This is the podcast where I, Jared, talk about assistive technology, security, driving cars, and anything else that may cross my desk. If you wish to contribute, please feel free to contact me through the contact information available on the blog or contact information available in the podcast itself. You may also go to my web site for other public contact information. I look forward in participation and comments from everyone.
Welcome to the tech podcast. Assignment 19 was a complete fail, and I know that I had a lot of failure but not all was my fault. You can search out this write up on the blog, but I talk about it here. Next, a company may be getting themselves in some trouble Forget going to a hotel … especially since records go back to 2013 … were you effected is the blog post I wrote, are you effected? Next, JFW 2021 and MAC version 11 are out and I taklk about both. Finally, I found some good news in the security field and I even have one more. Finally, a laugh and contact info at the end. Hope that you enjoy the program and I'll see you all later!
We're going to continue the credit card talk next week, but this should get you started.
Welcome to podcast 19 of the security box.
This week, let's talk about credit cards, PCIDSS, and more.
PCI DSS Compliance Guide: UK Costs & Checklist
PCI DSS requirements for building and maintaining a secure network and systems
The PCI SECURITY web site
Payment Card Industry Data Security Standard
We're putting the Wikipedia link in for reference. Please do not rely on it alone, as the page talks about a lot of unsourced material. We also posted two of those sources as I liked them, and we'll use one of them to talk about what PCIDSS is, and what is required.
Thinking about getting an Android phone? Think that its security is better than IOS and what it may have to offer? Thats your choice, and we're not going to change your mind. According to an article from the Register, maybe you should think about this again. According to the article, Google is being sued because it is taking a couple hundred MB from you on your cellular data even if the phone is sitting there quietly not being touched. Why? Because Google is preparing potential ads that might be of interest to you after it collects data in the background. The article goes on to say that Google people agree to multiple terms of service, none of which talks about the passive collection of data that has nothing to do with your use. New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they're not even in use? is the article, think about this when you decide which operating system you want.
This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs has a bunch of items in it, and we'll let you decide what you want to talk about.
Looks like we've finally gotten something that might work. After some time, I am now back on MyTelespace, where they have a call in number for callers who do not have the other technology to use. That number is 720-787-1080 and my box number is 8347 over there. Just another option for people to use. Thanks so much for listening, and make it a great day.
The show notes are quite lengthy, so not everything is going to be listed here, but please check the blog under podcasts for the complete notes.
Things to ponder
Disclaimer: The following are going to be things to ponder. Some things could be posted as a blog post, others are just thoughts based on one topic or another and may not be linked to anything. The opinions expressed are those of the presenter, and may not necessarily be those of the JRN, its staff, providers of software and services, or the like.
I got the best email ever. What was so interesting about it was the domain. Normally, I don't comment on Spam, but Just saw the best email ever … in my inbox … domain is relatively new is the blog post. You'll see the domain, as well as my thoughts. I talk about this one.
Amazon put a little bit of a scare in me by sending me an OTP when I did not even request one. I did some quick investigating and found I was not compromised, but turn on two factor (2sv) on Saturday, the 7th. I checked my transactions, card history, and other log in activity and didn't find anything suspicious.
On podcast 6 of the Security Box, it was discussed that Michael in Tennessee had a security concern about his apartment WIFI setup. He isn't wrong, as on September 7th, he called in to Twit' The Tech Guy and asked Leo. On this podcast, we'll play said segment and play Michael's things to ponder segment as we give an update on the worst security ever. If you want to listen to podcast 6 from August 19, 2020 here's the link to use (162162.33mb) for your enjoyment. Also read the text from tech guy labs, the tech guy: episode 1743.
That is only some of what is up, the blog will have more.
Welcome to podcast 17 of the technology series known as the security box.
Michael in Tennessee makes an appearance as he was not able to make it last week. We talk about encryption, the lack there of from the government, and companies in general in the security landscape.We are not pointing our fingers at any one company, but mainly an open discussion.
A subset of apps were targeted in an article that indicates that 76 percent of them have at least one vulnerability or bug. The goal is not to write perfect software, but software that can be fixed within a reasonable time frame. Different types of terms are used within this article, none of which I'm too familiar with, but the article I found quite interesting. It came from the folks at help net security. 76% of applications have at least one security flaw is the article, let us discuss.
Trend Micro has a program for free called House Call which is accessible. This was actually talked about this past Thursday with Andy and Josh. In the article Trend Micro HouseCall for Home Networks Trend Micro talks about what they've done with the program and how it can benefit you.
URL tracking systems like add words and add cents by Google can be abused just like the URL shorteners before it. How URL Tracking Systems are Abused for Phishing comes from Phishlabs, and its well worth the read. This should probably be talked about, because sites use these services including blindness related sites. Do you think it is time to move away from the services in the name of security?
News Notes and more
In some good news, we've definitely got some. Two Charged in SIM Swapping, Vishing Scams is the article penned by Mr. Krebs. Maybe this is a start to something, only time will tell what happens.
There may be more news that I didn't cover here or on the podcast of the box, let me know what you want covered.
Due to space limitations, the books section of the show notes can't be reproduced here. The Tech blog will have the entire notations including the books for you to peruse. Thanks so much for listening and contributing!
We've got shorten short notes although detailed. Here goes.
Welcome to broadcast 16 of the Security Box.
Time to catch up:
Jennifer, the staple it seems to this program, comes in with 8 different commentary pieces we'll step through in regards to last week's significant program on privacy, personal information online and the like. We'll see how this segment goes when it comes to whether there needs to be anything else said, or whether it'll speak for itself.
What do you think when it comes to your web host and what they offer? Some web hosts are Windows based, some are linux based, some may have both, and some ... well ... may just not care what they host no matter what the platform. In an article entitled Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor which comes from Phish Labs, we'll talk about a company that seems to be under multiple names, yet surves up all kinds of things that most web hosts would not tolerate. The group behind Planetary Reef leases IP space from a large reseller. I'm considered a reseller, selling space given to me, but a large reseller may be under a company that they buy their space from each month and they sell it to others. Let's talk about this as there is a history behind the web space market throughout the years.
In a related topic I covered and didn't originally cover under the rundown, we talk about this Krebs on Security article QAnon/8Chan Sites Briefly Knocked Offline and tie this and the first article together.
Has the Department of Justice not learned anything about why we need security today? I guess they really haven't because a Cyberscoop article entitled DOJ efforts to weaken encryption place national security at risk, congressman says was written by Shannon Vavra and it is quite well written. Rep. Ro Khanna has one message for politicians who continue to suggest technology companies should give law enforcement agencies access to encrypted data:
This is a power grab.
The U.S. Department of Justice has long called for technology firms to create software that would allow law enforcement agencies to investigate suspects
who use encryption to hide illegal behavior. For Khanna, a California Democrat, the tradeoff is too dangerous Most in government do not understand this, and its time that someone really hit the hammer home with this nonsense and lets put it to bed once and for all.
News, notes, and more
For a complete news notes overview, watch this space on the blog. I may have posted more than what is covered here, and what I do cover is only a few items from the subset of things I thought would be of interest. We're not going to link to everything, but maybe something else caught your attention that I did not cover. Let us see what you think of the news covered in the program, and of course, the comment boards await you.
Things to ponder
I honestly didn't see this coming. Now, … for a random breach … a psychotherapy center is something I bring up in news notes, but yet it is a serious thing. In things to ponder, I'll give my thoughts on this one. Its beyond repair.
As you listen to this podcast, what came true and didn't to date in regards to the 2020 report on what might happen in the security landscape? MyTelespace is currently down, blog posts are on the blog about it, and of course contact info as well. Enjoy!
This is episode 15, the show notes follow.
Welcome to the Security box, podcast 15. It was mainly an open forum of privacy talk today.
Armando, a broadcaster here on the mix, was on talking about his experience with Covid and other privacy concerns he had in regards to that. We also got in to a twitter discussion with names we've seen. No mention of exact names are mentioned here but we do talk about this. The Melting Pot, October 9, 2020 and Armando's Testimony can be listened to. These files will eventually expire, so get them while you can. Within the Internet Radio program, go in 86 minutes to hear the discussion.
In hour 2, I start and it continues in to hours 3-4 where we talk about privacy, the Internet, finding information, and other aspects of the discussion as Michael in Tennessee and Indiana both join me for hours 3-4 as part of this discussion.
This week's show lasts about 4 hours, and I hope you enjoy!
Welcome to podcast 354 of the technology podcast series. The segments on this podcast are mid-length, but quite interesting I think for a change in pace for this particular podcast. Let's tell you what we're going to cover.
Time to get your M-braille On is the blog post for written communication, but why gripe when this happens to many pieces of software besides M-Braille? It got fixed, and it now works again. All operating systems has its fallbacks when upgrading, and I talk about this.
Shaun Everiss and I talk about Yahoo. Shaun sent me an email which prompted me to create this blog post and segment 2 is all his. Segment 4 is mine.
Its always nice to have a discount, but why do we, the disabled, need a discount? Yes I get it, our software is quite expensive, especially if you use Jaws or the discontinued Window-Eyes. Other pieces of software which include Duxbury and even Braille2000 are expensive. There are discounts for specific cases, but why phones? This blog post: A petition on lowering the cost of an iphone for the disabled? Let’s discuss talks about This Apple Vis forum post: A petition asking Apple to consider discounts for people with disabilities. which has quite a number of negitive comments. I see what was tried with this post, but there are already discounts for phones through the carriers and even through Apple itself through care. I'm linking to my blog post and Applevis in this show notes so you can choose which one you want to read.
I hope you enjoy the program as much as I have putting it together, and I'll see you all on another edition of the program next time.
A day late, but its better than not posting at all. The podcast is packed, and I hope you all enjoy it!
The Security Box, podcast 14 must continue with the ongoing saga of John Bernard. We've got an article on that. What do you guys think of a passwordless future? Lastpass talks about it. News, notes, comments, and more.
What do you think of John Bernard? Apparently, the suspect that has been identified as this person walked away with 30 million dollars, and it doesn't stop there. The end of the article claims from one company that they hope that he comes through with his promise. Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M is the article. Could this be the end?
Passwords have long been one of the leading drivers of security risks and employee frustrations for businesses, which has only increased since organizations
transitioned to working remote. Passwordless authentication, on the other hand, securely connects employees to their work without the need to type a password
through technologies such as biometric authentication, single sign-on and federated identity. Is passwordless authentication the solution to the password
problem? This is only the first paragraph of this facinating article on a passwordless future which will get interesting. The article LastPass Research Finds 92% of Businesses Believe Passwordless Authentication Is in Their Organization’s Future is going to be discussed.
What is up with privacy? Conversations that could go awry because of an innocent conversation. Listen to the segment and form your own opinion.
I've done some reading but what about you? Submit things either by voice or text and lets discuss it.
Twit had an event held on October 8, 2020. Here is a sendspace link to that download which I'll have expire in 8 weeks from today. This is the property of twit, I'm supplying it as a courtesy to you. Visit the twit network to learn more about them.
The show notes are not lengthy this time, that is because we don't have a whole lot for them. Yes, news notes was covered, yet, we have some interesting discussion.
Below, please find the show notes.
Welcome to podcast 13 of the technology blog and podcast series known as the Security Box/. On this episode, we are going to cover NCSAM, week 1. The big thing now a days are your security and identity protection when it comes to your online safety. The first article Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis is discussed in a taped segment. Speaking of identity, Preston from Pensylvania is going to be on with an interview that I did with him talking about experience, stories, and the like. We'll also cover some news if time allows. Please make sure that you tune in to the blog web site for all of the news, as NCSAM will be busy and lots of items will be posted. You may want to decide to subscribe so you don't miss anything. Thanks for listening!
While the podcast is an hour, I know that I want to do more with the tech podcast in all kinds of tech not just the security landscape. In this podcast, I think I have covered a bit, even talking about some stuff in a different light unlike the Security Box. Here are the show notes.
Welcome to podcast 353 of the technology podcast.
NCSAM is out now, its the month of October and its definitely going to be an interesting month. Our first segment talks about the fact that identity theft may be more of a problem now more than ever. blog post
KNFB reader was intigrated in to newsline. People were griping about it on Apple Vis, and may have been in social media as well. I looked at the app one day, and I find it quite interesting but still easy to use. They griped because they had to reverify their info, otherwise known as reauthenticate. KNFB Reader lite works well, and I am glad I have choices. blog post
Michael in Tennessee taught me about Google and pairing to bluetooth devices. While I told my phone to forget the device, I had to go back in to google and get it repaired as I tried to demo how I got it to work. Be that as it may, this was kind of cool. Thanks Michael for this!
On a prior podcast, we covered SSL and what is happening with threat actors today. I intend to write a blog post with my thoughts, but the Security Box definitely covered this. Podcast 12 of the box covers this in a talk show format, but I figure it should be covered here for those who don't want the longer program. Tell me what you think.
The full program lasts an hour, so I hope you'll enjoy it. Thanks for listening! See you on another edition of the program.
Welcome to podcast 12 of the tech podcast series known as the Security Box.
On podcast 10 of the box, we link to an article about due dilligence. It was segment 2 of that podcast. Just recently,, its time to update this, as now Krebs has an article asking the question: Who is Tech Investor John Bernard? Seems to me that this guy, whoever he is, is not a good guy, and I think I visited the page in the first story just to see what it was about. In no way was I going to utalize the services, but I was mainly curious what the main page had to say. It is funny to see that the site has a general closed message on it, and people still come forward afterword to people like Brian and tell him what has happened to them. This is quite funny, and I think I'll have this as my first topic. Did you read the article linked to in podcast 10, and if so, what did you think? What do you think now?
Apparently, another tech company is hitting the news in regards to a ransomware attack. The company in question put out the same type of info that most companies put out in regards to the breach or lack there of when it comes to personal information that may have been taken. The problem is that the investigation is still ongoing, and even though the article was updated after initial printing, we can't say who is telling the truth. Govt. Services Firm Tyler Technologies Hit in Apparent Ransomware Attack is the article, and I think this aught to be quite interesting. Only time will tell.
APWG is the Anti Phishing working group. This group does work to try and advise security experts and us on how to be as safe as possible. Now they're saying that SSL should not be used in determining if a website is secure. We've known through Phishlabs articles on the blog that the rate of SSL certificates by actors was on the rise, but now we shouldn't rely on it. APWG: SSL Certificates No Longer Indication of Safe Browsing comes from the Phishlabs folks, and I think its worth the read. We also put it in the news notes rundown, and I am sure it'll garner conversation.
News Notes has quite a few items even though I have had technical problems as of late. The weather isn't helping with health concerns as well, so it may not be large, but it is good none the less. If you're interested in the news I've gathered, head on over to this blog post and check out what might interest you. There may be some overlap, but at the same time, you might find something you want discussed that I didn't read.
Michael in Tennessee is on with us for about 37 minutes talking about one particular article that caught his attention. He and I discuss this particular article, and we even bring up other odds and ends tying this up with other revelant but could be off topic stuff as well. The article we reference comes from Cyber Scoop, and its a good one. FBI hopes a more aggressive cyber strategy will disrupt foreign hackers which was posted to that site on the 21st of September. This article was written by Sean Lyngaas.
A shortened edition of the show today, and that is OK. Several topics too.
Welcome to podcast 11 of the Security Box.
Ransomware is everywhere. Last week, Michael in Tennessee sent this article during the show, and I finally got a chance to read it. This time, Newhall schools are effected, and while the advice given in the article is sound, we can officially say that nothing is predictable in this strange year. ABC7 in Los Angeles gives us: Ransomware attack shuts down remote classes in Newhall which has some good points. The article talks about what is being done which includes getting ferenzic folks in there, law enforcement, and other people who may be needed to restore data. The article didn't talk about training. Question, where is the training so people in the district know what to look for when something like this happens again? Ransomware starts with an email in most cases.
TikTok is back in the news, and this can't be good news anyhow. The article Lame-duck versions of TikTok and WeChat are definitely a problem, security experts say is what we're going to talk about, and we'll play this CNET video: TikTok, WeChat ban explained. I didn't know WEChat was a problem, but then again, I've not used that app at all. From what I've heard, its similar to apps for communication like Whats app, and other messaging apps. To top this all off, Michael in Tennessee recently sent me an article in regards to the TikTok Sale to Oracle. The TikTok deal solves quite literally nothing is the article, and it is quite interesting. This whole story aught to get interesting now, but suffice it to say, TikTok is saved, for now.
Open forum: what do you want to talk about? This is your time to shine.
News Notes and things
The biggest topic right now is TikTok and their very interesting developing story as it continues to unfold. Besides that, we've got some recent arrest news and other items in this blog post which has been cut short because of the fact I haden't felt well. The news also covers a Chinese firm who is supposed to do antivirus work being part of apt41. This is going to be interesting.
For the first time to our knowledge, ransomware may have lead to a death for a critically ill patient. The attack was an apparent accident, as the actors gave the hospital the key after it was determined they made a mistake on their target. Hospitals have never really fixed their security problems, mainly because of the lack of funding. This could hurt them now that they know that someone died. Ransomware may have led to the death of a German hospital patientRansomware may have led to the death of a German hospital patient is the article that talks more about this very interesting story.
While we didnt have a shot at news notes, we do cover some news and other stuff too. Found something of value? Get in touch!
Welcome to podcast 10 of the security box. On this edition of the program, we're going to leave room for Michael in Indiana to talk to us about phone stuff. We'll also have some other stuff as well.
Phishing has all kinds of forms, and the Security Box, podcast 5 only covered a little bit. Podcast 345 of the tech podcast series also covered Phishing. Also, we've covered Phishing in articles that I've read as well. This search page from the blog will bring up everything on phishing that might be of interest to you. Recently, I've learned about tricky types of phishing using services out there that can produce documents and forms for free or low cost. Tricky Forms of Phishing | Tricky 'Forms' of Phishing is the topic on this first segment of the program today. Did you know there are 13 different sites that can produce documents and forms that could trick users in to divulging information they shouldn't? The only one out of the 13 I've used is Google documents, but I'll talk about the 13 different ones in turn. Time to learn.
Recently, I've read an article talking about doing your due diligence . Do you do yours? Looks like a scammer knows how to play it well, and the name seems to be well known. The article Due Diligence That Money Can’t Buy talkes about someone by the name of John Bernard. What a facinating story!
Michael in Tennessee came on about a ransomware attack effecting Neuhal. We'll have more next week on this.
Michael in Indiana will be on talking about phone systems, security, and what he has seen in the landscape as an administrator.
Due to the time of the interview, news did not get aired this week. I'll keep this for a show next week, and we'll reference this next week. If you find anything from the below section you want covered, you're welcome to have your thoughts heard. Here's the news from this week we didn't cover that might be of interest to you.
News Notes September 12, 2020 is the main source for news this time.
Please check the tech blog for full show notes. They are longer than space permits in these notations. I hope you all enjoy the program as much as I have bringing it to you. We'll be back to Wednesday next week.
Welcome to podcast 351 of the podcast. Some people can't stand the changes in regards to one telephone system and what they did. Shaun Everiss and I team up and I created a page for it. Jaws had an update and I covered all but two. Here is the blog post on that as well. Finally, Typosquatting is discussed in preparation for the next Security Box. All this, and final thoughts and contact info on this edition of the podcast.
Welcome to podcast 7 of the Security Box. This week, let's peruse some topics, I'll link to some articles, and you can comment as usual. News, Notes, and much more. Thanks for listening!
Election officials have been warned about Typosquatting domains and how they can be used to bring trouble to their particular candidate. Typosquatting is a big problem, and in a future podcast, we'll look in to what this is. In an article entitled Feds warn election officials of potentially malicious ‘typosquatting’ websites you'll learn what is the danger in the election scheme of things.
I think its time to really bring out a topic. How many people heard of the dark web? 11.6 billion records have been breached and are on the dark web since 2005 according to this article by Lastpass. Is this something we should be concerned with as a whole, or do you think it isn't a big deal? This can only get worse, and the box wants to hear what you think of this. Each year, more companies are breached than ever before and it is definitely a problem I think. There is a way you can scan the dark web for any type of data like an Email address, but is this enough? Lastpass has the capability of doing this for you. The article What are dark web scans? goes in to more details on how this is done.
