Podcasts about wpa3

  • 98PODCASTS
  • 133EPISODES
  • 42mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 20, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about wpa3

Latest podcast episodes about wpa3

Packet Pushers - Full Podcast Feed
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 20, 2025 52:57


Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »

Packet Pushers - Fat Pipe
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day

Packet Pushers - Fat Pipe

Play Episode Listen Later May 20, 2025 52:57


Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »

Irish Tech News Audio Articles
Acer Connect Enduro M3 5G Mobile Wi-Fi, reviewed

Irish Tech News Audio Articles

Play Episode Listen Later May 8, 2025 4:23


We look at the Acer Enduro M3 a mobile hotspot for those who need to spend time in off the grid locations. See more about the Acer Enduro M3 here. Acer Connect Enduro M3 5G Mobile Wi-Fi, reviewed If you live or work somewhere with coverage blackspots then the use case for this device makes complete sense. Luckily our testers take their jobs seriously and are often dipping into out of reach areas, at least that is what they tell us when we are trying to contact them. This device definitely addresses this problem and it is small, compact and tough, all of which make it something that you would happily add to your tech gear when heading out into low coverage areas. Maybe it comes with the territory of spending time on the islands, and byways of West Cork and Kerry, but this device makes complete sense and is not yet competing in a market flooded with similar products either. There could definitely be some advantages from being an early mover in this space as it builds up fans and advocates for it's values too. The battery life is pretty good, you would be fine for a day out, and, if used sparingly, and only put on when you need it, then it should work well for an overnight or even several nights out in the wilds too. The display screen is a little tricky, especially for those of us with fingers on the slightly larger size, you might want to subcontract out some of those jobs to a more nimble fingered partner. For sea kayaking, or in your offroad vehicle the weight seemed fairly inconsequential, for hiking it might be more of a consideration. At the same time this is something that could save your life too, so those extra 250gms could still be well worth having with you. It does heat up, but again if you have it powered down until you need it then this issue can be mitigated easily. Our testers liked it, and the 20gbs of data that come preloaded ensure that you have something to work with in a dire emergency situation which would be the optimal time to use this, rather than posting social media updates with it. A nice piece of gear and our testers were happy to recommend it for others to use. More about the Acer Connect Enduro M3 When you're working on the go, you need a mobile hotspot that can keep up. The Acer Connect Enduro M3 and its ruggedized design is protected against drops, bumps, water, and more - giving you the freedom to take you and your work anywhere. The Acer Enduro M3 is a reliable and versatile mobile hotspot designed for users who need a durable, secure, and high-speed internet connection on the go, whether for travel, remote work, or outdoor activities. Its ruggedness, long battery life, and vSIM capabilities are significant advantages. Superior 5G Coverage with SignalScan No SIM card necessary - with vSIM technology and SignalScan, your device can flexibly connect to the strongest 5G or 4G signal from any network and ensures your connection stays strong and stable. Connect All Your Devices No matter if you're traveling with colleagues or family, this device has you covered. Connect devices on the go over Wi-Fi 6 22 MIMO wireless technology. Ruggedized Design Certified MIL-STD-810H durable and with IP54 protection against dust and water, this rugged mobile hotspot is designed to stand up to all the unexpected bumps and drops of everyday travel. Designed for All Day Connectivity The 6500 mAh high-capacity battery lets you stay focused on your travels without worrying about charging your device. Protect Your Data This mobile hotspot uses WPA3 to simplify your Wi-Fi security by enabling robust authentication and cryptographic strength while also providing built-in VPN functionality to ensure your data stays anonymous. Award Winning Design With its innovative and cutting-edge design, this mobile router has earned accolades such as a 2023 Red Dot Product Design Award and 2023 iF Design Award - internationally recognized symbols of excellence in design. https://www.acer.com/gb-en/networking/5g/acer-connect-enduro-m...

Telecom Reseller
Helium Teams with AT&T to Deliver Decentralized Wi-Fi Coverage Nationwide, Podcast

Telecom Reseller

Play Episode Listen Later May 2, 2025


“Coverage on demand is here—and it's being built by the community.”—Mario Di Dio, General Manager, Network Helium, Nova Labs Mario Di Dio In a groundbreaking step toward redefining wireless connectivity, Helium Network and Nova Labs have teamed up with AT&T to deliver seamless, secure Wi-Fi access across the U.S. through a decentralized network model. In a podcast interview with Technology Reseller News, Mario Di Dio, General Manager of Network Helium at Nova Labs, walked us through this major milestone and explained how Helium is reshaping the economics and delivery of mobile data. Unlike traditional networks built on costly infrastructure and centralized control, the Helium model allows individuals and businesses to host "mini cell towers"—hotspots that contribute to a nationwide mesh network. Now, with AT&T onboard, the Helium Network enables AT&T customers to connect automatically to these community-powered hotspots without any manual setup, thanks to Passpoint-enabled, WPA3-secure connections. “Just walk into a participating venue like a restaurant or community center,” said Di Dio, “and your phone automatically connects to the network without passwords, boosting coverage in hard-to-reach indoor areas.” The benefits extend to small business owners who can offer secure, guest Wi-Fi while earning Helium Network Tokens (HNT) for hosting a hotspot. This not only enhances customer satisfaction but also introduces a new revenue stream. Deployment is flexible—businesses can install purpose-built Helium devices or convert existing hardware from brands like Ubiquiti, Cisco Meraki, and Aruba into Helium-compatible units. A central element of Helium's transparency and scalability is Helium World (world.helium.com), a live, blockchain-backed dashboard that displays real-time data on hotspot locations, user traffic, and network usage. With over 90,000 active hotspots and peaks of over 900,000 users, the platform provides both visibility for carriers and insights for potential deployers. Another standout innovation is Helium's real-time quality of experience (QoE) metrics. “For the first time, carriers can get live KPIs from third-party Wi-Fi connections just like they do from their own cellular networks,” said Di Dio. This allows providers like AT&T to monitor and dynamically manage the user experience, toggling between Wi-Fi and cellular as needed. As Helium expands through partnerships with other mobile and virtual network operators, its vision for “coverage on demand” continues to gain traction. Using an innovative “expansion zone” feature, carriers can request network growth in targeted areas, and Helium's community of deployers responds. With this shift, Di Dio believes we're witnessing the future of wireless—one that's scalable, community-driven, and more responsive to real-world needs. “It's a very interesting economic proposition for carriers, and a practical one for the people and places that make up our connected world,” he said. Learn more: www.helium.com Live dashboard: world.helium.com #HeliumNetwork #NovaLabs #DecentralizedWiFi #AT&T #TelecomInnovation #WiFiConvergence #BlockchainConnectivity #vCon #TechReseller #HotspotEconomy #WirelessInfrastructure #ConnectivitySolutions

Packet Pushers - Full Podcast Feed
HW049: Updates on Wi-Fi Security, Wi-Fi 7 and WPA3

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 1, 2025 26:58


Host Keith Parsons and guest Stephen Orr took time at the Wireless LAN Professionals Conference in Phoenix this past February to discuss the security implications of Wi-Fi 7. Stephen explains that new features in Wi-Fi 7 require specific security protocols such as WPA3 to function. Challenges with device onboarding and secure authentication are addressed next,... Read more »

challenges security networking wifi wireless wlan wpa3 stephen orr wireless lan professionals conference
Heavy Wireless
HW049: Updates on Wi-Fi Security, Wi-Fi 7 and WPA3

