

Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day
Jul 27, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
Introduction
00:00 • 2min
Hacker in the Fed T-Shirt
01:40 • 2min
Hector's Week
03:19 • 2min
Insider Threat 2023
05:38 • 2min
The US Government Proposes a Voluntary Label Program for Smart Devices
07:33 • 3min
The US Cyber Trust Mark
10:38 • 3min
The Future of Cybersecurity
13:28 • 2min
Google Exposes Intelligence and Defense Employees Names in Virus Total League
15:52 • 3min
How to Avoid Human Error in Cybersecurity
19:21 • 2min
Google Restricts Internet Access to Some Employees to Reduce Cyber Attack Risk
21:29 • 2min
The Rise of the Dumb Phone
23:05 • 2min
The History of Beepers
25:31 • 2min
Delete Me Removes Your PII From Databrokers
27:09 • 3min
DRADA: G2's Highest Rated Cloud Compliance Software
30:02 • 2min
Black Hat Hacker Exposes Real Identity After Infecting His Own Computer With Malware
31:40 • 2min
The Cyber Security Firm Discovered the Real Identity of the Location
34:07 • 2min
The Cyber Criminals Computer
35:46 • 2min
The Importance of Drug Intelligence
37:42 • 3min
Hector, IT Security Analyst Jailed for Impersonating a Hacker
40:12 • 2min
The Low Hanging Fruit of a Ransomware Attack
41:48 • 2min
How to Fix a Zero Day in Chrome Browser
43:23 • 2min
The Importance of Reporting Bugs
44:53 • 3min
The Ethics of Google's Bug Bounty
48:19 • 2min
Google's Making Millions Off of Bugs
49:59 • 2min
Google's Threat Hunting Team Misses Some of the Smartest People in the World
51:29 • 3min
Microsoft Cybersecurity Analysis Professional Certificate
54:48 • 4min
Kevin McNich: A Personality and Cybersecurity
58:24 • 3min
How to Verify That Software Is Safe for Production
01:01:22 • 5min
How to Avoid Child Exploitation
01:06:46 • 2min
The Future of Privacy
01:08:41 • 4min
The Ethics of Child Exploitation
01:13:08 • 3min
The CNT Network Assessment Battery
01:15:43 • 4min
How to Interview for a Tech Job
01:19:59 • 2min
Google's Email Encryption
01:21:38 • 2min
How to Use Google's Concealed Mode Email to Protect Your Information
01:24:03 • 3min