Looks like Experian can't keep their mouth shut. According to a Cyberscoop article, 24 million South Africans are now at risk because someone potentially opened their mouth. They said the employee was tricked in to disclosing information on a unknown number of people, but the number seems to be a whopping 24 million. No hacking needed: Someone duped Experian into handing over data in breach affecting 24 million South Africans is the article and boy if Equifax and Experian haven't learned anything from their prior U.S. things, when will they ever learn? The U.S. stuff were hacking attempts but still ... human intervention is the weakest link in this whole ordeal.
This week in Security News from August 21st covers another article on the 24 million from South Africa and even some other stuff that might be of interest. The tech blog will also highlight things from this article that might be of interest.
Michael in Tennessee went ahead and gave me a heads up on this one. Turns out that a former CSO was charged in the Uber breach from 2016. U.S. prosecutors have charged the former Chief Security Officer at Uber with allegedly covering up a data breach at the ride-hailing company that exposed
information tied to roughly 57 million people.
Joe Sullivan was charged Thursday in the U.S. District Court in San Francisco with failing to disclose details of the security incident. to the proper authorities. Sullivan, who now works as the chief information security officer at Cloudflare, allegedly committed two felonies by not informing
investigators about the hack while they probed the circumstances surrounding a prior data breach. This is great news, and one in which I want to cover in passing. Former Uber CSO criminally charged with covering up 2016 data breach has the full details from Cyberscoop.
Welcome to podcast 6 of the Security Box. On this show, we've got a topic, a very interesting news notes where two articles take center stage, and we'll open the lines for comments, questions, and other things.
Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren't so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store's rules. On Epic's Fortnite Gambit is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let's discuss this one!
The news is quite interesting. This week, if Microsoft continues at its current pace, we'r going to have 1300 plus patches for Windows this year. This month, we learn that there are 120 patches, the 6th month in a row where the patches are 100 and over. This Tech post from last week in security covers this and some other stuff too.
The two articles that we talk about in the news notes is a two part article with lots of numbers and things to think about. Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World is the first and Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (part 2) is the second. The articles are also linked to the blog post for last week in security, but I am bringing them forward here because I really think people need to read them.
Michael in Tennessee came on to talk about his apartment complex and their lack of security with the WIFI setup. While they wanted to make it convenient, it could be a parking lot attack at the entire network.
Michael talked about updating software and how inportant it is.
Michael also talked about smart TV's as well.
Welcome to the technology blog and podcast, podcast 350.
I can't believe that we've made it to 350 episodes. In 2017, I didn't publish much because of the constant breaches, but in 2018 we've come to find out that we must continue this work. I reflect on this in the first official segment.
Several segments are videos with Covid 19 stuff as well as a short video segment from Twit dealing with Tik Tok. Nothing is set in Stone.
Katie Monroe from Transit App joined in the AAC meeting from August 13th's meeting. Lots of accessibility work was made and not just for people who are blind.
Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren't so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store's rules. On Epic's Fortnite Gambit is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let's discuss this one! If not side loading, what about the terms of service aspect?
The program lasts 1 hour, 10 minutes and I hope you enjoy!
Today was quite interesting. The numbers in phishing are staggering according to the APWG. Links to the main article we use and a podcast re given. There's plenty more to cover in this space.
Podcast 5 covered Phishing and its various forms. The main option we used was Wikipedia, but we also link to F-secure and a podcast talking about what this is. There is one aspect we did not cover which I think we should. Our things to ponder segment was a little adult in nature but appropriate in today's environment of social media and the things that are allowed and not.
Episode 25 | The Psychology of Phishing F-Secure
025| The Psychology of Phishing f-secure sound cloud
What is the CFAA and why has it been a problem? The technology blog
The show lasts 3 hours, 32 moinutes, and I hope you enjoy! No major news notes segments.
Welcome to podcast 4 of the Security Box. On this show, we've got one main topic, a very interesting talk by Shaun Everess about a big time breach which effects GPS, news, notes, and more!
Our main topic:
Our main topic is the Computer Fraud and Abuse act. What is it? How did it come about? Do you think its working?
What is the CFAA and why has it been a problem? The Technology blog and podcast
Shaun Everess talks about some blog stuff, but he also talks about a big time GPS hack that could possibly be effecting all of us in some aspect. The topic is also being cross posted to the technology podcast as a whole, but I'm putting it here for comment by this podcast.
This blog post from the Technology blog and podcast This has to be the biggest breach to date gives my thoughts, along with Shaun's email. It also links to the story both linked in his email, and actually linked at the bottom.
Other newsy things
Are you concerned about your news? Find something on a news site you may have heard on the tech blog or another source? https://technology.jaredrimer.net/2020/07/28/russia-targeting-corona-vaccine-were-no-closer-news-sites-are-late/ is the blog post from the tech blog, yet I read about it on one source, and found it on my news source while looking for something else.
COVID closures means more to business ID theft than you think from the blog talks about business compromises that will go beyond your technology. Lines of credit can help you get things for your business including technology things. Ever thought you'd be a problem?
Lastpass has an update in regards to their Phishing post earlier is quite interesting as we continue to talk about Phishing. This isn't going to be the only article I blog on the topic, please view the blog article section for more.
Florida Teenager arrested in massive twitter hack, two adults also charged The Technology blog and Podcast leading to three articles, two from news specific and one tech related
This isn't possibly the entire news, but some items that may be of interest. Please check the blog for more, contact me to tell me what you want discussed, and thanks for listening!
Welcome to the technology podcast, podcast 349. This program is almost an hour and a half, and is packed with tons of stuff. Contact information is given throughout the program, so please get in touch!
Have you ever seen notations talking about fixes for screen reader users? Firefox fixed a very nasty crash with Jaws, but besides that, other screen reader updates were made to Firefox 79 which has recently been released. You don't normally see fixes for access tech so this is quite a surprise and a welcome change. Thanks Firefox! blog post
Shaun Everess, my second admin, is along with a segment talking about one of the biggest breaches I believe we've seen. This one, deals with a well known brand most people will be familiar with. Besides that, Shaun talks about the Spam problem I've been trying to fight for years. >blog post on the breach and find updates through the blog in regards to what he did for the Spam problem.
I have a twitter update. first blog post and second blog post
B2K is finally talked about on another podcast besides this one. In a long awaited podcast, Blind Bargains Interviews Jared Rimer who talks about the program, braille transcription, and more. Segment starts 15 minutes in. blog post
I give a talk on two different articles I've recently read on Krebs on Security dealing with credit and debit card fraud and EMV payment processes. This recent blog post should've been posted after I recorded the segment, but does link to the two articles.
Michael in Indiana talks about two different items. The first, is a very interesting Comcast story which turned out great. The second, an unconfirmed report about Microsoft buying Tiktok. We talk about TikTok as South Korea was fining this Chinese App maker due to Coppa violations and big time ones too. I also have comments following a video I found through the BBC. blog post
Contact information, and information on what is going on in the security box ends the podcast. The total length of the file is 1 hour, 26 minutes. I hope the wide variety of topics is of interest to you. I'll be back with more on the tech podcast very soon. Thanks so much for listening!
Welcome to the Security Box, podcast 3. We really only have one main topic here. We also include news, notes, and other things in passing.
Children's Online Privacy Protection Act Wikipedia
The Childrens online privacy Protection act is here, not following the law by Tik Tok The Technology blog and podcast
We'll have two segments on things to ponder where personal information is concerned, and we'll also have your comments, questions, and concerns. I hope you'll enjoy the show as much as i have putting it together!
Thanks to everyone that decided to participate during the live program. Remember that if you listen through the podcast, your voice still counts, so get those emails, imessages, texts, or whats app messages to me. Contact info is given throughout the program, and thanks so much for listening!
Welcome to the security box, podcast 2. On this podcast, Twitter takes center stage as it suffered a very interesting security problem they need to solve. People have said it was a big time breach, but as you'll soon find out, unless you read the tech blog, there is more to the breach. Yes, accounts got breached, but we know there is other info. Articles are listed here for you to review. Besides that, find out about a big time breach article which was a two year look at many different breaches within a two year period. Also, find out about a piece of malware making a huge return on how it can't! be trackable now a days and what the threat actors are up to.
Depending on time, not everything may be covered. If you see the rundown and you want things covered we didn't get to, please let us know!
The links to news items are in no particular order, we provide them in the order I put them in. Of course, please contact me through the contact the dj's page on the mix or through the tech blog itself.
Thanks so much for listening to the program, and we'll be back with you next time!
Scammers hijack Twitter accounts of Joe Biden, Bill Gates and others to promote cryptocurrency Cyberscoop
Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store The Hacker News
Twitter Hacked in Bitcoin Scam Trend Micro
Around 130 Twitter accounts targeted in bitcoin scam hack, company says Cyberscoop
Account Takeover Attacks Cause Chaos @ Twitter Phish Labs
An update on our security incident twitter blog July 18 2020
In a future podcast, let us talk about the CFAA and whether you think its been effective. Even still, lets possibly talk about Coppa. Have any topics you want discussed security wise? Have terms you don't understand? The box wants to hear from you!
Welcome to podcast 348 of the technology blog and podcast series. I've decided to change it up a little bit with a different spin on the security aspect, as well as talking about a piece of software that I've once used before, but yet, need it again. The setup was quite easy, and I pretty much did it on my own. Then, what do you get when you have to think about the security of your software you use to do your work? What about the type of computer you use such as Windows, Mac or Lynux? Full thoughts and links to items follow.
Virtual Audio Cable is a piece of software that acts like a mixer. We've talked about it once before, and I believe we've demoed it. Its back as I talk about the Security Box and how I'm putting people on air.
What do you think about when you think of the Mac? Its not known for viruses, trojans, and worms. However, with this latest development, I begin to wonder if the Mac will start receiving more problems like Windows has for many years. In this article entitled Updates on ThiefQuest, the Quickly-Evolving macOS Malware from Trend Micro, really makes you think. Its got lots of images for those who are sighted,, so you might want to check it out as I talk about it and other operating systems in general.
Finally, what do you think about if you were told to install something that you had no idea had a back door? In this article Chinese banks require clients to use tax programs laced with backdoors, report says posted on Cyberscoop, I talk about it and how I'd handle that. I never saw the day that software would be laced with malware and a bit of social engineering would have you install it just to get your work done.
The program is 1 hour and 8 minutes long, and I hope you'll enjoy the program as much as I have putting it together for you. Thanks so much for listening!
Here are the show notes for this program which is podcast 347 of the main tech series.
