show episodes
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

Unsubscribe
Unsubscribe
Monthly
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
  continue reading
 
Loading …
show series
 
Uber just had another data breach. Learn from their mistakes, and the mistakes of other larege corporations, to find out how to keep your data safe and secure, even if you store it in the cloud. Our guest is cybersecurity expert and CEO of Dig Security, Dan Benjamin.By Extra Something Media
  continue reading
 
Phishing attacks have evolved. Hackers have found new ways to use private messaging apps, personal email accounts, and personal smartphones to attack- not just you - but your employer. Keep your job, and get a FREE voucher for SlashNext, by listening to this episode.By Extra Something Media
  continue reading
 
What is the future of education, and how does cybersecurity impact Education differently? How can student data be used to help predict the future success of a student, and how can universities keep student information private in the world of sophisticated cyber-attacks? Our guest is Dr. Punya Mishra, Associate Dean of Scholarship & Innovation and P…
  continue reading
 
Finally, the beginning of a set of standards for the digital age that is as easy to use as “Common Sense Media.” The DQ Institute this week launched the DQ Global Standards Report 2019 which is the world’s first attempt to define a global standard for digital literacy, skills and readiness across the education and technology sectors. With Digital C…
  continue reading
 
Recently a letter signed by 50 psychologists was sent to the American Psychological Association (APA) accusing psychologists working at tech companies of using “hidden manipulation techniques” and asks the APA to take an ethical stand on behalf of kids. Is this malicious intent on the part of tech giants, or is it just a design that worked too well…
  continue reading
 
Can you imagine having to tell your customers that the product they bought from you is gone? Their account is gone? Their data is gone? Would your business survive? Exactly that happened to a a company called VFEmail this week. How can you make sure your small business - or your home - is doing the basics to prevent critical loss? Our guest is cybe…
  continue reading
 
In this episode, we tell you about the rise of a new kind of credit card skimmer that can steal your credit card number at the gas pump. But this is different in two ways: it is inside the pump so you cannot see it, and the stolen cards are retrieved via Bluetooth which is easier for the thief. This hack is spreading fast because the clock is ticki…
  continue reading
 
In this episode, we discuss the worldwide impact of blockchain from the perspective of a person who advises governments – George Goognin. George is a Board Member of the Mile Unity Foundation, which educates governments and enterprises on how to apply blockchain technologies. George is the co-founder of peer to peer loan system Karma, and he is vic…
  continue reading
 
Spear phishing. It's when a hacker crafts an email or social media post designed to get you to click a link or open an attachment. And it is the most prevalent threat to both business and personal computers today. According to the FBI, it is also the method that hackers used to create the infamous hack of the Democratic National Committee (DNC) dur…
  continue reading
 
This week on DIY Cyber Guy, my guest is cybersecurity and privacy expert Dr. Chris Pierson. We look at a recent Amazon Dot vulnerability that sent out 16-second recordings of conversations in people’s homes. Also, hackers figure out how to easily use an expired hotel room key to actually make a master key - we will tell you how to check to make sur…
  continue reading
 
Ransomware. It is the virus that actually makes money for the attacker. At first, it was randomly deployed, just like the nuisance viruses of the past, indiscriminately finding victims through phishing and spoofed websites. But the game is changing, as the Georgia cities of Atlanta and Savanna found out the hard way. Special Guest, Cybersecurity ex…
  continue reading
 
Companies that offer free services, like Facebook and Twitter, are for-profit companies. So where is the profit if the service is free? It could be in an 'upsell' product, like LinkedIn, which means that some useful features are not available in the free version of the product and require a subscription fee to access. Another common profit model is…
  continue reading
 
Loading …

Quick Reference Guide