
Credit ratings increasingly looking at cybersecurity
• https://www.washingtonpost.com,by David DiMolfettaGood morning! This is David, Tim's researcher for The Cybersecurity 202. I'm anchoring today's newsletter. (Yes, I am nervous).
ON AIR NOW
Click to Play
Good morning! This is David, Tim's researcher for The Cybersecurity 202. I'm anchoring today's newsletter. (Yes, I am nervous).
New people come to this channel and think that I will just depress you with facts about this world that you may not want to hear. But this channel is actually not about that. Yes, I state the facts surrounding our world and it can get people depresse
If you have bad password habits then the result will be a hack. You need good password management habits.
Of all days...
"The telephone is the greatest nuisance among conveniences, the greatest convenience among nuisances." ~ Robert Staughton Lynd
In my old Antivirus video, I explained that the best protection against malware is not an antivirus product but a procedure where you factory reset the computer and start fresh.
In this week's CYBER, Joseph Cox talks us through how he created a clone of his voice and used it to bypass his bank's security checks.
I get asked a lot of questions about phones and SIM cards, like what happens when you remove the SIM card.
I will explain the concept of how TLS encryption (SSL) which is the backbone of Internet security can be compromised and has been compromised. I will explain how TLS/HTTPS works and all the possible flaws in it since this whole infrastructure of encr
Those operating with a super secure threat model have considered using Phones using data only SIMs or Wifi only and then using VOIP solutions. But if you don't understand what you are actually doing then you could cancel out the benefits. We will dis
As usual some "experts" speak out about my video on Apple surveillance and say it is a simple matter in cybersecurity to see how the iPhone talks to Apple HQ so there can be no secrets.
In everyday life, you are exposed to situations were you are asked to send documents, documents with personally identifiable information (PII). And most of you don't think that someone can read that. We'll go through some basic examples, some that I
In everyday life, you are exposed to situations were you are asked to send documents, documents with personally identifiable information (PII). And most of you don't think that someone can read that. We'll go through some basic examples, some that I
This is a primer on how you can layer a hidden network over the public networks and operate only in a completely encrypted environment.
I've been trying to understand Apple's moves and motives and it just dawned on me that they have responded to the demands of the Intelligence community.
I've talked about Apple's actions related to crazy privacy invading Client Side Scanning in many past videos, but maybe we've forgotten.
If you understand how intelligence agencies work, you will see that these state organizations rely on a particular set of data called Meta Data. And because of the indirect nature of meta data, the typical normie is made to think this is not much of
Apple and Google do a lot of advertising telling you about how secure your phones are. But is this even relevant to Privacy? Let's discuss how features touted even by "experts" are useless nonsense.
I'll show you some typical advice you get on the Internet about privacy and you will find, if you really understand the subject, that the advice will not help you privacy at all.
The world's largest aircraft fleet was grounded for hours by a cascading outage in a government system that delayed or cancelled thousands of flights across the U.S. on Wednesday. The White House initially said that there was no evidence of a cyber