Welcome to the technology blog and podcast, this is podcast 347 of the series. On this podcast, a longer segment on the Blue Leaks issue which I take you the article. Here is the blog post that is linked in the first Security Box which was issued yesterday. Next, Twitter apparently got hacked, or did they? We've been publishing blog posts as we learn more with my thoughts, and we'll be covering this on the Security Box next week. Finally, i have a braille transcription update as I deal with assignment 19. We'll definitely have more news coming out of the twitter camp. What a mess.
This will be the home of the podcast of the Security Box, just security talk on the mix. Articles linked here to topics I've talked about.
Welcome to the security box, podcast 1. While we're playing a wide variety of music, the music will not be part of the notations. We're only going to link to things talked about as part of the show itself. The show will be part of the Tech podcast series, but hosted through the independent channel of the suite of servers. I hope that you'll be enlightened by the discussion, and I encourage discussion. If listening through the podcast itself, contact me through my tech address used through the tech podcast. Mix listeners can contact me through the contact the DJ's page of the mix. Thanks for listening!
Dark web Wikipedia
Target’s Data Breach: The Commercialization of APT | SecurityWeek.Com. Security Week
There is doubt in evidence in a case of an alleged Linked in and dropbox hacker the Technology blog and podcast
We have an update on a prior story on a Russian Hacker who was found guilty The Technology blog and podcast
Blue Leaks, this is as bad as it gets The Technology blog and podcast
FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy Krebs on Security
There may be other things I reference that is not going to be specifically linked here. You can visit the tech blog to read anything of interest, as well as searching out stories for future inclusion. There are sources that I don't have because of the amount I already have to read. As the podcast grows, we may not have so many items, but we'll see over time. I hope you've enjoyed the program listening live, or the podcast if you listen that way. See you next time!
Welcome to the technology blog and podcast, podcast 346. Last podcast was at the end of May, and a lot has been going on around here health wise. I'm definitely feeling better, and I've got quite a bit for you.
At the end of May, beginning of June, Transit App was announced to be the Los Angeles Metro app of choice, changing the landscape of $240,000 in costs. Here is the blog post that I wrote which also links to Los Angeles Metro's blog as well. Let me know your thoughts on this one!
What does Capital One have to hide when it comes to their breach? After my health issues, I've been thinking about what to put in to the podcast, and I thought this would be good to talk about. This blog post links to an article that goes in to detail about this intriguing case. We already know Capital One was at fault, why are we continuing to hide it?
I recently penned an article asking about the state of Antivirus after someone emailed asking me to put Eset's web site in a 2017 blog post. Instead of doing that, I mention Eset and several good antivirus products in this blog post where I quote an email that Shaun Everess wrote in a forward talking about 2004's Windows 10 version. He's not wrong in his thoughts in the comments, but I still think we're at a disadvantage.
Michael in Indiana has every reason to get mad at TNO. TNO stands for Trust No One, and he had no idea an app he used was this way. I also leave my thoughts.
Finally, hot off the presses, a blog talking about another Government web site. The DHS has to be ashamed of itself! It links to an article recently penned by Brian Krebs about a web site called everify. We should be passed this ordeal when building web sites, should we not?
Do you have anything you want to comment on? Please get in touch by contacting me. The web site and blog have contact info, so please utalize it. I hope you enjoy this podcast, and I hope to get back in to podcasting more regularly.
Welcome to podcast 345 of the technology podcast series. This time, no covid-19 material as I have quite something different lined up for this podcast. I'm sorry its taken this long to release, I've not been feeling well, but the wait is worth it, as you'll see.
What type of app do you use to track your packages? Just before podcast 344's release, I had a hair, and decided to go searching for a replacement. Parcel Track was found and demoed. Some things including notification fixes were pushed out after the recording, the basic demo will give you an idea on what it is about and how it works. In the first segment, I talk about what I had used before, and introduced Parceltrack. The second segment was the demo itself.
Have you heard of terms such as catfishing or catphishing? Yes, thats awesome! I have but not really looked up what it meant until I found a Cyberscoop article talking about a well known figure that does cybersecurity work in the government who was impersonated. I did some looking up, and what I found was quite interesting. Both spellings of fish (phish) are used in this and it was quite facinating. Read the featured post for May 20th, Catfishing, Catphishing, what are they? for more on this, and it links to the Cyberscoop article.
Contact information is available for everyone at the end, and I hope you enjoy the program as much as I have bringing it together for you! Thanks so much for listening md feel free to reach out.
Welcome to podcast 344. On this podcast, we've got quite a bit for you.
We've got news notes of varying kind.
I demo and talk about something I recently learn on the iphone thanks to Michael in Indiana.
I talk about Kreb's article about moving money and how one can get duped. Krebs on Security: When in Doubt: Hang Up, Look Up, & Call Back which is also talked about on the tech blog.
Getting forms in a different language than you speak? We got two applications at MENVI which we are now not going to process based on advise given to us.
I hope to have another podcast really soon. Thanks for listening to this one, and make it a great day
Welcome to podcast 343 of the technology podcast series. This podcast is covid-19 based with a webinar done by Mikko Hypponen to a conspiracy theory which we'll play the audio and comments from Michael in Tennessee. To boot, a video about 10 minutes dealing with 5G and the prospects of whether it actually gets you sick. The podcast is a little over an hour, and I hope you enjoy it! Thanks so much for listening.
On this podcast, I've got a webinar that I would wait on, but its too important. Cyber criminals are taking advantage of this pendemic. I briefly talk about what the webinar has, then enjoy this 57 minute webinar which ends the podcast. Here's the blog post with the link to the webinar so you may get the slides if you wish. Thanks for listening!
Welcome to podcast 341. We've got a bit of stuff for you for an hour podcast.
The topic of cheating came up within the dice world community. Dice World is a game that now has chat rooms in it. I've covered this on my cast before, but someone wanted to cheat in other games, and questioned their participation in the tournaments.
I cover Braille2000 and setup as a blind person. I've got a write up on it as well. Read the write up: Getting Started with Braille2000 as a Blind Person for more.
I cover a little bit of news on the aweful change in our lives with the Corona virus, although I cover this as a tech related thing. I've got blog posts covering this, so just go peruse that.
Finally, Shaun Everess comes along and asks a question by email about letterboxes and why they've gotten smaller. Here we call them mail boxes, but it is pretty much the same.
Our contact info is at the beginning and end of the podcast, and I hope you enjoy the hour long program!
Welcome to podcast 340 of the technology blog and podcast series! This is the shows notations, and there's plenty.
Braille Book Review is a magazine put out by the Library of Congress's National Library Service and there's probably info that may be of interest to some.
Michael in Tennessee and I are to talk about Apple, Microsoft, Phishing, and scams.
SSL and TLS can go hand in hand with that discussion because I had an incident with a cert expiring, and so did the domain. Bad combo!
Contact info is found on the podcast both at the beginning and end of the program, and I hope you find this podcast of value. Thanks for listening to the program, and remember to leave those thoughts! They're very valuable. See you on another edition!
Welcome to podcast 338. I catch up with you on my workings on the Braille Transcription course and the work I'm doing with it now. After that, we bring you the IHS vulnerability research webinar from December 2019. I thought I had the link to the blog post talking about this webinar, but I guess I didn't post it unfortunately. I've posted some but need to do a better job on it. If this wasn't december's, it must be November's, but be that as it may, its a great webinar.
My contact information is made available at the end of the program as usual, and thanks so much for reading and participating on the blog!
Welcome to podcast 337. While we've got some corrections by Shaun in regards to last podcast, one of the biggest topics I think you'll want to get your paws on is buildings being connected to the Internet. I'm not kidding! I've got a blog post with the article of the same name: Hackers are hijacking smart building access systems to launch DDoS attacks and this is definitely something to think about.
Also on the podcast, we've got a dumb criminal award for the podcast. If you're going to commit a crime, you want to try and hide like a lot of America's Most Wanted's criminals did. Thats why they were hard to catch, and eventually, a lot of them were caught. A great story on how not! to get caught in cybercrime? is my blog post, and I link to Brian Kreb's coverage of this.
Finally, although not in the exact order of the podcast, we've got my discussion of the infamous 404 page and how it helped me fix a bug on my own web site. Building a 404 page that helps fix bugs is the article title, and it was definitely something interesting. While the code I wanted displayed didn't show, the fact is, we can fix our error pages to help us fix those pesky mistakes in code.
Contact information is available on the podcast, and even available on the blog. Feel free to utalize it, and we'll see you on another edition of the cast!
Welcome to podcast 336 of the technology blog and podcast series. I've got quite a number of things of varying topics in today's program.
The first segment of this program covers this blog post: A very comprehensive password manager review and Lastpass gets a poor review even though it has great features, up front postings of any security issue, and no data lost to date. Why? What gives? Thanks to Consumers Advocate for bringing this to our attention by sending an article, but this is definitely sad. Most of those items I've never heard of.
The second segment covers news, notes, and items posted to the blog. The tech blog has posted more since the recording, and you may be interested in a topic that has been posted, so get in touch!
I have a Braille Transcription update on assignment 17. Assignment 17: I passed! and Assignment 17 has been submitted for grading. I'll have a full write up at some point in regards to assignment 17 through Braille Transcription as a blind person at some point.
I've talked about scammers that have contacted me to try and hook up. They never call. but yet, they want money, gift cards, and hangout connections. Scammers hitting the blind, same as my talks earlier is the blog post that talks about this in writing. Dice World wants to know about players who are engaging in this behavior, please contact them if you feel the activity you're experiencing is questionable. Thanks Dice World for listening to the community! You really do care about safety and security, great job!
A recent article sent to us by Mary, a brand new contributer I've made available to the blog. I cover some statistics on this porgram, and More than 70 cybercrime statistics – Soon to be a $6 trillion problem is the blog title and accompanying article linked within. More from this facinating report will be discussed on another podcast.
Finally, Shaun Everess is along. He sent me an email recently, and his thoughts got me thinking. I address his email on the podcast for everyone to hear what I have to say. Facinating stuff, Shaun!
Contact info is of course at the end of the program, and this program is over an hour and a half this time. I hope you enjoy the wide variety of topics on this podcast, and I'll be back on another podcast very soon! Thanks so much for listening!
Welcome to the Technology podcast, podcast 335. On this edition, we do talk about a few things including security, transportation, and braille, but in a different light. Translation software was talked about in the talk, but nothing too specific. Here are the topics.
