Podcast Episodes
Back to SearchCatching Phish
The weakest link in most cybersecurity systems is you – that is, human beings. And one of the primary ways that people are tricked into infecting the…
2 years, 3 months ago
iOS 17 Security & Privacy
Apple has just released a major update to its mobile operating system: iOS 17. There are tons of fun new features, but today I’ll walk you through so…
2 years, 3 months ago
Your Face Belongs to Us
When the New York Times broke the Clearview AI story in 2020, we suddenly had to face the reality that no one could truly be anonymous in public any …
2 years, 4 months ago
Remediate Your Network
Today I wrap up my four-part series on how to secure your home network. We’ve enumerated our devices, gotten rid of stuff we don’t need, assessed the…
2 years, 4 months ago
Containing Big Data
In the US today we’re dealing with a completely unfettered free-for-all of data harvesting. Without meaningful privacy regulations like the EU’s GDPR…
2 years, 4 months ago
Assessing Your Network Security
In the third part of my series on securing your home network, we’ll assess your security and privacy vulnerabilities. In prior weeks, we’ve exhaustiv…
2 years, 4 months ago
Demystifying AI
Unless you’ve been living under a rock, you’ve seen several news stories about AI, machine learning and so-called Large Language Models. While tools …
2 years, 4 months ago
Hacker Summer Camp 2023
Every summer, hackers from around the US and around the globe descend on Las Vegas, Nevada, for a series of computer security conferences which are l…
2 years, 5 months ago
Cult of the Dead Cow
In the early 1980s, personal computers started entering our homes. Prior to the internet and services like America On Line (AOL), there were online b…
2 years, 5 months ago
Less is More
Last time, I told you how to enumerate all the devices on your home network. Before we go to the trouble of analyzing and mitigating their vulnerabil…
2 years, 5 months ago