

Zero-click Exploits Attacking iPhones, PC Motherboards Downloading Malware, and a New Dutch Mandate
Jun 8, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
The Lex Friedman Podcast: A Conversation About Cyber Security
01:34 • 2min
The New iOS Zero Click Exploit
03:34 • 2min
The Scary Zero Click Exploit via iOS Devices
05:21 • 2min
How CNC's Command and Control Is Used to Exploit Vulnerability
07:29 • 3min
Apple's Lockdown Mode Adds Another Layer to the Attack
10:21 • 2min
How to Handle a Lost Text for a Birthday
12:34 • 5min
The Zero Click Attack on the US National Security Agency
17:33 • 2min
The Importance of Anime Domains
19:11 • 2min
Hello Fresh: Your Recipe for Success
21:22 • 2min
DeleteMe Removes PII From Databrokers
22:58 • 2min
Hacker in the Fed: How to Stop Supply Chain Attacks
25:14 • 2min
The Problem With Gigabyte's Auto Updater Program
27:12 • 3min
The FTC Slams Amazon With a 30.8 Million Dollar Fine for Privacy Violations
29:59 • 3min
Ring's Problem With Easy to Use Devices
32:50 • 4min
The $25 Million Penalty for Reaching Children's Privacy Laws
36:53 • 1min
The Importance of Listening to Music in the Bathroom
38:22 • 2min
The Impact of a $300 Million Fine on AWS
40:10 • 2min
The Impact of the FTC Fines on Facebook
42:12 • 3min
The Blue Checkmark in Gmail Is Exploiting Scammers
45:02 • 4min
How Microsoft Authenticated Emails From Shared IP Space
49:19 • 2min
The Persistent Pushing on Google to Fix an Error
51:07 • 2min
Google's Blue Check Mark Verification
53:03 • 2min
The Pros and Cons of Security Text
55:27 • 4min
The Importance of General Contact Details for Security Engineers
59:23 • 2min
How to Stop Spammers From Calling Your Phone Number Every Day
01:01:36 • 4min