On our first segment, Trend Micro's 2019 report and 2020 predictions. I talk about the numbers and what sticks out with me. Incidently, the webinar that they'll do this month is dealing with the predictions for 2020. I'll blog about that after I get a chance to read the email. If you want to read my blog post about the threat report and predictions please go to the blog post entitled: Question: Are we looking for more or less threats this year and if so what kind? from blog The Technology blog and podcast and it links to the article in question.
On the second segment, we talk about the automated voice announcement system. Every bus here is supposed to call stops and every train is to call stops too. While it is technology, and it fails, the failure is also within the drivers. It has to work both ways, and my talk which will be presented on Thursday, January 16th, at an Accessibility Awards Luncheon will talk about this. At some point, we must have drivers and passengers work together to get passengers to where they need to go safely. How is it for you in your area? How is the AVA specifically for you? Lets talk!
Finally, the canute 360 is discussed. This blog post which was posted on the 10th talks about where to go and links to Blind Bargains. I attended this forum, and what I learned was quite interesting. I didn't stay long for the questions and answers, but the presentation was quite interesting. Its supposed to be made available for listening at some point. I do want to catch this so I can take the time to listen to the rest of the questions in case there is something else I can learn.
Finally, what is coming up on future podcasts and contact information. I hope you will enjoy the program as much as I have putting it together for you. I look forward in hearing from you!
email/imessage tech at menvi.org
text/whats app 804-442-6975
If you have other social media, you can use that. The Jared Rimer Network has all contact info made available and links to social media as well. Thanks for listening!
Lots of things here including a discussion found on the blog in regards to a vdio out there about the Internet being gone for a day. I take that discussion and turn it in to my own.
Hello everyone, welcome to podcast 334 for January 9, 2020. We've got a very interesting podcast comoing up, lets tell you whats on it.
What has been going on with SBC Yahoo! mail? Looks like they aren't communicating with their customers about potential problems. I don't think this is right, and my blog post entitled Yahoo forcing random password resets … am I the only one supporting someone having trouble? goes in to detail about this in writing.
As I tlak about what I want to do with the podcast, I give you the beginning of the Braille2000 tutorial I have created in regards to the talking edition. Go to the Braille Transcribing as a blind person web site to learn more, and download the full tutorial which is based on the documentation. We'll have more from this tutorial over time.
In commentary from last podcast, Shaun Everess talks about how there is a video out there talking about not having the Internet for a day. Instead of linking to it I take this talk a little bit further by talking about it but bringing up the loss of power to boot. What would we do if one, the other, or both occurred? Lets take this for a spin.
As always, contact information is going to be available at the end of the program, and I hope you enjoy this podcast. The podcast runs over an hour in length. Thanks for listening, and make it a great day!
Welcome to the first podcast of 2020, podcast 333. Below, please find a list of items and links where applicable as the topics of the podcast are listed below.
Breaches galore, the epidemic of whats happened in the last decade. Are we really looking for more trouble, or will it slow down?
Freshbooks: thank you so much for giving me a great reason for talking about you today. On this podcast, I talk about how I had to reinstall the Freshbooks app, and how easy it was to reauthenticate with my account. I was afraid that I was needing to grab my 20 character password and paste in the password field. Not anymore!
Twit.tv has a new sponsor on their list that spomnsors segments on Security Now. Sadly, I can't take advantage of it at this time, but it looks like something we could've and should've had many years ago. Learn about privacy.com and see if it will meet your needs.
Michael in Indiana and I talked about software and reminisced about the old days of how downloading the wrong software wasn't fatal, but just a havoc. Today, this isn't the case. I mention Stuxnet as an example of software that was developed and it did some real world damage. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: by Kim Zetter is the name of the book and its author. I read this through Kindle and I may have talked about this on my podcast when I did. If this is the first actual weapon that destroyed data and things that were going on, is something else being developed we yet don't know about?
As usual, our contact information is at the end of the program, and I hope you enjoy this first podcast. I'll be back on another edition very soon. Thanks so much for listening to this 71 minute program!
Merry Christmas, this is the last episode of 2019.
Welcome to the final edition of the technology blog and podcast series for 2019. Trust me, we've got a lot more coming, but this is the final podcast of 2019.
My initial thoughts on my brand new, Iphone 11.
Brian Krebs gets an award. Several other members of the security field was also mentioned as needing the award more than Brian, but CISO MAG Honors KrebsOnSecurity is the article Penned by Krebs.
I have a segment on Braille transcribing as a whole in particular to Braille2000 and not specific to the assignment as a whole. I found this quite interesting, even while I did the talk.
In the first podcast of 2020, I'm going to talk about a company I feel we should've had around about 10 years ago if not sooner than now. Its an advertiser of TWIT, and boy, if it doesn't fit my needs, I feel it may meet others. We're going to start with that, and even more as we continue the transcription course, my Iphone 11, and who knows what else we'll cover by this podcast as next year gets started and beyond. Until next year, thanks so much for listening to this podcast, and I'll be seeing you very soon!
On this podcast, NVDA gets updated and its a breeze! Assignments 17-19 are talked about and I want your thoughts. A webinar that caught my attention, and web design and why links are all over the home page.
On this podcast, B2k news, domain buying, and news on hospital mortality rates when ransomware and other attacks happen.Hospital breaches leading to more heart attacks? You bet! from blog The Technology blog and podcast Thats the name of the article and its linked from me. Very facinating read.
Welcome to podcast 329.
How can we keep ourselves as safe as possible when databases that companies hold them online? I completeluy understand the aspect of why they need to do so. It isn't possible for them to store it like I do, and its just becoming a problem. A telecom company breached, mongo DB to blame is the blog post referencing this segment.
National Cyber Security month is now complete. Why? In this ever changing landscape where everything is online must we have only one month to teach how to be as secure as possible? Please check out my blog post penning this topic: NCSAM is over, shall we stop teaching for my written thoughts on this important topic. Its something we should be discussing, and we should be discussing it all the time.
I found an article through dark reading, and instead of covering that, I think we should try to discuss it in a different light whereby we ask how consumers can be safe in this time of major security problems. It isn't just the entity that we shop at that should be the main problem, it is in both things. Merchants need to fix their security, but shoppers need to be careful and some tips are discussed on what we can all good.
Dice world has some interesting updates and I tie that in to other games and the accessibility landscape. There is always something to learn and I'm happy to see what happens as we continue to grow.
Michelle Dyer was a dear friend of mine. I let the domain go because I was under the assumption that the domain was not needed. Family contacted her closest friend, contacted me, and I've relaunched the domain on October 31st. Due to some other technical issues I could not fix, the domain is now relaunched and I only made some changes to clean some outdated info. Please click on this link to go to the Michelle Dyer Memorial page where you'll find tech podcasts to download that she was a part of. We thank each and everyone for your continued support of my work.
The track I selected for this podcast comes from the artist Ehren Starks from the depths of a Year. Contact information is also available at the end of the program. Thanks so much for listening!
Hi folks, welcome to podcast 328.
Transportation: can we use something like Navi Lens in conjunction with apps like transit app, Go Metro, or other apps to get us around by bus or train?
Making The Smart Bet On Cybersecurity
Whats going on with web threats? The October webinar by Trend Micro
Protecting Our Children Online
I hope you enjoy the program.
Welcome to podcast 327 for October 27, 2019.
What do you think about giving out or phone numbers? I'm not talking about business, I'm talking about phone numbers for personal use. I heard this on a telephone line on a bulletin board, and got to thinking.
VPN services is the next topic. I'm looking at express vpn as they were talked about on a prior post on the blog through tech warm. My thoughts are on this one.
I'm putting a feeler out there. On this third segment, I'm curious on your thoughts on the braille transcription course as a whole. I know I have had some struggles, but i'm curious on other people who have taken the course or are still taking it with me. Contact me by email for a phone call, as I'd like to discuss it with you.
Cachet Financial Reeling from MyPayrollHR Fraud is the next segment and the article is linked here. What an interesting story here.
Best Practices for Defanging Social Media Phishing Attacks is the final segment and lots of terms given here and info. This could be put under the NCSAM category as the cyber security awareness month is coming to an end.
Please feel free to contact me on the podcast contact info given, and I look forward in hearing from you!
Welcome to the technology blog and podcast.
Doordash is the latest major breach, lots of coverage on it. It happened between the release of 324 and now. Is this the beginning of the end? Here is the blog post on it.
There is some commentary left by Joseph. We'd love to hear more on what you have to say, so please leave thoughts on segments.
Password managers and phone calls is the third segment as we start NCSAM. Here is the blog post on phone numbers which should be really discussed. JHere is the blog post on password managers as well.
Scott Schober wrote a new book. Here is the blog post on this book. I talk about chapter 3 specifically, and my thoughts on it, as it did hit home for me.
Finally, I've got a braille transcription update as I continue to struggle with assignment 15. I think I'm almost there! Thoughts?
My contact information is available at the end of the program, and thanks for listening.
Welcome to podcast 324 of the technology blog and podcast. On this podcast, we've got two different books that are talked about. The first is one that I've already read, the second is one that I'm going to read and preordered through Amazon. Finally, I've got two articles that I talk about. One is in regards to a school system teaching the parents of their students the dos and don'ts of social media. Finally, an article which wasn't tech related, but yet it was bullying. What would have happened if this turned to online bullying and the same type of injury took place because of some cyberbully(s) who wanted to cause him harm? The only issue is that this child was 8 years of age. All of this, on this edition of the tech podcast.
The book Scam Me If You Can the Tech blog and podcast September 22, 2019 Scott Schober writes new book, will be out October 1 The Tech blog and podcast September 22, 2019
Are your kids being safe on social media? A school district is teaching the dos and don’ts of social media The Tech blog and podcast September 22, 2019
8-year-old Texas boy suffers brain injury after attack by bullies Fox29 news (no date given)
One thing I should mention is that Scott's book is available on Amazon as a non-kindle purchase, Kindle will be released October 1. He offered to send me a released copy, but since I can't read print, I'll wait for the digital version. Thanks Scott for offering to send it, it was appreciated. Thanks for reading the notes, and feel free to leave those comments! Contact information is available at the end of each and every podcast.
https://en.wikipedia.org/wiki/PhishingWelcome back to the technology blog and podcast, this is podcast 322 of the continuing series covering everything tech including assistive tech, self driving cars, the security landscape and more. This podcast is packed and even three articles that are on one topic, Phishing. Lets take this opportunity and give you the breakdown of today's program, and I hope you'll consider contacting me with your thoughts and comments on these topics.
