Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Date | Title & Description | Contributors |
---|---|---|
2025-02-18 |
Chrome Web Store is a mess - Apple Encryption in the UK, Texas Vs. DeepSeek US lawmakers respond to the UK's outrageous demand about Apple's encryption.What, exactly, is a "backdoor", and can a "backdoor" NOT be secret?Highlights from last week's Windows' Patch Tuesday.A look into RansomHub: The latest king of the Ransomware h... |
|
2025-02-11 |
Hiding School Cyberattacks - SparkCat, Decrypting ADP, AI Fuzzing New "SparkCat" secret-stealing AI image scanner discovered in App and Play stores.The UK demands that Apple does the impossible: decrypting ADP cloud data.France moves forward on legislation to require backdoors to encryption.Firefox moves to 135 with ... |
|
2025-02-04 |
Jailbreaking AI - Deepseek, "ROUTERS" Act, Zyxel Vulnerability Why was DeepSeek banned by Italian authorities?What internal proprietary DeepSeek data was found online?What is "DeepSeek" anyway? Why do we care, and what does it mean?Did Microsoft just make OpenAI's strong model available for free?Google explains ho... |
|
2025-01-28 | eM Client CAN be purchased outright.An astonishing 5-year-old typo in MasterCard's DNS.An unwelcome surprise received by 18,459 low-level hackers.DDoS attacks continue growing, seemingly without any end in sight.Let's Encrypt clarifies their plans for ... |
|
2025-01-21 |
Attacking TOTP - Force-Installed Outlook, DJI Firmware Update What do we learn from January's record breaking 0-day critical Patch Tuesday?Microsoft to "force-install" a new Outlook into all Windows 10 and 11 desktops?GoDaddy required to get much more serious about its hosting security.More age verification enfor... |
|
2025-01-14 | Meta winds down 3rd-party content filtering. Is encryption soon to follow?Taking over abandoned Command & Control server domains (strictly for research purposes only).IoT devices to get the "Cyber Trust Mark" — Will anyone notice or care?"SyncThing... |
|
2025-01-07 | The consequences of Internet content restriction.The measured risks of 3rd-party browser extensions.The consequences of SonicWall's unpatched 9.8 firewall severity.The incredible number of still-unencrypted email servers.SonicWall vulnerability patchin... |
|
2024-12-23 |
Best of 2024 - Apple's Secret Backdoor, CrowdStrike Catastrophe, Recall's Privacy Nightmare Leo revisits some of the year's top Security Now segments of 2024.956. Apple's Hardware Backdoor: Steve reflects on the previous week's 'The Mystery of CVE-2023-38606' deep-dive. Did Apple deliberately designed a secure backdoor?960. Unforeseen Consequ... |
|
2024-12-17 |
6-Day Certificates? Why? - Android Anti-Tracking, MFA lLogin Bypass, BIMI Is AI the Wizard of Oz? Or is it more?Microsoft's long standing effective MFA login bypass.Is TPM 2.0 not required after all for Windows 11?Meet 14 North Korean IT workers who made $88 million from the West.Android updates its Bluetooth tracking with a... |
|
2024-12-10 |
A Chat with GPT - China's Telecom Hack, Microsoft Activation Cracked, Coding with ChatGPT 4o This week, Steve and Leo discuss the recent 'Salt Typhoon' hack of U.S. telecom providers by China, TPM 2.0 requirement for Windows 11, Microsoft's newly hacked Windows activation system, Apple patenting AI facial and body recognition, and much more. S... |
|