, Weak Punishment, Meat-eating Vegetarian Babysitter, Middle School Pepper Eating Contest, Weak Passwords, Criminal Brings Child to Work, Black Market COVID-19 Tests, Barista Confessions Join our community here to keep laughing!
Learn about how your weak passwords can get approved even when they shouldn’t; why Saturn’s rings might not be as old as we thought; and how much time you should spend with someone to know if you really enjoy their company. Sources: The Top 100 Worst Passwords of 2019 | SplashData — https://www.teamsid.com/100-50-worst-passwords-2019/ 'Inconsistent and misleading' password meters could increase risk of cyber attacks | EurekAlert! — https://www.eurekalert.org/pub_releases/2019-12/uop-am121819.php 2019 Data Breach Investigations Report | Verizon — https://enterprise.verizon.com/resources/reports/dbir/ Password meters: inaccurate advice offered inconsistently? | Computer Fraud & Security, Volume 2019, Issue 11, November 2019 — https://www.sciencedirect.com/science/article/abs/pii/S1361372319301162?via%3Dihub Ancestor of Humans Lived With Dinosaurs | Seeker — https://www.seeker.com/ancestor-of-humans-lived-with-dinosaurs-1768223125.html Are Saturn’s Rings Really as Young as the Dinosaurs? | Quanta Magazine — https://www.quantamagazine.org/are-saturns-rings-really-as-young-as-the-dinosaurs-20191121/ The origin of Saturn's rings and moons | Science — https://science.sciencemag.org/content/364/6445/1028 Measurement and implications of Saturn’s gravity field and ring mass | Science — https://science.sciencemag.org/content/364/6445/eaat2965 The 3-Encounter Rule | The Art of Manliness — https://www.artofmanliness.com/articles/the-3-encounter-rule/ Relational mate value: Consensus and uniqueness in romantic evaluations. | Journal of Personality and Social Psychology — https://psycnet.apa.org/record/2014-08116-001 Relational Mate Value: Consensus and Uniqueness in Romantic Evaluations | Journal of Personality and Social Psychology (PDF) — https://static1.squarespace.com/static/504114b1e4b0b97fe5a520af/t/536558a7e4b00d4ffa0c60a0/1399150759190/EastwickHunt2014JPSP.pdf Amazon smart speaker users: you can listen to our podcast as part of your Amazon Alexa Flash Briefing! Just click or tap “enable” here: https://curiosity.im/podcast-flash-briefing.
This is the ProactiveIT Podcast. This Week: The latest in IT and Cyber Security news plus Weak Passwords, schools targeted by ransomware and HIPAA Right of Access Explained. This is... The post ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware appeared first on Nwaj Tech - Information Tech & Cloud Support.
10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq
This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Tenable Researcher Reveals Extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, Weak passwords are being banned in California, and Code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit http://hacknaked.tv to get all the latest episodes!
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
In this Episode, Kevin, James and Jason discuss implications of using default or weak credentials on systems and applications. In addition, they discuss some other mis-configurations regarding HTTP Methods and Web Server file accessibility (web.xml).