Podcasts about Webmail

  • 50PODCASTS
  • 86EPISODES
  • 28mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 6, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Webmail

Latest podcast episodes about Webmail

Heather du Plessis-Allan Drive
Nadia Yousef: CISO Lens Country Manager addresses safety concerns surrounding ministers using personal emails for Government work

Heather du Plessis-Allan Drive

Play Episode Listen Later May 6, 2025 2:44 Transcription Available


Education Minister Erica Stanford is not alone in forwarding Parliament and ministerial emails to her personal account - with Nicola Willis and Chris Bishop revealing they're guilty of similar acts. The Cabinet Manual says ministers should avoid using personal mobile and email accounts wherever possible. CISO Lens Country Manager Nadia Yousef says Webmail services like Gmail can be safe if you use a strong password multi-factor authentication - but it's not an appropriate tool for Government use. "Long, strong and unique passwords - it's something we talk about all the time and everyone's absolutely sick of hearing it - but they are the silver bullet with multi-factor." LISTEN ABOVE See omnystudio.com/listener for privacy information.

Abenteuer Home-Office | Damit du im Home-Office effizient an deinem Online-Business arbeitest!

Thu, 06 Feb 2025 04:45:00 +0000 https://abenteuerhomeoffice.podigee.io/297-282-spam-verhindern-durch-diese-routine 7ad19b2eccc33cdfe04bac6d0883db71 Direkt am E-Mail-Server Spam nervt, da stimmst du mir sicher zu. Aber wie kannst du als E-Mail-EmpfängerIn Spam verhindern? Die traurige aber realistische Wahrheit ist: Zu 100% wirst du das nur schaffen, wenn du komplett auf E-Mails verzichtest. Nicht sehr realistisch, oder? Für mich gibt es zwei Grundsätze bei E-Mails: Ich möchte alle E-Mails in meinem Posteingang finden, die ich wirklich haben möchte und dich ich angefordert habe. Ich möchte Spam Mails vermeiden, wo immer es geht und sie so selten wie möglich in meinem Posteingang finden. Das funktioniert allerdings erst, seitdem ich mein Webmail auf All-Inkl nicht mehr ignoriere und nicht glaube, dass es reicht, wenn mein E-Mail-Programm Thunderbird begreift, was Spam ist. Ja, und das erreiche ich durch die Spam-Routine, die ich dir hier vorstelle. Hier geht's zum Blogartikel und Video Und hier findest du die Checklisten, die ich erwähnt hatte. 297 full Direkt am E-Mail-Server no Claudia Kauscheder

The Daily Decrypt - Cyber News and Discussions
Microsoft Phishing Honeypots, Cisco’s DevHub Paused, Roudcube Webmail Vulns – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 22, 2024


Video Episode: https://youtu.be/2YiTiU75inA In today’s episode, we discuss Microsoft’s innovative approach to fighting phishing attacks using fake Azure tenants as honeypots to gather intelligence on cybercriminals, as highlighted by Ross Bevington at BSides Exeter. We also cover Cisco’s DevHub portal being taken offline following the leak of non-public data by a hacker, while examining recent exploitation of the Roundcube webmail XSS vulnerability for credential theft. Finally, we delve into critical flaws identified in several end-to-end encrypted cloud storage platforms, including Sync and pCloud, raising concerns over user data security. Articles referenced: 1. https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/ 2. https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/ 3. https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html 4. https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/ Timestamps 00:00 – Introduction 00:52 – Microsoft Phishing Honeypots 02:51 – Webmail Roundcube XSS 03:54 – CSP Vulns 05:08 – Cisco’s DevHub portal taken offline 1. What are today’s top cybersecurity news stories? 2. How is Microsoft using honeypots to combat phishing? 3. What happened with Cisco’s DevHub after a data leak? 4. What vulnerabilities have been discovered in Roundcube webmail? 5. What are the security issues found in E2EE cloud storage platforms? 6. How does Microsoft’s Deception Network gather threat intelligence? 7. What data was allegedly leaked from Cisco’s platform? 8. What is the significance of the Roundcube webmail XSS vulnerability? 9. Which platforms were found to have severe flaws in end-to-end encryption? 10. How does Microsoft's approach to phishing differ from traditional methods? Azure, phishers, honeypot, cybercriminals, Cisco, DevHub, cyber, data leak, Roundcube, phishing, JavaScript, vulnerability, security, encryption, Sync, vulnerabilities,

The Daily Decrypt - Cyber News and Discussions
CSS can Bypass Microsoft Phishing Protection and Vulnerabilities in Linux Kernel, Roundcube Webmail, WhatsUp Gold – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Aug 8, 2024


In today's episode, we dive into security vulnerabilities affecting Roundcube Webmail, Progress WhatsUp Gold, and Microsoft 365, discussing how flaws such as CVE-2024-42008, CVE-2024-4885, and a bypass method using CSS could allow attackers to steal sensitive information or execute remote code. We also explore the innovative Linux kernel exploitation technique "SLUBStick," which elevates limited heap vulnerabilities to arbitrary memory read-and-write capabilities, potentially leading to privilege escalation. Tune in to hear expert insights on how these vulnerabilities could be exploited and the recommended mitigations to safeguard your systems. Video Episode: https://youtu.be/47sS-AKK2qo 00:00 - Intro 01:14 - SLUBStick Linux Kernel 02:37 - Microsoft 365 Phishing Alert Bypassed with CSS 04:45 - Roundcube Webmail Vulnerabilities 05:49 - WhatsUp Gold RCE Flaw URLs: https://thehackernews.com/2024/08/roundcube-webmail-flaws-allow-hackers.html https://thehackernews.com/2024/08/new-linux-kernel-exploit-technique.html https://www.bleepingcomputer.com/news/security/critical-progress-whatsup-rce-flaw-now-under-active-exploitation/ https://www.bleepingcomputer.com/news/security/microsoft-365-anti-phishing-feature-can-be-bypassed-with-css/ Sign up for digestible cyber news delivered to your inbox: https://news.thedailydecrypt.com Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Roundcube, vulnerabilities, hackers, updates, SLUBStick, exploit, Linux kernel, WhatsUp Gold, CVE 2024 4885, RCE, exploitation, Microsoft 365, anti-phishing, CSS Search Phrases: What are today's top cybersecurity news stories? What are the major vulnerabilities found in Roundcube? How can hackers steal emails using Roundcube? What is SLUBStick and how does it exploit the Linux kernel? What updates have been released for Roundcube vulnerabilities? How can users protect their accounts from Roundcube vulnerabilities? What is CVE-2024-4885 in WhatsUp Gold? How can admins secure WhatsUp Gold servers against CVE-2024-4885? How to protect against phishing given the Microsoft 365 vulnerability? What are the latest cybersecurity updates for Microsoft 365?

Giga TECH.täglich
1&1-Webmail-Login: Ionos-E-Mails im Browser lesen

Giga TECH.täglich

Play Episode Listen Later Jul 22, 2024


Wer einen Mail-Account bei 1&1 (letzt Ionos) hat, kann ihn sich auf dem Smartphone oder in E-Mail-Programmen einrichten. Alternativ könnt ihr den 1&1-Webmailer nutzen, wenn ihr eure E-Mails im Browser lesen möchtet. GIGA zeigt, wie das geht und wie ihr Login-Probleme beheben könnt.

BSD Now
555: Poudriereing Apple Silicon

BSD Now

Play Episode Listen Later Apr 18, 2024 57:49


Kubernetes and back - Why I don't run distributed systems, NetApp's strategic contributions to FreeBSD: a deep dive into upstreaming efforts, Make your own E-Mail server - Part 2 - Adding Webmail and More with Nextcloud, Poudriere on Apple Silicon, One less Un*xy option for 32-bit PowerPC, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Kubernetes and back - Why I don't run distributed systems (https://www.davd.io/posts/2024-03-20-kubernetes-and-back-why-i-dont-run-distributed-systems/) NetApp's strategic contributions to FreeBSD: a deep dive into upstreaming efforts (https://freebsdfoundation.org/blog/netapps-strategic-contributions-to-freebsd-a-deep-dive-into-upstreaming-efforts/) News Roundup Make your own E-Mail server - Part 2 - Adding Webmail and More with Nextcloud (https://it-notes.dragas.net/2024/03/21/make-your-own-email-server-freebsd-adding-nextcloud-part2/) Poudriere on Apple Silicon (https://oliver-epper.de/posts/poudriere-on-m1-mac/) One less Un*xy option for 32-bit PowerPC (http://tenfourfox.blogspot.com/2024/02/one-less-unxy-option-for-32-bit-powerpc.html) Beastie Bits Powering up the future: the new FreeBSD cluster in Chicago (https://freebsdfoundation.org/blog/powering-up-the-future-the-new-freebsd-cluster-in-chicago/) Dragonflybsd 6.5 Snapshot Release on Acer Nitro AN515-51/58-XXX Series Laptops (https://github.com/catfacedck/Dragonflybsd-Acer-Nitro-Laptops-AN515-5158-XXX) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)

This Week in Linux
244: PipeWire 1.0, Red Hat Dropping Xorg, openSUSE, Nextcloud & more Linux news

This Week in Linux

Play Episode Listen Later Dec 3, 2023 26:27


https://youtu.be/A7fXwNGVctk Forum Discussion Thread (https://forum.tuxdigital.com/t/244-pipewire-1-0-red-hat-dropping-xorg-opensuse-nextcloud-amp-more-linux-news/6089) On this episode of TWIL (244), Red Hat has announced that Xorg is no more for RHEL. PipeWire 1.0 has been released to the world. Nextcloud has revealed they are joining forces with Roundcube to improve the Webmail option of Nextcloud. openSUSE is currently running a contest to change some logos for various projects. All of this and more on this episode of This Week in Linux, Your Source for Linux GNews! Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/ae656d8d-3f04-4345-a3f2-3d56370b0d70.mp3) Supported by: LINBIT = https://thisweekinlinux.com/linbit Want to Support the Show? Become a Patron = https://tuxdigital.com/membership Store = https://tuxdigital.com/store Chapters: 00:00 TWIL 244 Intro 00:36 Red Hat Dropping Xorg for RHEL 10 - [ link (https://www.redhat.com/en/blog/rhel-10-plans-wayland-and-xorg-server) ] 03:13 PipeWire 1.0 Released - [ link (https://gitlab.freedesktop.org/pipewire/pipewire/-/releases/1.0.0) ] 04:55 PeerTube 6.0 Released - [ link (https://framablog.org/2023/11/28/peertube-v6-is-out-and-powered-by-your-ideas/) ] 07:13 LINBIT - [ link (https://thisweekinlinux.com/linbit) ] 08:38 OpenMandriva Lx 5.0 Released - [ link (https://www.openmandriva.org/en/news/article/openmandriva-lx-5-0-released) ] 09:40 Roundcube Webmail Merges With Nextcloud - [ link (https://nextcloud.com/blog/open-source-email-pioneer-roundcube-comes-aboard-nextcloud/) ] 12:35 Selecting the New Face of openSUSE - [ link (https://en.opensuse.org/Logocontest) ] 16:04 ChatGPT's OpenAI CEO Fiasco - [ link (https://openai.com/blog/openai-announces-leadership-transition) ] 19:27 GIMP 3.0 Is Hoping To Release In May - [ link (https://developer.gimp.org/core/roadmap/) ] 23:02 Windows XP Ugly Sweater - [ link (https://gear.xbox.com/pages/windows) ] 25:33 Outro

This Week in Linux
244: PipeWire 1.0, Red Hat Dropping Xorg, openSUSE, Nextcloud & more Linux news

This Week in Linux

Play Episode Listen Later Dec 3, 2023 26:28


On this episode of TWIL (244), Red Hat has announced that Xorg is no more for RHEL. PipeWire 1.0 has been released to the world. Nextcloud has revealed they are joining forces with Roundcube to improve the Webmail option of Nextcloud. openSUSE is currently running a contest to change some logos for various projects. All […]

TechStuff
Tech News: Hackers and Vulnerabilities and APIs, Oh My!

TechStuff

Play Episode Listen Later Oct 26, 2023 34:12 Transcription Available


Pro-Russian hackers have found and exploited a vulnerability in a popular webmail app. Researchers found a very complicated way to compromise certain Apple devices. Slack has ended support for X/Twitter integration. Plus lots more.See omnystudio.com/listener for privacy information.

Podcast Bistum Passau
Telefonseelsorge im Bistum Passau - Wär das nicht was für Dich?

Podcast Bistum Passau

Play Episode Listen Later Jun 27, 2023 13:36


Die Telefonseelsorge im Bistum Passau braucht Unterstützung. Im Interview erfahren Sie mehr über diesen wichtigen Job. Alle Infos finden Sie außerdem unter: www.telefonseelsorge.bistum-passau.de. Sollten Sie Hilfe benötigen oder einen Ansprechpartner brauchen - 0800 111 0 222 ist die Nummer der Telefonseelsorge. Der Kontakt ist möglich per Telefon, per Chat und auch per Webmail. Nutzen Sie dieses Angebot – Anonym. Kompetent. Rund um die Uhr. Ihr Anruf ist kostenfrei!

Digitalmagazin von Radio Stadtfilter
Aha-Erlebnisse der unerfreulichen Art

Digitalmagazin von Radio Stadtfilter

Play Episode Listen Later Mar 28, 2023 35:31 Transcription Available


Jürg hat aufgeräumt und danach festgestellt, dass die Mails, die er nicht mehr in seinem Webmail haben wollte, auch aus Outlook verschwunden sind – eine höchst unerfreuliche Sache, weil er nicht bei sich, sondern bei seiner Cousine aufgeräumt hat. Bei Heidi hat sich noch keine böse Überraschung eingestellt. Aber sie fragt sich, ob das passieren könnte, falls sie dem Update-Begehren ihres Smartphones nachgibt. Das will unbedingt eine Software namens One UI 5 installieren, ohne dass dafür aus Heidis Sicht wirklich eine Notwendigkeit besteht. Und Hans-Ulrich hat sich nicht über unsere Aufforderung gefreut, die alten Office-Versionen zu ersetzen. Das würde er gern – doch erstens gefällt ihm das Update nicht und zweitens ist er sich nicht sicher, ob alle seine VBA-Scripte hinterher noch funktionsfähig sind. Und schliesslich stellt Hannes fest, dass ihm sein Mailprogramm Thunderbird immer wieder alte Adressen unterjubelt. Und das ist auch kein Vergnügen, weil deswegen andauernd Nachrichten auf der Strecke bleiben. Die LInks zur Episode: https://nerdfunk.ch/nerdfunk-655/

Die afrodeutsche Christin - Tabuthemen? Let's talk about it!
Seelenschhmerz: Erfahrungen mit sexueller Gewalt im jungen Alter

Die afrodeutsche Christin - Tabuthemen? Let's talk about it!

Play Episode Listen Later May 13, 2022 52:51


In der heutigen Episode habe ich mich mit meiner Freundin Linda zusammengesetzt, die mir über Ihr Leben und Ihren Erlebnissen als junges Mädchen erzählt. Schon früh hat Sie Erfahrungen mit sexuellem Missbrauch machen müssen und dennoch ist Sie heute ein ,,Sonnenschein'', wie ich sie nenne! Ihre Geschichte ist eine, die mir Hoffnung geschenkt hat. Ich hoffe dasselbe tut Linda's Geschichte für dich auch. Falls du ähnliche oder auch andere traumatische Erfahrungen gemacht hast und mit jemandem sprechen möchtest, bitte wende dich an folgende Nummer: Telefonseelsorge Hamburg: 0800 / 111 0 111 Du kannst dich auch per Chat oder Webmail beraten lassen (online.telefonseelsorge.de). Wenn du mehr Informationen brauchst, besuch gerne die Internetseite: https://www.telefonseelsorge.de/. Linda's Youtube Channel findest du hier: https://www.youtube.com/channel/UCIB77dH1gIcxkRbESkPuGkA much love x

華視三國演議
資訊戰異軍突起|烏克蘭絕地反攻|#沈伯洋 #矢板明夫 #汪浩|@華視三國演議|20220410

華視三國演議

Play Episode Listen Later Apr 10, 2022 52:15


烏俄實體戰爭新衝擊,決戰於千里之外,兵不血刃的資訊戰,撼動全球科技圈,能否助烏克蘭絕地大反攻? 目前中國、俄羅斯、北韓駭客互援,尤其中國駭客以量取勝,癱瘓攻擊成功率近四成,高於世界平均,從反送中就開始布局,備妥多套陰謀論,介入烏俄資訊戰。閱聽者必須學會判讀假新聞,辨查訊息來源,提升敵我意識,拒絕轉載自產自銷的內容農場文,突破中國的認知作戰。台灣有獲得國際認證的事實查核機構,加強闢謠效率,資訊攻防戰早已開打!精彩訪談內容,請鎖定@華視三國演議! 本集來賓:#沈伯洋 #矢板明夫 主持人:#汪浩 #資訊戰 #駭客 #假新聞 #事實查核 電視播出時間

#StartDisrupting
Tips on building your company, pivoting, and raising capital

#StartDisrupting

Play Episode Listen Later Mar 16, 2022 34:47


Learn more about entrepreneurship and how to know you've hit traction with your startup from Active Capital Founder and CEO, Pat Matthews.Pat is the founder and general partner of Active Capital, a venture firm focused on leading seed rounds for B2B SaaS companies outside of Silicon Valley. Prior to Active Capital, Pat was an entrepreneur, operator, and angel investor.  Pat's career started in 1999 when he dropped out of Virginia Tech to start a dot-com with some of his best friends and college roommates.  After the dot-com bubble burst, Pat and his team persevered through years of economic downturn before creating Webmail.us, a $10 million dollar software company that was recognized as one of the fastest growing private companies in America by Inc. Magazine.  In 2007, Webmail.us was acquired by Rackspace where Pat worked as an executive on the senior leadership team until 2013.  Pat has personally invested in nearly 100 startups and is an active board member of the Virginia Tech Apex Center for Entrepreneurship, Venture for America in San Antonio, and several Active Capital portfolio companies.Edited and produced by: Becca Halm

Web Masters
Sabeer Bhatia @ Hotmail: The Engineer Who Made Email Free

Web Masters

Play Episode Listen Later Nov 22, 2021 39:20


If you used the Web in the late 90s or early 2000s, there's a good chance you had a Hotmail email account. At the very least, you knew plenty of people with one. After all, at its peak, 25% of Internet users had Hotmail accounts. As a result, lots of people associate the creation of email with Hotmail.But Hotmail didn't invent email. Not even close. The first digital messaging systems current users would recognize as “electronic mail” were being used all the way back in the 1960s, and Hotmail didn't launch until 1996.For what it's worth, Hotmail didn't even invent Web-based email (a.k.a. “webmail”). Webmail first appeared in 1994. Instead, Hotmail's innovation was to make email broadly accessible to anyone -- for free -- via a browser.Of course most people today do -- or at least can -- access their email through browsers. But, in the mid-1990s, that wasn't the case. Instead, reading emails required an email client. That was fine if you were on your own computer. But what if you weren't near your computer? Or what if you didn't even own your own computer? How were you going to read your emails? That's the problem Sabeer Bhatia, Hotmail's founding CEO, helped solve. You'll learn how in this episode of Web Masters.For a complete transcript of the episode, click here.

LINUX Unplugged
404: You've Got Mail

LINUX Unplugged

Play Episode Listen Later May 5, 2021 57:09


It's episode III, Return of the Email. Everyone says never host your own email, so we're doin it. We just have one last job to complete. Special Guest: Daniel Fore.

The 443 - Security Simplified
Popping Webmail Shells

The 443 - Security Simplified

Play Episode Listen Later Mar 17, 2021 49:19


This week on the podcast we take a deep dive into the Exchange Server vulnerabilities that Microsoft issued an emergency patch for after discovering foreign adversaries were actively exploiting the flaws in the wild. We'll go over the vulnerabilities, how they work, and give some tips for defending against similar attacks in the future.

ACB Community
20201217 Vispero Training Series Webmail and JAWS

ACB Community

Play Episode Listen Later Dec 24, 2020 50:08


Vispero Presentation: Come learn how to master webmail and Stay in Touch with Ease from presenters Elizabeth Whitaker and Rachel Buchanan. Sponsored by Vispero

Ideas to Invoices
Pat Matthews, Founder and CEO of Active Capital

Ideas to Invoices

Play Episode Listen Later Dec 20, 2020 30:22


Pat Matthews is the Founder and CEO of Active Capital, based in San Antonio. The firm recently announced it has closed on its second fund worth $25 million. Matthews knows what it’s like to build a company from idea to exit. While a college student at Virginia Tech, he co-founded Webmail.us. He helped build Webmail.us into a $10 million business which sold to Rackspace in 2007. Then he spent six-year in executive positions at Rackspace as a Racker. He has invested in dozens of startups as an angel investor before founding Active Capital.

Unfettered Freedom
Unfettered Freedom, Ep. 8 - ESR Predictions, Respondus, DRM, Webmail Providers, All Distros Are Good

Unfettered Freedom

Play Episode Listen Later Oct 1, 2020 31:01


Unfettered Freedom is a video podcast that focuses on news and topics about GNU/Linux, free software and open source software. On this freedom-packed episode:0:00 - Intro2:04 - Eric S. Raymond has some predictions about Windows 10 and Linux.9:04 - The Respondus Lockdown Browser.15:26 - DRM is designed to limit your rights.19:31 - Are there any "free as in freedom" webmail providers?23:08 - Every distro is awesome! (or is it?)30:01 - Outro and a THANK YOU to the patrons!REFERENCED:► https://www.zdnet.com/article/open-sources-eric-raymond-windows-10-will-soon-be-just-an-emulation-layer-on-linux-kernel/► https://web.respondus.com/he/lockdownbrowser/► https://defectivebydesign.org/► https://www.fsf.org/resources/webmail-systems► https://www.reddit.com/r/linux/comments/j07qwy/every_distro_is_awesome/AUDIO VERSION OF THIS PODCAST:https://www.buzzsprout.com/1263722/https://open.spotify.com/show/2dWHD35...https://podcasts.apple.com/us/podcast...RSS FEED FOR UNFETTERED FREEDOM:https://feeds.buzzsprout.com/1263722.rssMUSIC ATTRIBUTION:"Key To Your Heart" by The Mini Vandals (from the YT Audio Library)CREATIVE COMMONS LICENSE:This video is licensed with a Creative Commons CC BY license. By marking this original video with a Creative Commons license, I am granting the community the right to reuse and edit that video. Freedom, baby!WANT TO SUPPORT THE CHANNEL?

FLÁVIO LIMA PROFESSOR 2.0
Webmail seguro

FLÁVIO LIMA PROFESSOR 2.0

Play Episode Listen Later Aug 30, 2020 1:38


Sites seguros

It Is What It Is: A True Crime Podcast
A best friends fight!

It Is What It Is: A True Crime Podcast

Play Episode Listen Later Jul 14, 2020 31:06


On July 20th 1980 in Morristown Tennessee best friends Mitzi and Mary go to Cherokee park for a  day for fun. Sadly the girls cross paths with POS Randy Lee May! Mitzi and Mary are in the biggest fight of their life's sadly Mary doesn't make it but her best friend Mitzi and Mary's siblings vow to keep her fight going strong. Shocking this family has to fight to keep Randy May behind bars where he belongs please go and sign this petition http://chng.it/HhqWGkVt4Q Mary's family and Mitzi should not have to fight alone! You can also help by writing  a letter or even as easy has an email. I found her story watching (who i wanna be when i grow up Paula Zahn) On the case with Paula Zahn Season 20 Episode 10 "A predator in the woods"   Tennessee Board of Parole Re: Randy May Parole Hearing 404 James Robertson Parkway Nashville, TN 37243 BOP.Webmail@tn.gov

Craig Peterson's Tech Talk
Welcome! Big Tech and Our Kids, Cloud Software not a Panacea, Regulatory compliance and Liability and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 28, 2020 89:46


Welcome!   We are going to hit a number of topics today from the world of Technology and I have a special guest today who will discuss a subject close that I feel is important for my listeners as well. We are going to talk about some of the dangers of using the cloud and why you need to be careful. Passphrases beat Passwords, Malware on Macs, Ransomware, Cloud Liability and How Big Tech is taking advantage of our kids.   For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Businesses in Danger: Data Transfer between Cloud Apps Passwords: Length trumps Complexity Businesses Must Understand The Intricacies of Cloud Security Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Businesses Beware: Ransomware is on the rise, again Liability belongs to You: Misconfigured Clouds and Security All Businesses are Tech Businesses - Like it or Not Big Tech taking Advantage of Our Kids --- Automated Machine Generated Transcript: Craig Hey, good morning, everybody, Craig Peterson here. I am not doing the Facebook Live this week. If you watched it last week, I'd love to know what you think. Of course, it's something I am more than glad to do. We're busy, so I don't want to do something that people aren't going to like. We're thinking about trying to do something a little bit different, where we go ahead and instead of just the radio show when we do these Lives. We're going to use those for deep dive so you can ask questions and all of that sort of stuff. I think that's going to work out pretty darn well. We'll see how that goes. We're, you know, we're just trying a few different things here as time goes on. Hey, I got a great interview coming up with a friend of mine. He has been sugar-free now for years, you know, is a tech show right then, and there's no particular tech behind this. You know, if you listen to me for a while that I have had a weight problem, okay. Ever since I was a kid, I had a belly on me. The bottom of my rib cage there in the center kind of points out as I get a ski jump from my belly over the years. I've had this constant battle with my weight, and I lost 80 pounds, I put 40 back on throughout about 15, almost 20 years. I guess that's not too bad. Now I've taken it off again. I've talked about what I did to do that. I want you to hear what Barry has to say. I invited him on. He's an incredible guy and done so many interesting things over his life. He has a book out there, and he had a membership site. He was helping people for a while to get rid of their sugar addictions, but he's going to give us some tips and tricks and some points as well coming up a little bit later on today. I want to discuss a fair amount today about "The Cloud" because so many people think it's a panacea. They think by using the cloud somehow relieves them from the regulatory liability of these regulations that are out there and some of the things that you're supposed to comply with, right? In some cases, if you are a subcontractor selling stuff to a military contractor, there's now a ten-year prison sentence plus all of these fines and things that can nail you. So people are thinking, well, we'll just move to the cloud, right? It's going to make it easier. It's going to make it cheaper. And you know, the first pass on those numbers might be the case it might be cheaper. But what I have found in doing a little bit more digging is that many companies are now abandoning the cloud. And when I found they were abandoning the cloud, that's when I started getting interested trying to figure out why what's going on here. Here. And so I dug into it, and I'm going to share that with you today. I think that's an essential thing for businesses. I've got a new report out from the FBI this week that's backing me up from five years ago. I think that's kind of cool. So we'll talk about what the FBI is warning and telling us to do. From our security standpoint. We're going to also talk about some of the intricacies of cloud security. Still, Mac malware on Max, this is kind of interesting, isn't it because we all been kind of conditioned to think the Macs are malware-free, due to their secure design. They use software designed in the university environment for networking, unlike windows. You know, so when you think about the Mac and you think that you are completely free of malware, that is not the case. We'll talk about what kinds of malware you are likely to be exposed to that could kind of nail you. We're going to talk about business ransomware, you do not hear much about it, because you know, there was such a big deal a year to two years ago, but it is on the rise again. So we'll talk about that and how that's affecting business. We're also going to talk about the fact that if you are in business, face it, and you're a tech business. There are no two ways about it, right? As a business person, now you have to use technology. So how do you do it? How do you take care of your security and your technology, when the Calvary is incoming, they're not there? You're just like every other business out there. That means you have to develop some technical prowess and expertise. You have to be also the guys that take care of your security. Maybe you'll bring in professional services firms to help you out. Companies like mine can come in and design your network or redesign your network. Or maybe have accountants come in and look over your bookkeeping. Maybe help to improve some efficiencies in the business. Maybe you bring a legal team in to make sure that you're not going to get nailed by some of these regulations out there. The bottom line is that we are all tech businesses in this day and age. That's something that I don't think most people consider. We'll get into that a little bit later on today. We're also going to be talking about big tech, taking advantage of our kids some new lawsuits filed under the children's online privacy protection act or COPPA, against some of the biggest companies out there in the online world. These are all big deals, I think. That's what we're going to be talking about today. If you want to two, you can get all of these different segments from my weekly radio shows my appearances on TV and radio at my website at Craig Peterson dot com, and you can listen to them individually. You can also subscribe to the podcast. What we've been doing with the radio show since the whole radio show from soup to nuts is an hour and a half long every week is to put it out as one long show. Thanks to a suggestion from a few listeners and one guy that kind of pushed me over the edge in making it that way. If you subscribe to the podcast on any of the major podcasting services, you are going to get a one hour and a half, a 90-minute podcast that covers all the latest news of the week. I appreciate everybody that's doing that. Of course, our numbers have gone down a little bit in the podcast downloads because there are fewer downloads instead of the show being a different podcast is now one podcast, but I think it is better. There was an event that was held by the FBI infragard program in New Hampshire here last week. I didn't go as I was just tied up. They hold it the morning, every couple of months, and most of the time, I just can't go. But the event was called "The Calvary is not coming." They weren't talking about Covid-19 The coronavirus. They were talking about our infrastructure, our businesses when we get attacked. I work with the FBI on cases and help them understand what's going on with attacks against our customers like when Iran or China, Russia, or even others are trying to attack our customers by doing some nasty stuff with our customers, right? Our customer's data that we just don't want to have happened. We just didn't want that information to get out. While preparing these tutorials, the pop-up-trainings, and coursework, it brought to mind this idea of the Calvary, and whether or not they're coming. You and I, we are the people who are responsible for the security in the businesses we work in, right? And that can end up meaning that it's all on our shoulders. So this whole Calvary thing got me to thinking that I think there's a great analogy here. We are the Calvary, I'm the Calvary, and that is the director Action I've been going anyways, not with that specific wording, that particular name, okay. But that's the direction I've always been going. But now I think I'm going to get way more specific about that. Because you are the Calvary, you are the people that your family goes to when there's a problem. You are the people who are relied on by the business owner. Maybe you are the business owner, and the buck stops with you when it comes to technology when it comes to security when it comes to making everything work, right. That's the way it is with me, right? I'm the business owner, and yet the tech buck, the security buck stops with me. And so that's the approach I'm going to be taking here. We are the Calvary. I am the Calvary. You are the Calvary every one of you, right? You listen to this tech show to understand technology a little bit better because you're the person that others go to who is going to answer their questions. Who's going to fix their problems. I think it's great, but I also feel a huge responsibility to help you with that. I kind of woke up in more than one time over the last few months with nightmares, that's the wrong word, but how do I help you? How do I help you guys best? What are the things you need to know that is going to be easy? It is a question that we need to work on need to understand. We need to make work for us and our families, our business families as well as our families. That's my theme. I have already got five tutorials in the can where I'm doing screenshots, and I am showing you what to do while you're watching my desktop as I am doing things. I'm installing an extension, or I'm locking down a Windows computer, or I'm configuring a firewall. I am doing all of these things you have to do for everybody or that you have to understand. That's where we're going. I am committed to this. I think I have a message that that works that people can understand, right? The Calvary isn't coming. You are the Calvary. We are the Calvary, each one of us, and that's what we will be covering. So keep an eye on that. Make sure you're on my email list because these tutorials, although free, you can only get them if you subscribe. Craig Peterson dot com is where you're going to find it online. Craig Peterson dot com. Make sure you also use subscribe to the podcast, I'd appreciate it if you enjoy these. A subscription always helps us out and helps get the word out even further. We'll be right back listening to Craig Peterson on WGAN and, of course, online at Craig Peterson dot com. Hi guys, welcome back. Craig Peterson here on WGAN. In online, of course, Craig Peterson dot com. We're going to talk about the cloud and what stuff you need to worry about and what you don't. I was at my chiropractor's just this week and talking with him, and he has moved his practice in with another chiropractor. It's a little bit bigger, they've got massage therapists, and now there are four chiropractors in practice there. He was asking because he was concerned, they have a system there that is cloud-based, and you know, time was they would have a server there in the office, maybe in the basement, and they would have their little firewall, they try and keep things safe. Now that it's out in the cloud, their worried. We're going to be getting into that in a few minutes. And then also coming up here at the top of the hour. I've got my friend Barry who's going to be joining us, and we're going to be discussing sugar, which is, yeah, I guess there's kind of a tech angle to the sugar side, right? Like the high fructose corn syrup and the problems coming from that, of course, we're not going to talk about that part of it, but what he's done and the book he has as well as what you can do. First off, let's talk about our first cloud topic of the day. And this is about businesses in danger, and how they're in danger now from the cloud. The cloud, as I mentioned in the last segment, is not a panacea; it does not relieve you of any responsibility for the data that is in the cloud. So, for instance, if you have patient data, if you have data that is privileged or personally identifiable, putting it into a cloud vendor's hand does not relieve you of that responsibility. If you want to check it out with most of the major vendors out there like Google, for instance, you can find their statements online of what it is that they will accept responsibility for, which is nothing. And that's particularly true if you're not using the business type services. For instance, with Office 365, if you are using their email service, for example, and you're on their lower tier of the platform, you're not going to get security. You're not going to get the ability to block some of the most malicious types of emails that might be coming in. It's not backed up. They are not going to have some of the multi-factor-authentication that you really should have tied in with things, maybe like DUO or others, alright. Just because there is a cloud-service does not mean it's safe. Just because a company like Microsoft with its Office 365 does have some pretty darn secure services. Don't assume that the lower end service is they have are going to be safe for you either. And there's a great article I have up on my website right now. And it's from Health Net security. And it's talking about this subject and saying that 44% of malicious threats are cloud-enabled nowadays. Think about that. It's huge. Time was when the risks were what viruses and we know anti-virus software now is pretty much good for nothing, right? Because the anti-virus software is not going to protect you from modern threats. But that's what it was. It was all this virus stuff that might spread and worms that might cover the basics. But now we're seeing that cybercriminals are using the cloud because it's been an effective method for them to hide their attacks. Because the cloud vendor again, it's you know, friendly. Glee, this is you know, saying, you see a lot, aren't I? Frankly, when you get right down to it, if you are in a big cloud vendor like Microsoft or Google or an Amazon. Or even some of these smaller guys that are still pretty big, you're not even noticeable. Would they notice if you moved to another cloud provider? You will not change their bottom line or their top line. You're not even a rounding error. How much do you think that they care about you individually? What can you do when you get hacked, and you're in the cloud? What can you do when their cloud network goes down? What can you do when their software isn't working when a rollout of their latest release doesn't work? Or maybe it just doesn't work for you and 10,000 other people, which is nothing, right? Because Yeah, well, we got millions of subscribers 10,000 Some people Yeah, well, we'll get right on that for you, sir. Right, because you're not even in the 1%. Lots of problems here. And when we're talking about the security side, yeah, in some ways, it's going to be more secure. But in many ways, it's not. Here's a quote here from a threat company that they do a lot of research is called net scope and scale P. and Ray can Aziz is the threat research director over there. And he's saying, and we are seeing increasingly complex thread techniques being used across cloud applications, spanning from Cloud phishing and malware delivery, to cloud absolute control and ultimately, cloud data exfiltration. Of course, data exfiltration is where the bad guys are stealing your bank account information, stealing nutritional property, stealing your customer's information, etc. Or research Research shows the sophistication and scale of the cloud-enabled Kill Chain to increase, requiring security defenses that understand thousands of cloud apps to keep pace with attackers and block cloud threats. For these reasons, any enterprise using the cloud needs to modernize and extend its security architecture. In other words, what he's saying is any business because we know when he's an enterprise, I want to bring up a critical point. I was doing some work and doing some training with a bunch of accountants in Ireland. The largest group of accountants in Ireland, and I was explaining some of the security problems that we see here and around the world and that they see there, and they started talking about enterprises. Now I note in enterprises, right, and enterprise is big business. You think of enterprises here in the United States, and you're thinking about you know, the multi-billion dollar profit that some of these vast enterprises get. An enterprise means any business, right? It's an enterprise for a kid to set up a lemonade stand at the side of the road and sell lemonade to passers-by. That's an enterprise. So they're saying here, and I agree that every business, no matter how small, needs to understand the threat and understand that cloud apps aren't the answer and you have to take care of it yourself. The Calvary isn't coming. Your end Nat not even in that you're not a rounding error when it comes to the amount of money these companies made and make every year. So you have to be your own Calvary. Now, when we're stuck talking about businesses here, they're saying that 89% of companies are In the cloud Now, that doesn't mean they're hundred percent in the cloud, it just means you're using the cloud service. I bet you when you got right down to it, that those numbers are probably really 100%. People are using some of the services that maybe you shouldn't be using, right. They're using Google Docs and Sheets and all of those types of things. I use Grammarly all of the time, and some of those things can leak data. So we're trying to be careful not to use some of the cloud services when it comes to more confidential data. But really, it's 100%. Think about everything you're doing, all of the collaboration tools, and people are using Slack, which is not secure. And they're using that to share information within the team. You know, it's a great productivity application, sweb mail apps, those are probably the most popular and used today, people using Gmail or I mentioned office 365. I have a friend who still uses Yahoo, who knew that they were still in business doing email, right? There, the average company is using 142 different cloud applications. And I'm what I'm just trying to do here. Now, I'm not trying to scare you away from using the cloud. It isn't just a scare tactic. I'm not trying to sell you a listen. You need to have multiple layers, and you have to buy them for me, right? What I want you to do here, my whole goal of talking about this today is to get you to pay attention to what you're doing, and the data that you have up there. We're going to talk about this more when we get back. We'll finish this up. We're talking about the new FBI, released this week, what they're saying about security and what you can do to help. So stick around. You're listening to Craig Peterson on WGAN. We'll be right back. Hey, welcome back, everybody, Craig Peterson here, WGAN online at Craig Peterson dot com. We're going to talk here about the FBI his latest recommendation from their press release this week. We've got more coming up about cloud security. Ransomware is on the rise again, what type is it? What's it doing? And at the top of the hour, I've got Barry Friedman joining us. We're going to talk about sugar, and the impact of sugar. Now, this isn't an entirely tech-related topic, but I know you're going to appreciate this. He is a great guy. He's got an excellent little book out. It's been up for quite a few years now. It is this concept that he has about sugar and what to do with it, and about it has helped to change my life. I figured I would share it with you. It's one of the things I find essential. Let's finish up our first cloud topic of the day because I want you guys to think about your use of the cloud. When you get into the larger businesses, it's looking like the average of these Fortune 500 companies. The real big ones, but not like the, you know, absolutely massive ones. Those guys are using over 2400 distinct cloud services and apps. Think about what you're using what you're doing. And let's help you think about it for a minute here. Here's a top of five cloud app categories. Which of these are you using Cloud Storage? So we're thinking about things like Dropbox here or box, we're thinking about things like Google Drive, which again, all of these guys Microsoft has one drive, all of them have tiers that are safe. However, most people are not buying their secure tier. So keep that in mind. Next, collaboration tools, which collaboration tools are you using? Right? I am talking about Slack here, and about the Microsoft Teams program. And there are many other types of collaboration as well. We use some for putting together diagrams to use some for some of our graphics arts. We use some cloud apps for grabbing videos and doing some video production. Webmail, what are you using for webmail? Consumer stuff? What do you do? Are you going on to amazon.com to order things? How about some of these other sites, social media, many of us my business included, we have social media accounts that we use to keep in touch with our prospects and with our clients. Which are these are you using Google Drive, YouTube, office 365. Hopefully, you're at least using one of the business versions of office 365. How about Facebook? How about Google? Gmail, Microsoft Office SharePoint, that's a pretty common one. Outlook. How about Twitter, Amazon