October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
All content for How Hacks Happen is the property of Many Worlds Productions and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
How Hacks Happen
24 minutes
6 months ago
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's method for online connection, his Air Card, was both his downfall and his salvation. Take a deep dive into the data cell providers collect, how they share it with law enforcement, and the Fourth Amendment's role in protecting privacy. And tune in for Part...
How Hacks Happen
October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunate consequences, so you can avoid the same fate. Resources $61K, gone just like that for Oro Valley couple.Dream Kitchen Renovation Ruined by a Scam...