Heavy Wireless

Play Episode Listen Later Apr 1, 2025 26:58


Host Keith Parsons and guest Stephen Orr took time at the Wireless LAN Professionals Conference in Phoenix this past February to discuss the security implications of Wi-Fi 7. Stephen explains that new features in Wi-Fi 7 require specific security protocols such as WPA3 to function. Challenges with device onboarding and secure authentication are addressed next,... Read more »

challenges security networking wifi wireless wlan wpa3 stephen orr wireless lan professionals conference
The Signal: A Wi-Fi Alliance podcast
Wi-Fi® enables a new level of security with Marian Kost of Texas Instruments

The Signal: A Wi-Fi Alliance podcast

Play Episode Listen Later Jan 29, 2025 14:55


In this episode, we welcome Marian Kost, VP and GM of Connectivity at Texas Instruments, back to the podcast to talk about wireless security. As the number of connected devices grows, securing them becomes more important than ever, especially in critical areas like patient monitoring, building automation, and industrial applications. Marian tells us that the latest generations of Wi-Fi are even more secure than previous iterations, and we discuss how WPA3™  delivers significant security advantages. We also talk about how these advancements are encouraging manufacturers to adopt Wi-Fi for new applications, helping drive the proliferation of Wi-Fi devices. Tune in to learn more about what's next for Wi-Fi and security.For Wi-Fi AllianceFor Membership InfoGeneral Contact

7 Minute Security
7MS #658: WPA3 Downgrade Attacks

7 Minute Security

Play Episode Listen Later Jan 17, 2025 32:58


Hey friends, today we cover: The shiny new 7MinSec Club BPATTY updates A talk-through of the WPA3 downgrade attack, complemented by the YouTube livestream

7 Minute Security
7MS #655: Happy Hacking Holidays

7 Minute Security

Play Episode Listen Later Dec 30, 2024 58:08


Today we're doing a milkshake of several topics: wireless pentest pwnage, automating the boring pentest stuff with cursor.ai, and some closing business thoughts at 7MinSec celebrates its 7th year as a security consultancy.  Links discussed today: AWUS036ACH wifi card (not my favorite anymore) Panda PAU09 N600 (love this one!) The very important Github issue that helped me better understand BPFs and WPA3 attacks TrustedSec article on WPA3 downgrade attacks

Ask The Tech Guys (Audio)
HOT 195: Connecting Older Tech to Modern Networks - Gmail Storage, .pst Files, Internet Speeds

Ask The Tech Guys (Audio)

Play Episode Listen Later Dec 15, 2024 39:33


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

All TWiT.tv Shows (MP3)
Hands-On Tech 195: Connecting Older Tech to Modern Networks

All TWiT.tv Shows (MP3)

Play Episode Listen Later Dec 15, 2024 39:33


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

The Tech Guy (Video HI)
HOT 195: Connecting Older Tech to Modern Networks - Gmail Storage, .pst Files, Internet Speeds

The Tech Guy (Video HI)

Play Episode Listen Later Dec 15, 2024 39:33


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Hands-On Tech (Video HD)
HOT 195: Connecting Older Tech to Modern Networks - Gmail Storage, .pst Files, Internet Speeds

Hands-On Tech (Video HD)

Play Episode Listen Later Dec 15, 2024 39:33


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Hands-On Tech (MP3)
HOT 195: Connecting Older Tech to Modern Networks - Gmail Storage, .pst Files, Internet Speeds

Hands-On Tech (MP3)

Play Episode Listen Later Dec 15, 2024 39:33


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

All TWiT.tv Shows (Video LO)
Hands-On Tech 195: Connecting Older Tech to Modern Networks

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Dec 15, 2024 39:33 Transcription Available


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Hands-On Tech (Video HI)
HOT 195: Connecting Older Tech to Modern Networks - Gmail Storage, .pst Files, Internet Speeds

Hands-On Tech (Video HI)

Play Episode Listen Later Dec 15, 2024 39:33 Transcription Available


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Total Mikah (Video)
Hands-On Tech 195: Connecting Older Tech to Modern Networks

Total Mikah (Video)

Play Episode Listen Later Dec 15, 2024 39:33 Transcription Available


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Total Mikah (Audio)
Hands-On Tech 195: Connecting Older Tech to Modern Networks

Total Mikah (Audio)

Play Episode Listen Later Dec 15, 2024 39:33 Transcription Available


On Hands-On Tech, Mikah continues to answer more of your submitted questions, such as reclaiming Gmail storage from deleted emails, connecting an older iPad to a newer Wi-Fi network, and why you might not be getting exactly close to the speeds you should be getting with your internet service provider. Jack wonders why, after deleting old emails in his Gmail account, why he doesn't have more space in his account. Ronald asks a follow-up question from a previous episode involving his new Mac and whether he can use Spinrite to maintain a formatted external drive. Hassan has an Eero router with WPA3 enabled, but he has to connect an older iPad to the network, which won't work on the network. Is there a workaround he can do to get the iPad to work on the Eero network? Ray wants to know about uploading his .pst files from his Outlook client to another email provider like Gmail or Yahoo so he doesn't have to utilize the Outlook client anymore when accessing his emails. And Ross wonders if he can do anything to get access to speeds as close as the 2.5Gbps he is paying for with his ISP. Don't forget to send in your questions for Mikah to answer during the show! hot@twit.tv. Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

CISSP Cyber Training Podcast - CISSP Training Program
CCT 182: Multilayer Protocols and Advanced Networking for the CISSP (Domain 4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Oct 7, 2024 34:06 Transcription Available


Send us a textUnlock the secrets of cybersecurity mastery with Sean Gerber as we embark on a journey through Domain 4 of the CISSP exam. Ever wondered how AI could transform the chaotic world of Security Operations Centers (SOCs)? Discover the potential of artificial intelligence to streamline alert management and enhance detection efficiency, a much-needed solution for the 60% of SOC professionals swamped by alert overload. Stay ahead of the curve by understanding the rapid rise of AI startups and the strategic importance of future investments in SOC capabilities.Venture into the realm of Voice over IP (VoIP) and unravel the intricacies of RTP and SRTP protocols that power real-time communication. Learn how these protocols ensure optimal data transmission while safeguarding against common threats like phishing and session hijacking. Dive into the revolutionary shift from traditional PSTN to VoIP, and explore the role of converged protocols like MPLS that simplify network integration. With a focus on security enhancements, this episode offers vital insights into maintaining robust communication systems in the face of evolving threats.Explore advanced networking concepts like Software-Defined Networking (SDN) and network virtualization, which are reshaping data transfer efficiency. Delve into wireless encryption protocols, including the transformative WPA3, and emerging technologies such as Li-Fi and Zigbee. Addressing cellular network encryption challenges with LTE communications, we provide a comprehensive guide to navigating the ever-evolving landscape of wireless standards. Wrap up your cybersecurity education with a spotlight on CISSP Cyber Training resources, designed to support your certification journey and contribute to a meaningful cause.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

TechCentral Podcast
TCS+ | Don't let your Wi-Fi drag your business down

TechCentral Podcast

Play Episode Listen Later May 10, 2024 25:38


A strong and reliable Wi-Fi network is no longer a perk but a fundamental necessity. Just like access to good coffee and comfortable chairs, businesses are expected to provide a seamless Wi-Fi experience for employees, guests and tenants. A frustratingly slow or spotty connection can bring your entire operation to a crawl, hindering productivity and damaging your reputation. Wi-Fi experts at Vox Vox understands the critical role Wi-Fi plays in a successful business and how its Wi-Fi offering can be a major differentiator. The guest today in this episode of TCS+ is Craig Blignaut, product manager for Wi-Fi at Vox. Blignaut brings a wealth of knowledge about the needs of businesses and the technology that keeps them connected. Planning for success: proactive Wi-Fi solutions Blignaut discussed the importance of having a well-defined Wi-Fi strategy from the very beginning: proper planning prevents problems later. Vox takes a proactive approach by using specialised software to create virtual models of your office space. This software considers building materials like brick, glass and metal, allowing it to predict how Wi-Fi signals will travel and where obstacles might cause issues. This virtual planning isn't just about signal strength; it also helps determine the best placement for access points and switches, as well as how to route cables in the most efficient way. It even considers factors like employee traffic patterns to optimise network performance and capacity in areas where it's needed most. Just like any other piece of equipment, Wi-Fi needs regular check-ups to ensure optimal performance. Vox offers a comprehensive Wi-Fi audit service that includes both on-site and remote testing. This ensures your access points are delivering the data, bandwidth and capacity you need to function smoothly. The audit also considers factors that can fluctuate over time, such as the number of users on the network, peak usage times, and even changes to your building's structure or materials. Staying secure Security is another crucial aspect of any Wi-Fi network. Outdated systems are vulnerable to breaches, leaving your business data and your users' information at risk. As Wi-Fi technology improves, so, too, should your security protocols. Vox recommends using strong encryption like WPA3 to keep your network safe from unauthorised access and data loss. Managed Wi-Fi solutions: the power of remote support In addition to supplying enterprise-grade equipment, Vox offers a managed Wi-Fi solution that provides off-site management and remote support. This means you have a team of experts behind the scenes, constantly monitoring your network and proactively addressing any issues that may arise. Vox's AI-powered software can even anticipate and troubleshoot potential problems before they occur, preventing disruptions before they start. The bottom line Don't settle for a sluggish, unreliable Wi-Fi network. A poor connection can frustrate employees and guests alike, hindering productivity and creating a negative impression of your business. A Vox Wi-Fi audit can identify areas for improvement and ensure you're getting the most out of your network. Imagine a world where your employees can download large files, stream video conferences and access cloud-based applications without a hitch. Ready to upgrade your Wi-Fi experience? Contact Craig Blignaut at Vox or your Vox account manager to discuss your options and take your business Wi-Fi to the next level. • Visit www.vox.co.za or e-mail info@vox.co.za • Book a Wi-Fi survey or audit • Guest Wi-Fi solutions from Vox This promoted content was paid for by the party concerned TechCentral

Security Clearance Careers Podcast
10 Tips for Better Cyber Hygiene

Security Clearance Careers Podcast

Play Episode Listen Later May 5, 2024 11:53


In an era where our digital footprint is as significant as our physical presence, maintaining robust cyber hygiene is crucial for protecting personal information and ensuring online safety. Katie Helbling tests Phoebe Wells' knowledge on some cyber practices on the third episode of the ClearanceJobs Gameshow.Test your own knowledge with the questions / answers:What is a common method hackers use to gain access to passwords? PhishingWhat is NOT a type of malware? Freeware What does the term "VPN" stand for, and what is its primary purpose? Virtual Private Network; to secure and privatize your internet connectionWhat is considered the weakest for securing accounts? Using the same password for multiple accountsWhat is the main function of a Firewall in computer security? To monitor and control incoming and outgoing network traffic based on predetermined security rules Here are ten tips to bolster your cyber defenses:Use Strong, Unique Passwords: The foundation of good cyber hygiene starts with strong, unique passwords for each of your accounts. Consider using a passphrase or a password manager to generate and store complex passwords that are difficult to crack.Enable Two-Factor Authentication (2FA): Adding an extra layer of security beyond just a password can significantly reduce the risk of unauthorized access to your accounts. Two-factor authentication requires a second form of verification, such as a text message code or an authentication app, to log in.Regularly Update Software and Systems: Cyber attackers exploit vulnerabilities in outdated software and operating systems. Regular updates help patch these security holes and protect your devices from malware and other cyber threats.Be Wary of Phishing Attempts: Phishing emails or messages attempt to trick you into giving away sensitive information. Be skeptical of unsolicited communications, especially those that request personal data or direct you to a webpage where you need to input your details.Use Secure Networks: Public Wi-Fi networks can be hotspots for cybercriminals to intercept your data. Use a virtual private network (VPN) to encrypt your internet connection and shield your online activities from prying eyes.Backup Your Data: Regularly back up important data to an external drive or cloud storage. In the event of a cyber attack, such as ransomware, you can restore your data from the backup without succumbing to the demands of cyber extortionists.Educate Yourself About Cyber Threats: Awareness is your first line of defense. Stay informed about the latest cyber threats and the best practices for avoiding them.Secure Your Home Network: Change the default username and password on your home router and enable WPA3 encryption to protect your Wi-Fi network from unauthorized access.Limit Personal Information Shared Online: The more information you share online, the easier it is for a cybercriminal to target you. Be mindful about what personal details you post on social media and other websites.Use Antivirus Software: Install reputable antivirus software on your devices to provide real-time protection against malware and other cyber threats. Ensure it's set to update automatically for the best defense. Hosted on Acast. See acast.com/privacy for more information.

Packet Pushers - Full Podcast Feed
PP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 13, 2024 31:59


It's time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We also discuss what features make WPA3 an improvement over WPA2, particularly the replacement of PSK with SAE.... Read more »

Packet Pushers - Fat Pipe
PP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 13, 2024 31:59


It's time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We also discuss what features make WPA3 an improvement over WPA2, particularly the replacement of PSK with SAE.... Read more »

It's 5:05! Daily cybersecurity and open source briefing
Episode #199 - Don't Let Your Printer Compromise Your Network; Space Pirates Attack Across Russia and Serbia; Worldcoin says it will share its data; Apple and UK; UK Ambulance Patient Records Hauled Offline Cyber Attack Probe; This Day, August 3 in

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Aug 3, 2023 12:47


Packet Pushers - Full Podcast Feed
Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 16, 2023 36:21


On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger.

Packet Pushers - Full Podcast Feed
Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 16, 2023 36:21


On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger. The post Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Packet Pushers - Fat Pipe

Play Episode Listen Later May 16, 2023 36:21


On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger.

Packet Pushers - Fat Pipe
Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Packet Pushers - Fat Pipe

Play Episode Listen Later May 16, 2023 36:21


On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger. The post Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella appeared first on Packet Pushers.

Heavy Wireless
Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Heavy Wireless

Play Episode Listen Later May 16, 2023 36:21


On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger.

K12 Tech Talk
Episode 109 - K12 SIX Conference Recap and Doug Levin Interview

K12 Tech Talk

Play Episode Listen Later Mar 10, 2023 56:34 Transcription Available


Chris is on leave again this week, so Mark and Josh do their best to proceed without him.   Mark recaps the K12 SIX Conference that was held in Austin, Texas. Josh talks about trying to change a SSID over to WPA3 and it did not go well. They also talk about a new method students are using to attempt to crack WPA2 passphrases on Chromebooks using the chrome://net-export page. The majority of this episode is an interview that Chris and Mark conducted with Mr. Doug Levin, founder of K12 SIX. Doug sat down with the guys to talk about what K12 SIX offers to districts and what the goal of the conference is. LISTEN HERE (and on all major podcast platforms). Hang out with us at K12TechPro.com Buy our merch!!! Vizor - 20% Off Fortinet - Email fortinetpodcast@fortinet.com SomethingCool.com - Cybersecurity Solutions Extreme Networks - Email dmayer@extremenetworks.com Provision Data Solutions Oh, and... Email us at k12techtalk@gmail.com Tweet us @k12techtalkpod Visit our LinkedIn page HERE Reddit

The Really Useful Podcast
Bitcoin Crash, Windows 11's Start Menu Ads, Portless iPhone Rumoured, and What is WPA3?