services like s3 or Amazon Web Services. It was the list goes on and on. LinkedIn, many of them are using them. When and when we're talking about 44% of the threats being cloud-based. It gets to be a big deal. The five top targeted cloud apps are Microsoft Office 365. Now we're seeing this right now with one of our clients who is using Office 365. Now we have them on one of the enterprise levels that they need. They have multiple times a day people trying to break into their Microsoft Office 365 for business accounts from Iran. Now numerous times a day, but also from China and Russia. The next top one box. Very good. Again, outstanding software, but you have to have the right kind. And make sure you're using at least two-factor authentication with some sort of a random one-time password (OTP) type generator. Google Drive Microsoft as your GitHub. Man, it goes on and on lots of great information here. I'm not planning on doing a full course on the cloud anytime soon. But we are going to talk about it more a little bit today coming up later on. But I want to get to this FBI thing right now. About five years ago, there was some academic research that was published, and I remember reading it back then I was really, really into it came out of Cornell, and they looked at the strength of passwords. And we went into the whole history of behind passwords how they started I remember the very first passwords, you know, we remember using systems didn't have passwords. But it has evolved to the point today where these recommendations that came out five years ago are starting to take root with people. There have been so many discussions, so many arguments, if you will, about what should or should not happen when it comes to security. Some are arguing that we need more complexity in our passwords. Many businesses require you to have uppercase lowercase digits, special characters in the password used to be used to have control characters and your passwords. I haven't seen that requirement in a long time. It was back in the days of terminals. Others say, Hey, listen, all you need to do is make your passwords longer. Because part of the problem we have with passwords is the more Like some password, the more likely somebody is going to write it down. And if they write it down, the cleaning crew or somebody else is going to come across it, right? That's a bit of a problem. Well, the FBI is Portland office this week, came out on the side of longer passwords and not this whole complexity mess. So in the FBI statement, they said, quote, instead of using the short, complex password, it's hard to remember, consider using a longer passphrase. It involves combining multiple words into a long string of at least 15 characters. The extra length of the password makes it harder to crack while also making it easier for you to remember. It falls right in line with the research out of Cornell. It is what I've been recommending for a long time. You're best off using some sort of a phrase such as a four-word phrase for a password. Remember, I use password managers, and you should be. You should be using one password or using Lastpass to make sure that you are safe right. So using one of those have it choose the words for you randomly. Both of them have the ability to generate passwords. Occasionally I will use these very complex ones with upper lowercase special characters and numbers. But I only do that when the site requires you to do that. Okay. But this is a very, very big deal. And you might have seen stuff about this before there is a famous now-infamous XKCD webcomic that is online, I should say. It is kind of cool. A lot of sarcasm, math, and language, but it's looking at password strength and through 20 years of effort and said We've successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess. And that is the problem, the harder it is for the computer to guess. The longer it'll take to break-in to, and the less likely they can get into your account, right? So they break it down, look for common substitutions, look at the order numerals punctuations and basically, they come out and say, Hey, listen for your average password, using troubadour ampersand three as the example. That's 1-234-567-8910 11 characters, which is a pretty good length, right? Most sites only require eight characters. That breaks down to 28 bits of entropy. That's two to the 28th power, and at 1000 guesses a second, it would take a computer above three days to break that particular password. You know, possible attack if it's a weak remote web service, it can be a lot faster, there are hash tables that are news. Those hash tables make it so that the bad guys can crack a password in just minutes. When you start using these big ones, and the example is like course, correct battery staple, that's 44 bits, takes 550 years to guess versus three days. Think about that for a few minutes. I think it's vital that we use these passphrases from once again, I agree with the FBI on this one. All right, when we come back, we have one more segment before we get into our little sugar interview. And we're going to talk a bit of malware on Mac. So stick around. We'll be right back. Hey, welcome back, everybody. Craig Peterson here on WGAN and online, Craig Peterson dot com. We're going to talk right now about malware on max. Right, our max hack-proof is not kind of the bottom line. But we're going to talk about that we also have more coming up on some of the cloud risks and things you can do, where you should keep an eye out when it comes to the cloud services that you're using. And I want you to think about what services you're using. And we did talk about that a little bit earlier. Okay, so let's get into the max right now. When we get back to the top of the hour, we're going to be joined by my good friend. We're going to be talking a little about what's going on when it comes to sugar, guys, so he's coming up here in about what 1015 minutes, so make sure you stick around you're going to enjoy it. He has a book out there by You'll find it over on Amazon almost anywhere online. And I think you'll get a lot out of it. It's called I love me more than sugar, the why and how of 30 days sugar-free. So it's, it's absolutely a great idea and is something must pay attention to, we have such an obesity epidemic in addition to all the illnesses, so many of them traced back to that one ingredient. Why and how and what's going on. All of that is coming up with my friend Barry Friedman coming up at the top of the hour. So our Macs you know if you've watched me for a while that I am a huge Apple fan, right? And I'm a big Apple fan mainly because when Apple first came out with iOS 10, not iOS but with a Mac os 10. They had switched from using what was a complete and total toy operating system to a real one using Unix and a refined version of Unix. They ended up having a mock OS underneath it. I had worked on both platforms before helping to develop the kernels in both of those, so I thought, well, this is great, maybe now's the time because I was frustrated, right. I had been using Unix for years. I had, at that point, used Linux as well. And so many of the apps that I wanted to use just weren't available for Linux or any version of Unix. That was a big BSD guy. He still used BSD for some of the things we're doing. I just said, this Is it, right? Because you could drop into a terminal, you had a real terminal, a real operating system sitting under underneath you. And I thought that was pretty darn cool. And I have stuck with Max ever since. But Macs are not foolproof. They do come under attack. Apple has tightened things up. If you've got Catalina, which is the latest release of the Mac operating system, you know that some of the old apps that you might have had no longer work on Catalina, because Apple now has put some requirements in place. The biggest one is, you guys need to be 64 bits instead of 32 bits. That makes the operating system writing a little bit easier because you no longer have to handle two sets of libraries and worry about linking the man or the addressing space for the application. After all, you want to randomize it. And so now I'm going down a rat hole, you're getting kind of geeky, but that's one of the things the other big thing is now you might have noticed that Apple has a lot of controls in place about where an application can go on your Mac, what it has access to and will pop up and ask you about it. There is a lot more stuff coming up. In fact, in the next minor release of Catalina, there's going to be more restrictions in place. But even with all of those things, there are still some vulnerabilities, nothing like Windows. But Windows is getting better. But there are still some significant flaws in the way windows works with its file-sharing services, services turned on, even though it has a firewall. It's a crappy one, and that's part of what we're going to take care of with some of the courses and tutorials I am offering. You're going to be able to lock down any Windows or Mac computer all by yourself. You're going to be able to lock down your small business network, and I am teaching you how to do that, absolutely free. No upsells. Depending on how far you want to be able to lock it down, I will have some courses and things too. As I've said so many times, you're the Calvary the hackers are coming you have to be prepared. When we're talking about Macs, what must we pay attention to? Malwarebytes has some outstanding software that you can use on a Mac and also on Windows. It's one of the few pieces of software one of the packages that I recommend, frankly, but they've got a new report out, and they're saying that Mac malware is now growing faster than malware for Windows, for the first time. It is a quote right out of malware bytes. For the first time, Macs outpaced Windows PC in the number of threats detected per endpoint. I want you to remember, that is threats, not actual successful attacks. In total, we saw approximately 24 million Windows, adware detections, and 30 million Mac detections. We're talking about adware here. These aren't the viruses that have plagued windows forever. It isn't the ransomware that continues to plague windows and will for years to come. We're talking about adware detections. Frankly, what this boils down to so that you don't get too worried about it with your Mac. It is that most of the Mac malware is much more of a nuisance, and it is a real danger. Because Macs are generally not vulnerable to what we would normally classify as malware. They do have some pop-ups that can happen because of the browsers. That's why I've got my training coming up. You guys that are the frontline defenses in your homes and your families and your businesses, you are the Calvary. I've got some great Calvary training coming up for all of you. Keep an eye out for that here in a couple of weeks. But Macs are mostly only vulnerable to this so-called adware frankly and add whereas I said it's more of a nuisance than a danger. Here's something else that Malwarebytes acknowledges it says max differed drastically from windows in terms of the types of threats seen. Between us. It's because they design Macs drastically different than Windows machines. Mac's operating system is designed right. Back to Malwarebytes, where we found several different categories and families in our top detections and Windows threats that classify as traditional malware, especially those aimed at businesses. Most Mac threats and certainly the most common ones are families of adware and potentially unwanted wanted programs (PUPs). Among the top 10 Mac threats for consumers and businesses or it is a mix of these PUPs, these potentially unwanted programs, and adware. The PUPs are a variety of mostly cleaning apps termed as unwanted not just by Malwarebytes but by the Mac user community at large. Two of the best-known examples mean Mac keeper and Mac booth. And I had to add to that, that I have a good friend and he was in the insurance business for years, had his practice and they had several people working for him as he was handling insurance, and then he went into investment type stuff. And it was interesting to me that he fell for that whole pop thing multiple times. He just kept downloading and paying for Mac keeper, which just doesn't do anything, and is malware itself. It is adware. Mac boosters are the same sort of problem. Don't install those things. By the way, when it comes to a Mac, this is very crucial. You have to install the software yourself, right. So until last year, the two top Mac adware apps had detected installations. Number one Hundred of thousands in 2019. However, one new piece of adware was detected 30 million times. It's called New Tab. It appeared on the scene in December 2018. It's an adware family that attempts to redirect searches in the web browser to earn illicit affiliate revenue. I've talked about that before it clicks on ads using your browser. And it is usually delivered in the form of apps with embedded Safari, Safari extension Safari is Apple's number one browser, Apple's browser itself, right. So don't use a new tab. Most crucially of all, Mac malware is not a virus, and it can't spread by itself. It isn't a worm that kind of crawls around. Mac OS does not allow unsigned apps to be installed without user permission at all. The mission these apps cannot spread from machine to machine. You have to fix them. No drive-by, right? None of that happens on a Mac. So the way Mac malware gets installed is by entirely new users like you and me into installing it ourselves. And when we're talking about these potentially unwanted programs, when I call it a scam, where, frankly, but these types of scams advertising junk apps, pretend they're doing something useful. And this is part of what chrome google just got rid of over 500 Chrome extensions because they were doing the same thing. They had scareware built into them. They weren't clicking on all kinds of ads out there to try and drive up revenues. Naive users like my buddy that get tricked into installing them and sometimes even paying for them, which is what he did with Mac keeper. Okay. And then they're hijacking your browser. It's just crazy. So protect yourself. It is simple. Only ever install apps from the Mac App Store or a trusted developer. Only install browser extensions that are recommended by me or by trustworthy sources, because they are not signed and not reviewed. You can always delete them, and you can always remove them, you know, and that's been my advice for people for a long time. Go through your inventory of apps, including on your iPhones, your iPads, etc. The thing that you see that you haven't used in a while delete them. I just went through earlier this week on my iPhone, I sat there and said, Okay, I haven't used that for a while, but I really could use it soon. No, I haven't used it for a while, and I deleted it, which is what I recommend everybody do here. Be very careful that great article from nine to five Mac by Ben Lovejoy that I was commenting on here this segment, and you'll find it online and, of course, at Craig Peterson dot com. And this is part of what I do if you are on my email list, you will get these emails. We have a high open-rate like 40% of you guys open these emails, and I think that's just phenomenal. It's a very, very high rate because they are so useful. So make sure you subscribe, Craig Peterson, calm, slash subscribe, get on my email list, and articles like this and others, including that FBI warning that just came out, will show up in your mailbox. Usually, Saturday morning depends on how far a week's been going. Stick around when we come back. I got my friend joining us, Barry Friedman. You're listening to Craig Peterson on w GAN online Craig Peterson dot com. Hello, everybody, welcome back. Craig Peterson here on WGAN. A little earlier this week, I sat down and recorded an interview with a friend of mine. I've known him for quite a while now. His name is Barry Friedman. He's written a book that you'll find online. It is one of the Amazon number one bestsellers titled I love me, more than sugar. You know that I have been very conscious about my health, particularly recently, right? As I get a little bit older, you realize I'd better be healthy, or I'm going to have all kinds of problems. I have been doing all sorts of diets over the years over the last 40 years. A lot, okay. I kind of stuck with the Atkins diet for a while lost quite a bit of weight. I also have tried a couple of other things. Over the last couple of years, year and a half, anyway, my wife and I have been doing Intermittent fasting. We found it to be just absolutely incredible for us. Now, Barry has a different way of approaching it that's been very successful for him and many other people. So I asked him if he'd sit down with us and talk a little bit about it, and he did. So here we go with the interview with Barry Friedman. Again, check it out online, you'll find this book. It's called I love me more than sugar, the why and how of 30 days sugar-free. We're joined right now by Barry Friedman. He is an author. He has been quite busy over the years, even on Johnny Carson, back in the day. He is a gentleman that I know and appreciate. He's helped me out with a few things over the years. I want to talk a little bit about this book here. I love me more than sugar. What he has found. What he's doing. To help not just me out a little bit, but he's going to talk about sugar and how it impacts all So let's get started. Barry, welcome. Barry Hey, Craig. Craig 2:06 Now there is a whole bunch of controversy out there right now, I've heard people say there are a million diet plans. If you do a Google search, you'll find one that'll work for you because they all work. You know, and it's varying degrees, right? And I've done this over the years, I lost 80 pounds doing the diet, which is really something and then I put about half of that on over the next 20 years. I've taken it off now by doing intermittent fasting and being a little more cautious about what I eat. Looking at all of these changes over the years, one of the significant changes I see right now, Barry, has to do with this food pyramid, which tells us we have to eat grains that were the basis of it. Why don't you tell us a little bit about why that is? What's the problem with the grains and sugars in them. Barry It is funny, you know, all that stuff. See, you would talk to a nutritionist and do well to dig into that, Craig. But what I can tell you is, you know, since childhood of our culture, our parents often use sugar as a reward, punishment, and bribe. It works its way into our lives so fast, so pervasively, and it's kind of a miracle. We eat a lot of wheat. We eat a lot of grains, and those turn into sugar. We eat a lot of sugar. We're up to about 150 to 180 pounds a year average for Americans. It's about eight pounds every three weeks. I know that because I used to go on TV talking about my book and a juggle an eight-pound bowling ball. I would hand that to the host and say, here's how much sugar an average person eats in three weeks, and they hit the table with it. Yeah, it's funny, you know, I think in 2020 or within this decade, we are going to unequivocably look at sugar the same way we now look at tobacco. It snuck in. Back in the old days, go back 150 years, rich people would eat four pounds of the stuff a year. Our systems have not developed fast enough to handle the massive increase, and it shows up in all kinds of ways, overweight, and obesity. A lot of people will tell you it has a lot to do with the number of cancers we have. If you were to look at those two curves, cancer, and sugar consumption, those curves look pretty similar. Now, I'm not a doctor. I'm a four-time world champion who doesn't eat sugar. Craig 4:28 Sugar over the years, we know it has caused problems. I saw some studies looking at some of the Egyptian mummies thousands of years ago now a couple of thousand years ago, and they had all kinds of problems with their teeth and many other diseases that they had. Now they're attributing that to sugar. You mentioned that when we were younger, we would get a little bit of sugar as kind of a treat or reward. Now we see these hangry commercials, but you need to eat this Chocolate Bar because it's going. It has gotten out of hand Unknown Speaker 5:04 Yeah, it's hilarious. I mean, that's how we get up to 150 180 pounds a year, it's added to everything. Crackers and salt have dextrose in it to keep it from caking, salt has sugar, which is fantastic. You know, a lot of savory foods will have it, and it just shows up everywhere. The truth is, after eight years of coming up, Leap Day 2020 will be my eighth anniversary. My first day sugar-free was leap-day 2012. I love these every four years I get an actual anniversary. What happens, you know, what happens when it stopped eating is the taste for the desire for the need. The addiction goes away. Food starts to taste differently. I've often said to people, Craig, that you can't speak for the version of yourself who lives on the other side of 30-day sugar-free. Right now, the person I am is influenced by everything I've done in the last whatever, 30 days or 30 years. That person on the other side of a 30-day sugar-free detox is an entirely different person as far as skin or anxieties. Usually, the feelings they have, their skin, the amount of sleep they need, the way their teeth feel. My teeth feel so good all the time right now used to be able to take my pulse in my teeth after eating a four-pack of Reese's Peanut Butter Cups. I could feel my pulse. Yeah, I may have