Logo
    Search

    Podcast Summary

    • Cyber war intensifies with AI, causing record data compromisesIn 2023, there were 3,205 data compromises, a 78% increase from the previous year, with ransomware attacks causing substantial damages, and companies unprepared for state-sponsored actors.

      The cyber war is no longer a cold war but a hot war, with AI playing a significant role in intensifying cyber threats. The number of data compromises has seen a significant increase, reaching an all-time high of 3,205 in 2023, a 78% increase from the previous year. This trend is alarming, with ransomware attacks becoming increasingly vicious, resulting in substantial damages for companies. The UnitedHealthcare ransomware attack, which caused almost $1 billion in damages, is a prime example of the gravity of the situation. The fact that UnitedHealthcare executives appeared before Congress and downplayed the severity of the attack, despite not even having 2-factor authentication, highlights the unpreparedness of many companies for the escalating cyber war, particularly against state-sponsored actors.

    • State-sponsored hackers and individual criminal hackers pose significant cybersecurity threatsBoth state actors and individual hackers use advanced technologies like AI to create sophisticated attacks, making it essential for individuals and organizations to stay vigilant and prioritize cybersecurity.

      The cybersecurity landscape is becoming increasingly complex and dangerous, with both state-sponsored hacking groups and individual criminal hackers posing significant threats. These groups are using advanced technologies like AI to create sophisticated attacks, making it difficult for even well-funded organizations to keep up. On one hand, we have state actors like Russia's CozyBear and AlphaV, who are using hacking and ransomware to raise funds for their governments. On the other hand, we have individual hackers, like Hans Gruber, who are simply in it for the money and the thrill. The use of AI in cybersecurity is a double-edged sword – while it can help detect threats and prevent breaches, it can also be used by hackers to create convincing phishing attacks and train their hackers more efficiently. Furthermore, the human element remains a significant vulnerability, as we are often the weakest link in the security chain. The increasing sophistication of these attacks, coupled with the ease with which hackers can collect personal data to build profiles, makes it essential for individuals and organizations to stay vigilant and prioritize cybersecurity.

    • The Cyber War's Hot and Cold AspectsThe cyber war includes both hot (hacking) and cold (disinformation campaigns, identity theft) aspects, and recent state-sponsored hacking groups demonstrate the severity of these threats, requiring agile software development and individual awareness to stay protected.

      The cyber war is becoming increasingly hot as states fund hacking activities and the use of biometric authentication systems, like passkeys, becomes more prevalent. Passkeys eliminate the need for passwords and add an extra layer of security, making it difficult for unauthorized users to gain access. However, the cyber war also includes the cold aspect, such as disinformation campaigns and identity theft, which can lead to collateral damage for individuals. The rapid development of AI and the increasing number of threats require a shift towards agile software development in the US military to keep up. The cyber war's impact goes beyond nations and affects individuals, and it's important to recognize the severity of both the cold and hot aspects of this ongoing conflict. Recent examples of state-sponsored hacking groups, like CozyBear and Storm 558, show how these groups can use tiny breaches to gain access to systems and infrastructure, potentially leading to significant damage.

    • Cyber Threats to Critical InfrastructureNeglected infrastructure upgrades and resistance to investments in security create vulnerabilities for critical infrastructure, leading to potential devastating consequences from cyber attacks like ransomware, DDoS, spoofing, and phishing. State-sponsored attacks pose an additional risk.

      The increasing sophistication of cyber attacks, particularly against critical infrastructure like energy sectors, power grids, and healthcare systems, poses a significant threat with potentially devastating consequences. Old, unpatched equipment and resistance to upgrades due to financial priorities contribute to these vulnerabilities. Ransomware attacks, distributed denial of service attacks, spoofing, and phishing are common types of cyber attacks. For instance, in the case of the MGM hack, attackers called the help desk and used real names to gain access. State-sponsored attacks are another major concern due to the potential for collateral damage. The ongoing focus on AI and technology investments, coupled with neglected infrastructure upgrades, creates a classic infrastructure problem. It's essential to invest in securing our critical infrastructure to mitigate these risks.

