show episodes
 
Artwork
 
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number, ++1 877-852-473O US/CA
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Service Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Service Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech support Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number, ++1 877-852-4730 US/CA
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech support Phone Number, sometimes the users face some Customernical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech support Phone Number +1 877-852-4730 US/CA and let them solve your issues easily!
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily!
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Tech Support Phone Number +1 866-688-9269 US/CA and let them solve your issues easily!
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Support Phone Number, sometimes the ukers face some Customer issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Support Phone Number +0 121-828-2311 UK/CA and let them solve your issues easily!
  continue reading
 
📲MÁLWAREBYTES 📲+1800(821)2090 Helpline Number📲 KLKKR24x7 📲MÁLWAREBYTES HELPLINE 📲+18008212090📲Contact Number📲 KLKKR 📲MÁLWAREBYTES TECHNICAL 📲+18008212090📲Support Contact Number📲 KLLLR calling about an issue with your MÁLWAREBYTES TECH support support phone number TV care, the representative will transfer you to the TV MÁLWAREBYTES TECH support support phone number team. No matter what issue you are calling about, the MÁLWAREBYTES TECH support and TECH support team will be able to help you re ...
  continue reading
 
MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Phone Number, sometimes the users face some Customer Technical issues with it. If you are facing problems with your MALWAREBYTES or MALWAREBYTES account, then fret not! You can establish contact with the expert team of MALWAREBYTES by dialing up the MALWAREBYTES Customer Care Phone Number, ++1 8O5{5O6}55O2 US/CA MALWAREBYTES have expanded throughout in recent years. But the MALWAREBYTES Customer Care Ph ...
  continue reading
 
Contact our MALWAREBYTES Customer Care Phone number +1:805:(874):7479 and solve the MALWAREBYTES mail & Desktop Gold App-related problems within a minute. Our MALWAREBYTES Support number +1:805:(874):7479 provide MALWAREBYTES customer Care on Phoenix, billing, account backup, mail account recovery, account information changes, Fixing the MALWAREBYTES account problem, MALWAREBYTES Desktop gold app issues etc. You can get MALWAREBYTES customer Care and technical support by toll-free MALWAREBYT ...
  continue reading
 
MALWAREBYTES Customer Support +44(808-178-2987)Phone’ Number What Is The MALWAREBYTES Customer Support Phone’ Number? What Is The MALWAREBYTES Customer Support Phone’ Number? Assuming you are referring to AT&T/MALWAREBYTES, the customer service number is How to Contact MALWAREBYTES Customer Support Phone’ Number MALWAREBYTES is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including Customer support. If yo ...
  continue reading
 
MALWAREBYTES Helpline phone Number, 44808‒178‒2987 MALWAREBYTES Helpline phone number helpline phone Number, toll free Number, Customer care Number, Helpline Number, Helpdesk Number, Helpline phone Number, Helpline Number, Login Issue, Helpline phone Number l MALWAREBYTES Helpline phone Number, 44808‒178‒2987 MALWAREBYTES Helpline phone number helpline Number, toll free Number, Customer care Number, Helpline Number, Helpdesk Number, Helpline phone Number, Helpline phone Number, Login Issue, ...
  continue reading
 
MALWAREBYTESCustomer support phone Number, (800)-747-2725 MALWAREBYTESCustomer support phone number helpline phone Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Customer support phone Number, Customer support Number, Login Issue, Customer support phone Number l MALWAREBYTESCustomer support phone Number, (800)-747-2725 MALWAREBYTESCustomer support phone number helpline Number, toll free Number, Customer care Number, Customer support Number, Helpdesk ...
  continue reading
 
MALWAREBYTES Support phone Number, 1866‒688‒9269 MALWAREBYTES Technical Support phone number helpline phone Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Technical Support phone Number, Tech Support Number, Login Issue, Technical Support phone Number l MALWAREBYTES Support phone Number, 1866‒688‒9269 MALWAREBYTES Technical Support phone number helpline Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Tec ...
  continue reading
 
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Technical Support phone number helpline phone Number, toll free Number, technical care Number, technical support Number, Helpdesk Number, Technical Support phone Number, Technical Support Number, Login Issue, Technical Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Technical Support phone number helpline Number, toll free Number, technical care Number, technical support Number, Helpdesk Numb ...
  continue reading
 
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Customer Support phone number helpline phone Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Customer Support phone Number, Customer Support Number, Login Issue, Customer Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Customer Support phone number helpline Number, toll free Number, Customer care Number, Customer support Number, Helpdesk Number, Custo ...
  continue reading
 
MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Cox email Support phone number helpline phone Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Number, Cox email Support phone Number, Customer Support Number, Login Issue, Cox email Support phone Number l MALWAREBYTES Support phone Number, 44808‒178‒2987 MALWAREBYTES Cox email Support phone number helpline Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Numbe ...
  continue reading
 
MÁLWAREBYTES Support phone Number, 44808‒178‒2987 MÁLWAREBYTES Cox email Support phone number helpline phone Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Number, Cox email Support phone Number, Customer Support Number, Login Issue, Cox email Support phone Number l MÁLWAREBYTES Support phone Number, 44808‒178‒2987 MÁLWAREBYTES Cox email Support phone number helpline Number, toll free Number, Cox email care Number, Cox email support Number, Helpdesk Numbe ...
  continue reading
 
MALWAREBYTES Tech support phone Number, 44808‒178‒2987 MALWAREBYTES Tech support phone number helpline phone Number, toll free Number, Customer care Number, Tech support Number, Helpdesk Number, Tech support phone Number, Tech support Number, Login Issue, Tech support phone Number l MALWAREBYTES Tech support phone Number, 44808‒178‒2987 MALWAREBYTES Tech support phone number helpline Number, toll free Number, Customer care Number, Tech support Number, Helpdesk Number, Tech support phone Numb ...
  continue reading
 
Artwork
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Artwork

1
KnowTechTalk

Barb Paluszkiewicz

Unsubscribe
Unsubscribe
Monthly
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
  continue reading
 
Loading …
show series
 
More than 20 years ago, a law that the United States would eventually use to justify the warrantless collection of Americans’ phone call records actually started out as a warning sign against an entirely different target: Libraries. Not two months after terrorists attacked the United States on September 11, 2001, Congress responded with the passage…
  continue reading
 
🎶 Ready to know what Malwarebytes knows? Ask us your questions and get some answers. What is a passphrase and what makes it—what’s the word? Strong? 🎶 Every day, countless readers, listeners, posters, and users ask us questions about some of the most commonly cited topics and terminology in cybersecurity. What are passkeys? Is it safer to use a web…
  continue reading
 
This is a story about how the FBI got everything it wanted. For decades, law enforcement and intelligence agencies across the world have lamented the availability of modern technology that allows suspected criminals to hide their communications from legal scrutiny. This long-standing debate has sometimes spilled into the public view, as it did in 2…
  continue reading
 
The irrigation of the internet is coming. For decades, we’ve accessed the internet much like how we, so long ago, accessed water—by traveling to it. We connected (quite literally), we logged on, and we zipped to addresses and sites to read, learn, shop, and scroll. Over the years, the internet was accessible from increasingly more devices, like sma…
  continue reading
 
You’ve likely felt it: The dull pull downwards of a smartphone scroll. The “five more minutes” just before bed. The sleep still there after waking. The edges of your calm slowly fraying. After more than a decade of our most recent technological experiment, in turns out that having the entirety of the internet in the palm of your hands could be … no…
  continue reading
 
A ransomware attack occurs every 14 seconds. Cyber attacks occur once every 39 seconds. The average ransomware attack costs a company $170,000! Does your business need cyber insurance? Is cyber insurance really worth the investment? What is a cyber warranty? Barb speaks with Nick Wolf, part of Cork’s Leadership Team about Cyber Warranties. 0:00 – B…
  continue reading
 
Our Lock and Code host, David Ruiz, has a bit of an apology to make: “Sorry for all the depressing episodes.” When the Lock and Code podcast explored online harassment and abuse this year, our guest provided several guidelines and tips for individuals to lock down their accounts and remove their sensitive information from the internet, but larger p…
  continue reading
 
A digital form of protest could become the go-to response for the world’s largest porn website as it faces increased regulations: Not letting people access the site. In March, PornHub blocked access to visitors connecting to its website from Texas. It marked the second time in the past 12 months that the porn giant shut off its website to protest n…
  continue reading
 
Few words apply as broadly to the public—yet mean as little—as “home network security.” For many, a “home network” is an amorphous thing. It exists somewhere between a router, a modem, an outlet, and whatever cable it is that plugs into the wall. But the idea of a “home network” doesn’t need to intimidate, and securing that home network could be si…
  continue reading
 
A disappointing meal at a restaurant. An ugly breakup between two partners. A popular TV show that kills off a beloved, main character. In a perfect world, these are irritations and moments of vulnerability. But online today, these same events can sometimes be the catalyst for hate. That disappointing meal can produce a frighteningly invasive Yelp …
  continue reading
 
