SecurityIf you feel like you’ve been getting more email spam than usual lately, you’re probably right. According to a recent report from Fortune, a sophisticated spambot called “Onliner” has figured out a way to bypass spam filters and has used that advantage to target some…
September 20, 2017 •
3 min read
SecurityFor years, tech enthusiasts have been calling the Internet of Things “the future of technology.” But is it? On the one hand, there is some appeal to a world where everything is digitally connected. Being able to control your home’s lights, thermostat, irrigation system, security…
September 19, 2017 •
3 min read
SecurityThe personal information of 143-million people may have been compromised when the consumer credit reporting agency Equifax was hacked. What do we know about the attack? And what can we do going forward?
September 18, 2017 •
16 min read
SecuritySince the addition of the fingerprint reader to the iPhone, the convenience of Touch ID has been hard to deny. From unlocking our phones to instantly authorizing an in-app purchase, it’s a rapid and convenient way to authenticate yourself to your device. Now with iOS…
September 18, 2017 •
2 min read
SecurityWe know that an unsecured Internet of Things (IoT) thing like a light bulb or a web-connected picture frame can become part of a botnet or a dedicated denial of service attack. But how does that happen? That’s the topic of today’s show.
September 13, 2017 •
17 min read
SecurityWith malicious networks using tens of millions of computers and devices to serve up spam, run denial of service attacks, and more, botnets are a threat we can’t ignore.
August 31, 2017 •
18 min read
SecurityCheating in online video games is nothing new — it’s been an almost permanent fixture of the scene for years. Despite consistent anti-cheat efforts, new hacks continue to crop up for popular games all the time. It’s an arms race, much in the same way…
August 30, 2017 •
3 min read
SecurityToday, we are looking at five of the biggest data breaches and most notable hacks in history. Who got hit? What data was stolen? How did they happen?
August 24, 2017 •
18 min read
SecurityOn today’s episode, we’re looking at the way technological change has affected modern medicine, threats the healthcare industry faces, and what we can do to protect patient safety now and in the future.
August 17, 2017 •
18 min read
SecurityOne of Apple’s most famous marketing campaigns revolved around the catchphrase “There’s an app for that”—to the point that Apple eventually had the slogan trademarked. However, for users living in China, that statement is no longer true. According to a recent report from CNBC, Apple…
August 14, 2017 •
3 min read
SecurityEvery time a new version of Apple’s operating system arrives, every tech-focused publication on the Internet does a deep dive on the new key features. Occasionally, though, cool bells and whistles go overlooked. Such is the case with the macOS Keychain Access application, which, in…
August 11, 2017 •
3 min read
SecurityThe rise of artificial intelligence in the consumer space seems to have happened overnight. It feels like we’ve gone from Apple’s introduction of Siri to virtual assistants everywhere in the blink of an eye. On today’s episode, we’ll be covering some security concerns that accompany the rise of AI.
August 10, 2017 •
16 min read
SecurityAnother glaring security problem with Internet of Things devices has come to light. The details highlight the reasons why IoT security should be a front-line concern — not an afterthought. With several major attacks this year powered by botnets built on the back of compromised…
August 10, 2017 •
2 min read
SecurityEarlier this year, Google users encountered a unique and particularly devious phishing attack. Phishers have used Google Docs in various capacities for several years, most frequently creating phony forms to try to collect sensitive user data. During this enormous wave of phishing attempts, though, users…
August 8, 2017 •
2 min read
SecurityWhile the WannaCry ransomware wave was sweeping the globe, one of the first stories that emerged alongside it was about the exploit that allowed it to exist: EternalBlue. Exposed as an NSA-discovered vulnerability during leaks by the mysterious Shadow Brokers, it allows malware authors to…
August 5, 2017 •
2 min read
SecurityOn today’s episode we’ll be taking a look at spyware: what it does, where it comes from, and what you can do to defend against it. Sometimes it’s pretty obvious when you’ve got a malware infection – ransomware lets you know that your files have…
August 3, 2017 •
27 min read
SecurityRemember jailbreaking? From the first iPhone, it has been an integral part of the community around the device and even something which has pushed its development forward. Initially, just a way to unlock the phone and release it from the “jail” of an exclusive carrier…
August 3, 2017 •
3 min read