    • Phishing attacks can lead to serious consequencesPhishing attacks can result in loss of access to critical systems and data, financial damage through ransomware, and control of other accounts

      Phishing attacks can lead to serious consequences, including the loss of access to critical systems and data, as well as financial damage through ransomware attacks. The Okta breach discussed is a prime example, where a hacker impersonated a VP and tricked an employee into resetting their 2FA, gaining access to the company's Okta account and ultimately taking control of many other accounts. In contrast, a distributed denial of service (DDoS) attack involves taking over a large number of computers to flood a targeted website with traffic, making it unavailable to users. Microsoft, which has a significant number of older, vulnerable systems in use, has acknowledged the importance of security and has made efforts to address these threats.

    • Microsoft should focus on improving core infrastructure security for their public cloud offeringsMicrosoft needs to demonstrate a genuine commitment to security by enhancing infrastructure security for Azure and other public cloud services, while Apple has taken a proactive approach by issuing warnings to users about potential cyber threats.

      While Microsoft's CEO, Satya Nadella, recently prioritized security above all else, the industry and public perception is that Microsoft, as a leading cloud provider, has neglected security in the past. To demonstrate a genuine commitment to security, Microsoft should focus on improving core infrastructure security, especially for their public cloud offerings like Azure. An alternative approach could be for Microsoft to invest in upgrading outdated Windows XP systems worldwide, particularly in healthcare systems in emerging economies, to prevent potential security vulnerabilities. Apple, on the other hand, has taken a proactive approach to security, issuing warnings to users about potential cyber threats. While some may view Apple's warnings as premature or too late, the company's history of being an early victim of cyber attacks has driven them to prioritize security. Overall, it's crucial for tech companies to prioritize security and take tangible steps to address vulnerabilities to regain the trust of their customers.

    • Apple warns of targeted iPhone attacks, highlighting evolving cybersecurity threatsStay informed and take proactive measures to protect against targeted and persistent cyber attacks. Solutions like edge security and zero trust can help mitigate damage.

      As cybersecurity threats continue to evolve and become more sophisticated, individuals and companies need to be more vigilant than ever before. Apple's recent warning about targeted attacks on specific iPhones is a reminder that cybercriminals are becoming more targeted and persistent in their efforts to gain access to sensitive information. Companies like CrowdStrike and Zscaler, which provide edge security and zero trust solutions respectively, are becoming increasingly important in the cyberwar era as they help protect devices and networks from these threats. The AT&T data breach serves as a cautionary tale, highlighting the importance of knowing the source of an attack and taking swift action to mitigate the damage. As the cybersecurity landscape continues to evolve, it's crucial for individuals and companies to stay informed and take proactive measures to protect themselves.

    • Zero Trust Security and AI are Essential in Today's Cloud EraZero Trust Security validates user identity at every step, CrowdStrike and Zscaler offer complementary solutions, AI plays a crucial role in cybersecurity, Accenture helps implement security measures post-breaches, Datadog excels in network monitoring and AI-driven security

      With the increasing shift of companies' infrastructure to the public cloud, traditional security measures like firewalls are no longer sufficient. Zero trust security, which involves validating a user's identity at every step of the way, has become essential. CrowdStrike and Zscaler are two companies that offer complementary solutions in this regard, with CrowdStrike acting as the bouncer outside the bar and Zscaler as the bartender checking IDs inside. Another area of growing importance is cybersecurity cleanup and response in the aftermath of data breaches or disasters. Companies like Accenture could potentially fill the role of Winston Wolf from Pulp Fiction, helping organizations implement multi-factor authentication and other security measures to minimize damage. Moreover, as cybersecurity threats become increasingly sophisticated, the use of AI in cybersecurity is becoming more prevalent. Every SaaS provider is adding AI to their products, and tools that can observe network activity and take action based on that data will be crucial in the era of cyber warfare. Datadog, which already offers network monitoring and security products, is a prime example of a company that could excel in this area.

    • Balancing modern tools and infrastructure upgrades for cyber war protectionInvest 25% in employee education, 25% in infrastructure upgrades, and 50% in modern cybersecurity tools. Prioritize password security and be cautious of suspicious emails and calls.