The Really Useful Podcast

Play Episode Listen Later Nov 16, 2022 31:00


Bitcoin is crashing, leaving a lot of people out of pocket. Windows 11 is sneaking ads into the operating system, and what is WPA3? With some public Wi-Fi tips and recommendations, this is your Really Useful Podcast.You can subscribe to the Really Useful Podcast on Apple Podcasts, Spotify, Google Podcasts, Amazon Music and Audible, Player FM, or copy the RSS feed into your podcast player.This week, we chat about the following tech news that matters: US Justice Department Seizes Billions in Bitcoin Windows 11 Nudges Sign-up Ads Apple Considering Portless iPhone We've got these tips and tricks: WEP, WPA, WPA2, and WPA3 Explained Ways Hackers Can Use Public Wi-Fi to Steal Your Identity We finish the show with the following recommendations: TheC64 Collection 1 cartridge for Evercade Nothing Ear Stick review Christian Cawley and Gavin Phillips host this podcast. You can contact them on Twitter: @thegadgetmonkey and @gavinspavin, with your suggestions for future topics. 

Techzine Talks
WiFi 7 is een grote stap voorwaarts in connectiviteit

Techzine Talks

Play Episode Listen Later Jul 18, 2022 28:12


Er is een nieuwe WiFi-standaard op komst, namelijk WiFi 7. Deze nieuwe standaard is een grote sprong voorwaarts in draadloze connectiviteit. Voor het eerst is het mogelijk om met meerdere frequenties tegelijk te verbinden, is de bandbreedte per kanaal fors toegenomen en de latency afgenomen. Hierdoor zijn stabielere en snellere verbindingen mogelijk dan met voorgaande WiFi-standaarden.WiFi 7, WiFi 6E, WPA3 en het einde van de 2,4 GHz band?In deze podcast staan we stil bij de ontwikkeling van WiFi, uiteraard gaan we de diepte in op WiFi 7, maar staan we ook stil bij voorgaande standaarden en de ontwikkelingen die elkaar hebben opgevolgd. Denk bijvoorbeeld aan de introductie van WPA3, waarmee je verbinding nog beter is versleuteld en dus veiliger is. Ook staan we stil bij de 2,4 GHz-band, dat is de oorspronkelijke band die langzaam lijkt te verdwijnen. 5 GHz en 6 GHz zijn de betere frequenties voor WiFi. Voor de echte professionals gaat Sander zelfs nog in op OFDMA en QAM.

The Signal: A Wi-Fi Alliance podcast
Wi-Fi and the future of remote work with Harry Dewhirst, CEO of Linksys

The Signal: A Wi-Fi Alliance podcast

Play Episode Listen Later Apr 9, 2022 16:11


In this episode, we'll be talking to Harry Dewhirst, CEO of Linksys, about the various ways Wi-Fi is driving the future of secure, remote work. Approximately 35 million people in North America will be working from home by 2025. One of the cornerstones of making remote work feasible is ensuring that it is safe and secure while providing the best quality of experience, and this is a major focus for Linksys innovations. Support for WPA3-personal and WPA3-enterprise, Wi-Fi 6 coupled with mesh, and technologies like Wi-Fi QoS Management are helping solve the security and connectivity challenges as employees continue the working from home trend even after the pandemic is over. To learn more about the ways Wi-Fi solutions are enabling the promising future of remote work, listen to this podcast.Links: For Wi-Fi Alliance: www.wi-fi.org For Membership Info: https://www.wi-fi.org/membership General Contact: https://www.wi-fi.org/contact-us

Switching, Routing, and Wireless Essentials with KevTechify on the Cisco Certified Network Associate (CCNA)
Secure WLANs - WLAN Concepts - Switching, Routing, and Wireless Essentials - CCNA - KevTechify | Podcast 48

Switching, Routing, and Wireless Essentials with KevTechify on the Cisco Certified Network Associate (CCNA)

Play Episode Listen Later Apr 8, 2022 15:31


In this episode we are going to look at Secure WLANs.We will be discussing Video - Secure WLANs, SSID Cloaking and MAC Address Filtering, 802.11 Original Authentication Methods, Shared Key Authentication Methods, Authenticating a Home User, Encryption Methods, Authentication in the Enterprise, and WPA3.Thank you so much for listening to this episode of my series on Switching, Routing, and Wireless Essentials for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Switching, Routing, and Wireless Essentials v2 (SRWE)Episode 12 - WLAN ConceptsPart G - Secure WLANsPodcast Number: 48-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment 

Simple Cyber Defense
Wifi Security Basics (S03E05)

Simple Cyber Defense

Play Episode Listen Later Mar 7, 2022 29:05


Simple Cyber Defense Security Updates Season 3 Episode 5 Support US: Donations - https://simplecyberdefense.com/Donate Connect with US: Facebook - https://www.facebook.com/SimpleCyberDefense/ Twitter - https://twitter.com/SimCyberDefense MeWe - https://mewe.com/join/simplecyberdefense Mastodon - https://mastodon.social/@SimpleCyberDefense Minds - https://mastodon.social/@SimpleCyberDefense LBRY - https://lbry.tv/@SimpleCyberDefense LinkedIn - https://www.linkedin.com/groups/12488483/ Rumble - https://rumble.com/c/c-406535 PeerTube - https://worldofvids.com/video-channels/simple_cyber_defenese/videos YouTube - https://www.youtube.com/channel/UCF1IvGkxa4qz-jsJg70884Q Intro: Film Glitch by Snowflake (c) copyright 2017 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. http://dig.ccmixter.org/files/snowflake/56350 Ft: reusenoise Links: 8 Steps to Stronger Wifi Security - https://www.digicert.com/blog/8-steps-stronger-wifi-security Differences among WEP, WPA, WPA2 and WPA3 wireless security protocols - https://www.techtarget.com/searchnetworking/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2 --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/simplecyberdefense/message Support this podcast: https://anchor.fm/simplecyberdefense/support

The Essential Apple Podcast
S1E226 - Essential Apple Podcast 226: More News than you'd think

The Essential Apple Podcast

Play Episode Listen Later Jul 1, 2021 96:54


Recorded 27th June 2021 Currently Apple's Podcast app doesn't seem to render links properly so if you are listening in the Podcasts app go to www.essentialapple.com (http://www.essentialapple.com/) for full shownotes and links. Simon, Steve and Nick get together again to take a look at rather more stories than they thought they had including Amazon sending tens of thousands of items a week to landfill, Safari Technology Preview, the death of John McAffee, Hubble's broken computers, the MyBook Live story and more. GIVEAWAYS & OFFERS Glenn Fleishman's book Take Control of Securing Your Mac can be found at takecontrolbooks.com along with many other titles by him, Joe Kissell, Jeff Carlson and others. Steve at Geeks Corner has a podcast which is usually a 5-15 min show of his thoughts on tech. Also keep an eye on his site or follow him on Twitter @GeekCorner_uk to watch for regular giveaways. Why not come and join the Slack community? You can now just click on this Slackroom Link to sign up and join in the chatter! Slacker @MacJim has a family friendly Flickr group for listeners to share photos because the Darkroom channel in the Slack has become so popular - if you're interested head over to to the Essential Apple Flickr and request an invitation. On this week's show: NICK RILEY Big Show on the @spligosh on Twitter very occasionally. Sometimes appears on Bart Busschots' Let's Talk Apple Sutton Park Circuit church worship on YouTube Nick's church stream videos – You Tube JAMES ORMISTON MacJim in the Slack In charge of the Essential Apple Flickr Also on Flickr as thesrpspaintshop Has videos on Vimeo STEVE DURBIN Runs the Geeks Corner website Produces the Geeks Corner podcast @GeekCorner_uk on Twitter APPLE Russia votes to force U.S. tech giants to open local offices – AppleInsider Apple Shares List of Products to Keep Safe Distance Away From Pacemakers – MacRumors Apps can request access to more RAM with iOS 15 entitlement, exceeding normal system memory limits – 9to5Mac Safari Technology Preview - Safari – Apple Developer Adobe Removing Photoshop Sketch and Illustrator Draw From App Store in July – MacRumors Running Low on iCloud Storage? Heres How to Make Room for the Things You need – iDropNews How to delete Time Machine local snapshots in macOS – AppleInsider Hotspot connections will be safer in iOS 15 thanks to WPA3 security protocol – 9to5Mac You Don't Need iCloud+ for 'Hide My Email' in iOS 15 | How to Set It Up Now – iDrop News Final Cut Pro 10.5.3, Compressor 4.5.3, and Motion 5.5.2 – TidBITS The Real System Requirements for Apple's 2021 Operating Systems – TidBITS TECHNOLOGY Amazon Is Destroying Thousands of Unsold AirPods, iPads, and MacBooks According to New Investigation – iDrop News Revealed: Amazon destroying millions of items of unsold stock in UK every year – ITV The ex-Amazon worker who helped expose scale of unwanted stock being destroyed – ITV Second Amazon whistleblower claims brand new goods being binned – ITV John McAfee, Antivirus Software Creator, Found Dead In Spanish Prison Cell – HuffPost NASA is pulling out all the stops to fix the Hubble Space Telescope – SlashGear Podcasts | Everything Technology – Bob O'Donnell Microsoft releases Windows 11 for free – but most computers will not be able to run it – Independent Microsoft wont allow Windows 11 on many older Surface devices – PC World SECURITY & PRIVACY “I'm totally screwed.” WD My Book Live users wake up to find their data deleted – Ars Technica Western Digital drives remotely wiped: What experts say to do now – SlashGear WORTH A CHIRP / ESSENTIAL TIPS All Things Secured | Online Security Made Simple – Josh Summers This app lets you download full macOS Big Sur installer pkgs with one click – 9to5Mac JUST A SNIPPET For things that are not worth more than a flypast River Runner - Watch the path of a raindrop from anywhere in the contiguous United States Somebody put a Raspberry Pi inside a G5 iMac because why the heck not? – iMore Essential Apple Recommended Services: All Things Secured – Online security made simple by Josh Summers. Pixel Privacy – a fabulous resource full of excellent articles and advice on how to protect yourself online. Doug.ee Blog for Andy J's security tips. Ghostery – protect yourself from trackers, scripts and ads while browsing. Simple Login – Email anonymisation and disposable emails for login/registering with 33mail.com – Never give out your real email address online again. AnonAddy – Disposable email addresses Sudo – get up to 9 “avatars” with email addresses, phone numbers and more to mask your online identity. Free for the first year and priced from $0.99 US / £2.50 UK per month thereafter... You get to keep 2 free avatars though. ProtonMail – end to end encrypted, open source, based in Switzerland. Prices start from FREE... what more can you ask? ProtonVPN – a VPN to go with it perhaps? Prices also starting from nothing! Comparitech DNS Leak Test – simple to use and understand VPN leak test. Fake Name Generator – so much more than names! Create whole identities (for free) with all the information you could ever need. Wire and on the App Stores – free for personal use, open source and end to end encryted messenger and VoIP. Pinecast – a fabulous podcast hosting service with costs that start from nothing. Essential Apple is not affiliated with or paid to promote any of these services... We recommend services that we use ourselves and feel are either unique or outstanding in their field, or in some cases are just the best value for money in our opinion. Social Media and Slack You can follow us on: Twitter / Slack / EssentialApple.com / Soundcloud / Spotify / Facebook / Pinecast Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.

Apfelfunk
282: Welle der guten Laune

Apfelfunk

Play Episode Listen Later Jun 30, 2021 95:53


- Public Betas sind los: Zwischenfazit iOS 15 und macOS Monterey - Ein wenig mehr: Beta 2 von iOS 15 - Wann kommen sie endlich? AirPods und AirPods Pro Gerüchte - Oh la la OLED: iPad Air könnte OLED bekommen - Windows 11 vorgestellt: Was bedeutet das für den Mac? - Umfrage der Woche - Zuschriften unserer Hörer Links zur Sendung: - Das war Apfelfunk Frankfurt 2018 - https://apfelfunk.com/das-war-apfelfunk-frankfurt-2018/ - Apple: Public Beta Programm - https://beta.apple.com/sp/de/betaprogram/ - 9to5Mac: Was in iOS 15 neu ist - https://9to5mac.com/2021/06/24/heres-whats-new-in-ios-15-beta-2-and-ipados-15-beta-2/ - 9to5Mac: Personal Hotspot in iOS 15 mit WPA3 - https://9to5mac.com/2021/06/26/hotspot-connections-will-be-safer-in-ios-15-thanks-to-wpa3-security-protocol/ - 9to5Mac: Apps können in iOS 15 mehr RAM nutzen - https://9to5mac.com/2021/06/25/apps-can-request-access-to-more-ram-with-ios-15-entitlement-exceeding-normal-system-memory-limits/ - MacTechNews.de: Berichte zum Release der neuen AirPods Modelle - https://www.mactechnews.de/news/article/AirPods-und-AirPods-Pro-Berichte-zum-Release-der-neuen-Modelle-177970.html - 9to5Mac: Veröffentlicht Apple ein iPad Air mit OLED-Display? - https://9to5mac.com/2021/06/30/report-apple-to-release-10-8-inch-oled-ipad-air-next-year-oled-ipad-pro-in-2023/ - 9to5Mac: Windows 11 funktioniert nicht auf Intel Macs - https://9to5mac.com/2021/06/25/windows-11-wont-be-officially-supported-by-any-intel-mac-heres-why/

Tweakers Podcast
#170 - PlayMobil-trekkies, WPA3-problemen en OS-vergelijkingen

Tweakers Podcast

Play Episode Listen Later Jun 24, 2021 55:44


0:00 Intro 0:20 Opening 1:20 PlayMobil 8:05 WPA3 15:00 Silent Hill 20:10 Accounts 28:37 Windows 11 53:40 Sneak peek Deze week praten Arnoud Wokke, Jurian Ubachs, Jelle Stuip en Olaf van Miltenburg over de Star Trek-set van PlayMobil, compatibiliteit van apparaten met WPA3, de theorie dat het Nederlandse Blue Box een Silent Hill-game maakt, geblokkeerde accounts en de komst van Windows 11. See omnystudio.com/listener for privacy information.

Cryptography FM
Episode 17: Breaking Wi-Fi With Frame Attacks!

Cryptography FM

Play Episode Listen Later Jun 1, 2021 35:58


Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications. However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn't it discovered before? We'll discuss this and more in this episode of Cryptography FM. Links and papers discussed in the show: * Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation (https://papers.mathyvanhoef.com/usenix2021.pdf) * Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd (https://papers.mathyvanhoef.com/dragonblood.pdf) * Release the Kraken: New KRACKs in the 802.11 Standard (https://papers.mathyvanhoef.com/ccs2018.pdf) Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Mathy Vanhoef.

