Episode 162 - Google Is Recording Your Voice, How To Listen To And Delete IT
Release Date: 01/29/2018
Security In Five Podcast
Twitter made an announcement recently that they will be ending free access to their API. This epsiode talks about this move and the damage it may cause to many apps and services. Source - Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
Meta paid out a bug bounty for a vulnerability/design flaw in the multi-factor authentication process on Instagram/Facebook. This episode talks about what the bug was and why or how Meta missed this in their design. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
Staying knowledgeable and up to date on the ever-changing web security space is difficult. There are classes, courses, and certifications you can achieve but those are to lay the foundation but it's up to us to keep it going. I found a site that provides so much insight and tools for security it had to be a podcast episode. Source - Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
GoTo, the parent company of LastPass, announced they they too have suffered a breach. Unknown threat agents accessed and took encrypted backups and other materials of customers. This episode talks about the breach and what you should think about if you are a customer of them. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
Apple released iOS 16.3 and macOS 13.2 which included a new security feature for support of Security Keys. This episode talks about what this is, why it's a great security addition and how it works. Source - Apple Support Page - Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
In the past week there have been several stories of "breaches" that were caused by credential-stuffing attacks. This episode talks about what credential stuffing is and where the blame should be pointed. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
T-Mobile is back in the cybersecurity news and not for a good reason. Another breach has been announced to the tune of 37 million accounts. This episode talks about how it happened and the past breaches they have suffered since 2018. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
PayPal announced that some accounts were compromised through a crednetial stuffing attack. This episode talks about why this is not PayPal's fault and the blame needs to be put on the users. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
The term hacker is used and most people think of the bad guys. Did you know there are several different types of hackers? This episode talks about them and the differences between them. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineSecurity In Five Podcast
Norton LifeLock notified some customers that their accounts may have been accessed by an unauthorized thrid party. Norton was not hacked directly nor was it a failure of Norton that this happened. This episode talks about how the hackers accessed these accounts and where the blame should be directed. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Where you can find Security In Five - Email -
info_outlineWere you aware Google is recording your voice from your computers and mobile devices? They are. Did you know you can go into your account, listen to all the creepy recordings of you talking at random times but you can also delete and turn it off. This episode tells you how.
Google Activity Center - https://myactivity.google.com/myactivity
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Podcast Page - http://securityinfive.libsyn.com
Podcast RSS - http://securityinfive.libsyn.com/rss
Twitter @binaryblogger - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
Spotify - Security In Five Podcast Page
Email - [email protected]