      Investing in both modern cybersecurity tools and old infrastructure upgrades is crucial for effective cyber war protection. While advanced tools like CrowdStrike and Zscaler are essential for monitoring and securing new systems, neglecting outdated equipment can leave vulnerabilities unaddressed. Therefore, 25% of the investment should be allocated towards employee education, 25% towards urgent infrastructure upgrades, and the remaining 50% towards modern cybersecurity solutions. Additionally, using a password manager is a personal recommendation for protecting oneself against cyber attacks. Remember, default to no when encountering suspicious emails or phone calls.

    • Stay cautious and skeptical during unsolicited callsBe wary of unsolicited calls, especially those with AI-generated voices. Default to a 'no' response and establish a family password for calls involving loved ones to add an extra layer of security.

      Being cautious and skeptical when receiving unsolicited calls, especially those with AI-generated voices, is crucial in protecting yourself from phishing attempts. Defaulting to a "no" response can help filter out potential scams, but having a family password for verifying the authenticity of calls involving loved ones can add an extra layer of security. Remember, don't answer or engage with suspicious calls, and be cautious even if the caller seems legitimate. Stay informed by tuning in to "This Week in Tech" on Motley Fool Live every Friday from 10 AM to 11 AM EST, or catch the replay on the Motley Fool replay hub. Becoming a Motley Fool member gives you access to this and other valuable resources. As always, do not make investment decisions based solely on the information discussed on this program. I'm Mary Long, and I'll be back with you next Monday. Stay safe, fools.

    Recent Episodes from Motley Fool Money

    Paramount Has a Buyer

    Paramount Has a Buyer
    A couple of weeks ago, Skydance Media’s offer to buy Paramount looked like it was dead. Now, both companies have a joint press release announcing the deal. (00:21) Jason Moser and Ricky Mulvey discuss: - What Skydance Media is getting in the Paramount deal. - Why Netflix is winning the streaming wars. - Questions that investors should ask before putting money in a turnaround story. Then, (15:58) Alison Southwick and Brian Feroldi kick off their summer school series with a history class on markets. Companies discussed: PARA, NFLX, DIS, PYPL Learn more about the Range Rover Sport at www.landroverusa.com Host: Ricky Mulvey Guests: Jason Moser, Alison Southwick, Brian Feroldi Engineers: Dan Boyd, Desiree Jones David Ellison interview on “The Town”: https://podcasts.apple.com/us/podcast/skydances-david-ellison-on-his-plans-for-paramount/id1612131897?i=1000661591016 Brian Feroldi’s newsletter: https://longtermmindset.co/newsletter/ Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 09, 2024

    Americans are Flying, Airline Stocks are Not

    Americans are Flying, Airline Stocks are Not
    (00:21) Asit Sharma and Dylan Lewis discuss: - How the airline industry’s focus on capacity and being able to supply more flights means fares are low, even in the face of record demand. - Eli Lilly’s $3.2B acquisition of Morphic, why it’s interested in the inflammatory bowel disease markets, and a few risks to keep in mind for the high-flying provider of weight-loss drugs. (14:39) Fool analyst Kirsten Guerra talks with Mary Long about her investing journey, and a career pivot that took her from rocks to stocks. Companies discussed: DAL, UAL, AAL, JBLU, LUV, LLY, MORF Host: Dylan Lewis Guests: Asit Sharma, Kirsten Guerra, Mary Long Producer: Ricky Mulvey Engineers: Dan Boyd Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 08, 2024

    Axios CEO on Media’s Existential Crisis, Entrepreneurship, and Luck

    Axios CEO on Media’s Existential Crisis, Entrepreneurship, and Luck
    What happens to a publisher when an AI personal assistant can just give you the news? Jim VandeHei is the CEO of Axios, the co-founder of Politico and the author of Just the Good Stuff. Mary Long caught up with VandeHei for a conversation about: The “aha” moment that created Politico. How AI changes our relationship with information. Practicing good times paranoia and bad times optimism. The case for teaching kids how to play poker. Companies mentioned: ABNB, JPM Host: Mary Long Guest: Jim VandeHei Producer: Ricky Mulvey  Engineers: Desiree Jones, Austin Morgan Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 07, 2024