been feeling my finger, but it felt like my tooth was banging. Anyway, if somebody is interested in doing that, you know jumping, find little tricks you can do for yourself like tell yourself you're not getting any sugar for 10 AM or noon. Little tiny tricks will turn around the habits. Craig 6:35 It is the habit that is the problem. In so many ways for so many people. Going back to what I've been doing with intermittent fasting. You know I had it in my mind that I had to eat. We look at our kids nowadays. They have breakfast, and they have a mid-morning snack in school, they have lunch at school and then an afternoon snack after school and another bite before they go to practice. The score it's getting bigger, just listening to it and drink during sports practice Barry Yeah, exactly. It is sugar, and it's compounding. Craig When I decided, Hey, I'm going to skip a meal, you know, just a very moderate light-fast. Yeah, my brain was just going, Oh, you've got to eat. I found that really what it was for me was kind of always an addict, right? I was addicted to it. Is sugar that way too? You are describing it as you know, try not to have sugar before 10 AM. Is this something an addiction, frankly? Barry Oh my gosh, are you kidding me? I mean, the sugar beats up four organs pretty severely, the brain, the liver, the heart, and the skin. As far as the brain and when you're talking about like, even before we take that bite, you know, it starts firing up, you know, it fires up the same receptors that are fired up by gambling or sex or drugs. No chance of addiction. They're right certainly no chance of addiction. But yeah, it plays, and you know, it's funny going off sugar and I did it for 30 days. Well, I did for one day at first felt so good on March 1, 2012. I was like, I have to do this for 30 days and see what happens about 20 days into that. I was like, Oh my gosh, I'm going to do this for a year just because I feel so alive right now I have to see how I feel. But what happens is it throws a monkey wrench into well-choreographed habits that you have in your life, right the way you live and yours and other people's. That's another thing that happens, you know, it's like I live in a family with a wife and a son. We mean, you don't do sugar. It's a personal decision. You know, you get this little dance of confusion that you get to run around, but it's also within that is bliss, and there's resentment, and there's a renewal, and there's hope the emotions so much is involved. When we eat sugar, you know, it's not supposed to be a portal for squelching fear and sadness and loneliness, anger. It's supposed to be for food, and so few of the 650,000 items that are on a market shelf, serve that exact purpose. The food you know, we can walk around and collect what's food, in a pretty small basket, and other stuff are usually just connectors for that hundred and 150-180 pounds of sugar a year. Craig 9:10 Let's talk about this bloating, right? We were discussing a little bit about what happens when we eat a lot of sugar. The insulin response, for ten years, I was a volunteer paramedic, and I certainly had diabetic patients. You'd find them just unconscious, and what do you do with them? I know a lot of people who have diabetes, as well. A lot of this has to do not just with the insulin response, which I'd love to chat about briefly. It has to do with inflammation at the cellular level. Our bodies are blocking themselves because of what we're doing with some of the sugars that we're eating. We put on weight, and that increases our inflammatory response. It results in some of these other problems with the brain and the heart and the liver. Barry Yeah. There are very few things that surprise me when I walk around an airport, and I still travel a fair amount. When walking around an airport, I see a lot of large people. We're big people nowadays, and it's not surprising. You know, when you talked about the molecules, sugar is composed of two molecules, I'll keep this as technical as possible, Glucose, and fructose. Glucose gets metabolized by every cell in the body, you know, and if we don't get it from the diet, our diet our bodies make it. Fructose, so very different. The only organized organ that can metabolize that is the liver. The liver is the single transporter for it. It's overworked. I mean, it's it probably did pretty well back in the days when people ate four pounds of sugar, wealthy people ate four pounds of sugar, not average peasants, the likes of me. I've gotten a few they called it the delicate spice back in the day, and that's what our livers could healthfully handle you don't see a lot of large people when we look back in old pictures. I just got all these pictures of my grandma, and her family send through the legacy box is such a beautiful thing to get these 14 Films back. No one is fat, Craig. There's nothing personal in the video. Yeah, going back to probably the 1880s the earliest people on here, but that's just people running around. They've not filled themselves. It's a challenge, man, you know, and it becomes a very personal decision, no one's going to make us quit sugar. We've been talking about it. Craig Hey, stick around. When we get back, we're going to finish up our interview with Barry. He has some more interesting points, including how he got to the point he's at right now. So we'll be talking about that. And we're also going to talk a little bit about intermittent fasting, what I've been doing, and what you might want to do and then we're going to get back into technology. Listen to Craig Peterson WGAN. Craig Hey, welcome back everybody Craig Peterson here WGAN online at Craig Peterson dot com. Hey, let's pick up our interview with Barry Friedman. In case you were wondering what the name of his book is, it's "I love me more than sugar." I quite enjoyed it. This guy is a great guy and has been involved with so many things over the years, from being on the Johnny Carson show doing juggling through today where I met him because he's one of the coaches in one of the programs in which I participate. Very, very great guy, and we're going to talk more with him about the whole sugar thing. Barry I wasn't famous for a long time when I first tried this and then then it started, like, wow, he's still doing that, you know, the Curiosity started then I wrote a book about it and got on TV shows as fast as I wanted to dial-up and call-in or fly-in and be on Morning News. There's a call for it. It's a curiosity, but soon, it will be something that we must study. Craig Yeah, I think it's going to be common sense a few years from now. We're speaking with Barry Friedman. He has written a book, and I want to get into that. Now. I'm glad you brought it up. It is part of the 30-day exercise that you discussed. There's a plan in there. Why don't you tell us a bit about the book? I found it over on Amazon. Easy enough to find, and what's it doing? How's it going to help people? Barry Yeah, you know, this book is it's very non-scientific, and I, my buddy, Penn Jillette of Penn and Teller, the taller, bigger-half of Penn and Teller, He lost over 100 pounds on it. He wrote a great book called presto, how I lost 100 pounds. He's got an excellent subtitle for it, but his first line in the book, and I'm one of the few people in the world that can jump on to his tagline. If you take diet advice from a juggler, you're an idiot, because that's what he wrote in the book. I wrote the book really from just a perspective of a guy who did it. A guy who, you know, I traveled around a lot. I did shows for 34 years. Ted conferences, TV shows, I was around a lot of delicious sugar, and I used to love it all. From 2012 on, no added sugar, anything. I tell stories about that journey. Some substitutions we can do, where it starts, what it does to us. Some challenges you may come across, and then the 30 days is walked through very scientifically. I ran an online program for five and a half years and helped thousands of people do a 30-day challenge. What that gave me Craig was a massive database of where people are on day one, day two, day three. It is a traceable spike. I mean, you can see some of the most dramatic days of my life. And you know, it's, I call it in the book ground zero-day for ground zero it was crashing. I remember lying on a massage table. Tears are running down my face. Not because of not having sugar, but I knew that moment was a turning point. My wife as she was like holding me down deep massage as hard as she could just get stuff moving in my body, but I was I felt like it was the door of the threshold into a new life. I think if I would have folded at that point, just grab something I wouldn't have just gone back to going past that day. That was when everything changed. So we in the community, we often talk about what's your day for, and sometimes it's a day for other people, but there is a time when we need to. That's the hero's journey part. That's where you grab the mystical apprentice who goes with you and the mentor who goes with you and walk you through dope. If that helps, I would love to walk you through that. Visa v the book and we have a Facebook page with the how 50-60,000 people on it who have all dabbled in some realm of it, and it's a movement. As I said at the beginning, we will soon look at this the same way we now look at tobacco, no doubt about it. Craig 3:55 The book is called "I love me more than sugar." Barry Friedman is the Author, anything else you'd like to add here? Barry, before we go? Barry Oh, I would just love to tell everybody that if something in this conversation spoke to you, I trust it. Don't question it. There's a fight or flight reflex in the brain that a little gland, that small almond-shaped gland whose job it is to take us away from scary things. If something touched you before, it has a chance to go through that part of the brain, a chance to tell yourself that there is a time for doing this. Know that sugars not for satisfaction or completion. It has never put through that kind of test. It's always about getting more. Like, I said, we will look at this as a real downfall for society. It got added to everything, and it became routine. As Craig said, we began hearing commercials about how we owe it to ourselves how we deserve this. So I trust the gut influences the gut instinct. If you heard something and take a chance, Craig 4:53 I put a link on my website as well obviously to this interview, and you mentioned a Facebook page. What's the name of that group? Or that page? Barry Thirty days sugar-free, but the last 30 days sugar-free Facebook group. We post some stuff in there from time to time. Craig 5:10 All right, and it's a community, and I think that's something that can help. Barry Yeah. Boy does it ever. It is easy to feel alone in this stuff. Craig 5:16 Yeah, exactly. Especially in this day and age again, Barry Friedman. I love me more than sugar and 30 days sugar-free. Look it up on Facebook. I appreciate you being with us today. Unknown Speaker 5:28 Thanks so much, Craig. Thanks for what you're doing. Bye-Bye. Craig 5:31 Hey, as I said, I hope you enjoyed it. Barry's just a great guy. It's a lot of fun chatting with him about what is going on out there. What he's been doing, and he's done a lot, right. I think the most exciting people, frankly, are the people who have done a lot of different diverse experiences in it, and it helps us help you helps me just overall. All right, so we got a couple more things we want. To cover here today, one of them is the liability here on cloud services. We'll get to that in a little bit of business. Ransomware, I think, is an important thing. We'll be talking about that and big tech taking advantage of our kids. But I want to kind of continue with this theme. Barry was talking about sugar, and I know that you know, some diets w for some people, they're not great for others. If you have diabetes, of course, getting to getting rid of some of the sugar can be problematic, right? You know, I was a volunteer in the ambulance service for ten years, and I quite a bit of advanced training and everything else. When called to the scene of a diabetic emergency, we would administer d-50, which is 50% dextrose to diabetics who were out of it, then take the blood samples and stuff so they can spin them up in the lab quickly when we got into the hospital. You know, probably if someone has a diabetic emergency that you got to get some sugar into them right away. So getting rid of sugar is a difficult thing for a person with diabetes. I have, as I mentioned before, on the show, I have been focused on intermittent fasting. It is effortless to do. I've been following a doctor up at the University of Toronto, Dr. Fung, who has several books out on the subject. Before I started this, I read at least a half a dozen books on intermittent fasting. There are so many ways to do intermittent fasting nowadays. You want to go 12 hours a day, at least without eating. And that's not hard when you get right down to it. You know, think about going to finishing dinner at six o'clock or seven o'clock at night. And then not having any snacks, not eating until six or 7 AM. The next day, there's your 12 hours. And then the other thing to do with intermittent fasting is never, ever, ever snack. Now you can have dessert if you want, you're going to have ice cream, cake, pie, you can have any of that stuff that you might want to have, but have it with your meal. Don't wait an hour before you have dessert or two hours or more, have it right away. What you're trying to do is control the insulin levels. Now a better way to do it is what's called 16-eight. That is instead of 12 hours of no food at all. You can have water, you can have clear liquids, obviously no sugar, and you go for the 16 hours. That means if you stop at 6 PM by 6 AM, your 12 hours and you want another four hours left, so let me know You could eat at 10 AM. Or if you finish your meal at 7 PM, which is the latest, you should finish eating. That means you could eat at 11 AM The next morning. You might have a skip breakfast again, no snacks, just black coffee, or tea with no milk. And then you, you have your lunch at noon, and then you have your dinner at four or five or six o'clock. Whatever works for you. You will lose weight, and you will get healthier. If you have diabetes or have other medical issues. You want to talk to your doctor about it. But this can cure type two diabetes, just intermittent fasting. But the whole sugar thing I think is something any of us can do. Even if you can't fast. Hey, Craig Peterson here, WGAN stick around. We got a lot coming up. Yeah, we're back into tech in the next segment. Hello, everybody, welcome back, Craig Peterson here. I hope you're on my email list. I want to keep everybody up to date. We've got some training for you guys. You're the Calvary, right? You're the people who come in to help fix the problems with small business computers. Maybe you're responsible for them. Perhaps you're the owner of the business, right? You're responsible for making sure that everything's running right and for choosing the right technology and stuff. I appreciate you all being with me. I have some specialized training coming up for you as well. But you need to be on my email list if you are going to find out about those pieces of training. The way to do that is just going to Craig Peterson dot com slash subscribe. Of course. Peterson P-E-T-E-R-S-O-N. Just like it sounds, Craig Peterson dot slash subscribe, and you'll get my weekly email outlining the most significant threats that are out there right now. All of the articles that we talked about in the show, and more. Plus a few more that I just don't get to that are essential. People love it. We get an excellent open rate, some of the best in the industry. That's how good this newsletter is. And I provide it for free. And I give a lot of these pieces of training, absolutely free. All of my tutorials are available on my website as well at Craig Peterson dot com. I built the technology behind some of the biggest organizations websites in the world. And yet mine is very sad. Okay, I have to get my act together. Oh, well, there's always something else to do. Right, just the cobblers kids. Well, let's get into ransomware because it is on the rise again. But let's start with a little history because I think this is cool when you get right into it. There is an article that I started reading over at CSO online that reminded me of it, and you'll see a link to it as well on my website at Craig Peterson dot com and in this morning's newsletter. Hopefully, you got that. But it started this ransomware thing back in 1991. There is a biologist who was doing AIDS research, and he was kind of upset that other people who were also researching AIDS, were getting more notice, and he wanted more credit than he was getting. He started sending out quote, AIDS research quote, on floppy disks via US mail back in 91, to other aids researchers. It had a piece of malware on there called PC Cyborg Cyborg. It was the first ransomware that we know of. Isn't that something, right? It was these researchers who were competing with this one researcher. The next big one used encryption was back in the aughts. Back in the mid-aughts, Bob 2005, it was called an Archie vs. It used encryption and was defeated. You can find its password over in Wikipedia even nowadays. Now, in 2010, we started seeing the series of what are called police ransomware packages. And they were warnings from law enforcement about victims of illicit activities and demanded payment of fines. So this was a new generation of anonymous payment services that they started to use to be able to better hard payments without getting caught. Of course, this was some of the Bitcoin and some of these other types of services. that allows you to send money, semi-anonymously. Remember that right it is not anonymous, the FBI and the Secret Service have worked together to arrest people who have been using Bitcoin illegally for, you know, these types of anonymous transactions. There was a new trend that started to emerge, and that was cryptocurrencies. Other than the legal activities that occurred that drove up the price of cryptocurrencies. Which were artificially high begin with, the other big drive for cryptocurrencies, has been ransomware. People need to pay ransoms, at least they want to pay ransoms. How do they do it? Well, that's what the criminal started to use. Extortionists just absolutely love them. Why? They are designed to be relatively untraceable, and relatively anonymous, right? So they started shooting their demands to other currencies. It's also nice because then they don't have to worry about, well, what's the value? In France, it's a euro, or In Britain, it's pound sterling, the US dollar, Canadian dollar, Australian dollar, know the value. cryptocurrency is pretty much flat, no matter what currency you're using. These attacks started shooting up about that point in time. But as of a couple of years ago, in 2018, the ransomware boom seemed to be on its way out. The hackers had found other illicit ways that people were using to snag Bitcoin. One of them is still in use today, and that is to have something on your browser that starts to use your browser to do Bitcoin mining for them. Okay. They were also looking for bitcoin wallets, Cryptojacking became very popular. It is something denial of service attackers have been using for years. They gain control of computers without their users or owners of the computers knowing. Cryptojacking ransomware decline, but cryptojacking SHOT UP 14-15%, so they're using your electricity, they're using your computer to have this whole, you know, the whole thing of having a new mind for Bitcoin. And of course today and it's not just Bitcoin and other cryptocurrencies. But today, many of these cryptocurrencies, it is costly to do mining, because most of the coins are gone. That's part of the reason they want to use your computer, but even then, the payback isn't as big as it used to be. So now we're starting to see two big drivers behind this massive surge recently in ransomware. So the First has to do with the vague guarantees of the cryptocurrency pricing. Many of the crypto-jackers. We're using the victim's computers to mine this open-source Monero currency. However, Monero prices have been dropping, and Bitcoin prices have dropped dramatically as well. Although now with some of the real viruses, like the Covid-19. Some of them are going up because people are moving their money into gold and some cryptocurrencies. Monero prices have started dropping, and the bad guys are starting to realize that mining cryptocurrency is not going to be as rewarding as ransomware. Attackers had already compromised the victim's computer with Trojan downloaders making it easy to launch a ransomware attack when the time was right. It took them only about a year 18 months to make a U-turn. It is just fascinating when you get right into it. We've seen a lot of them over the years, and now they are attacking businesses. They've always used this kind of spray and pray tactic of trying to send out this ransomware to as many computers as possible and as many people as possible, hoping that we are going to be successful without a significant return on investment. They've been going more and more against or against us by going directly right using phishing, spearfishing techniques, and other types of targeted attacks. So let's take a brief look here at some of the most significant attack methods that are out there. Sam Sam is number one right now is started appearing about f