For decades, fake IDs had roughly three purposes: Buying booze before legally allowed, getting into age-restricted clubs, and, we can only assume, completing nation-state spycraft for embedded informants and double agents. In 2024, that’s changed, as the uses for fake IDs have become enmeshed with the internet. Want to sign up for a cryptocurrency …
  continue reading
 
If your IT and security teams think malware is bad, wait until they learn about everything else. In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialists create strictly financial alliances to plant malware on unsuspecting employees, steal corporate credentials, slip into business networks, and, for a…
  continue reading
 
AI – It's everywhere nowadays, reshaping our reality in ways we’ve only begun to explore. Barb goes in depth with Jimmy Hatzell – the intrepid co-founder and CEO of Hatz AI – exploring his vision and expertise to see how AI can empower, enhance and encourage transformation for MSPs and their clients. 0:00 – Barb's Introduction 0:46 – Who is Jimmy H…
  continue reading
 
If the internet helped create the era of mass surveillance, then artificial intelligence will bring about an era of mass spying. That’s the latest prediction from noted cryptographer and computer security professional Bruce Schneier, who, in December, shared a vision of the near future where artificial intelligence—AI—will be able to comb through r…
  continue reading
 
On Thursday, December 28, at 8:30 pm in the Utah town of Riverdale, the city police began investigating what they believed was a kidnapping. 17-year-old foreign exchange student Kai Zhuang was missing, and according to Riverdale Police Chief Casey Warren, Zhuang was believed to be “forcefully taken” from his home, and “being held against his will.”…
  continue reading
 
Hackers want to know everything about you: Your credit card number, your ID and passport info, and now, your DNA. On October 1 2023, on a hacking website called BreachForums, a group of cybercriminals claimed that they had stolen—and would soon sell—individual profiles for users of the genetic testing company 23andMe. 23andMe offers direct-to-consu…
  continue reading
 
It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper Zero. “Talk” across low-frequency radio to surreptitiously change TV channels, emulate garage door openers, or even pop open your friend’s Tesla charging port without their knowing! “Squawk” with the Flipper Zero’s mascot and user-i…
  continue reading
 
Like the grade-school dweeb who reminds their teacher to assign tonight’s homework, or the power-tripping homeowner who threatens every neighbor with an HOA citation, the ransomware group ALPHV can now add itself to a shameful roster of pathetic, little tattle-tales. In November, the ransomware gang ALPHV, which also goes by the name Black Cat, not…
  continue reading
 
Our guest, Michael Contento, is a seasoned expert who has journeyed through the whole life cycle of an MSP. We hear about Michael's story and gain invaluable insights on the MSP landscape in Canada, the dynamics of mergers, what to look for in an acquisition, and the hurdles owner-operated MSPs face. Whether you're a budding MSP looking to scale or…
  continue reading
 
A worrying trend is cropping up amongst Americans, particularly within Generation Z—they're spying on each other more. Whether reading someone's DMs, rifling through a partner's text messages, or even rummaging through the bags and belongings of someone else, Americans enjoy keeping tabs on one another, especially when they're in a relationship. Ac…
  continue reading
 
In September, the Las Vegas casino and hotel operator MGM Resorts became a trending topic on social media... but for all the wrong reasons. A TikTok user posted a video taken from inside the casino floor of the MGM Grand—the company's flagship hotel complex near the southern end of the Las Vegas strip—that didn't involve the whirring of slot machin…
  continue reading
 
What are you most worried about online? And what are you doing to stay safe? Depending on who you are, those could be very different answers, but for teenagers and members of Generation Z, the internet isn't so scary because of traditional threats like malware and viruses. Instead, the internet is scary because of what it can expose. To Gen Z, a fe…
  continue reading
 
When you think of the modern tools that most invade your privacy, what do you picture? There's the obvious answers, like social media platforms including Facebook and Instagram. There's email and "everything" platforms like Google that can track your locations, your contacts, and, of course, your search history. There's even the modern web itself, …
  continue reading
 
In 2022, Malwarebytes investigated the blurry, shifting idea of “identity” on the internet, and how online identities are not only shaped by the people behind them, but also inherited by the internet’s youngest users, children. Children have always inherited some of their identities from their parents—consider that two of the largest indicators for…
  continue reading
 
Small businesses require a simple plan to protect themselves from cyber crime. Cyber attacks are unexpected, and these attacks seem to be on the increase. The good news is the majority of cyber crimes can be prevented, and a network assessment performed by an MSP is pivotal to improving security within an organization. Matthew K. Koenig from Nodewa…
  continue reading
 
Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she has "such a beautiful name." Once, Ricky Gervais simply needed her photos ("I want you to take a snap of yourself and then send it to me on here...Send it to me on here!" he messaged on Twitter), and even Tom Cruise slipped into her DMs (thoug…
  continue reading
 
"Freedom" is a big word, and for many parents today, it's a word that includes location tracking. Across America, parents are snapping up Apple AirTags, the inexpensive location tracking devices that can help owners find lost luggage, misplaced keys, and—increasingly so—roving toddlers setting out on mini-adventures. The parental fear right now, ac…
  continue reading
 
Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being detected. Sounds unique, right? Frustratingly, it isn't, as the specific security loophole that was abused by the hackers has been around for years, and Mi…
  continue reading
 
Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digit…
  continue reading
 
The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be it email addresses, credit card numbers, or even medical records. There are the users—unsuspecting, everyday people who, through no fault of their own, mistakenly put their trust into a company, platform, or service to keep their informat…
  continue reading
 
In the United States, when the police want to conduct a search on a suspected criminal, they must first obtain a search warrant. It is one of the foundational rights given to US persons under the Constitution, and a concept that has helped create the very idea of a right to privacy at home and online. But sometimes, individualized warrants are neve…
  continue reading
 
When you think about the word "cyberthreat," what first comes to mind? Is it ransomware? Is it spyware? Maybe it's any collection of the infamous viruses, worms, Trojans, and botnets that have crippled countless companies throughout modern history. In the future, though, what many businesses might first think of is something new: Disinformation. Ba…
  continue reading
 
In this grand symphony of small business IT, every instrument, every section plays its part. But as we know, in any great performance, a single note change can influence the whole piece. This raises a crucial question: How does a business keep track of all the subtle changes in each section? Shawn Sailer from Liongard joins Barb to explain how tool…
  continue reading
 
In May, a lawyer who was defending their client in a lawsuit against Columbia's biggest airline, Avianca, submitted a legal filing before a court in Manhattan, New York, that listed several previous cases as support for their main argument to continue the lawsuit. But when the court reviewed the lawyer's citations, it found something curious: Sever…
  continue reading
 
The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has access to your network, the more time they’ve had to embed themselves into your systems. Communicating with everyone involved can help limit the duration between attack and clean-up. Establish a program…
  continue reading
 
On January 1, 2023, the Internet in Louisiana looked a little different than the Internet in Texas, Mississippi, and Arkansas—its next-door state neighbors. And on May 1, the Internet in Utah looked quite different, depending on where you looked, than the Internet in Arizona, or Idaho, or Nevada, or California or Oregon or Washington or, really, mu…
  continue reading
 
Ransomware is becoming bespoke, and that could mean trouble for businesses and law enforcement investigators. It wasn't always like this. For a few years now, ransomware operators have congregated around a relatively new model of crime called "Ransomware-as-a-Service." In the Ransomware-as-a-Service model, or RaaS model, ransomware itself is not de…
  continue reading
 
In January, a mental health nonprofit admitted that it had used Artificial Intelligence to help talk to people in distress. Prompted first by a user's longing for personal improvement—and the difficulties involved in that journey—the AI tool generated a reply, which, with human intervention, could be sent verbatim in a chat box, or edited and fine-…
  continue reading
 
In today's fast-paced business environment, technology has become an integral part of almost every aspect of operations. From communications, marketing to supply chain management and Cyber Security, ALL businesses rely heavily on technology. Journalists behind industry publications, conferences, social media and research reports provide a deep unde…
  continue reading
 
The list of people and organizations that are hungry for your location data—collected so routinely and packaged so conveniently that it can easily reveal where you live, where you work, where you shop, pray, eat, and relax—includes many of the usual suspects. Advertisers, obviously, want to send targeted ads to you and they believe those ads have a…
  continue reading
 
Consider this: 99% of the world doesn’t speak geek, nor do they understand cybersecurity and how to protect their digital assets. For the 1% of people who are familiar with terms like Privilege Escalation, Lateral movement and Seim, you might want to continue listening to understand how to communicate effectively to the rest of the world. Joining B…
  continue reading
 
How many passwords do you have? If you're at all like our Lock and Code host David Ruiz, that number hovers around 200. But the important follow up question is: How many of those passwords can you actually remember on your own? Prior studies suggest a number that sounds nearly embarrassing—probably around six. After decades of requiring it, it turn…
  continue reading
 
CIS Control 16 - Application Software Security The way in which we interact with applications has changed dramatically over years. Organizations use applications in day-to-day operations to manage their most sensitive data and control access to system resources. Instead of traversing a labyrinth of networks and systems, attackers today see an openi…
  continue reading
 
Loading …

Quick Reference Guide