The ALPS In Brief Podcast
ALPS In Brief – Episode 57: How to Remain Cybersecure On the Road

The ALPS In Brief Podcast

Play Episode Listen Later May 25, 2021 29:13


As the world re-opens and you begin to stretch your legs, ALPS Risk Manager Mark B tells some true tales and offers some tips for safeguarding your client data and maintaining your firm's cybersecurity from your phone, Airbnb, or the wide-open road. Transcript:  Mark Bassingthwaighte: Hello, I'm Mark Bassingthwaighte, the risk manager with ALPS, and welcome to another episode of ALPS in Brief, the podcast that comes to you from the historic Florence building in beautiful downtown Missoula, Montana. It is a pleasure to have the opportunity to visit again via podcast. Before I get into the topic of this podcast, I'd like to share story and some information about what's going on and in my life as a way to set up where we're going to go.                 Let's start with a call that I took earlier this week, and it came from an attorney who really wanted to understand if what he was doing in terms of security with his system was sufficient, if there was other things that he could do. What prompted the call is he went through an experience somewhat similar to what happened to my wife and I a number of years ago, he was the victim of identity theft. Had a tax return filed, fraudulently filed, obviously, in his name, and some other things had occurred. One of the mistakes he made, however, was using a complex password. Now, that was not the mistake, that's a great thing, but he used it on multiple accounts. And as a result of getting his personal information, they were also able to get into his work computer. Some email was being sent out from his computer under his name, trying to scam clients and some businesses he works with out of funds. And so, that was a bit of a mess.                 The other situation that's going on in terms of my own life is, and this is all good, but my wife and I are currently in transition. We are going through something I think a lot of people are going through in these crazy times, and it has to do with moving. Long story short again, the timing of moving out of one home, which has been sold, and into a new home, which is currently still under construction, did not line up as close as we might have liked, so we are currently in transition, living in a temporary apartment until things settle down and get finished. You know, it's quite a change. Most of our belongings are sitting in storage. We kid around that at some point when we finally get settled, and the truck unloaded and start unpacking, it'll be like Christmas. We'll say, "Hey, I had no idea we had this stuff." So it's got to be fun.                 But I began to realize, although I've been telecommuting for many, many years, and will continue to do so, this transition into a corporate apartment, and by that, I simply just mean it's a small furnished apartment, sort of struck me as I'm going through an experience similar to what I think a lot of people did when they had to rapidly transition from the office to working from home in the early days of the pandemic. There were some things here, that as I started to set up and figure out what was going on, I realized, "Oof, wait, there are some security issues that really need to be addressed." I thought it's worth talking about some of this. The lawyer that called, it was about best practices. You know, "What am I doing wrong? What am I doing right? Is there anything else I could be doing?"                 And we had a good discussion, and it turns out there were a few things she could do to further secure what he was doing. And again, I sit and think, "Okay, boy, I didn't realize, just wasn't thinking about how much I take for granted given my old situation and then transitioning." So let's talk about what we can do as individuals to make our systems as secure as we can to help protect the competences, the property, the identities of our clients, and of course our own personal information. This discussion is not about everything that we can do to secure an office network. It's more focusing on the day-to-day basics, the day-to-day things we should all be thinking about that can help. IT, at our firm, keep us secure as a firm, and keep our information and the information of our clients private and confidential.                 That's look at this, and I want to start with just the basics, and then we'll kind of explore some other things. But the basics, it is extremely important that we keep the operating system and the applications that we're running on all these devices current in terms of security patches. Now, when I talk about devices, I'm talking about the laptops or PCs that we have at home, but even the mobile devices we travel with for vacation or for work trips. You know, smart phones, tablets, all of these things we need to keep current. Sometimes we may even need to go out and look for patches. I have to do that occasionally on applications on our cell phones. But these patches are being issued for a reason, and they are often bringing additional security features or updates to close vulnerabilities that have been discovered in prior versions, so absolutely essential.                 Now, one of the things that a lot of people do, and we all spend all kinds of money nowadays on these smartphones, and there's some crazy awesome phones out there, but we treat them as phones. We're not always thinking about the fact that this is a pretty robust computer. So we need to make sure that every mobile device and every device in our home that we are using for work has a internet security suite running, and it too should be kept current with all patches. One side note here, do not rely on free security programs or free VPNs. There's lots of free stuff out there, even in the security space, and you get what you pay for, which is very little when it comes to security. Now I'm not suggesting that the security software, these free VPNs, don't do what they say they're going to do. A free VPN will certainly encrypt your data stream so that anybody that tries to intercept this data stream won't see it.                 But the company that gives you this free product, there's an exchange, and the exchange is they get to monetize and monitor all your doing, and so you are what they are making money off of. That's not acceptable. And for a lawyer who is practicing law in terms of using these devices in the further and the practice of the law, because that information, just no. So you need to spend the few bucks that it's going to cost and be a bit more secure about it all.                 Turn on full disk encryption. You know, in this day and age, when it's one setting on a phone or a laptop, turn this stuff on. I consider it unethical, I truly consider it incompetent, not to take the time to turn this stuff on. Full disk encryption is typically once you turn your device off and somebody tries to turn it back on, if it's lost or stolen, if they don't have the password to decrypt, your data is protected and your client confidences are protected. So turn that on.                 Set up the ability to do remote wipes if a device is ever lost or stolen. I mean, doesn't that seem like a no-brainer? Take the time to do that. Again, it's so simple and easy to do. Use strong passwords, long pins, and never use the same password or pin on different devices or accounts. The story I just shared with the lawyer who called me, that was the mistake. He was using a very complex password, which was great, but he was using that same password on multiple accounts. You know, if they get one, they have now access to everything. That that makes no sense.                 Now, what is a complex password? Well, best practices would say 16 characters. We're rapidly approaching 20, a number of people that I work with and know in the security space really are saying 20. I routinely am using 20 to 24 on a number of accounts if the device or the application will accept that. And when we say complex, so in my case, we have 20 characters on some of this stuff. It's upper, lower case letters. It's symbols. It's numbers. And it's going to be very, very hard to guess. You know, there's no dictionary words here that that would be easy for a hacker to try to figure out. A lot of pushback that I get on this is, "How can I remember all of this stuff? Good Lord." You know? "I have trouble remembering what I had for breakfast yesterday, Mark."                 Well, I am not kidding you when I say that my wife and I probably manage between 200, 250 complex passwords and different usernames. I never repeat. I never use them on multiple counts, this kind of thing. What have I done differently? I use a password manager. Personally, I use RoboForm. There are a number out there that are quite good. Dashlane would be another example. But these programs store and manage all these complex passwords for us. And if I need to change a password, it will even do that for me and randomly generate a new complex password, and memorize it for me. So all of my wife and I need to do is remember a very complex, and this is a long one, but a very complex passphrase, and that's the keys to the kingdom. It's not written down anywhere. We remember it. There's no stickies, it's all easy. But we have the ability now to use complex passwords in every aspect of our life, on any account and device that it'll work with.                 Turn on or utilize two factor authentication on all accounts. Don't make it easy. Two factor authentication, we're talking about authenticator apps or sending a pin as you try to log in your bank account. You get the code, a six digit code, typically, on a text message. You don't want to make it easy. If somebody happens to figure out what the password is on, heaven forbid your IOLTA account, and they're trying to steal some money out of them, well, when they're logging in, if they don't have your phone, the text message isn't coming to them. It's just one extra level of protection. And I'm telling you. Now, TFA, you can hack it. Using that doesn't mean you're 100% secure, but you are exponentially more secure than not using TFA, so absolutely use that on every work personal account that you can in terms of if it's available: email accounts, financial accounts, in terms of investment, bank accounts, those kinds of things, are obvious key places where you would want to do that.                 Install a VPN. A VPN, and that stands for virtual private network, and it is a software program that will encrypt your data stream so that if you are, well, I'm going to talk about this a bit more in terms of wifi momentarily, but it just makes sure that the sessions, when we are on the internet, that the data stream is encrypted. Again, we're trying to make it ever more complex.                 Those are some basic things to think about. But now I want to shift gears a little bit and explore. You know, as lawyers, we do take vacations and we travel for business, and there's some exposures that come up here as well. It could be staying in an Airbnb, in a hotel. The list goes on. So a couple of quick behavioral comments, things that we can do. Never use a public computer. I'm thinking about the business center at the resort in Cabo, or at the hotel in DC, whatever it might be, or even local libraries. There's all sorts of places where public computers are available. Absolutely not acceptable in terms of practicing law, communicating with clients. These things are very, very difficult to keep secure. Anybody can come in and do all kinds of stuff, so I would just not use them at all.                 