Hacker And The Fed

Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day

Jul 27, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Hacker in the Fed T-Shirt
01:40 • 2min
3
Hector's Week
03:19 • 2min
4
Insider Threat 2023
05:38 • 2min
5
The US Government Proposes a Voluntary Label Program for Smart Devices
07:33 • 3min
6
The US Cyber Trust Mark
10:38 • 3min
7
The Future of Cybersecurity
13:28 • 2min
8
Google Exposes Intelligence and Defense Employees Names in Virus Total League
15:52 • 3min
9
How to Avoid Human Error in Cybersecurity
19:21 • 2min
10
Google Restricts Internet Access to Some Employees to Reduce Cyber Attack Risk
21:29 • 2min
11
The Rise of the Dumb Phone
23:05 • 2min
12
The History of Beepers
25:31 • 2min
13
Delete Me Removes Your PII From Databrokers
27:09 • 3min
14
DRADA: G2's Highest Rated Cloud Compliance Software
30:02 • 2min
15
Black Hat Hacker Exposes Real Identity After Infecting His Own Computer With Malware
31:40 • 2min
16
The Cyber Security Firm Discovered the Real Identity of the Location
34:07 • 2min
17
The Cyber Criminals Computer
35:46 • 2min
18
The Importance of Drug Intelligence
37:42 • 3min
19
Hector, IT Security Analyst Jailed for Impersonating a Hacker
40:12 • 2min
20
The Low Hanging Fruit of a Ransomware Attack
41:48 • 2min
21
How to Fix a Zero Day in Chrome Browser
43:23 • 2min
22
The Importance of Reporting Bugs
44:53 • 3min
23
The Ethics of Google's Bug Bounty
48:19 • 2min
24
Google's Making Millions Off of Bugs
49:59 • 2min
25
Google's Threat Hunting Team Misses Some of the Smartest People in the World
51:29 • 3min
26
Microsoft Cybersecurity Analysis Professional Certificate
54:48 • 4min
27
Kevin McNich: A Personality and Cybersecurity
58:24 • 3min
28
How to Verify That Software Is Safe for Production
01:01:22 • 5min
29
How to Avoid Child Exploitation
01:06:46 • 2min
30
The Future of Privacy
01:08:41 • 4min
31
The Ethics of Child Exploitation
01:13:08 • 3min
32
The CNT Network Assessment Battery
01:15:43 • 4min
33
How to Interview for a Tech Job
01:19:59 • 2min
34
Google's Email Encryption
01:21:38 • 2min
35
How to Use Google's Concealed Mode Email to Protect Your Information
01:24:03 • 3min