    How US Presidents Manage Money

    How US Presidents Manage Money
    Reagan knew how to budget. Jefferson knew how to party. Megan Gorman is the author of the upcoming book, “All the Presidents' Money: How the Men Who Governed America Governed Their Money.” Gorman is also the founding partner of Chequers Financial Management Robert Brokamp caught up with Gorman for a conversation about: - What FDR, a “bit of a trust fund kid,” did if he needed money. - How Ronald Reagan’s humble beginnings impacted his finances. - Why a Great Depression president was a great investor. Host: Robert Brokamp  Guest: Megan Gorman Producer: Ricky Mulvey Engineer: Tim Sparks Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 06, 2024

    2024: Top-Heavy, AI-Fueled, Supply-Constrained

    2024: Top-Heavy, AI-Fueled, Supply-Constrained
    It’s our mid-year review show! We talk through the market’s strong start in 2024, how it’s being driven by the big names, and where the deals might be. (00:21) Jason Moser and Matt Argersinger discuss: - Why the market is up, but top-heavy in 2024, and the types of stocks currently trading at a discount to big tech. - Four defining themes of the year so far: AI, interest rates, next-gen tech, and the pivot to value for consumers.  - The state of real estate, and why low supply means prices may stay high in residential for a long time, even in spite of high rates. (19:11) Matt and Jason break down two stocks on their radar: ABM Industries and Rubrik. Stocks discussed: NVDA, MSFT, AAPL, ABM, RBRK Host: Dylan Lewis Guests: Jason Moser, Matt Argersinger Engineers: Dan Boyd Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 05, 2024

    What’s Upflation?

    What’s Upflation?
    I don’t know, what’s up with you? Jason Moser and Mary Long discuss Tesla’s delivery numbers, how personal care companies are dealing with declining sales, and a mattress merger that might not come to be. Read the Bloomberg article mentioned here. Companies discussed: TSLA, TPX Host: Mary Long Guest: Jason Moser Producer: Ricky Mulvey Engineer: Dan Boyd Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 03, 2024

    Chewy’s New Kitten

    Chewy’s New Kitten
    This investor is not a cat, though. Asit Sharma and Ricky Mulvey discuss Chewy becoming a meme stock, Cedar Fair and Six Flags merging into one company, and headlines from 2029. Companies discussed: CHWY, SIX, FUN, AMZN, WMT Host: Ricky Mulvey Guest: Asit Sharma Producer: Mary Long Engineer: Tim Sparks Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 02, 2024

    Canada's Market: Apathy Means Opportunity

    Canada's Market: Apathy Means Opportunity
    It’s Canada Day! We celebrate our neighbor to the north with a mid-year check on the state of Canada’s stock market.  (00:21) Jim Gillies and Dylan Lewis discuss: - How the TSX stacks up to the S&P 500 so far in 2024. - Why investor apathy in Canada is creating some low valuations and great buying opportunities. - Two Canadian stocks to watch: MTY Brands and Kit’s Eyewear Companies discussed: BMO, BNS, RY, ENB, SHOP, MTY, KITS Host: Dylan Lewis Guests: Jim Gillies Producer: Ricky Mulvey Engineers: Dan Boyd Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJuly 01, 2024

    The Global Cold Rush

    The Global Cold Rush
    Nicola Twilley is the author of “Frostbite: How Refrigeration Changed Our Food, Our Planet, and Ourselves” and the co-host of Gastropod. Ricky Mulvey caught up with Twilley for a conversation about: - The cold chain and our economy. - Finding investment opportunities inside of refrigerators. - And one reason why Unilever gave up on ice cream. - A new technology changing how we eat fruits and vegetables. Companies mentioned: COLD, WMT, UL, YUMC Host: Ricky Mulvey Guest: Nicola Twilley Producer: Mary Long Engineers: Desiree Jones, Chace Pryzlepa Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJune 30, 2024

    The Two Most Important Questions in Investing

    The Two Most Important Questions in Investing
    What is it worth? Why?  Ricky Mulvey caught up with Motley Fool Canada’s Jim Gillies for a conversation about how retail investors can value stocks and why they have an advantage over institutional traders. They discuss: - The difference between price and value. - What financial metrics can and can’t tell investors. - The valuation case for a sporting goods retailer. Companies mentioned: AAPL, OTC: WIPKF, MEDP, ASO, DKS, ADDYY, SFM Host: Ricky Mulvey Guest: Jim Gillies Engineer: Tim Sparks  Learn more about your ad choices. Visit megaphone.fm/adchoices
    Motley Fool Money
    enJune 29, 2024

    Related Episodes

    Who is Hacking the U.S. Economy?

