Learn how you can stay safe when using free file transfer services such as WeTransfer, Dropbox, SendThisFile, etc. In this latest podcast, our experts discuss: how attackers are exploiting free file transfer services to infect your systems, inherent vulnerabilities in the transfer process, the privacy these services provide, and steps you can take to ensure your files are protected during a transfer.
In news, you will hear about the latest Whatsapp Attack that affected over 1 million users, vulnerabilities in the Amazon Key, and the newly formed Global Cyber Alliance.
This week, we dig into another data-collecting giant: Facebook. We talk about the different kinds of data Facebook collects from its users, the ways Facebook uses this data, and new developments in Facebook’s ability to recognize your face and read your emotions—and how Facebook is exploiting these new capabilities to better support their advertising network.
In news, one of the world’s biggest accountancy firms has fallen victim to a cyber-attack. We discuss what simple steps you could take to stay protected, and the newest successful attack developed by the hacker community.
This week, we talk all about Google. Specifically—just how much of your data Google stores, and what you can do about it. We bring on two experts to explain more than just stored search histories. Our experts discuss the data Google collects from Chrome, YouTube, and Android, and what Google is really doing with all this data. We close out explaining how you can protect all the data Google collects from you.
In news, we talk about how Equifax could have prevented their image-shattering breach. We also discuss security flaws found in the most unlikely of places—pacemakers.
In this week’s episode, we look at security on Android and iOS operating systems. Our experts discuss security features these providers have put together, vulnerabilities you should be aware of, protecting data on your mobile phones, security on app stores, app permissions you should be wary of, and more.
In news, we talk about a new attack trend termed the Dog in the Middle Attack or DiTM and a new password standard issued by the NIST - National Institute of Standards and Technology in the US that might surprise you all.
Last week, we discussed some successful social engineering techniques cyber criminals still use. This week, we dive dipper into social engineering and get expert tips from experts on how to combat social engineering. How to spot emails that seem to be from your friend or boss? How to identify a genuine phone call from your banker? And more.
In news, the IOT Cybersecurity Improvement Act of 2017, yet another HBO hack, and Three Square Market implants Micro Chips in its employees.
This week we discuss the widely popular technique cyber criminals use to gain access to your account credentials; social engineering. This could be to gain access to your email account, your bank account and pin, and even your personal information such as DOB and Mother’s Maiden name. Our hosts share accounts of clever social engineering tactics that has worked with people who are aware and other aspects of this technique.
In news, we have credit card fraud in Bengaluru using advanced card skimmers, the latest Ransomware attack LeakerLocker targeting Android phones and more.
In this week’s episode, we explore Payment apps such as Samsung Pay, Apple Pay, Android Pay, Payzapp, Citi Pay, etc. We answer questions like; how does it work, how to access and use these apps, security innovation these apps have brought, POS machines that support these payments, what happens if you lose your phone loaded with these payment apps, and more.
In this week’s news, we talk about the latest victim of the Erebus Ransomware, how hackers can steal your passwords if you are using an EEG headset, and Microsoft’s artificial intelligence to fight windows malware.
In this week’s episode we talk about the future of contactless cards. The popularity of contactless cards is gaining rapidly. The current year so far has seen more contactless transactions then anytime earlier. While consumer’s find contactless card payments a very convenient mode to make a purchase, very few are actually aware of the risks associated with it. Paladion cyber security experts Hari and Balaji discuss the pros and cons of contactless cards.
In this week’s episode we ask the question, how secure is your mobile phone? Many people now do everything on their smart phones, but you may be putting yourself at risk every time you open an app or use WiFi. We will discuss what it is about your phone that makes it a target for hackers, what some companies are doing to protect you, and most importantly, what you can do to protect yourself. We will also look at cyber stories from around the world including an incident of an online password manager getting hacked, a game that teaches kids to become responsible internet users, as well as more fallout from the WannaCry ransomware.
