Is Google using Chrome to get at your data? With the biggest share of the browser market, your shiny Chrome app could have a dark side that puts your confidential information in danger. For better or for worse, Google is everywhere and so is its Chrome software. But while Google has been beating the drum about making life easier for Chrome users, privacy issues have been surfacing. Have you been affected by Chrome’s automatic login and automatic data sync features? Is it just Google failing to communicate properly, or is conspiracy theory now turning into reality? Tune into this podcast and find out!
If data is the new oil, Google has some of the biggest refineries in the world. Raw data in, insights and analysis out, but what about privacy and confidentiality? Google information also powers advertising designed to target you as an individual. How? By using your personal data, preferences, and often many more of your intimate details. Trust is just one issue. Monopolistic practices, data snooping, and unauthorized data sharing are others. Is Google evil? Is it time to call in the Jedi Knights to save the world? Find out how far the tentacles of the Google Empire reach in this podcast and what you should be looking out for.
Personally Identifiable Information or PII can be dangerous in the wrong hands. Phishing, identity theft, and cyber extortion are just some of the threats. But how much do you think about data security when using chauffeuring services like Uber? Join us in this podcast to find out about the policies for data retention and the security issues that affect you directly, and your rights regarding data deletion. With our panel of experts, we pick the Uber privacy case apart. And put it back together with handy tips about how you can better safeguard your personal data. Get the details here!
Have you received threatening email recently? You’re not alone. We talk about how it happens and what you can do to stop it affecting you. First, find out about even supposedly reputable Internet actors that make it difficult for you to protect your privacy. Get the lowdown on the way that password and email files are hacked and resold for phishing scams. Hear about how malware can worm its way into your PC or mobile. Then listen as we explain smart, safe ways to set up your passwords, use protection like 2FA, and deal with emails that menace you (breathe sigh of relief HERE!).
Are mobile banking apps safe? We discuss app risks and threats that could seriously affect your banking well-being if you don’t watch out for them. We also run through the differences between mobile and desktop banking, and why the banking sector may be making a rod for its own back by trying to be too helpful to customers using mobiles. Find out with us how to avoid pitfalls like downloading fake apps and see how to identify authentic versions. Make sure that your money stays safe in your account, out of reach of thieves and hackers!
There may be far more of you, personally, on the web than you think. In this podcast, we discuss how social media giants and other popular internet firms collect huge amounts of data… on you! Ostensibly, they do this to better know you and meet your needs. However, the danger is in the abuse of that data. The Facebook - Cambridge Analytica case is still echoing in cyberspace. On a brighter note, however, data privacy is being reinforced. Individuals can ask that their personal data be erased from organizations like Facebook and Google. Join us and see how these developments could affect you.
Roll up, roll up, online buyers and sellers! We dive into the world of Amazon to see if users are adequately protected in their transactions. While the online retailing leader has several built-in safeguards, there are still ways that users can game the system. Is your credit card safe? Can you trust product reviews? What should you look for in Amazon product pages to pick products and vendors most likely to meet your needs, honestly and efficiently? We also take a quick peek at certain social media and improvements they still need to make in cyber security and data privacy.
Election rigging hit the news recently, with horror stories of the Cambridge Analytica company exploiting data on 50 million people, all from a quiz-master using Facebook. We tell you how that quiz data was used to produce psychographic profiles whose tentacles stretched back into Facebook’s huge database of links and Likes. How it was made ready for manipulation of behavior in key votes and referendums. Has social media therefore become a hidden surveillance state? Which apps on Facebook might already have your data and be threatening your privacy? Find out how to check and what you can do about it!
A bitcoin and blockchain information bonanza awaits you in this podcast. To find out what’s really going on and what you can, should or cannot do, we’ve invited our special guest Narayan Neelakantan, the co-founder and CEO of Block Armour. Listen to Narayan tell it like it is, including why banks are now so interested in blockchain and what’s at stake security-wise when buying digital currency. He also explains how sneaky operators could be stealing your computer power to become the next bitcoin billionaires. All this, plus our roundup of the high points of recent IT and cyber security news.
How much does your grocer know about you, or your travel agent, or your taxi driver? If you’re buying and booking online, it could be a lot more than you think. In this month’s podcast, we look at the impact of ecommerce on our data privacy. Buying preferences, personal profile, it can all be analyzed to second-guess what you want to purchase next. Or, as in the current Facebook data sharing scandal, for figuring out how you plan to vote in the next election. We also bring you another highly select news roundup with fingerprint faking (look out, Aadhaar!) and ransomware for robots (a new twist on ransomware robbery).
This month’s podcast covers drones that won’t leave you alone, real-world holdups to rob people of virtual currency, the fight against fake news, and updates on that hot digital potato, Aadhaar. Despite government guidelines and best practices, Aadhaar still has significant fear, uncertainty and doubt to contend with. Recent events like government gas subsidies being automatically gobbled up by Airtel bank accounts don’t help its reputation either. However, with your trusty Paladion podcast panel, you’ll find out here about smart moves to protect your Aadhaar security and decide whether to link your Aadhaar to your own phone numbers and bank accounts.
