Download the App!
show episodes
 
Buzzword Bingo explores top-of-mind topics in enterprise tech. Each topic is examined from multiple perspectives through in-depth interviews with industry leaders and aficionados. Powered by Rubrik.
  continue reading
 
Artwork

1
Rhize Up

David Schultz

Unsubscribe
Unsubscribe
Daily
 
In-depth conversations about where IT meets manufacturing. Listen to experts discuss topics like manufacturing standards, execution systems, event-driven architectures, and integration between businesses and processes. No buzzword bingo, just deep discussions from experienced practitioners. Hosted by David Schultz with a rotating panel of guests. Episodes normally air every other week.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Monthly
 
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Loading …
show series
 
If you've seen The Imitation Game you've heard of the Enigma, the cryptographic machine used by the German military in WWII. Everything about the Enigma--how it was used, how it was solved--is echoed in the cryptographic methods we used in the past, today, and in the future. Support the Show. Visit us on Patreon for bonus content and special offers…
  continue reading
 
On July 19, the CrowdStrike outage was all over the news. But what was it really about, and what does it have to do with all of us? While the outage was repaired quickly, the fact that it affected so many systems we depend on is a wakeup call reminiscent of crippling cybersecurity attacks. In this episode, we look at what happened, how it relates t…
  continue reading
 
Your smart phone keeps busy, even when you're not on it. Apps are constantly downloading data–thumbnails, ad content, new posts–at a surprising frequency, even when you're not actively using the app. These downloads can lead to your download data making it look like you're using your phone when you're not. In this episode, I pull a story from my da…
  continue reading
 
In response to the San Bernardino shooting in 2015, the FBI demanded that Apple, Inc. create a "back door" to bypass the shooter's iPhone security, a back door that could also compromise any iPhone, anytime. Thankfully, Apple CEO Tim Cook wasn't playing. But this isn't the first time government and law enforcement has tried to stick their noses int…
  continue reading
 
Buzzwords are the language of business and marketing. But do they really live up to the hype? Find out how phrases like "end-to-end encryption" and "blockchain" are used to hype up a service that might not be what it seems. Join me on a journey through the world of buzzwords in cybersecurity marketing. Resources: Hackers steal nearly $10 million fr…
  continue reading
 
Have you gotten a dream job offer through WhatsApp, Facebook, or some other suspicious source? It's probably a scam. Let's look at how job scams work, and how you can spot them. Report job scams in the USA to the Federal Trade Commission. Support the Show. Visit us on Patreon for bonus content and special offers! But only if you hate scams and atta…
  continue reading
 
Does your phone serve you content based on your conversations? It depends. This is the third episode in a three-part series on social media. Here we talk about what your apps or services might be listening to, and what you can do about it. Resources: Does Your Phone Listen to You for Ads? (Yes, Here’s How) This Company Might Be Listening to Everyth…
  continue reading
 
What's your favorite Beatles song? Where did you get married? What's your dog's name? Whenever you answer a question on a random person's or company's post, you're giving up information to exploit you. See what social media sites collect about you Support the Show. Visit us on Patreon for bonus content and special offers! But only if you hate scams…
  continue reading
 
How do you find out what social media platforms know about you? Bet you didn't know you can grab your data anytime, all of it. In this episode, we talk about how to get all your data from a social media platform so you can see what they've stored. Get your data from Facebook Get your data from Instagram Get your data from LinkedIn Get your data fro…
  continue reading
 
What is an NFT, and why would anyone want to buy one? There are lots of reasons why someone might buy a certified JPG or other NFT, but there's no guarantee your NFT will increase in value or even retain the value you paid for it. In this episode, host Michele Bousquet talks about different kinds of NFTs on the market, how they compare to physical …
  continue reading
 
The story of Silk Road, the underground website where you could buy and sell anything, is now part of internet lore. Customers could order everything from pot to meth and have it delivered to their door. Then came fake IDs, unregistered guns, poisons, and murder-for-hire. But wherever there's illegal activity and lots of money, violence isn't far b…
  continue reading
 
Well, it finally happened: I got scammed! I bought a high-end projector at a price that was too good to be true, because it wasn't true. Don't fall for the White Van scam! White van speaker scam on Wikipedia The Art and Math of Cryptography at Amazon.com Support the Show. Visit us on Patreon for bonus content and special offers! But only if you hat…
  continue reading
 
In October 21, 2021, Josh Renaud, a reporter for the St. Louis Post-Dispatch newspaper, privately alerted a government authority that their website had vulnerabilities. In response, the governor of Missouri, Michael L. Parson, brought charges against the journalist for "hacking." This story would be hilarious if it wasn't true. Update: In July 2022…
  continue reading
 
You get an email telling you you've been billed for a product you never ordered, and when you call for a refund, you somehow you get an excess refund and have to send back the difference. Find out how scammers manipulate people into sending them "excess refund money" from a nonexistent refund, and what you can do to keep it from happening to others…
  continue reading
 
What is Tor? In this episode, we demystify the Tor browser and how it relates to the Surface Web, the Deep Web, and the Dark Web. Maybe you want to use Tor, and maybe you don't. But in any case you'll know what it is, and will be able to decide if it's right for you. Download the Tor browser at the official site A great read about the dark web at W…
  continue reading
 