The Surreal and Absurd Club
Ep. 75 Reality Bites

The Surreal and Absurd Club

Play Episode Listen Later Jan 25, 2020 64:27


Pssst...Rob was depressed...pass it on.   @TheSAClubPod on Twitter   3DickMafia.com on WebWorlds   TheSAClubPod@Gmail.com on WebMail

Tecnocincuentones
Episodio 72.-El WebMail empuja fuerte

Tecnocincuentones

Play Episode Listen Later Jan 25, 2020 4:25


Muchas corporaciones públicas y privadas están virando al uso del webmail, por cuestiones relacionadas con el coste, la seguridad y la facilidad para sus usuarios, como ocurre en varias universidades españolas. Unen capacidades para ser leídos en telefonía móvil. El ejemplo: Horde.

The Tech Authority Podcast
Tech Authority Podcast - Episode 132 - How to have multiple gmail accounts in 1 webmail window

The Tech Authority Podcast

Play Episode Listen Later Sep 2, 2019 2:32


In this episode we tell you how can add multiple gmail or gsuite accounts into 1 webmail window to make things easy to manage

Obey Your Strengths
12 / When Strengths turn into Weaknesses with Pat Matthews and Lorenzo Gomez

Obey Your Strengths

Play Episode Listen Later Jun 25, 2019


“When Strengths turn into Weaknesses” Kathy Kersten chats with Active Capital Founder, Pat Matthews and Geekdom Media CEO, Lorenzo Gomez about the tipping point when strengths can become weaknesses. Pat Matthews was a Co-founder of Webmail.us, that grew to $10M in sales and sold to Rackspace in 2007. Pat’s Top 5 Signature Themes are Maximizer, Activator, Command, Individualization, Relator. Lorenzo Gomez III is the Geekdom Media CEO, Co-Host of The Brand Brothers podcast and author of The Cilantro Diaries: Business Lessons from the Most Unlikely Places. Lorenzo’s Top 5 Signature Themes are Context, Restorative, Activator, Positivity, WOO. Kathy Kersten is the host of Obey Your Strengths, the podcast dedicated to fanning the flame of the Strengths movement one success story at a time. As a Gallup Certified Strengths Coach since 2008, Kathy has help 70+ organizations, hundreds of teams and thousands of individuals leverage individual’s strengths to increase performance. Kathy’s Top 5 Signature Themes are Strategic, Input, Learner, Belief, Maximizer. If you would like information on individual, team or organizational coaching, visit kathykersten.com. To discover your own strengths, visit gallupstrengthscenter.com. Instagram: @kathy.kersten Facebook: @obeyyourstrengths

Obey Your Strengths
12 / When Strengths turn into Weaknesses with Pat Matthews and Lorenzo Gomez

Obey Your Strengths

Play Episode Listen Later Jun 25, 2019


“When Strengths turn into Weaknesses” Kathy Kersten chats with Active Capital Founder, Pat Matthews and Geekdom Media CEO, Lorenzo Gomez about the tipping point when strengths can become weaknesses. Pat Matthews was a Co-founder of Webmail.us, that grew to $10M in sales and sold to Rackspace in 2007. Pat’s Top 5 Signature Themes are Maximizer, Activator, Command, Individualization, Relator. Lorenzo Gomez III is the Geekdom Media CEO, Co-Host of The Brand Brothers podcast and author of The Cilantro Diaries: Business Lessons from the Most Unlikely Places. Lorenzo’s Top 5 Signature Themes are Context, Restorative, Activator, Positivity, WOO. Kathy Kersten is the host of Obey Your Strengths, the podcast dedicated to fanning the flame of the Strengths movement one success story at a time. As a Gallup Certified Strengths Coach since 2008, Kathy has help 70+ organizations, hundreds of teams and thousands of individuals leverage individual’s strengths to increase performance. Kathy’s Top 5 Signature Themes are Strategic, Input, Learner, Belief, Maximizer. If you would like information on individual, team or organizational coaching, visit kathykersten.com. To discover your own strengths, visit gallupstrengthscenter.com. Instagram: @kathy.kersten Facebook: @obeyyourstrengths

WDR 4 Kuttler digital
Die besten E-Mail-Anbieter

WDR 4 Kuttler digital

Play Episode Listen Later Jun 4, 2019 2:23


Rund 850 Milliarden E-Mails werden pro Jahr in Deutschland gesendet und empfangen. Ohne E-Mails geht so gut wie nichts mehr, egal ob privat oder im Büro. Autor: Peter Kuttler.