Which is scarier, malware that figures out your behaviour and adapts to it, or your Aadhaar number out on the web for all to see? In this podcast, we discuss both possibilities and recent events connected with them. We also run through a few of the things designed to protect your Aadhaar personal information. They include random number generation, biometrics, and last but not least, your right to privacy! Join us and find out more, including how expensive it can be for enterprises and organizations that leak personal information or lose it through being hacked. That sounds like good motivation for being more careful, but is it enough?
As we move into 2018, we look at how the privacy and security wars are likely to be fought. Will users ever be safe from criminal hacking AND government snooping? At least one mega-messaging platform is trying right both those wrongs, while a social media leader just upped the stakes against social engineering. We also look back on winners and losers of 2017. For those who got burned, there are lessons to be learned. Biometrics, machine learning, and artificial intelligence are just some of the possibilities we discuss for preventing the world’s worst hacks of last year from happening again this year.
Learn how you can stay safe when using free file transfer services such as WeTransfer, Dropbox, SendThisFile, etc. In this latest podcast, our experts discuss: how attackers are exploiting free file transfer services to infect your systems, inherent vulnerabilities in the transfer process, the privacy these services provide, and steps you can take to ensure your files are protected during a transfer.
In news, you will hear about the latest Whatsapp Attack that affected over 1 million users, vulnerabilities in the Amazon Key, and the newly formed Global Cyber Alliance.
This week, we dig into another data-collecting giant: Facebook. We talk about the different kinds of data Facebook collects from its users, the ways Facebook uses this data, and new developments in Facebook’s ability to recognize your face and read your emotions—and how Facebook is exploiting these new capabilities to better support their advertising network.
In news, one of the world’s biggest accountancy firms has fallen victim to a cyber-attack. We discuss what simple steps you could take to stay protected, and the newest successful attack developed by the hacker community.
This week, we talk all about Google. Specifically—just how much of your data Google stores, and what you can do about it. We bring on two experts to explain more than just stored search histories. Our experts discuss the data Google collects from Chrome, YouTube, and Android, and what Google is really doing with all this data. We close out explaining how you can protect all the data Google collects from you.
In news, we talk about how Equifax could have prevented their image-shattering breach. We also discuss security flaws found in the most unlikely of places—pacemakers.
In this week’s episode, we look at security on Android and iOS operating systems. Our experts discuss security features these providers have put together, vulnerabilities you should be aware of, protecting data on your mobile phones, security on app stores, app permissions you should be wary of, and more.
In news, we talk about a new attack trend termed the Dog in the Middle Attack or DiTM and a new password standard issued by the NIST - National Institute of Standards and Technology in the US that might surprise you all.
Last week, we discussed some successful social engineering techniques cyber criminals still use. This week, we dive dipper into social engineering and get expert tips from experts on how to combat social engineering. How to spot emails that seem to be from your friend or boss? How to identify a genuine phone call from your banker? And more.
In news, the IOT Cybersecurity Improvement Act of 2017, yet another HBO hack, and Three Square Market implants Micro Chips in its employees.
This week we discuss the widely popular technique cyber criminals use to gain access to your account credentials; social engineering. This could be to gain access to your email account, your bank account and pin, and even your personal information such as DOB and Mother’s Maiden name. Our hosts share accounts of clever social engineering tactics that has worked with people who are aware and other aspects of this technique.
In news, we have credit card fraud in Bengaluru using advanced card skimmers, the latest Ransomware attack LeakerLocker targeting Android phones and more.
In this week’s episode, we explore Payment apps such as Samsung Pay, Apple Pay, Android Pay, Payzapp, Citi Pay, etc. We answer questions like; how does it work, how to access and use these apps, security innovation these apps have brought, POS machines that support these payments, what happens if you lose your phone loaded with these payment apps, and more.
In this week’s news, we talk about the latest victim of the Erebus Ransomware, how hackers can steal your passwords if you are using an EEG headset, and Microsoft’s artificial intelligence to fight windows malware.
In this week’s episode we talk about the future of contactless cards. The popularity of contactless cards is gaining rapidly. The current year so far has seen more contactless transactions then anytime earlier. While consumer’s find contactless card payments a very convenient mode to make a purchase, very few are actually aware of the risks associated with it. Paladion cyber security experts Hari and Balaji discuss the pros and cons of contactless cards.
In this week’s episode we ask the question, how secure is your mobile phone? Many people now do everything on their smart phones, but you may be putting yourself at risk every time you open an app or use WiFi. We will discuss what it is about your phone that makes it a target for hackers, what some companies are doing to protect you, and most importantly, what you can do to protect yourself. We will also look at cyber stories from around the world including an incident of an online password manager getting hacked, a game that teaches kids to become responsible internet users, as well as more fallout from the WannaCry ransomware.
In this episode we look at the one of the most used and possibly most misunderstood aspects of modern business – cloud computing. We’ll trace the origins of shared networks and discuss whether or not turning all of your most precious data over to a third party makes you safer or more vulnerable to attacks. We will also let you know the various services the cloud has to offer and we’ll predict what cloud computing may look like in the future.
In the 8th episode, we look at security around an electronic voting machine (EVM), vulnerabilities in the system, the extent of impact hacking an EVM machine can have, and the future of electronic voting. We also cover the recent Wanna Cry Ransomware threat and discuss what went wrong and how it was able spread so quickly.