What we can we learn about hacks, scams, and fraud from TV shows and movies? Plenty, as it turns out. Fictional shows, documentaries, podcasts, and other types of entertainment are a treasure trove of knowledge. Don't discount the education you can get about scams, con games, legal proceedings, police procedure, and other aspects of safety, all whi…
  continue reading
 
The Tinder Swindler is a fascinating Netflix documentary about a serial romance scammer who took each of his "girlfriends" for more than $100,000 each. In this episode, we look at what we can learn from The Tinder Swindler, going beyond the easy "blame the victim" mentality to show how effective such scams can be, and to point out the individual re…
  continue reading
 
The hack of Sony Pictures Entertainment in 2014 was one of the most bizarre crimes of the decade. Instead of demanding money, the hackers threatened a terrorist attack on the USA if Sony didn't cancel the release of the film 'The Interview,' a comedy about two bumbling journalists who travel to North Korea and attempt to assassinate the country's S…
  continue reading
 
Why are older people so susceptible to scams? There could be a relationship to the music you loved in your teen years. Just as most of us have a Musical Peak in our teens, I propose that we also have a Technology Peak in our 20s-40s. Nudging our elderly relatives out of their Technology Peak, and into the present, is the only way to break this patt…
  continue reading
 
What would you do if you found out someone was using your identity to take out credit cards, steal your tax refund, or even raid your bank account? Meet Tiffany, Pete, and Astrid, three victims of identity theft. Find out how each of them discovered the fraud, what they did to reverse the damage, and what they do now to prevent it from happening ag…
  continue reading
 
How are bike thieves like hackers? Both look for the same kinds of vulnerabilities, including easy-to-crack passwords. Would you leave your bike's combination at the default of 0000? Of course not. In the same way, you should change default passwords and use something that a hacker won't find easy to crack. Be safe out there! Support the Show. Visi…
  continue reading
 
Black Friday, the day after American Thanksgiving, is traditionally one of the biggest holiday shopping days of the year. But hackers aren't going to take a holiday--they'll use Black Friday as an opportunity to try and scam you. If you get a text about an order or a gift card, don't tap the link! Instead, go to the retailer's site and see if there…
  continue reading
 
You've heard of Bitcoin, but how does it work, and why are so many people talking about it? Let's talk about blockchain--the tech behind Bitcoin and other cryptocurrency--in plain English, including hashing, a key part of blockchain technology. We'll also talk about why people invest in cryptocurrency. Resources for this episode Development of bloc…
  continue reading
 
If anyone--the IRS, the electric company, the police--calls you and asks you to buy a prepaid Visa card or a gift card to pay your bill over the phone, it's not who you think it is. They'll tell you to scratch the numbers off the back and read them the numbers. This is a ploy by scammers to get money from you. Don't fall for it! This tip was inspir…
  continue reading
 
Hackers operate off of fear. They'll call you with an urgent problem: Your bill is overdue! Pay now! But if they don't know your name, social security number, or anything else about you, it's a scam. Hang up and be satisfied that you thwarted yet another hack. Support the Show. Visit us on Patreon for bonus content and special offers! But only if y…
  continue reading
 
In July 2015, a very polite group of hackers called The Impact Team stole the data of over 30 million users from Ashley Madison, a website for cheating spouses, and threatened to dump it all over the dark web if the site wasn't shut down. The site stayed up, and the data went out. Learn about how hackers worldwide have used the data to blackmail us…
  continue reading
 
Let's look at the impact of credit card fraud, and talk about how they're stolen, and what you can do to keep your credit safe. Jiggle that cover, man! Resources for this episode: Credit card safety: 8 tips to help keep you safe: https://www.zdnet.com/article/how-hackers-stole-millions-of-credit-card-records-from-target/ Verizon 2020 Payment Securi…
  continue reading
 
Say No to the NSA! Until the mid-1970s, the National Security Agency held an iron grip on all research into computer-based cryptography in the USA. In this episode, we talk about how the NSA squashed all public research into cryptography in the 1950s and 1960s, but loosened its grip to work to develop the Digital Encryption Standard (DES) with IBM.…
  continue reading
 
When consumer reporting agency Equifax was breached in 2017, the records of over 140 million people (more than half the adults in the USA!) were stolen. Three years later, we take a closer look at the mistakes Equifax's security team made, how hackers leveraged a compromised Equifax web page to gain access to logins, passwords, and dozens of additi…
  continue reading
 
Today, companies are on a journey to modernize their infrastructures and meet the changing demands of businesses. The cloud is becoming a strategic part of this initiative due to its potential to unlock cost savings and increase agility. However, the cloud also brings a new set of migration and data protection challenges.In this episode, Michael Fa…
  continue reading
 
In a world where data is mission-critical for nearly every organization, the threat of ransomware continues to be top of mind. Adding to the pain, cyber attacks have become increasingly sophisticated and complex.In this episode, join Andrew Miller and Darren Swift (Systems Engineer, Rubrik) as they explore the ever-changing ransomware landscape and…
  continue reading
 
In recent years, there's been an uptick of companies making their software freely available to the public. However, in many cases, this decision means giving up exclusive rights to their technology. What's driving this change? And what business value does open source provide?In this episode, Ken Hui (Rubrik) and Matt Broberg (Sensu) help unfold the…
  continue reading
 
Loading …

Quick Reference Guide