Episodios

  • Insights Into Technology: Episode 30 "The Signal and the Noise" (AUDIO)
    Jun 21 2025

    Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.

    Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

    Más Menos
    30 m
  • Insights Into Technology: Episode 30 "The Signal and the Noise" (VIDEO)
    Jun 21 2025

    Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.

    Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

    Más Menos
    30 m
  • Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (VIDEO)
    Jun 15 2025

    In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

    Más Menos
    31 m
  • Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (AUDIO)
    Jun 15 2025

    In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

    Más Menos
    31 m
  • Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (AUDIO)
    May 26 2025

    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

    Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

    Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Más Menos
    37 m
  • Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (VIDEO)
    May 26 2025

    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

    Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

    Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Más Menos
    37 m
  • Insights Into Technology: Episode 27 "Patch Fast, Code Nice, and Maybe Don't Use That 2012 Router" (AUDIO)
    May 17 2025

    In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy.

    Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.

    Más Menos
    24 m
  • Insights Into Technology: Episode 27 "Patch Fast, Code Nice, and Maybe Don't Use That 2012 Router" (VIDEO)
    May 17 2025

    In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy.

    Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.

    Más Menos
    24 m