Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 2min
How to Protect Your Data From Hacker Attacks
01:45 • 4min
Industrial Control System Hacking Tool Kit - Malwar
05:55 • 2min
The Sisa Advisory on the Pipe Dream Malware
08:24 • 4min
The Data Breach Highlights the Need for an Employee Offboarding Process
12:35 • 4min
Paying With Your Left Hand - Is That Really the Case?
16:58 • 2min
Payte Chip Implants - What Is It and How Do They Work?
18:49 • 4min
I Just Threw My Wise Home Security Cameras in the Trash
22:34 • 2min
How to Update Your Wise Cam Firmware
25:03 • 3min
Is There a Reputable Disclosure Time Line?
27:42 • 3min
Hackers Using Fake Police Data Requests to Trick Companies
30:55 • 2min
Security Credentials and the Law Enforcement Email Address
32:57 • 3min
What Is a VPN?
35:34 • 1min
V P Ns Are Internet Snake Oil, Like the Proverbial Snake Oil
36:50 • 4min
V P Ns - What's the Problem?
40:54 • 2min
Should You Use a VPN?
42:53 • 2min
VPS VPN - What Are You Doing With Your VPS?
45:22 • 1min
Is Your Internet Service Provider Encrypted?
46:48 • 2min
Choosing a VPN Provider
49:05 • 1min
How to Configure a VPN Profile
50:28 • 3min
Using a VPN in a Home Router
53:47 • 3min