Philmore Productions has had it bad with the technology as of late. I put a senario in place as a thought piece. Let me know what you think.
An unofficial report on assignment 15 was released, where I knew I had to fix some things, and yet I have read everything. Its going to get interesting once I'm ready, and I've sent my official assignment. Still pushing through.
A self driving car has had it bad. This isn't the first for this make and model, and I have a hunch that this can be fixed. The strech of highway, according to the article I read, is to blame, where something wasn't fixed, and the car got in to an accident. Multiple cars got in to an accident at the same spot. California highway barrier not repaired before fatal Tesla crash from blog The Technology blog and podcast is the article, and it links to the article of the same name where you can read more.
In our Phishing segment, three articles come together with some alarming statistics. Its not going away any time soon. The first article which caps off this segment is entitled Why Social Media is Increasingly Abused for Phishing Attacks. Just take a look at this stat: "In 2018 we found that the abuse of social media increased by near 200%" and if thats not enough, Phishlabs expects this to increase. I am not surprised, and this article is linked to other material. In another article Cybersecurity: 99% of email attacks rely on victims clicking links which means we need to continue to teach. Its OK to be curious, but yet, you should know the signs and we need to make sure we slow down and look at what we're clicking on. Finally, to cap this off, Techwarm, a contributer to the blog, posted What is Phishing: Learn How to Protect Your Company which also links to some things and a great article to boot. All of these articles are put together in a nice package and tied up with a bow.
I hope you enjoy this 73 minute podcast. I'd also like to thank Amadeus, maintainer of Live Wire for putting this podcast as a podcast on Live Wire. Besides my show at 2276, people who read the RSS can now subscribe to a board to get the podcast if they wish. That board number is 974, so enjoy your options! Thanks so much for participating, and we'll see you next time!
In the better late than never department, I put podcast 321 together on the 2nd.
Welcome to podcast 321 of the technology blog and podcast. In no way am I complaining at all, but I really think that braille transcription software, no matter what you use, should be a tool. When I started lesson 15, discussed in full in the first segment, I found that I seemed very confused. Its not graded yet, and I'm sure I have a few things to correct before my first submission, but I'm confident I'll understand it. This article entitled Transcription software can’t do it all: Even Braille 2000 doesn’t have every possibility is a written aspect, but the first 30 minute segment goes in to an audio detail of the lesson and my confusions. Next, a very interesting ted talk dealing with storing data and DNA. I mention telephone systems including Live Wire, MyTelespace, and Philmore Productions Voice mail as examples of systems that could utalize this if it were to ever happen and how Philmore Productions could do things better and how Live Wire hasn't lost any data because of a different backup routine. No trashing is going on here, but the talk and the recent Philmore Productions news about their data made me think about this a little more. Next, Armando is along with a very interesting talk about the Iphone and how we can utalize it without a home button. I relate an experience with a supervisor of a company when I showed him how Voice Over worked, and he didn't have a home button. Contact info on both sides of the program is given. Thanks for listening!
On this podcast, Sonos, google home, the front door lock, and even a braille transcription update as well. Also, Aira and their announcement of a free 5 minute service which I've utalized and its very efficient.
We're packed on this episode, but yet I've made sure we've got a wide variety of stuff.
Tech podcast 319 has Philmore, is it getting worse? The Capitalone Breach since we've been gone, Braille Transcription, and more. Enjoy!
Welcome to the tech podcast, this is show 318. I'll be in the process of reloacting, so this may be the last podcast until the relocation is complete. I'm hopeful that the relocating process will go well, and I'll be available through contact methods mentioned throughout the program should you have questions and concerns.
We talk about URL shorteners. Cutt.us and similar services can be a target of spam. This service, along with a couple of others, allow the visitor to report suspicious links. These services allow the shortening of long URL links to shorten one for sharing. Reporting suspicious URL's may be a start, but I'm going to try and get recaptcha on one of my biggest sites to see if it can curve this problem.
In segment 2, we finish the talking of shorteners by talking briefly about another service similar to the one I link above, and then we demonstrate braille 2000's grade relaxer. This particular part of the application was already working, but some accessibility fixes were made, and with the beta, I present to you how the relaxer can be used in a classroom setting.
We take a song break. In the last segment, we had relaxed Gokul Salvadi to demo how this is done. I thought the music would be perfect to play one track, and you can leave your thoughts.
Finally, Equifax and Myspace are back in the news. When Myspace Was King, Employees Abused a Tool Called ‘Overlord’ to Spy on Users from blog The Technology blog and podcast |
Welcome to tech podcast 317.
How is our security as of late? Is the landscape good or bad? What are your thoughts on it?
Braille 200 has a very interesting update. Braille 2000 has interesting childrens program, made accessible is the article, and I talk about my work with this area of Braille 2000. Here is the Braille 2000 category that you can link to on the blog. It is the entire history of what I've been up too with Bob. We may have talked about this, but there are other odds and ends we tlak about if this was not talked about in this segment. If not, and you want me to cover it in detail, I can do that. The segment is Braille 2000 where we are at this point.
Jaws gets an update that fixes a major bug in Adobe. It also fixes other odds and ends as well, not just that. blog post for those who need it.
Mirai and Trickbot are back in the news. Blog post on the topic.
I saw an article on email and 5 signs on what to do if its hacked. Blog post.
Phishing sites and their trends. What do you think will happen? Phish Labs blog post has all the juicy details.
Michael in Indiana has a Philmore update. A month or so ago, Philmore Productions voice mail went down due to weather related activity. Its been a month or there abouts, and its still mostly down. The good news, Philmore did use an array, so the data isn't lost, but the web site remains down. Listen to all the details.
Contact information is available at the end of the program. Enjoy!
Hello folks, welcome to the tech podcast, podcast 316. On this podcast, we cover We Transfer. This is a service that was used to deliver files to me, and I actually like its interface. If it is right, I could see myself paying for it, but right now, I don't need to do that. I talk about this service and what it has to offer. Next Braille 2000 V2.274 take 2: we’re getting better is the accompanying article and I talk about a new menu that will appear once the talking edition becomes available to the general public hopefully very soon. The beta can now be recommended, and you should contact Bob to get your copy. Finally, Krebs on Security is here with an article A Tough Week for IP Address Scammers is discussed. I hope you enjoy the program as much as I have, and thanks so much for listening to the program!
The opinions expressed are those of the show notes, and may not necessarily represent the companies in which they represent.
See you next time!
Sorry for the delay in publishing, we've ran in to a technical issue, which I've found a work around.
On this podcast, lessons 13-15 are talked about of the braille transcription course. Next, IOS 12.3. It does fix one of the bugs I've had. Next, one ring scams, and how it relates to a book I read in 2018 called Hacked Again. Contact info at the end of the program. Enjoy!
On this podcast, tech moving too fast: do you think it is? Next, a braille transcription fail, big time. Gaelynn Lea, an artist on CD Baby, is disabled and yet involved in touring and more. I pick a track from this artist and we feature it. Finally, a tech talk dealing with a wristwatch to aid the blind and others in navigation. Search the tedtalk out on Youtube or Ted's website. CD Baby page for Gaelynn Lea so you can read more about her.
Welcome to the technology blog and podcast, podcast 313. We've got a lot for you in a wide variety of news, notes, Braille 2000 stuff, and more.
Wipro (pronounced We Pro) is in the news big time. There are three articles which are talked about in the first segment.
The 2019 Phishing Trends and Intellegence Report is out. Some very interesting stats within this article that I discuss.
Julian Assange was recently picked up for violating the CFAA according to a report. I thought I saw multiple articles, but one article was retrieved. I talk about this development.
Braille 2000 is getting ready to release their next version. In a segment, I talk about the Braille 2000 percent codes in general, highlighting the entire list that I have, skipping some which aren't available yet. They're talked about in passing, but no code is discussed in full. The web site has removed Version 1 of the software, and version 2 that has been ran is now on the home page.
Two ted talks about seizures and heart attacks are talked about and the full talks are played in full. You can search the talks separately through YouTube on the ted talks channel.
The articles dealing with Wipro are hard to swallow. Clearly, nobody knows what is happening, but hopefully they've found the issue and corrected it. Being an IT company, you need to understand these things and do proper PR. The PR here was not good, and I'm sure they'll feel the reprocussions for awhile.
A list of articles that accompany the podcast follows:
2019 Phishing Trends & Intelligence Report: The Growing Social Engineering Threat Phishlabs blog April 16, 2019
Anonymous offshoots rush to avenge Assange arrest with cyberattacks Cyberscoop April 19, 2019
Experts: Breach at IT Outsourcing Giant Wipro Krebs On Security April 15, 2019
How Not to Acknowledge a Data Breach Krebs On Security April 17, 2019
Wipro Intruders Targeted Other Major IT Firms Krebs On Security April 18, 2019
Enjoy the podcast, it lasts 72 minutes long. Thanks for listening and make it a great day!
On this podcast, braille transcription software updates using percent codes. A woman got caught with malware on USB drives when going to a place claiming they were there for an event. Finally, we talk about signatures in general, and my thoughts on whether they should have specifics on what device the mail was sent from. Contact info is at the end.
Welcome to the technology podcast, podcast 311. We've got a very interesting braille transcription update which makes me very excited to push forward in this course. Besides that, a transit update, and we start with several articles in discussion. The articles will be linked, and the podcast runs 82 minutes. I hope you enjoy the program!
Alleged Child Porn Lord Faces US Extradition Krebs on Security March 22, 2019
Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years Krebs on Security March 21, 2019
Man Behind Fatal ‘Swatting’ Gets 20 Years March 29, 2019
Thanks so much for listening! That completes the article listings and do feel free to read them if the discussion interests you. See you next podcast!
On this podcast, Equifax is back in the news, and its not so great. Next, Live wire has shows, and we talk about it. Goldwave is talked about with something new I discovered that it can do. You may notice a change in the program. Sports and technology, what are they using? I know of some of it, but yet I may not be correct. Finally, my confussion on assignment 12, and some of my confusion explained. Thanks for your continued support in this podcast.