Literally, if I had my own firm and was in charge of things here, I would have one warning, and do it twice you're fired if somebody, anybody, were using a public computer for work. It's that high risk. No public wifi. No open. You know, I'm talking about the airport, I'm talking about the signal at the hotel, I'm talking about Starbucks, those kinds of things. We absolutely cannot use this if any alternative exists. And there are alternatives. I won't get into what all the risks are, but it's very, very insecure and very high risk.                 So what's an alternative? Well, when I travel, a lot of times what I will do is connect my laptop to my smartphone. I'm using my smartphone then as a hotspot, and so the data stream will be sent using the carrier signal, AT&T, Verizon, whatever carrier you have. Far more secure than the local wifi hotspot.                 If however, and I can appreciate at times there are some circumstances where it may not be an option and you really must use wifi, there are some interesting ethics opinions out there that talk about this, but it is an acceptable risk with certain conditions. The two big wins are this, make sure that you know what the legitimate signal is. If you're at an airport and you're turning it on, you're trying, and it says, "Oh, here's Free Jet Blue wifi." "Oh, I love Jet Blue." Jet Blue has never made wifi available. Okay? But that signal has been out there. People will just create names that they think people will log into. If you're at a Hilton Hotel and you see Free Hilton, it's not Hilton. That's not what they call their network. Make sure you know. Ask the barista, ask the person at the front desk at the hotel. "What is the name of the network that you have set up that's the legitimate one for me to use?" So now which one to connect to.                 Then the other thing is, and this is not optional, as soon as you log into the network, initiate, use the VPN. Encrypt your signal. Is this risk-free? Absolutely nothing is risk-free. But this is going to be a little bit more risky than using the carrier signal, but you're taking reasonable precautions to do what you can in light of the circumstances to be as secure as you can. Those are two key things to think about.                 Some other things, don't leave devices on and accessible if you step away, and you have a conversation with somebody, if you're outside working around a pool on vacation, trying to just get a little sun. Don't leave your laptop on at some table unwatched. Have it automatically timeout and log off, or in 10 minutes, or whatever it might be. If you want to run down to dinner in your hotel room, again, log out, or better yet just turn the thing off until you get back up there. But take some steps. Again, it's all about making sure. We don't want to make it easy for others to get into our systems. So there's a couple of things to think about in terms of vacations and travel.                 Next, I'm thinking about the move here, and stepping in. My big concern, and I'm using this as a parallel or a corollary to the work from home struggles and that transition. My immediate concern was the router. You know? I have the instructions here. The username is admin. Okay, that's the default. A lot of them are named admin. The password that they had set up was easy to guess and just, you know. You look and say, "Okay, I don't know what they've done with the settings." That's completely unacceptable. I cannot and would not put myself at risk using that signal, let alone ALPS.                 Now, I may be a little crazy at times, I don't know, but I kept my new router, my personal router, I had that with me. Now, I don't travel with a router all the time, although if I'm going to start traveling and I may stay put for a couple of weeks somewhere, I actually might start doing that. I'm very sincere in saying that. But I'm able to trust the signal and be far more secure. I'm not suggesting now, again, that you take routers with you on your travel, but I am suggesting, hey, in your home, if you've not thought about this and taken steps to secure your router, now is the time. There are all kinds of exposures that can come into play here. The purpose of this talk is not to really explore all that, but it's just to say you need to do something. Let me go through, I have a short list here of things from an article I wrote about this, but I want to talk about some of the basics.                 You need to understand that the usernames and passwords, the default ones, are available on the internet, they're often standards, and that they need to be changed. So again, think about the complex password. That's have a very complex password for the router, and that's change the username from admin to something that is a bit more unique to you. Change the network SSID. Again, the name of the network. Every router comes with a default name. That has to be changed or something that's unique to you, but don't make it something that's obvious as to who you are. You know, Mark at 2022 Front Street. The neighbors all know, "Hey, that signal's Mark. And you know, no. You want to make it, "I don't know who this is," kind of. Okay?                 Set up a guest network in your home, with its own network name and your unique password, so that guests have access to a network. I trust our kids. They're all good kids. They're all adults. We're empty nesters. But when they come home, none of them are allowed on the home network, because it's used for work, and there's a lot of, you know. It's personal information. I don't want to expose my stuff to there, and vice versa. But you know, if they're doing something they shouldn't be doing on the network, it's separate. I just strongly encourage you to do that. Because when kids come into the home, and friends of your kids come into the home, and they're gaming, and doing all kinds of things, if they're on your network that your work computer, and your personal devices, and everything's on, you're risking. They bring this new level of exposure that we're not necessarily thinking about. So block that. Set up a separate network.                 If the firmware version of your router isn't current update to the most current version available, it's all about security patches. Routers need to be updated as well. If it's an auto update option, check that to make sure. If you can't tell or it looks like there's been no update even released in the last 12 to 18 months, throw out that router and get a new one. And I'm not kidding around. These routers need to be able to be updated automatically, and the updates, a lot of routers, they stop ... I had an older router and it was two years out of date before I finally realized, I'm going, "Well, that's not good." So get rid of it and get something current.                 Confirm that the network authentication method, and what we're talking about is in the encryption that the routers using, is set to WPA2 personal, or even better, WPA3 personal, excuse me, if that option is available, WPA3 is simply just more secure. If neither option, WPA2 or WPA3 is available on the router, it's old, toss it, get a new one. Not kidding. And finally, turn off universal plug and play. That's sort of the functionality that makes it very easy to connect new internet of thing devices and whatnot around the house. I know that it makes connecting new devices when you introduce them to the home a little less convenient, but leaving it on provides hackers easy access. That's just not acceptable.                 I mean, if you want to do that in your own life and nothing in your home is connected to the office network or you're doing nothing for work, okay. Have at it, I guess. But when we are using devices, the network, for work, that's got to be turned off. That access avenue, for lack of a better description, has been used even to insert programs like banking Trojans that try to capture your login credentials to your bank account or to your 401k. Not good. We need to address that.                 Set up a defined work space. Part of this is a wellness thing for me, part of it is just establishing boundaries in a home, perhaps with children, but having a defined workspace that you can enter and exit from and others can learn to respect can be a huge difference. No device sharing. Absolutely no device sharing. Confidentiality is in play and there's no pandemic exception. You know, if you are using devices: work computers, personal computers for work, smart everything. The kid's, family, if they are not members of your firm, cannot and should not be on these devices.                 And the final thing that I want to talk about is just behavior in general. There's really been a couple of interesting studies of late looking at this, in terms of some security studies, looking at behavior. I find it absolutely fascinating. Part of it has occurred because of this massive work from home thing, but it's true, this has been true pre-pandemic and it's going to stay true post-pandemic and vacations. When we use our own devices, as opposed to a work-controlled device, a work-issued device, and when we are outside of a formal office setting, whether it's vacation, at home, et cetera, we actually, in terms of just seems to be inherent to the human race, I guess, but we seem to be inherently less vigilant, less diligent. We just get far more casual. So we are more easily tricked, or you know, falling prey for a phishing attack or clicking on something we shouldn't be clicking on, not just paying attention, not turning things off, sharing devices. We just get very, very casual.                 We can't. Stay sharp. Think before you click. Don't get too comfortable with the casualness. Don't get too comfortable with this new normal. I understand that for many of us, as an example, we had to transition very quickly to a work from home setting, and it was about making sure the tech works so that we keep moving forward as best we could. And little thought was given to the security of side of this. And then we get comfortable with it and we don't even think about it. That's what I'm trying to address, in part with this in terms of work from home with this, but I want you to think about it in all assets. It's not just the pandemic, it's not just working from home. It's when we're traveling, when we're on vacation. We need to stay vigilant and we need to periodically just take a few minutes and sit down and think. "Wait, is this a responsible thing to do?" "Wait, have I taken all the steps that I should have taken earlier on or I should be taking now?"                 I certainly haven't covered everything that you can do, but these are key things, and important things, and basic things that I think we should all be thinking about, and that should be on your radar. So that's it. I hope you found something of value out of this short discussion. I encourage you, if you have any concerns or questions, something that I might be able to help with, please don't hesitate to reach out. My email address is mbass, M-B-A-S-S, @ALPSinsurance, one word, ALPSinsurance.com. So ALPSinsurance.com, mbass@ALPSinsurance.com. You do not need to be an option shored to visit with me if there's something I can do. Hey, if someone reaches out and I'm able to do something that might prevent just one hack, one breach, that's a great day.                 That's it folks. Hey, have a good one. God bless.  

