Episodios

  • Insights Into Technology :Episode 31 "Security Theater and the Folding Table of Broken Dreams" (AUDIO)
    Aug 31 2025

    In this week's episode of Insights Into Technology, the team dives into a busy news cycle filled with data security stumbles and cross-continental policy drama.

    First up: The FTC has warned major U.S. tech companies not to comply with international censorship or encryption-weakening laws—like those in the UK and EU—if it risks violating American user rights. The FTC’s message? Obey foreign laws at the expense of U.S. privacy, and you might face legal heat at home. Companies like Apple, Meta, and Microsoft are now caught in a legal tug-of-war that could reshape how global platforms handle compliance.

    Next, macOS users fall prey to a new social engineering campaign using fake tech-support ads that trick users into installing the SHAMOS infostealer. The malware bypasses Gatekeeper, steals sensitive data, and burrows deep into the system for persistence—posing a rising threat for Mac-heavy enterprise environments.

    We also examine a whistleblower report accusing a federal agency (DOGE) of uploading Social Security data for 300 million Americans to an insecure cloud server—without oversight or proper security. While no breach has been confirmed, the mere exposure highlights a critical failure in government data governance and cloud risk management.

    Más Menos
    57 m
  • Insights Into Technology :Episode 31 "Security Theater and the Folding Table of Broken Dreams" (VIDEO)
    Aug 31 2025

    In this week's episode of Insights Into Technology, the team dives into a busy news cycle filled with data security stumbles and cross-continental policy drama.

    First up: The FTC has warned major U.S. tech companies not to comply with international censorship or encryption-weakening laws—like those in the UK and EU—if it risks violating American user rights. The FTC’s message? Obey foreign laws at the expense of U.S. privacy, and you might face legal heat at home. Companies like Apple, Meta, and Microsoft are now caught in a legal tug-of-war that could reshape how global platforms handle compliance.

    Next, macOS users fall prey to a new social engineering campaign using fake tech-support ads that trick users into installing the SHAMOS infostealer. The malware bypasses Gatekeeper, steals sensitive data, and burrows deep into the system for persistence—posing a rising threat for Mac-heavy enterprise environments.

    We also examine a whistleblower report accusing a federal agency (DOGE) of uploading Social Security data for 300 million Americans to an insecure cloud server—without oversight or proper security. While no breach has been confirmed, the mere exposure highlights a critical failure in government data governance and cloud risk management.

    Más Menos
    57 m
  • Insights Into Technology: Episode 30 "The Signal and the Noise" (AUDIO)
    Jun 21 2025

    Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.

    Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

    Más Menos
    30 m
  • Insights Into Technology: Episode 30 "The Signal and the Noise" (VIDEO)
    Jun 21 2025

    Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.

    Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

    Más Menos
    30 m
  • Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (VIDEO)
    Jun 15 2025

    In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

    Más Menos
    31 m
  • Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (AUDIO)
    Jun 15 2025

    In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

    Más Menos
    31 m
  • Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (AUDIO)
    May 26 2025

    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

    Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

    Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Más Menos
    37 m
  • Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (VIDEO)
    May 26 2025

    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.

    Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.

    Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Más Menos
    37 m