Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/39/3e/0e/393e0e09-3d70-1754-d6a7-2de4e56e570c/mza_7769317693318020113.jpg/600x600bb.jpg
How Hacks Happen
Many Worlds Productions
79 episodes
1 week ago
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
Show more...
Technology
True Crime,
News,
Tech News
RSS
All content for How Hacks Happen is the property of Many Worlds Productions and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
Show more...
Technology
True Crime,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/39/3e/0e/393e0e09-3d70-1754-d6a7-2de4e56e570c/mza_7769317693318020113.jpg/600x600bb.jpg
Random Number Generators Pt 2: Unsecure Devices
How Hacks Happen
25 minutes
2 months ago
Random Number Generators Pt 2: Unsecure Devices
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources Securing the IoT Ecosystem: Challenges & SolutionsData security of IoT devices with limited resources: challenges and potential solutionsWhat Is IoT Security? Challenges and RequirementsApple Platform Sec...
How Hacks Happen
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...