Apfeltalk® LIVE! Videopodcast (HD)
WLAN richtig nutzen!

Apfeltalk® LIVE! Videopodcast (HD)

Play Episode Listen Later Apr 10, 2021 61:00


Immer wenn Gordon Priebe von AVM bei uns in der Sendung ist, wird es einerseits unterhaltsam, andererseits auch spannend. Auch dieses Mal haben wir mit ihm viel gelacht und viel gelernt. Das WLAN-Standards jetzt eine einfache Nummer bekommen, statt komplizierter Bezeichnungen ist eine der Sachen, die wir als Erkenntnis aus der Show mitnehmen. Aber auch, dass Verschlüsselung nach WPA3 möglicherweise mit alten Geräten zu Problemen führen kann, Insgesamt haben wir einiges an Themen behandelt, wie man das WLAN besser ausnutzen kann und was die Zukunft noch bringen wird. Auch die No-Cloud-Strategie von AVM war ein interessanter Teil der Unterhaltung. Ganz “nebenbei” haben wir dann auch auch den Gewinner unserer HomePod-Mini-Verlosung ermittelt.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

WPA3 Dragonblood Vulnerability http://papers.mathyvanhoef.com/dragonblood.pdf North Korean Trojan: HOPLIGHT https://www.us-cert.gov/ncas/analysis-reports/AR19-100A Gaza Cybergang Group1 "SneakyPastes" https://securelist.com/gaza-cybergang-group1-operation-sneakypastes/90068/

aruba unplugged
EP08 Demystifying WPA and the WPA3 Security Standard

aruba unplugged

Play Episode Listen Later Mar 6, 2019 30:28


HPE Fellow at Aruba Networks, and distinguished security expert, Dan Harkins, helps draw a cyber-line in the sand by providing WPA & WPA3 security tips for both home and public spaces.

Tech Talk Radio Podcast
July 21, 2018 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Jul 21, 2018 58:37


Bufferbloat (IQrouter is the answer), covering webcam with tape (overhyped threat), bootable ISO file (saving on USB drive with Rufus), USB DVD drive (for laptops without DVD), watching streaming content offline (supported by Netflix, Prime, HBO, Showtime), Profiles in IT (Christopher Sholes, father of the typewriter and QUERTY keyboard), hackers target iPhone with malware (MDM takes over phone, originated in India), making iPhone fingerprints more accurate (take multiple images of same finger), SIM hijacking (the latest exploit, beware), WPA3 will make WiFi more secure (replaces fourteen year old WPA2), Girl Scouts issues 30 new STEM related badges, scent of coffee boosts math performance (coffee drinking not required), Google Loon brings Internet to Kenya (bringing 49 million to the web), and Gigabytes, Terabytes, Petabyes (what does it actually mean). This show originally aired on Saturday, July 21, 2018, at 9:00 AM EST on WFED (1500 AM).

The Cell Phone Junkie
The Cell Phone Junkie Show #629

The Cell Phone Junkie

Play Episode Listen Later Jul 2, 2018 39:02


Three new chipsets from Qualcomm, the WiFi alliance launches WPA3, and AT&T increases it's administrative fee. How to Contact us: 650-999-0524   How to Listen:

The 443 - Security Simplified
Nation State Attacks

The 443 - Security Simplified

Play Episode Listen Later Jul 2, 2018 33:38


In this episode of "The 443 – Security Simplified", we talk about the Cyber Cold War and how nation-state cyber attacks impact not just countries but private organizations as well. Before that though, we take some time to break down the new WPA3 wireless security standard from the Wi-Fi alliance. Are VPNs still required for a secure wireless experience? Subscribe to "The 443 - Security Simplified" on Apple Podcasts Stitcher Overcast Google Play TuneIn RSS

HomeTech.fm Podcast
Episode 217 - Projects Project with Joe Albian

HomeTech.fm Podcast

Play Episode Listen Later Jun 29, 2018 58:55


On this week's episode of HomeTech: We are joined by Joe Albian, a supporter of the show who shares his handy work on the latest installment of the "Projects Project". Joe hired professional help for portions of the home including wiring and landscape audio but has also done a great deal of professional-caliber work on his own. The results are a clean and robust installation with a few custom touches you won't want to miss (including one of the nicest AV head ends we've seen on the show)!That plus...WiFi's tougher WPA3 encryption is now availableHDR10+ could provide stiff competition for Dolby VisionStrong evidence of a pending Sonos-HomeKit partnership... a HomeTech exclusive :) and more...Fan of the show? Want to support our efforts? Please consider becoming a Patron!

The PC Pro Podcast
Podcast 438

The PC Pro Podcast

Play Episode Listen Later Jun 28, 2018 64:09


The team discusses the abrupt departure of Intel's CEO; the new WPA3 wireless security standard; a misconceived copyright proposal; and problems with Apple keyboards. Our Hot Hardware candidate is the Dell G3 – a big-screen, low-cost gaming laptop.

WIRED Security: News, Advice, and More
The Next Generation of Wi-Fi Security Will Save You From Yourself

WIRED Security: News, Advice, and More

Play Episode Listen Later Jun 26, 2018 8:52


There are more Wi-Fi devices in active use around the world—roughly 9 billion—than there are human beings. That ubiquity makes protecting Wi-Fi from hackers one of the most important tasks in cybersecurity. Which is why the arrival of next-generation wireless security protocol WPA3 deserves your attention: Not only is it going to keep Wi-Fi connections safer, but also it will help save you from your own security shortcomings.

Tech Talk Radio Podcast
January 13, 2018 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Jan 13, 2018 58:50


History Lane (hard drive evolution), Facebook Snooze explained, buying a surge protector (specs explained), Profiles in IT (Frank Greene, African-American Silicon Valley pioneer), Foreign Intelligence Surveillance Act (passed in House, implications), CES2018 Tech Trends (Wireless Charging, Voice Assistants, Virtual Reality, 8K TV), GM to release driverless cars in 2019, Americans skeptical about autonomous vehicles, Spectre and Meltdown update (worst vulnerability in last decade), new Wi-Fi standard is coming (WPA3 to be relased, Krack vulnerability fixed, safer hotspot connections), Supreme Court to review Internet sales taxes (South Dekota legislative challenge), hundreds of smarphone apps are spying on you (track your TV watching and more), Apple battery replacement program ($29 battery replacement, delayed by battery shortage). This show originally aired on Saturday, January 13, 2018, at 9:00 AM EST on WFED (1500 AM).