Podcast Episodes

Back to Search
Catching Phish

The weakest link in most cybersecurity systems is you – that is, human beings. And one of the primary ways that people are tricked into infecting the…

2 years, 3 months ago

Short Long
View Episode
iOS 17 Security & Privacy

Apple has just released a major update to its mobile operating system: iOS 17. There are tons of fun new features, but today I’ll walk you through so…

2 years, 3 months ago

Short Long
View Episode
Your Face Belongs to Us

When the New York Times broke the Clearview AI story in 2020, we suddenly had to face the reality that no one could truly be anonymous in public any …

2 years, 4 months ago

Short Long
View Episode
Remediate Your Network

Today I wrap up my four-part series on how to secure your home network. We’ve enumerated our devices, gotten rid of stuff we don’t need, assessed the…

2 years, 4 months ago

Short Long
View Episode
Containing Big Data

In the US today we’re dealing with a completely unfettered free-for-all of data harvesting. Without meaningful privacy regulations like the EU’s GDPR…

2 years, 4 months ago

Short Long
View Episode
Assessing Your Network Security

In the third part of my series on securing your home network, we’ll assess your security and privacy vulnerabilities. In prior weeks, we’ve exhaustiv…

2 years, 4 months ago

Short Long
View Episode
Demystifying AI

Unless you’ve been living under a rock, you’ve seen several news stories about AI, machine learning and so-called Large Language Models. While tools …

2 years, 4 months ago

Short Long
View Episode
Hacker Summer Camp 2023

Every summer, hackers from around the US and around the globe descend on Las Vegas, Nevada, for a series of computer security conferences which are l…

2 years, 5 months ago

Short Long
View Episode
Cult of the Dead Cow

In the early 1980s, personal computers started entering our homes. Prior to the internet and services like America On Line (AOL), there were online b…

2 years, 5 months ago

Short Long
View Episode
Less is More

Last time, I told you how to enumerate all the devices on your home network. Before we go to the trouble of analyzing and mitigating their vulnerabil…

2 years, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us