Popular Myths about VPNs

In this sponsored episode from our friends at ClearVPN, Artem Risukhin Content Marketing Manager at ClearVPN, joins co-host Tom Eston to discuss the most popular myths about VPNs. Be sure to watch the YouTube edition for a demo of ClearVPN and don’t fo… Continue reading Popular Myths about VPNs

Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates

Is dream hacking the next big privacy concern or just a new marketing gimmick? Some people may be surprised that TikTok shares data with China, and details on Google Chrome adding HTTPS-first mode and Firefox and easing its blocking of Facebook login b… Continue reading Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates

Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

Details on the Kaseya supply-chain and REvil ransomware attack, a new zero-day exploit called “PrintNightmare” affects all Windows versions before June, and how randomly generated passwords in a popular password manager were not so random. ** Links men… Continue reading Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

TikTok can now collect biometric data from user content, researchers find a vulnerability in Peloton bikes, and why some people think that Nextdoor might be the next big social network. ** Links mentioned on the show ** TikTok Can Now Collect Biometric… Continue reading TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Details about the “ANOM” global crime sting where the FBI created a fake encrypted mobile phone for criminals that promised secure communications, new details about how the Colonial Pipeline ransomware attack started, and some really bad security resea… Continue reading ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining

Is Amazon Sidewalk the latest threat to our privacy? Also, what’s the big deal about NFTs, and why mining cryptocurrency through your anti-virus software is a horrible idea. ** Links mentioned on the show ** What Does Amazon Sidewalk Mean for Your Priv… Continue reading Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining

Biden’s Cybersecurity Executive Order, Apple’s AirTag, Cyber Insurance

Details about Biden’s cybersecurity executive order, privacy and stalking concerns with Apple’s new AirTag technology, and why some cyber insurance companies may not pay out for ransomware in the future. ** Links mentioned on the show ** New Cybersecur… Continue reading Biden’s Cybersecurity Executive Order, Apple’s AirTag, Cyber Insurance

How Gamification is Changing Cybersecurity

Gamification is changing cybersecurity and the way we learn! Scott Wright, Co-host and CEO of Click Armor, joins us this month to discuss why gamification is a “game” changer in our industry. ** Links mentioned on the show ** What is Gamified Learning?… Continue reading How Gamification is Changing Cybersecurity

Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

More news and updates about the Colonial Pipeline ransomware attack, the DarkSide ransomware as a service (RaaS) goes dark on the dark web, and why we still need cybersecurity best practices (regardless of an opinion piece that says otherwise). ** Link… Continue reading Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

The Colonial Pipeline Ransomware Attack

This week Tom and Kevin discuss the Colonial Pipeline ransomware attack, RaaS (Ransomware as a Service), and why ransomware attacks are not going away anytime soon. ** Links mentioned on the show ** Colonial Pipeline Hackers, DarkSide, Apologize, Say G… Continue reading The Colonial Pipeline Ransomware Attack