    Who is Hacking the U.S. Economy?

    In the past few weeks, some of the biggest industries in the U.S. have been held up by cyberattacks.

    The first big infiltration was at Colonial Pipeline, a major conduit of gas, jet fuel and diesel to the East Coast. Then, J.B.S., one of the world’s largest beef suppliers, was hit.

    The so-called ransomware attacks have long been a worry. But who are the hackers and how can they be stopped?

    Guest: Nicole Perlroth, a reporter covering cybersecurity and digital espionage for The New York Times. 

    Sign up here to get The Daily in your inbox each morning. And for an exclusive look at how the biggest stories on our show come together, subscribe to our newsletter

    The Daily is doing a live online event: We follow up with students and faculty from our series Odessa. And we hear from the team who made the documentary. Times subscribers can join us June 10.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday. 

    The Cyberattack That’s Roiling Healthcare

    The Cyberattack That’s Roiling Healthcare
    Hospitals, pharmacies and medical groups have been reeling in the wake of last month’s ransomware attack on a company widely used for insurance billing and payments. WSJ's James Rundle unpacks how the cyberattack on Change Healthcare has left thousands of providers scrambling to pay their bills and some wondering if they can keep their doors open. Further Reading: - Change Healthcare Rival Onboards Hundreds of Thousands of Customers During Hack Crisis  - U.S. Health Department Intervenes in Change Healthcare Hack Crisis  - UnitedHealth Aims to Restore Change Healthcare Systems Within Two Weeks  Further Listening: - The Ruthless Group Behind Ransomware Attacks on Hospitals  - Ransomware, a Pipeline and a Gas Shortage  - Why Crypto is Key to Stopping Ransomware  Learn more about your ad choices. Visit megaphone.fm/adchoices

    Netflix Black Mirror Becoming Reality?

    Netflix Black Mirror Becoming Reality?

    In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix's Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.

    As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools to navigate the complex web of cyber threats. Tune in, buckle up, and let's embark on a journey to secure the future of your digital existence.

    Support the show

    Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

    MacVoices #23247: MacVoices Live! - Waze Camera Security; Vegas Casino Hacks (2)

    MacVoices #23247: MacVoices Live! - Waze Camera Security; Vegas Casino Hacks (2)

    Chuck Joiner, David GinsburgEric BoldenBrian Flanigan-ArthursBen RoethigJim ReaWeb Bixby, and Jeff Gamet continue a discussion of the controversy surrounding the USB-C charging case for AirPods Pro. Then the group reveals who and who doesn’t screen protectors for iPhones. Questions over the selection of Wyze security cameras, security issues surrounding Eufy cameras and video doorbells are asked and answered. This session concludes with a look at the ransomware attacks on Caesars and MGM and the importance of prioritizing cybersecurity, and how our data is being used. (Part 2) 

    MacVoices Featured Gear

    Today’s MacVoices is supported by MacVoices Featured Gear. Get more done with your tech, like the Elgato Stream Deck. Providing 6, 15, or 32 programmable, customizable keys to trigger pretty much anything that can be done on your Mac, the Stream Deck can save you hours of productivity time. Get the details and link at MacVoices.com/FeaturedGear.

    Show Notes:

    Chapters:

    0:00:38 Discussion on USB-C charging case for AirPods Pro
    0:02:09 Charging capabilities of the USB-C case for Apple Watch and other devices
    0:03:14 Controversy over USB-C Charging
    0:05:23 Exploring the Standby Mode and Qi Chargers
    0:08:10 Using an HDMI to USB-C capture dongle for iPad
    0:09:42 The Importance of Screen Protectors
    0:10:51 Concerns about Apple's Glass Technology
    0:12:14 Wirecutter pulls recommendation for Wise security cameras
    0:13:33 Jeff shares concerns about Wise and Eufy security cameras
    0:15:12 Discussion on switching to HomeKit compatible cameras for security
    0:16:50 The Importance of HomeKit Secure Video
    0:18:56 Privacy Concerns on Public Streets
    0:22:38 The Compromise of Home Safety
    0:24:23 Ransomware Attacks on Caesars and MGM
    0:26:39 Social Engineering and Human Element in Security Systems
    0:28:25 Lack of Investment in IT Security by Casino Companies

    Links:

    Why We’re Pulling Our Recommendation of Wyze Security Cameras 
    https://www.nytimes.com/wirecutter/blog/wyze-security-breach/

    Guests:

    Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn.

    Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitterby email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, and on his blog, Trending At Work.

    Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud.

    Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer’s Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet.

    David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud

    Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He’s been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon.

    Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on  Twitter and Mastodon.

     

    Support:

         Become a MacVoices Patron on Patreon
         http://patreon.com/macvoices

         Enjoy this episode? Make a one-time donation with PayPal

    Connect:

         Web:
         http://macvoices.com

         Twitter:
         http://www.twitter.com/chuckjoiner
         http://www.twitter.com/macvoices

         Mastodon:
         https://mastodon.cloud/@chuckjoiner

         Facebook:
         http://www.facebook.com/chuck.joiner

         MacVoices Page on Facebook:
         http://www.facebook.com/macvoices/

         MacVoices Group on Facebook:
         http://www.facebook.com/groups/macvoice

         LinkedIn:
         https://www.linkedin.com/in/chuckjoiner/

         Instagram:
         https://www.instagram.com/chuckjoiner/

    Subscribe:

         Audio in iTunes
         Video in iTunes

         Subscribe manually via iTunes or any podcatcher:

         Audio: http://www.macvoices.com/rss/macvoicesrss
         Video: http://www.macvoices.com/rss/macvoicesvideorss

    Support:

         Become a MacVoices Patron on Patreon
         http://patreon.com/macvoices

         Enjoy this episode? Make a one-time donation with PayPal

    Connect:

         Web:
         http://macvoices.com

         Twitter:
         http://www.twitter.com/chuckjoiner
         http://www.twitter.com/macvoices

         Mastodon:
         https://mastodon.cloud/@chuckjoiner

         Facebook:
         http://www.facebook.com/chuck.joiner

         MacVoices Page on Facebook:
         http://www.facebook.com/macvoices/

         MacVoices Group on Facebook:
         http://www.facebook.com/groups/macvoice

         LinkedIn:
         https://www.linkedin.com/in/chuckjoiner/

         Instagram:
         https://www.instagram.com/chuckjoiner/

    Subscribe:

         Audio in iTunes
         Video in iTunes

         Subscribe manually via iTunes or any podcatcher:

         Audio: http://www.macvoices.com/rss/macvoicesrss
         Video: http://www.macvoices.com/rss/macvoicesvideorss

    00:00:38 Discussion on USB-C charging case for AirPods Pro 00:02:08 Charging capabilities of the USB-C case for Apple Watch and other devices 00:03:13 Controversy over USB-C Charging 00:05:23 Exploring the Standby Mode and Qi Chargers 00:08:09 Using an HDMI to USB-C capture dongle for iPad 00:09:41 The Importance of Screen Protectors 00:10:51 Concerns about Apple's Glass Technology 00:12:14 Wirecutter pulls recommendation for Wise security cameras 00:13:33 Jeff shares concerns about Wise and Eufy security cameras 00:15:12 Discussion on switching to HomeKit compatible cameras for security 00:16:49 The Importance of HomeKit Secure Video 00:18:55 Privacy Concerns on Public Streets 00:22:38 The Compromise of Home Safety 00:24:22 Ransomware Attacks on Caesars and MGM 00:26:38 Social Engineering and Human Element in Security Systems 00:28:25 Lack of Investment in IT Security by Casino Companies

    126: REvil

    126: REvil
    REvil is the name of a ransomware service as well as a group of criminals inflicting ransomware onto the world. Hear how this ransomware shook the world. A special thanks to our guest Will, a CTI researcher with Equinix. Sponsors Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com. Support for this show comes from Arctic Wolf. Arctic Wolf is the industry leader in security operations solutions, delivering 24x7 monitoring, assessment, and response through our patented Concierge Security model. They work with your existing tools and become an extension of your existing IT team. Visit arcticwolf.com/darknet to learn more. Learn more about your ad choices. Visit podcastchoices.com/adchoices