Ingeniéria Inversa
Ingeniería Inversa Nro.28 Webmail y auriculares

Ingeniéria Inversa

Play Episode Listen Later May 17, 2019 51:18


Hoy hablamos de webmail y de auriculares Twitter @fdorr @juancuntari Telegram @ingenieriainversa

TechtalkRadio
Episode 239 - My Motherboard is a Truck

TechtalkRadio

Play Episode Listen Later Apr 7, 2019 55:29


John Broadway returns and joins Andy Taylor to converse about the latest in Technology. Computers systems for both the desktop and laptop have really continued to work well in performance years after they were built or purchased. Andy's Asus K55 has begun to show a slowdown in performance which he believes could be from a system fan beginning to fail. Asus has been in the news recently with a security hole found in the MotherboardUpdate feature, the company has since patched the problems which some believed to have affected over a million users. Broadway and Andy share though the consistent quality over the years of the Asus Motherboards. John gives us an analogy of the computer system with comparisons to the Auto World. John Broadway talks about the Auto Update features on systems and why they are a great solution for security on a system patching holes. Looking for a plan on how to roll out a new Desktop Computer, John shares some good tips. A story about a problem which arose with a Lenovo system however the company’s customer service took care of the situation. Once again, Broadway calls in the best NASCAR reference for explaining RAID. The guys disagree on the Need for Anti-Virus third party programs for consumers. Over the years the AV programs have changed with results over time that became bloated. Andy swears by the Latest version of Norton however Johncalls on the Windows Defender program as a good source however reminds, it is about user education to not be click happy! The computer professionals hired to work on your computer systems should be checked out for references. John feels that background certification should be required as a way to protect end users. Listener comments for Broadwaythanking him for his Military service but also praise for his support for Ubiquity products. Why Smartphone are’s so pricy? Are they offering better features? The guys talk about the Streaming Service said to be coming from Apple Streaming. Is Apple coming in too late in the game? John shares why he doesn't think they are. John shares a Website MXToolbox.com to see if Webmail may be on a Blacklist. Connect with us on our Social Media sites. Facebook @techtalkers Twitter @TechtalkRadio Instagram techtalkradio Web: TechtalkRadio.Com

The Top Entrepreneurs in Money, Marketing, Business and Life
1339 $3m ARR Org Chart Company CEO Uses "Touch Zero" Operating Model to Manage Cash

The Top Entrepreneurs in Money, Marketing, Business and Life

Play Episode Listen Later Mar 25, 2019 21:25


CEO & founder of Pingboard, which provides live org charts & planning software to thousands of companies. Prior to Pingboard, Bill was CTO & co-founder of Webmail, the largest B2B email provider before Gmail. After Webmail was acquired by Rackspace, Bill co-founded Capital Factory, which helps entrepreneurs in Austin build great companies

Smashing Security
014: Protecting webmail - a Smashing Security splinter

Smashing Security

Play Episode Listen Later Mar 30, 2017 30:33


What can you do to better protect your online email accounts? In this special "splinter" episode (or should it be a "shard"?) regular hosts Graham Cluley and Carole Theriault discuss with Paul Ducklin tips on how to defend your Gmail/Yahoo/Hotmail/Outlook/etc account. SHOW NOTES: Passwords - a Smashing Security splinter How to better protect your Google account with two-step verification and Google Authenticator - Graham Cluley How to protect your Yahoo account with two-step verification (2SV) - Graham Cluley NIST declares the age of SMS-based 2-factor authentication over - TechCrunch The lesson we all must learn from the Celebgate nude photo hack - Graham Cluley Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Special Guest: Paul Ducklin.

Digital Forensic Survival Podcast
DFSP # 057 - Webmail Collections

Digital Forensic Survival Podcast

Play Episode Listen Later Mar 21, 2017 20:03


This week I talk about a methodology to collect webmail using freely available tools as well as the things you must consider before you do so.

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday for March 1 2017

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Mar 1, 2017 13:23


Today's Webmail Wednesday comes from Steven and asked about how to deal with stress. Listen as Dr. B gives his thoughts. If you want to send a question for Dr. B, please email at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday: Innate talents vs Skills

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Feb 15, 2017 6:10


This episode of Webmail Wednesday responds to a listener who is wondering about competition with others who may be more talented than him/her. Also talks about jealousy and how it relates to one's professional life.

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday: Feb 8 2017

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Feb 8, 2017 23:39


This week's Webmail Wednesday comes from Tony. And this is a very special episode because this is a little longer episode than our regular episodes. Why is that so? Listen in to find out.

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday for Feb 1 2017

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Feb 1, 2017 6:52


Today's Webmail Wednesday is a special one because the question is from a Facebook feed of Dr. B and not from a listener. Listen in to know the question and Dr. B's answer.  For questions, please email at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday: Why Is Dr. B Serious?

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jan 25, 2017 8:07


Today on Webmail Wednesday: One of our listeners asked Dr. B about his podcast and suggested some ideas to make it more successful and also why Dr. B is serious. If you have questions for Dr. B please send them in at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday: How To Handle Negativity

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jan 11, 2017 7:59


This week on Webmail Wednesday: Another listener question is answered by Dr. B and the question is: "How do you deal with negativity from team member in the office?" Please send your questions to host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 34: Triathlon

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jan 5, 2017 7:40


This week on Webmail Wednesday: Dr. B answers a listener question from Pegah regarding Triathlon and how important exercise is. Stay healthy everyone.

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 33: Plans For 2017

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Dec 21, 2016 18:40


2016 is about to end and this week on Webmail Wednesday: A listener asks Dr. B what are his plans for 2017 and more. Feel free to send questions for Dr. B at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 32: Dr. B Answers A Critic

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Dec 14, 2016 9:07


This week on Webmail Wednesday: Dr. B answers an email from a critic regarding his practice. Listen how he answered the questions and how he handled it well. You can send us questions for Dr. B at host@thepassionatedentist.com  

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 31:How do you deal with dental phobic patients?

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Dec 7, 2016 8:13


On this episode of Webmail Wednesday: Dr. B answers a listener question about how to deal with patients who have a dental fear. You can send us questions for Dr. B at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 30: Dental Insurance: Plans vs. No Plans

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Nov 30, 2016 10:13


Today on our Webmail Wednesday. Dr. B answers a question from a listener regarding Dental Insurance. Is signing a plan a good idea or not? Listen to Dr. B's response. You can send us questions for Dr. B at host@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 29: Feedbacks Are Welcome

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Nov 23, 2016 5:44


In this weeks episode of WebMail Wednesday, Dr. B reads another listener's feedback and also a recap from the previous Webmail Wednesday episode. If you have any questions for Dr. B, shoot us an email at host@thepassionatedentist.com. 

Utter Brilliance
UB012: Leading during growth: Don’t miss out on learning how this leader grew his company over 1,000% in 3 years and now advises others on how to do the same. Featuring Pat Matthews, CEO @ Filestack.

Utter Brilliance

Play Episode Listen Later Oct 27, 2016 62:21


UB012: Leading in times of growth: Don’t miss out on learning how this leader grew his company over 1,000% in 3 years and has become a key advisor to others looking to achieve the same goal. Featuring Pat Matthews, CEO @ Filestack. Today you’ll hear: The biggest changes he’s experienced running companies in the past ten years How Technology is changing the way small businesses are run About his first big success story where he grew his email hosting company, Webmail.us, to 10 million in revenue with some speed Why he loves the growth stage of a company and how you can better gauge if you’ve achieved Product Market Fit and are gearing up for growth Product Market Fit, what it is and why it matters How he found his prime leadership spot (growth) and how that discovery influenced the types of startups he advises Pat’s thoughts on interviewing, candidates, recruiting, and winning the talent war What he looks for in his interview process and in candidates he’s interviewing Why he’s know as a leader who speaks his mind, is direct and ‘leaves the happy talk at the door’ and why that’s often exactly what entrepreneurs, senior executives and front line employees need the most Traits of an entrepreneur that, if they go unchecked can be detrimentalHow he increases innovation by breaking people out of their title boxes

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 28: Leaving Insurance Plans

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Oct 26, 2016 14:20


In this weeks episode of WebMail Wednesday, Dr. B gives some advice on how to escape the insurance prison that so many dentists are trapped in. If you have any questions for Dr. B, shoot us an email at host@thepassionatedentist.com. 

Utter Brilliance
UB011: Winning the war on talent: How one company beat out Google for top talent, turned recruiting into a passion and designed a foolproof interview process thus achieving 1,000% growth in 3 yrs

Utter Brilliance

Play Episode Listen Later Oct 20, 2016 24:39


Winning the war on talent: How one company beat out Google for top talent, turned recruiting into a company wide passion and designed a foolproof interview process that allowed them to achieve 1,000% growth in three years. Today you’ll hear: About a little company called Webmail.us that turned out to be an international success How the leaders helped ensure they became a great place to work, used employee and customer engagement to their advantage and established an engagement focused organization How I stalked the CEO so I could be part of the amazingness Why the CEO saw HR as a partnership, not as a department that belonged in a box in the back corner How Webmail.us set itself up to compete with Google for talent Examples of the type of out of the box thinking around recruiting that led to amazing talent hires Why it’s important to set the bar high when it comes to interviewing...and how to get started raising the bar in your company How we used our existing culture to bring the best talent into the company. How we beat the trendy companies to the top talent in the software development space Creating an interview process that allows you to create a best place to work Why your interview process is the number one thing you need to re-design if you want to build a best place to work The three things you need to know before you start the hiring process for a position Why hiring someone for the next step in their career makes all the difference for your cultureWhy you should study Webmail.us if you care about building engagement

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 27: Simplify and Make Lists

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Oct 19, 2016 9:06


In today's WebMail Wednesday, Dr. B discusses ways to help your staff properly prepare for your patients. Implants can be tricky and it can be hard for your staff to know what to prepare for them. Making lists and simplifying the set up lists can help your staff better prepare for your patients. 

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 26: Patient Acceptance

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Oct 12, 2016 15:00


In this episode of WebMail Wednesday, Dr. B answers a question from one of our listeners about patient acceptance and how to continue to grow a practice. 

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 25: Team Building

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Oct 5, 2016 14:37


Team building is a very important part of any practice. Your staff should feel like you are the captain of your team and everyone should be working towards the same goal. Dr. B dives a little deeper into this and gives advice on what you can do to make your staff feel more like a cohesive and efficient team.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 24: Every Dentist Is Different

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Sep 28, 2016 11:31


Every dentist practices a little differently. Each one has different technology, different pay scales, and different levels of service and dedication. That's the discussion for today's episode of WebMail Wednesday. Dr. B sheds some light on the subject and fills us in on why dentists shouldn't have to defend their prices or services.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 23: Vacation Days

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Sep 21, 2016 12:15


How do vacation days fit into your practice? This weeks WebMail Wednesday is all about how vacation, sick, and personal days fit into your practice and how you and your team members should think about them. 

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 22: Answering Emergency Calls

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Sep 14, 2016 7:10


It's very important to know which person in your practice is responsible for answering emergency calls and how those calls are received. Whether it is through phone, text, email or pager, a emergency call protocol should be in place to make sure that your patients feel taken care of and that their dental care is of utmost importance. 

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 21: Short Term Option Discussion

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Sep 7, 2016 12:20


In this episode of WebMail Wednesday, Dr. B responds to a comment out a recent magical words episode, "Thats a great short term option." The Passionate Dentist encourages anyone to write in a discuss these topics no matter if they agree with Dr. B or not. It is all about the discussion and communicating how to make the profession better.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 20: Connecting With Patients

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Aug 31, 2016 9:08


In this episode of WebMail Wednesday, Dr. B responds to a question about how to relate better with patients and become more involved in their lives. Dr. B give a few choice words and phrases to help you deepen the connection between you and your patients.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 19: 3 Steps To Handling Angry Patients

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Aug 24, 2016 11:25


When a patient gets angry for whatever reason, it can be really easy to feed the fire and make it worse. In this weeks episode of WebMail Wednesday, Dr. B answers an email from one of our listeners about angry patients and gives us three steps to better deal with those situations. If you have any questions, comments, or feed back for us, please shoot us an email to info@thepassionatedentist.com

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 018: Missed Appointment Fees

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Aug 17, 2016 9:19


Does your practice charge for missed appointments? Why or why not? That is the topic of discussion in today's WebMail Wednesday. Dr. B lets us in on how he handles missed appointments, repeat offenders, and knowing the right time to let a patient go. If you have any questions and want to be in one of our episodes, send us an email to info@thepassionatedentist.com.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 017: Voices of Dentistry

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Aug 10, 2016 7:38


In this episode of WebMail Wednesday, Dr. B answers a question from a potential podcaster on how to get into the realm of dental podcasting. If you want to know more about dental podcasts you can visit Alldentalpodcasts.com or go to VoicesofDentistry.com to learn about the upcoming dental podcaster summit.

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 016: Should I Buy or Lease?

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Aug 3, 2016 9:28


In this episode, Dr. B answers an email from one of our listeners asking whether they should lease or buy the space that their practice is in. Dr. B is not a CPA but does offer some good opinions and insights based on his own experiences. 

The Passionate Dentist Podcast with Dr. B. Saib
Webmail Wednesday 015: A Special Thanks

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jul 27, 2016 5:18


We love feedback, and we really appreciate when our listeners write in to us to say how much they like the podcast. This Webmail Wednesday is a special thanks to one of our listeners that sent a very touching and flattering email. If you have something to say, please feel free to write us at anytime and we will be happy to respond on the show.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 014: Voicemail Cancellations

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jul 20, 2016 4:59


Some patients like to call and cancel their appointments at the last minute, leaving a gap in your schedule. One solution for this is to change your voicemail everyday and direct patients to call your cell phone. Most dont want to talk to anyone, but if they have to, most of the time they just choose to keep their appointment. Check it out to find out more!

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 013: Hiring a Front Desk Manager

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jul 13, 2016 8:47


The person sitting at the front desk of your practice is more than just a receptionist they are a manager. They manage phones, patient info, and represent the face of the practice. This episode of WebMail Wednesday covers what you should be looking for when hiring a new Front Desk Manager.

The Passionate Dentist Podcast with Dr. B. Saib
WebMail Wednesday 012: Dating Patients

The Passionate Dentist Podcast with Dr. B. Saib

Play Episode Listen Later Jul 6, 2016 6:10


In this episode, Dr. B answers a question from one of his listeners about dating a patient. Doctor/Patient relations are a tricky thing and there must always be a level of caution when considering dating one of your patients

CERIAS Security Seminar Podcast
Kent Seamons, Usable Secure Webmail for Grassroots Adoption

CERIAS Security Seminar Podcast

Play Episode Listen Later Mar 23, 2016 55:57


Recent concerns about government surveillance have focused attention on secure communication tools for the masses. The security properties of these tools receive more attention than their usability properties. This talk will cover our recent effort to design a usable secure webmail system. We have conducted a number of studies to analyze existing tools and our own systems to determine whether these tools are usable by the masses to communicate securely. Most recently, to determine whether secure email is ready for grassroots adoption, we conducted a laboratory user study that recruits pairs of novice users to install and use several of the latest systems to exchange secure messages. We will discuss both quantitative and qualitative results from 25 pairs of novice users as they use Pwm, Tutanota, and Virtru. Participants report being more at ease with this type of study and better able to cope with mistakes since both participants are "on the same page". We find that users prefer integrated solutions over depot-based solutions, and that tutorials are important in helping first-time users. Hiding the details of how a secure email system provides security can lead to a lack of trust in the system. Participants expressed a desire to use secure email, but few wanted to use it regularly and most were unsure of when they might use it. About the speaker: Dr. Kent Seamons is the Director of the Internet Security Research Lab in the Computer Science Department at BYU. His research interests are in usable security, privacy, authentication, identity management, and trust management. He received a PhD in Computer Science from Illinois. Prior to joining the faculty at BYU, he conducted research at the IBM Pittsburgh Lab where he was a co-inventor of trust negotiation. He has published over 50 peer-reviewed papers that have been cited over 4,300 times. Dr. Seamons has been awarded nearly $5 million in funding from NSF, DARPA, NASA, and industry. He is also a co-inventor on four patents in the areas of automated trust negotiation, single sign-on, and security overlays.

CERIAS Security Seminar Podcast
Kent Seamons, "Usable Secure Webmail for Grassroots Adoption"

CERIAS Security Seminar Podcast

Play Episode Listen Later Mar 23, 2016


Recent concerns about government surveillance have focused attention on secure communication tools for the masses. The security properties of these tools receive more attention than their usability properties. This talk will cover our recent effort to design a usable secure webmail system. We have conducted a number of studies to analyze existing tools and our own systems to determine whether these tools are usable by the masses to communicate securely. Most recently, to determine whether secure email is ready for grassroots adoption, we conducted a laboratory user study that recruits pairs of novice users to install and use several of the latest systems to exchange secure messages. We will discuss both quantitative and qualitative results from 25 pairs of novice users as they use Pwm, Tutanota, and Virtru. Participants report being more at ease with this type of study and better able to cope with mistakes since both participants are “on the same page”. We find that users prefer integrated solutions over depot-based solutions, and that tutorials are important in helping first-time users. Hiding the details of how a secure email system provides security can lead to a lack of trust in the system. Participants expressed a desire to use secure email, but few wanted to use it regularly and most were unsure of when they might use it.

Down the Security Rabbithole Podcast
DtR Episode 85 - NewsCast for March 24th, 2014

Down the Security Rabbithole Podcast

Play Episode Listen Later Mar 24, 2014 46:09


Topics covered The FTC jumps into the breech (pun intended) and may try and levy fines against Target, and future breach victims - http://ww2.cfo.com/technology/2014/03/ftc-urges-data-breach-penalties/ http://www.nextgov.com/cybersecurity/2014/03/target-could-face-federal-charges-failing-protect-customer-data-hackers/80824/?oref=ng-channelriver Could the Barclays Bank breach of Feb 2014 have been test data? Richard Bishop thinks so - http://blog.trustiv.co.uk/2014/03/barclays-data-breach-%E2%80%93-could-it-be-test-data http://www.theregister.co.uk/2014/02/10/barclays_investigates_gold_mine_client_data_breach/ US Commerce Dept not renewing ICANN contract, moving control to ITU - http://www.bloomberg.com/news/2014-03-15/u-s-to-relinquish-control-of-internet-address-system.html http://www.businessweek.com/articles/2014-03-17/the-u-dot-s-dot-ends-control-of-icann-gives-up-backing-of-the-free-speech-internet With Microsoft officially, and finally, stopping support for WinXP (after 14yrs!), is there a "breach crisis" around the bend? - http://www.pcmag.com/article2/0,2817,2455206,00.asp Microsoft can read your Hotmail/webmail ...so can Google, Apple and Yahoo! hype or crisis? - http://www.theverge.com/2014/3/21/5533814/google-yahoo-apple-all-share-microsofts-troubling-email-privacy-policy (bonus) "eGovernment" is something many governments globally and locally are moving ahead with - is this rainbows or rain clouds? I joined Discover Performance Weekly to briefly discuss - http://youtu.be/bAfP-jc0x6Q

TWiT Throwback (MP3)
The Tech Guy 901: Saturday, August 18, 2012

TWiT Throwback (MP3)

Play Episode Listen Later Aug 18, 2012 155:13


Webmail suggestions, upgrading to Mountain Lion, backing up an iPad, and your calls. Host: Leo Laporte Guest: Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Bandwidth for the Tech Guy podcast is provided by CacheFly.

TWiT Throwback (Video HI)
The Tech Guy 901: Saturday, August 18, 2012

TWiT Throwback (Video HI)

Play Episode Listen Later Aug 18, 2012 155:13


Webmail suggestions, upgrading to Mountain Lion, backing up an iPad, and your calls. Host: Leo Laporte Guest: Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Bandwidth for the Tech Guy podcast is provided by CacheFly.

Tech in Style Podcast
Email or Webmail – Burning Issue

Tech in Style Podcast

Play Episode Listen Later Aug 3, 2012 3:31


When it comes to email do you fire up your web browser or are you desktop all the way? Spode and Bethan look at the pros and cons of webmail and email, to see which is best.

MultiAstuces Eric Othon Le Matin Dimanche

Retrouvez un mot de passe oubliéSAFARI - Comme beaucoup d’internautes, vous êtes inscrits sur plusieurs sites Internet et possédez divers comptes Webmail. Pour éviter de devoir à chaque fois taper votre nom d’utilisateur et votre mot de passe, vous avez opté pour l’option du navigateur Safari, qui permet de les enregistrer. Si vous devez changer de machine ou utiliser un autre navigateur, il se peut que vous ayez oublié un ou plusieurs mots de passe. Avec le navigateur d’Apple, il est possible de les retrouver, et ce sans aucune demande aux modérateurs du site en question.Eric OthonLe Matin Dimanchewww.astuces.lematin.ch

MultiAstuces Eric Othon Le Matin Dimanche

Retrouvez un mot de passe oubliéSAFARI - Comme beaucoup d’internautes, vous êtes inscrits sur plusieurs sites Internet et possédez divers comptes Webmail. Pour éviter de devoir à chaque fois taper votre nom d’utilisateur et votre mot de passe, vous avez opté pour l’option du navigateur Safari, qui permet de les enregistrer. Si vous devez changer de machine ou utiliser un autre navigateur, il se peut que vous ayez oublié un ou plusieurs mots de passe. Avec le navigateur d’Apple, il est possible de les retrouver, et ce sans aucune demande aux modérateurs du site en question.Eric OthonLe Matin Dimanchewww.astuces.lematin.ch

Digital Nibbles Podcast
What Does the Cloud Mean for Consumers? Digital Nibbles Podcast episode 004

Digital Nibbles Podcast

Play Episode Listen Later Feb 3, 2012 32:44


In this episode from 2/1/12, Allyson and Reuven chat with Michael Sheehan, a cloud evangelist from Go Grid who is also known as the HighTechDad. His passion for looking at technology and how it integrates into a family lifestyle made him the perfect guest to talk about the consumer cloud including what it looked like in the past (Webmail) and where we’re headed (smart household products). If you’d like to get in touch with Michael, follow him on Twitter @HighTechDad. We’ll also be having him back on the show, so don’t forget to check out future episodes of the Digital Nibbles Podcast! Show timeline: • 0:00: Introductions and News of the Week • 4:24: Interview with Michael Sheehan, Go Grid/HighTechDad • 30:25: Wrap up

Gmail Podcast
Special: Dragon*Con session – Webmail Security

Gmail Podcast

Play Episode Listen Later Nov 13, 2011 61:12


This special episode of the Gmail Podcast is a recording of a webmail security presentation I did at DragonCon in Atlanta Georgia on September 3, 2011. I co-presented for the EFF track with my Technorama co-host Kreg Steppe. It’s a little longer than my usual Gmail Podcast. And at times it starts to become a […]

Founders Talk
Bill Boebel / Rackspace

Founders Talk

Play Episode Listen Later May 11, 2011 38:04


Adam talks with Bill Boebel, VP Strategy/Corp Dev at Rackspace and Founder of Webmail.us about staying the course, keeping the team motivated during turbulent “cash strapped” times, getting acquired by Rackspace and staying on to continue building the company post-acquisition.

Changelog Master Feed
Bill Boebel / Rackspace (Founders Talk #14)

Changelog Master Feed

Play Episode Listen Later May 11, 2011 38:04


Adam talks with Bill Boebel, VP Strategy/Corp Dev at Rackspace and Founder of Webmail.us about staying the course, keeping the team motivated during turbulent “cash strapped” times, getting acquired by Rackspace and staying on to continue building the company post-acquisition.

MultiAstuces Eric Othon Le Matin Dimanche

Consultez simultanément plusieurs comptes Webmail.INTERNET EXPLORER 9. Avec des comptes de webmails, comme Google Mail, Yahoo, Hotmail, il n'est pas possible d'en ouvrir plus d'un à la fois d’une même messagerie en ligne. Or, si vous possédez plusieurs comptes Gmail ou autres, il vous serait peut-être agréable de les consulter simultanément. Grâce à la fonction Nouvelle session de la version 9 du navigateur Internet Explorer, c’est désormais possible.Eric OthonLe Matin Dimanchewww.astuces.lematin.ch

MultiAstuces Eric Othon Le Matin Dimanche

Consultez simultanément plusieurs comptes Webmail.INTERNET EXPLORER 9. Avec des comptes de webmails, comme Google Mail, Yahoo, Hotmail, il n'est pas possible d'en ouvrir plus d'un à la fois d’une même messagerie en ligne. Or, si vous possédez plusieurs comptes Gmail ou autres, il vous serait peut-être agréable de les consulter simultanément. Grâce à la fonction Nouvelle session de la version 9 du navigateur Internet Explorer, c’est désormais possible.Eric OthonLe Matin Dimanchewww.astuces.lematin.ch

UKFast - Corporate Film Production
Exchange through Webmail

UKFast - Corporate Film Production

Play Episode Listen Later Mar 17, 2011 0:46


Whether you have a dedicated or shared exchange service, webmail allows you to connect to your email from wherever you are.

CRE: Technik, Kultur, Gesellschaft
CRE176 Cloud Computing

CRE: Technik, Kultur, Gesellschaft

Play Episode Listen Later Feb 21, 2011 146:35


Cloud Computing wird viel diskutiert und wenig verstanden. In den letzten Jahren nimmt die Zahl der Dienste und Dienstarten "in der Wolke" ständig zu und man verliert schnell den Überblick, was hier eigentlich noch womit konkurriert und welche Einsatzmöglichkeiten bietet. Im Gespräch mit Tim Pritlove bietet Tobias Rodäbel einen Überblick über die Landschaft von Cloud Services und stellt die Funktionsweise von Cloud Computing Plattformen vor. Themen: Entwicklung von frühen Diensten im Internet; Webmail; Verteiltes Rechnen und Virtualisierung; Infrastructure as a Service; Populäre Infrastrukturanbieter; Platform as a Service; der neue Betriebssystemkampf in der Wolke; Zuverlässigkeiten und Abhängigkeiten; Cloud Services, Datenschutz und Privatsphäre; welche Anwendungen sich für Cloud-Plattformen eigenen und welche nicht; Webanwendungen vs. Native Anwendungen; Google App Engine und TyphoonAE; Open Source Alternativen für Cloud Technologien; wo Cloud Services für Firmen interessant sind und wo nicht.

Informatica

Webmail