We then get serious with a very worrisome flaw which very likely exists in the WAN interface of the routers that many of us probably own. This week we'll start off with a bit of fun over the most tweeted by far wacky tech news item. Finally, we're going to look at some recent goings on at the Ben-Gurion University of the Negev, which never fails to entertain. I have some welcome progress to report about my work on SpinRite, and some listener feedback. We have another big and widespread IoT update mess to share. We tell everyone about a new tracking-stripping and privacy-enforcing email forwarding service that's just come out of a yearlong beta from the DuckDuckGo people. We share pieces of a fascinating conversation with a Russian ransomware operator, gaining some insight into the way he conducts attacks and the way he views the world. ![]() We look at some recent saber-rattling by the U.S.'s FTC and FCC over the disclosure of presumably private location data. This week we begin by discussing the implications of last week's LastPass breach disclosure. And after all that, we look at the result of Symantec's recent research into their discovery of more than 1800 mobile apps which they found to be leaking critical AWS cloud credentials, primarily due to carelessness in the use of today's software supply chain. Then I have two bits of miscellany, three pieces of listener feedback, a fun SpinRite video discovery, and my discovery of a wonderful and blessedly prolific science fiction author. And we examine a recent anti-Quantum computing opinion from an Oxford university quantum physicist. A somewhat hidden autorun facility in PyPI's pip tool used for downloading and installing Python packages is being used to run malware. We look at Chrome's urgent update to close its 6th 0-day of 2022 and at a worrisome “feature” - I think it a bug! -in Chrome. We ask the question whether TikTok leaked more than 2 Billion of their user's records. This week we look at Google's just-announced and launched open source software vulnerability rewards program. Then we're going to examine EvilProxy, the conceptual cousin to Ransomware as a Service. I have another comment about my latest Sci-Fi author discovery and two quick bits of feedback from our listeners. There's another QNAP mess which is bad enough to exceed my already quite high QNAP mess threshold, and D-Link routers need to be sure they are running their very latest firmware. The While House conducted a “Listening Session” to dump on today's powerful tech platforms, and a government regulator in The Netherlands quit his position and tells us why. I also note that cryptoheists have become so pervasive that I'm not mentioning them much anymore. This week we look at an unusual and disturbing escalation of a cyberattack. ![]() For the other resources you can either LEFT-CLICK to open in your browser or RIGHT-CLICK to save the resource to your computer. Than the audio files since they are created afterwards.)įor best results: RIGHT-CLICK on one of the two audio icons & below then choose "Save Target As." to download the audio file to your computer before starting to listen. (Note that the text transcripts will appear a few hours later We use "local links" to count downloads, but all of the high-quality full-size MP3 files are being served by AOL Radio.Ī web page text transcript of the episode Leo also produces " This Week in Tech" (TWiT) and a number of other very popular podcasts (TWiT is America's most listened to podcast!) So if you are looking for more informed technology talk, be sure to check out Leo's other podcasts and mp3 files.Īnd a huge thanks to AOL Radio for hosting the high-quality MP3 files and providing the bandwidth to make this series possible. Send us your feedback: Use the form at the bottom of the page to share your opinions, thoughts, ideas, and suggestions for future episodes. See the section at the bottom of this page. Receive an automatic eMail reminder whenever a new episode is posted here (from ). To subscribe, use whichever service you prefer. You may download and listen to selected episodes from this page (see below), or subscribe to the ongoing series as an RSS "podcast" to have them automatically downloaded to you as they are produced. But as a work of extreme image manipulation, it came out surprisingly well.) It was created by a fan of the podcast using GIMP (similar to
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |