Podcast Episodes
Back to SearchHave You Been Pwned?
Every time there’s a data breach at a company or service where you do business, there’s a chance that the bad guys will reverse engineer your passwor…
5 years, 8 months ago
Phish Spotting 101
The bad guys are having a field day with all the coronavirus hubbub, using our fears and anxieties to trick us into clicking bad links, downloading i…
5 years, 9 months ago
Contact Tracing, Privately
As health services and society in general struggle to cope with the coronavirus pandemic, people are desperately seeking new and inventive ways to cu…
5 years, 9 months ago
Secure & Private Social Distancing
During our global COVID-19 self-quarantining, video conferencing usage has exploded. I’ve tried to find hard statistics, but they’re rising so fast t…
5 years, 9 months ago
Privacy by Design
Wouldn’t it be nice if privacy wasn’t an afterthought? What if user privacy was built in from the get go? What if the entire design assumed that you …
5 years, 9 months ago
Beware COVID-19 Scams
Never let a good crisis go to waste. Though normally applied to politics, it can be equally applied to opportunistic cyber criminals. With the world …
5 years, 9 months ago
The CCPA and You (Part 2)
In part 1 of this interview, Hayley Tsukayama walked us through the details of the new California Consumer Privacy Act (CCPA). In part 2, we discuss …
5 years, 10 months ago
The CCPA and You (Part 1)
On January 1st, 2020, the California Consumer Privacy Act (CCPA) went into effect. While not perfect, the CCPA is a landmark piece of legislation for…
5 years, 10 months ago
Hacked: A Clearer View of Clearview
A few weeks ago, the New York Times published a bombshell article about a small startup called Clearview AI who was using a massive database of three…
5 years, 10 months ago
Adversarial Interoperability (Part 2)
it’s not cheap or easy to get your iPhone repaired – largely because there’s not a lot of real competition in the iPhone repair market. That’s no acc…
5 years, 10 months ago