On this podcast, Ground Zero is closing. Why? Hear why in a segment. Satelites, can they be hacked? An article is very interesting, yet its not common. Michael in Indiana has an update on Vorail. Equifax is back in the news, and its not good. Finally, the 2018 trends from Trend Micro and their findings, something caught my attention about them. I hope you enjoy the program.
Hello everyone, welcome to podcast 305 of the tech series. On this podcast, I talk about the domain name system in the first segment. There is a very interesting issue that was recently disclosed, however, it isn't so bad unless you give your credentials out to someone you don't trust. Alert (AA19-024A) was posted to the blog which links directly to the advisory. Other news articles also talk about this as well as Security Now's Steve Gibson. Pure Nature and the Ralphs Supermarket app are also demoed. The podcast will last you about an hour and 40 minutes and I hope you enjoy this extended program. Thanks for listening, and make it a great day!
Welcome to podcast 304 of the technology blog and podcast series. Philmore Productions is back in the spotlight, this time, a very interesting voice mail saying that he's getting a T1 update, but yet, you tell me if he's describing voice ovr ip. I got a very interesting phone call, this happened in the middle of my blog post typing, so i stopped to answer the phone. The phone call didn't identify itself from a company, but yet, went on to talk about the fact I was due 0 percent APR if I acted immediately. I talk about news notes, and things of interest that I've read including an article that was very interesting in court cases and jail time. Also, File Mail is a service that was discussed briefly from Security Now. Dice World has an update of interest, and of course contact information is available at the end of the program. I hope that you enjoy the program as much as I have putting it together for you. The program lasts 74 minutes.
Hello folks, welcome to podcast 303 of the technology blog and podcast series.
I'd like to start the podcast with something that came across my desk. This first segment deals with Swatting, and its a very interesting topic as now we've got a very interesting story that has a happy ending. Facebook cybersecurity exec victim of swatting call is the name of the article that sparked this discussion. When I retweeted this article, I got some likes and a conversation from someone who has been effected by swatting. The individual, whom I'm not naming talked to me about some things he's been doing to learn, and he wrote an article A decidedly creepy story of how social media can impact your life. I told him my story of someone who had been wanting information from me, but yet, that individual was talked about on my podcast, and had to serve some time. He was able to gather that I'm blind, however, that isn't top secret as its posted on my personal page, among other places as well. I sent some related articles his way which were written by me: Bullying, Is This Just a Disability Problem? and Can Social Media Really Be Bad for You? People need to think about their actions no matter whether they were targets of social engineering or swatting, both can have their own consequences. I think we really need to continue the conversation, and I'd love to hear from you on ways to curve the swatting and social engineering epidemic that has plagued us for way too long. Knowing that swatting has been a dacades long problem as of late isn't going to make me feel better, thats for sure.
Next, I found someone with an interesting braille question, dealing with a contraction we've known for the longest time. While the contraction in question has not changed from English American Braille to Unified English Braille, the question was asked why the word here was spelled out with the "er" contraction and not the "dot 5, h" as we were taught. I'm curious on whether we have found an issue with the book with an error, or whether it was written that way by someone who doesn't know the rules? I'm not going to speculate, but I'm putting it out there.
Next, Marty at Blindfold Games comes on the podcast to discuss his company Objective Education. I talk to him about some of the popular games, some that have dropped off, and about the new company. He gives his contact information at the end of that segment.
Finally, contact information as a whole, and a teaser on whats coming up on the next available podcast.
The podcast runs you 76 minutes, and I hope you enjoy! Thanks for listening!
Hello everyone, welcome to podcast 302 of Jared's technology blog and podcast series. How many of you know about Live Wire and its sister system Ground Zero? If you don't, I have a short segment in regards to both, and include Live Wire's web site for you to go peruse its offerings. Next, BevMo payment breach affects thousands, with researchers pointing to Magecart is talked about, but yet, BevMo did the best they could. Next, Skype has some changes, and a potential bug that happened to me could happen to you. Finally, lesson 8 of the braille transcription course, and reading with Braille 2000 with JFW is demoed, as there is something that I've found that isn't a show stopper, but yet, I've provided the file to Braille 2000 for their review and hopeful resolution. Contact information is at the end, and please feel free to utalize it. Thanks for reading the show notes, and enjoy your day!
On this extended edition, the podcast has some lengthy segments. We ask you what we should cover. Question, are you keeping up with your finances? News notes, what else did we miss? The San Diego school District got breached, the tech blog links to the breach via an article. Finally, our predictions and how things have changed through the years. Contact information is available at the end of the podcast, and the podcast is extended running an hour and 40 minutes (100 minutes) long. Thanks for listening!1
Meet a bomb threat person who also does Denial of Service attacks as the first segment talks about an article entitled Bomb Threat Hoaxer, DDos Boss Gets 3 Years which comes from Krebs on Security. We also have a braille transcription update in regards to my grade on lesson 7. I also have a landscape for the podcast, recapping the last several years, how things haven't changed, but yet, we must press on talking about the things that must get out including breaches, and my thoughts on those too. All of this on a packed podcast. This is tentitively the last podcast of the year, unless something breaks where we need to get the info out. Until the next podcast, make it a great day.
Hello everyone, my name is Jared, and I want to take this opportunity to welcome each and every one of you to my technology podcast. On this edition of the podcast, I have lots of news type items including domain registration news, Aira, of course a braille transcription course update, and other newsy types of things.
The following are links to various items that I thought should be linked for you to read at your own time.
That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards Krebs on Security
NOAA team sees Florence and Michael storm surge devastation first-hand NOAA
Cooking and Technology technology blog and podcast blog, links to two items from blind bargains
AIRA Killing Unlimited Plan, Raising Prices for Others, Adding $29 Intro Plan blind bargains
The program lasts 64 minutes. Contact information is available at the end of the program. Thanks for listening, and enjoy your stay!
On this edition of the podcast, braille transcription takes a different turn, where I discuss my struggles and show you what was going on. Talk about work arounds, and other things of interest. One of the things that I talk about is the information about the program I chose, Braille 2000 which is done in such a way, where it could be considered true WYSIWYG. I talk about other programs, but since I don't know much about one, and have used little of the other, I do mention them by name. I also have news notes items as well. One of the items effects the mac, whereby, you must be using a crypto wallet, and a very specific one. Spam campaign targets Exodus Mac Users is the article referenced in the second news notes file. I hope you enjoy the program as much as I have putting it together for you.
Hello folks, welcome to podcast 295 of the Technology blog and podcast series, I'm Jared Rimer. We're packed with a wide variety of stuff. We've also got several articles that complement the podcast content for you.
IOS 12.1 is out. blog post from the tech blog links to the apple vis post where you can read more.
What do you get when you update a banking trojan that we've not heard from in a long time? The banking trojan is trick bot, and its packed with new features. Trickbot Shows Off New Trick: Password Grabber Module comes from Trend Micro.
30 years ago, someone released a program to do something. It lead to what we now know as Ddos. 30 years ago, the world's first cyberattack set the stage for modern cybersecurity challenges is the article, and it was quite interesting.
This Stuck in traffic video from last month talks about Ransomware. It is back in the news, as I saw an article from Trend Micro that says that we are on the decline, but yet, we could see an increase in Ransomware in the future. This blog post leads to the article from Trend Micro that discusses this.
Philmore productions must love the negative press. In podcasts 212 and 213, a big time issue was talked about, and it was downplayed as not a big deal. Instead, the people who talked about the issue were trashed, and one of them was called when they talked to me non the phone. This time, I hear about a story where someone wanted to cancel service, but yet, someone else was braught up in a term the company uses called "dirty pool." This blog post is an article I pened in regards to that issue.
SMS is short for short message service. This is how we send and receive messages via the cellular network. Its now being used for profit in an article Krebs on Security pened entitled SMS Phishing + Cardless ATM = Profit and while it isn't new, its becoming more prevelant. This is quite interesting.
The podcast lasts you 76 minutes in length. I hope you enjoy the program, and I'll see you on another edition. Thanks for listening!
Hello everyone. Welcome to podcast number 294 of the technology blog and podcast series. We're packed with two braille transcription segments, one talking about Unified English Braille changes that I'm learning as part of taking the braille transcription course. The 2nd file that talks about the transcription aspect of things talk about my report for lesson 3, something that may actually happen to anything, including some oversite issues.
Between the two files, we've got Yahoo! having to pay a large amount of money for dealing with their breach issues, and Rutgers University has an update in regards to a story with an interesting technological aspect. This has nothing to do with the 8 football players that got arrested or suspended by the law or school due to the bitcoin issues with putting money on a school card. Our contact information is at the end of the program.
We've got articles to which you may want to read as part of today's program. They're linked below.
Former Rutgers U. student hacker gets home confinement, has to pay $8.6M in restitution NJ.com
Mirai Co-Author Gets 6 Months Confinement, $8.6M in Fines for Rutgers Attacks Krebs On Security
How to Change a Drive Letter lifewire.com
Yahoo to pay up to $85m to settle data breach lawsuit Cyberscoop.com
Thanks so much for listening, and remember to leave that feedback. It is important. I want to know what you think.
Welcome to podcast 293. On this podcast, I continue the braille transcription course coverage by talking about my thoughts on lesson 2's report. Each report is going to be different, but I talk about moine and how I can understand what they want us to do. Since that taping, I've talked to a transcriber, and they also gave me some tips, but definitely getting the braille version of the book I need will be more helpful than the braille formatted files for the note taker. I'll be working on that. Next, J. Wolfgang G. had a very interesting talk that I had listened to. Bounty Hunters is the talk, and I hope that you enjoy this. Finally, I talk about something that I found of interest, but did it a little bit differently. The third segment is talking about the supply chain. I talk about the articles, but also put it in to daily life. Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? is the first article and Supply Chain Security 101: An Expert’s View is the 2nd. Both articles are good, and I hope you enjoy the talk. Contact information is at the beginning and the end of the program. Enjoy the program, it runs you 84 minutes. Thanks for listening!
We have a lot for you. Here are the show notes for each and every one of you.
Welcome to podcast 292 of the technology blog and podcast series. We've got a bunch of stuff for you, and i hope you enjoy the program as much as I have bringing it to you. The program is 83 minutes in length.
Braille Transcription course and learning UEB. My thoughts on learning UEB as a transcriber, and not just as a reader. I also have some corrections from last podcast.
