
The Silk Road Bitcoin Hack
Hacker And The Fed
Is There Still a Risk?
Hector: If you're using a phone that is compromised or a device that is compromised, all of those security features and tools become academic and best. This is why it's extremely important to make sure that your devices, your endpoints, your mobile phones are always updated. And then take the extra steps, like Hector said, knowing if your phone's been maliciously taken over. Use networks that you know are secure.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.