October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
All content for How Hacks Happen is the property of Many Worlds Productions and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
AI Gone Rogue: Delusional Chats Lead to Heartbreak
How Hacks Happen
23 minutes
1 month ago
AI Gone Rogue: Delusional Chats Lead to Heartbreak
AI is great for researching topics and digging up information. But what happens when people start to humanize their chatbots, and think they're talking to God? Or that they are God? Let's look at what makes AI come up with delusional theories, and why it tells people they're right even then they're wrong. Resources People Are Losing Loved Ones to AI-Fueled Spiritual FantasiesTowards Understanding Sycophancy in Language ModelsI, Robot by Isaac Asimov Send us a text Inspiring Tech Leade...
How Hacks Happen
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...