A very interesting article which is entitled When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference? and boy it gives a real true tale that happened to Brian. The article was written on the 2nd of October, and I discuss my thoughts on it.
The third segment deals with a Youtube segment, and it is a short video. drones verses the california wildfires is the video and I introduce this one. I honestly don't remember where I saw it, but I think it is quite interesting.
Winamp gets an update. Winamp's web site has an announcement that I was tipped off to in regards to its development. Not being touched in quite awhile, Winamp 6 is coming soon, but they gave us a functioning 5.8 which I was provided. I'll let you know how it works. Hopefully, the new company who is doing winamp, keeps the accessibility in place we in the blind community are accustomed to. Wishing and hoping.
Finally, Voice Phishing Scams Are Getting More Clever caught my attention. I do talk about something I got by a voice message a few weeks ago, where I've not returned the call, and yet, I'm also still here. Do you want to learn more about voice phishing? If you do, please go to the voice phishing page on Wikipedia so you are educated.
Our contact information is at the end of the program as well, as well as briefly at the beginning. Please remember to utalize the info if you have any comments, questions, or concerns. Thanks so much for listening to this program, and I hope you'll join me for another podcast soon. More great interesting info is coming I thought you'd enjoy too. Thanks for listening!
On this podcast, we welcome a new podcast provider, welcome aboard! I briefly describe what the podcast is. Then, we start the program talking about facebook's bug. After that, two files dealing with braille transcription, chips with implants, or do I have it backwards, microsoft's big time error for windows update, and vorail making a change. When we have more info on vorail's change, we'll post it on the blog and make sure the podcast is updated. Thanks for listening and make it a great day!
Hello everyone, welcome to podcast 290 of the technology podcast series. IOS 12 with screen time, notifications, comments on the beta cycle process, and SIRI and shortcuts are discussed as part of the first 4 segments. Finally, are systems like Net By Phone and Internet Speech's Net Echo viable in today's internet? In the final segment, I talk about the net past, and the net today. I also talk about something still ongoing with one company's response to questions and concerns. Contact information is available on both sides of the podcast. I hope you enjoy the program and thanks for listening!
Hello everyone, welcome to podcast 289. Jared reveals who has been the culprite of the scammy behavior. Apple releases version 12 of IOS. Transit app has put back a feature, but after the podcast segment, I got a chance to look and connecting lines is not accessible. Finally, I invite Jennifer on board to discuss the revelation of Julia's behavior, and I use Jennifer as a blocking mechanism to show how easy it is to do that no matter the situation. Contact information is on the blog, and at the end of the podcast. I hope you'll enjoy the program.
Welcome to podcast 288, I'm hoping you'll enjoy this podcast. Why are we going after cybersecurity companies, and not the people who are actually doing the hacking? Articles I've read pose this question, and its your job to go find those. Next, Sound, Fury, And Nothing One Year After Equifax is discussed as we have more questions in regards to Equifax and one year later. Finally, Why don't we take a look at A Closer Look at the Locky Poser, PyLocky Ransomware as we learn about file types that are encrypted that I've never heard of. Contact information is at the end of the podcast, and I hope you enjoy this podcast.
Hello folks, welcome to podcast number 287. This is the first podcast on Anchor that will be released there. I talk about scammy behavior, even though it wasn't in email form, its good to be on guard. Transit App has their new version 5 of their app, and I demo a little bit to show you how it works now. Finally, we bring back the scammy behavior when we talk about an article from Phishlabs entitled Phishing 101: Targeted Phishing Attacks. Our contact information is also available at the end, as well as our public thanks to Anchor. Thanks for listening!
Welcome to podcast 286 of the technology blog and podcast series with Jared Rimer. On this podcast:
Skype gets a repreave as Version 7 is loved by many in the blind and sighted alike. This is because its got global hotkeys that are loved by all. We learn some good news from Michael in Indiana, who lets me know about the Freedom Scientific podcast and from there, we learn that Skype is going to allow us to use Skype verson 7 for the foreseeable future.
Go to the blog to read the rest of the notes.
Hello folks, welcome to podcast 285 for August 29, 2018. On this extended edition of the podcast, we've got quite a number of items for you, and the podcast will last you 113 minutes.
We start with a demo of Mixcloud. Mixcloud can be considered similar to streaming services like Pandora except they have the advantage of you listening to podcasts. I talk about the web site, demo the app, and the app is interesting but some accessibility issues are present.
Stuck in traffic has a series called stuck in traffic. In this segment, Wulf talks about tech support scams. Here's the youtube link for those who want to watch it.
There's more, go to the the blog to read the full notes.
Hello everyone, welcome to podcast 284. This podcast has been in the making for almost a month, but it is well worth the wait. Here's what I have for you. First, I tell you a story about a gentleman who got kicked off of a phone line, and this gentleman claimed to be an independent artist who isn't doing anything anymore. The activity that got him kicked off is quite interesting, however, do you believe what he has to say in this story that I give you? Next, a teaching moment. This teaching moment is two stories in one in a related form. Third, Phishing and Social Media, Will it Over Take Email? This article was very insightful. Next, a youtube video: The rapid growth of the Chinese internet -- and where it's headed - Gary Liu which was quite interesting. Next, discussing innocent things that could gleam personal information, which includes a 5 minute segment
Hello everyone, welcome to podcast 283 of the independent technology podcast, different than other tech podcasts. I say we're different because we don't do things the same as other podcasts, and if you've not given the podcasts this year a listen, you might want to and see what interests you. This week, we're going to talk about a virginia bank who got hacked twice, Lifelock had a problem luckily that was reported by a security researcher, I demo the wells fargo app. Hope you enjoy the show.
LifeLock Bug Exposed Millions of Customer Email Addresses Krebs on security July 25, 2018
A Virginia Bank Breached Twice and No Fix 01.media July 26, 2018
Thanks for listening!
Welcome to podcast 280. My name is Jared Rimer, an I hope that you enjoy the program as much as I am bringing it to you. Three segments but they are good segments and they include links. The links are as follows:
Chinese-linked hackers breached top Australian defense university, report says Cyberscoop
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kindle Edition amazon.com
Multi-Factor Authentication: More Important Now than Ever lastpass.com and their blog
Thanks so much for participating in the program, and feel free to leave those thoughts!
Welcome to podcast 279. This podcast is long awaited, and I need to get back to doing things more promptly. The news here is not so outdated, but I definitely need to work on getting stuff out more timely. Today, I talk about learning a braille transcription program which I'm continuing to learn. Next, do you know about top level domains? ICANN is allowing new TLD's to be released, and in this article entitled Bad .Men at .Work. Please Don’t .Click published on the 11th of June, talks about several bad domains, over 50 percent of whose URL's are "bad" and the word bad is in quotes because it needs to be. Finally, since time had elapsed, a compilation of various news items. Each segment is over 20 minutes, but maybe of interest. I'll try to get more podcasts out more often. Thanks for listening!
Welcome to podcast 278 of the technology podcast with Jared Rimer. I've got several articles I'm going to link to as part of this week's program, as well as a game update from audio game hub.
3 Charged In Fatal Kansas ‘Swatting’ Attack Krebs on Security
Kansas Man Killed In ‘SWATting’ Attack Krebs on security
Mobile Giants: Please Don’t Share the Where Krebs on Security
Why Is Your Location Data No Longer Private? Krebs on Security
Welcome to podcast 277 of the technology podcast series with Jared Rimer. Is diction a security risk, especially when it comes to habits as dictating medical and other history that you may text to someone that you feel isn't a problem? A podcast I heard dealing with the disabled braught this up, and I thought about it. Its quite interesting, and the security experts call this a trade off. Next, we have a 6 part series dealing with cyberland, and its many adventures. F-secure posted this in their youtube channel, and I thought it should be shared. Next, T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account is discussed. I've also put similar thoughts out on the phone lines. Finally, our contact information. I hope you'll enjoy the program as much as I have, and I'll be back soon with another one.
Published on April 29th. On this podcast, I talk about dad, what he did in regards to me and technology. I also talk about a tech glitch that I found through some comments, and how I'm planning to fix it. I hope you enjoy the podcast. Read the full 2 and a half page letter to dad including any comments by clicking on the link. Thanks for listening!
There was a bit of a delay, but podcast 274 was released on the first of April.
Welcome to podcast 274. Are you familiar with how someone who would get dressed could do it if they have a disability that prevents them from doing it on their own? A very powerful ted talk will talk about this, in what I'd call the low tech segment. Are you familiar with Philmore Productions? A customer gives me a file that was posted to one of their bulletine boards, and asks some questions. This 33 minute segment talks about my thoughts on the file, and it is not looking good. I'll let you listen to the segment and decide this on your own, but I call this my thought piece. Next, have you mistyped domains? We all have. In an article pened by Brian Krebs entitled Omitting the “o” in .com Could Be Costly gives some insites that I talk about. Finally, I started a M
March 3, 2018 had an episode of the podcast.
On this podcast, a ted talk bonus on jackpotting ATM's. Comments on the video with commentary on the Zone's closing, and finally why did we choose our phone of choice? Come have a discussion with us.
Welcome to tech 272. On this edition, an update to podcast 62, which was done way back in 2008. Our main segment is dealing with NVDA and its remote feature. We talk about how it can be abused and while no damage is done this time, people can get themselves in to trouble. We hope to talk about this more in future podcasts.
UEB, better late than never. Can Augmented reality and tech help with surgeries? Fake handbags are nothing new, but can this type of fake item really funnel crime rings? An interesting ted talk by someone who investigates such things. Also, comments on an article about Alexa being a blindness specific tool. It can help, but it should not be just a blindness tool. Contact info at the end.
Welcome to podcast number 268 for January 15, 2018. On this edition of the program, I talk about a cautionary tale of giving out personal information which I heard on a telephone line where someone gave out the address in which they live. Question: what might happen if you do this? I'll leave it right there. Next, the Kansas swatting incident. Krebs posted two articles which I posted to the blog, and I'll repost them here. Kansas Man Killed In ‘SWATting’ Attack is the first article and Serial Swatter “SWAuTistic” Bragged He Hit 100 Schools, 10 Homes is the second. Can this get any worse? Next, I talk about my thoughts on what we might see in the new year and beyond in the security landscape. Finally, we listen to a video in regards to spector and meltdown.