In this episode we look at the one of the most used and possibly most misunderstood aspects of modern business – cloud computing. We’ll trace the origins of shared networks and discuss whether or not turning all of your most precious data over to a third party makes you safer or more vulnerable to attacks. We will also let you know the various services the cloud has to offer and we’ll predict what cloud computing may look like in the future.
In the 8th episode, we look at security around an electronic voting machine (EVM), vulnerabilities in the system, the extent of impact hacking an EVM machine can have, and the future of electronic voting. We also cover the recent Wanna Cry Ransomware threat and discuss what went wrong and how it was able spread so quickly.
In this week’s episode we look at the growing threat of malware. In 2016, a new malware was developed every 4.6 seconds and the cyber security world has been forced to keep up. We will discuss what malware is, how it has changed and developed and what the experts are doing to keep us safe. We will also give our listeners tips on how they can stay safe from the latest malware invasion. In this episode we’ll also let you know why it may finally be ok to forget your PIN, what you’re doing that lets hackers inside your smart phone, and how your music headphones might be selling your personal information.
In this episode we discuss how hackers have made using your payment card in person just as risky as paying online. We will look at the methods hackers use to steal your information, including how they are able to get your card data and how they can steal your PIN. We’ll also discuss some of the more sophisticated attacks on payment cards and provide a checklist you can use to stay safe.
In this episode we also explain the latest phishing strategies and look at the new malware destroying IoT devices.
In this episode we examine why Bitcoin is the chosen currency of cyber criminals. We discuss the journey Bitcoin took to become the ultimate financial tool of the criminal world as well as the technology behind it. We will also reveal the truth behind Bitcoin’s supposed anonymity. Is Bitcoin the future or is law enforcement closing in on this once untouchable crypto currency?
Also in this episode, the true cost of cyber security incidents, how hackers robbed a bank with smart phones, and why Israel is teaching children cyber security skills.
In February 2016, Hollywood Presbyterian Medical Center in Los Angeles, CA was hit by a ransomware attack that ultimately cost them $17,000 when cyber attackers were effectively able to shut down the hospital unless they paid up. In this episode, we discuss the increased targeting of both small and large organizations and enterprises, how ransomware works, and what you can do to prevent your organization from being the next target.
Also in this episode: Making your mobile device more secure, the curious case of a police department being held up by cyber criminals, and why you may not have to prove you’re not a robot when you log in to websites anymore.
Today, we’re going to talk about something that affects all of us, thanks to the government’s insistence on Aadhaar. We are talking of biometric authentication, or the use of fingerprints, iris scans, voice recognition and so on, to secure your data. We will be looking at how this works and if there are security risks involved in biometrics. Fingerprints have been used as ID for centuries! People still sign cheques and documents using fingerprints, and many of us have fingerprint scanners installed in office entrances. Plus, we use fingerprint to my phone.So, what has changed now to make fingerprints so newsworthy?
Using a debit or credit card or any kind of plastic money comes with its set of risks. In fact, stealing credit card data was the first big trend in the history of cyber-attacks. We’ve come a long way since then and built solid defense systems. But with e-commerce taking off in a big way in the past few years, usage of credit and debit cards to make online transactions has grown sharply. This exposes us to a new level of risks and threats, which is only increasing as more and more people go cashless. It’s time we examined them with the people who know all about this and get a wider perspective.
How secure are digital wallets?
Online security is something that doesn’t just worry Snowden, it affects all of us, especially, when it concerns our money. In fact, after demonetisation in India, cash hasn’t been easily available, forcing everyone to use cashless options like digital wallets. Suddenly, digital wallets like Paytm, Mobiwik, Freecharge have become mainstream and we’re using them to buy everything from vegetables to an airline ticket. We had been using the alternate payment methods like credit and debit cards, Internet banking and ATMs etc for years. We always had the choice of using these new methods or cash. We had time to learn these at our own pace. Now suddenly with cash disappearing overnight and mobile-wallets being the only viable option – isnt the shift too abrupt?
Our Podcast describes this key shift, how this impact could lead to security concerns and what are the key pointers to keep in mind while using digital wallets.