Powered by RND
PodcastsTechnologyRandom but Memorable

Random but Memorable

1Password
Random but Memorable
Latest episode

Available Episodes

5 of 164
  • The secret world of car hacking with Joseph Cox | VEHICLE SWAPPING VIDEO GAME
    Ever wondered how easy it is to hack a car? 🚗💻 This week, returning guest Joseph Cox, a journalist at 404 Media, joins the podcast to dive into the secret world of car hacking. Joseph explains how modern vehicles have become rolling computers, what that means for your privacy, and the surprising ways criminals are breaking into them.In Crash Course, we unpack SIM swapping — how hackers try to hijack phone numbers to access online accounts, and what you can do to stop it. 📱🔐Over in Watchtower Weekly, it’s game on as we look at how cybercriminals are targeting video game players and developers, from crypto-stealing titles on Steam to lawsuits in the world of Fortnite. 🎮Plus, we celebrate a major win — Random but Memorable just picked up a Gold Signal Award! Thank you for listening and helping us make it happen. 🏆🏰  Watchtower WeeklyVideo games: How cybercriminals are targeting players and developers alike. 🎮Steam game removed after cryptostealer takes over $150KBlockBlasters: Infected Steam game downloads malware disguised as patchEpic Games Suing Two Fortnite Island Makers Over Inflated ‘Bot’ Engagement‘The Last of Us Part II’ Leaked Footage Reveals Major Story SpoilersGrand Theft Auto 6 Leaks: Everything That's Happened So FarPokémon maker confirms it was victim of hack👨‍🏫  Crash CourseThis week: SIM swapping1Password blog: What are SIM swap attacks, and how can you prevent them?🎙  Guest Interview – Joseph Cox👉 Visit: 404media.co🎧 Listen to the 404 Media podcast🎧 Listen to our previous episode with Joseph Cox: Doughnut Panic Sting Operation📄 Inside the Underground Trade of ‘Flipper Zero’ Tech to Break into Cars by Joseph Cox📲 Follow @josephfcox on X🗣 #Ask1Password – Ask Roo Anything!1Password blog: Closing the credential risk gap for AI agents using a browserPlease send us an email at: [email protected] us a question in the 1Password Community forum📲  Follow Us…Watch on YouTubeFind us on Apple PodcastsFind us on SpotifyVisit 1Password.comCheck out our blogFind us on X @1PasswordFind us on Facebook or InstagramSend us an email: [email protected]❤️  Review Us...If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.
    --------  
    1:00:38
  • The state of passkeys in 2025 with Nick Steele | BEER SHORTAGE PUBLIC KEY
    How is the transition to passkeys going in 2025? 🔑 This week, we’re joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys.In Crash Course, we break down public-key encryption — the powerful technology that keeps your passkeys (and so much more) secure. 🔐 You’ll finally understand how those mysterious “key pairs” actually work.Meanwhile, in Watchtower Weekly, we’re heading to the factory floor to explore how ransomware is hitting manufacturing hard — and what it really costs when production grinds to a halt. 🏭💥Plus, in #Ask1Password we share tips on how to organize your vaults and tags like a pro, and wrap things up with another law-breaking round of Hack or Hoax?! 🧑‍⚖️🏰  Watchtower WeeklyWhen Factories Go Dark: The Real Cost of Cyberattacks on Manufacturing. 🏭💥Japan days away from running out of Asahi Super Dry due to cyber attackJapan's Asahi hack that halted beer production claimed by Qilin ransomware groupJaguar Land Rover cyberattack deepens, with prolonged production outage, supply chain falloutManufacturing under fire: Strengthening cyber-defenses amid surging threatsSupply Chains Under Siege: Inside the Cyber Threats on ManufacturingAre manufacturing cyberattacks increasing globally in 2025?👨‍🏫  Crash CourseThis week: Public-key encryption1Password blog: What is public-key cryptography?🎙  Guest Interview – Nick Steele from 1Password👉 1Password blog –1Password helps author a new standard for secure credential transfer👉 FIDO Alliance: CXF specification👉 Visit: passkeys.directoryFollow Nick Steele on LinkedIn🗣 #Ask1Password – Ask Roo Anything!Please send us an email at: [email protected] us a question in the 1Password Community forum📲  Follow Us…Watch on YouTubeFind us on Apple PodcastsFind us on SpotifyVisit 1Password.comCheck out our blogFind us on X @1PasswordFind us on Facebook or InstagramSend us an email: [email protected]❤️  Review Us...If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.
    --------  
    1:02:51
  • How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT
    Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we’re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you. 🕵️‍♀️🔐In Crash Course, we break down identity theft itself: the different types, how it spirals from a single scam, and the practical steps you can take to make yourself harder to impersonate.Plus, in Watchtower Weekly, we explore how criminals are turning the human voice into the newest attack surface. From AI voice clones to professional “callers,” we unpack why vishing scams are surging — and what shifting global policies could mean for banks, carriers, and consumers. 📞🤖And of course, we wrap things up with an extra-fishy round of Hack or Hoax?! 🎲🐟🃏🗳️ Vote for us! Vote for us in the 4th Annual Signal Awards here. 🏆 📧 Please remember to verify your email address for your vote to count.🏰  Watchtower WeeklyThe human voice as the new attack surface. 🗣️ShinyHunters breach Salesforce via vishingCrypto execs targeted with bespoke voice phishing campaignsKorean Supreme Court: Voice phishing loan valid with multiple checksVoice phishing-linked frozen bank accounts set to hit record high this year👨‍🏫  Crash CourseThis week: Identity Theft1Password blog: Protect yourself from identity fraud scams🎙  Guest Interview – Eva Velasquez from ITRC👉 Visit: idtheftcenter.org📺 Watch ITRC on YouTubeFollow Eva Velasquez on LinkedIn🗣 #Ask1Password – Ask Roo Anything!Please send us an email at: [email protected] us a question in the 1Password Community forum📲  Follow Us…Watch on YouTubeFind us on Apple PodcastsFind us on SpotifyVisit 1Password.comCheck out our blogFind us on X @1PasswordFind us on Facebook or InstagramSend us an email: [email protected]❤️  Review Us...If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.
    --------  
    1:03:03
  • How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM
    What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice. 🎙️🛰️In Crash Course, we cut through some industry jargon to explain Zero Trust: never assume, always verify. And in Watchtower Weekly, ransomware gets a 2025 upgrade. We cover LunaLock’s dystopian AI threats against artists, bargain-bin ransoms disrupting Swedish municipalities, and a UK car line halted by a hacker crew mash-up.Plus, #Ask1Password tackles 1Password vs. Apple Passwords, and Hack or Hoax?! brings another almost-too-believable tale. 🧠🕵️‍♂️📺🏰  Watchtower WeeklyOld-fashioned ransomware has had a glow-up.Artists&Clients hit with “AI training” extortion twistSweden’s municipalities knocked offline for just 1.5 BTCHackers linked to M&S breach claim responsibility for Jaguar Land Rover cyber-attackCourts have halted Pa. Attorney General’s Office cases after a ransomware attack 👨‍🏫  Crash CourseThis week: Zero TrustWatch: What is Zero Trust Security?Listen: Random but Memorable episode 12.7🎙  Guest Interview – Hayley Benedict, RANE👉 Visit: ranenetwork.com🎧 Listen to RANE Podcast SeriesFollow RANE on LinkedInFollow Hayley Benedict on LinkedInFollow Hayley Benedict on Bluesky🗣 #Ask1Password – Ask Roo Anything!Please send us an email at: [email protected] us a question in the 1Password Community forumShow_boat’s tips for guarding against IoT vulnerabilitiesPlus, join us for another instalment of our new security game, Hack or Hoax! 📲  Follow Us…Watch on YouTubeFind us on Apple PodcastsFind us on SpotifyVisit 1Password.comCheck out our blogFind us on X @1PasswordFind us on Facebook or InstagramSend us an email: [email protected]❤️  Review Us...If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.
    --------  
    1:09:41
  • How to build a career in cybersecurity with Heath Adams | JOB HUNT BOT FATIGUE
    Want to work in cybersecurity but don’t know where to begin? Or just curious what it takes to break into the field? This week, we’re joined by the internet’s very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background. 👩‍💻💼In Crash Course, you’ll learn about Security Fatigue and why we should all be talking about it. You’ll understand why it’s affecting so many people in the industry and how to spot the early warning signs. Plus, in Watchtower Weekly we unravel the latest in IoT vulnerabilities, and why your TV could be part of a botnet. 📺🤖We also share an extra juicy hacking story in Hack or Hoax?! 🧃🏰  Watchtower WeeklyWhen Your TV Joins a Botnet: The Latest in IoT VulnerabilitiesHackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home1 Million Third-Party Android Devices Have a Secret Backdoor for ScammersGoogle is taking the hackers to court over a major Android fraud ringGoogle sues alleged hackers behind BadBox 2.0 botnet which has infected millions of devicesGoogle Gemini AI Bot Hijacks Smart Homes, Turns Off the LightsFBI – Home Internet Connected Devices Facilitate Criminal Activity👨‍🏫  Crash Course This week: Security Fatigue1Password Report – The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity🎙  Guest Interview – Heath Adams – The Cyber Mentor👉 Visit: TCM Security Academy📺 Watch The Cyber Mentor on YouTube📲 Follow @TCMSecurity on X📲 Follow TCM Security on LinkedIn🗣 #Ask1Password – Ask Roo Anything!Please send us an email at: [email protected] us a question in the 1Password Community forumPlus, join us for another instalment of our new security game, Hack or Hoax! 📲  Follow Us…Watch on YouTubeFind us on Apple PodcastsFind us on SpotifyVisit 1Password.comCheck out our blogFind us on X @1PasswordFind us on Facebook or InstagramSend us an email: [email protected]❤️  Review Us...If you're loving the show, please leave us a review on Apple Podcasts or wherever you listen to podcasts.
    --------  
    1:08:29

More Technology podcasts

About Random but Memorable

A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
Podcast website

Listen to Random but Memorable, The Last Invention and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Random but Memorable: Podcasts in Family

Social
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/1/2025 - 5:42:36 PM