
Sign up to save your podcasts
Or


Robocalls are the bane of my existence. I get so many spam calls that I’ve just stopped answering my home phone altogether. I’ve given out my cell number to fewer people, so thankfully I get fewer junk calls there. But I still won’t answer any calls unless I recognize the number. Why is it so easy to spoof caller ID? Well, starting July 1st in the US, mobile carriers are now required to implement a new(ish) set of technologies to make that more difficult: “Stir” (“secure telephone identity revisited”) and “Shaken” (“signature-based handling of asserted information using tokens”). While not perfect, they should at least help identify shady callers. In today’s Tip of the Week, I’ll give you some other options for blocking spam calls, as well.
Lots of other (mostly bad) cybersecurity news to cover today: Someone scraped a ton of LinkedIn data from over 700M LinkedIn subscribers (about 92% of total users) and posted it for $5000; a very odd and specific WiFi SSID could break your iPhone; 30M Dell computers are vulnerable to a nasty BIOS attack; many users of the old WD My Book Live storage drives have had all their data erased; the REvil ransomware gang has attacked at least 200 companies with a new supply chain hack; Microsoft tries and fails miserably to fix a bad printer server bug (“PrintNightmare”), Russian hackers are constantly trying to brute force your bad passwords; and finally, the USA’s CISA is warning manufacturers of ThroughTek devices about an exploitable vulnerability in several webcams and IoT devices.
By Carey Parker4.9
6464 ratings
Robocalls are the bane of my existence. I get so many spam calls that I’ve just stopped answering my home phone altogether. I’ve given out my cell number to fewer people, so thankfully I get fewer junk calls there. But I still won’t answer any calls unless I recognize the number. Why is it so easy to spoof caller ID? Well, starting July 1st in the US, mobile carriers are now required to implement a new(ish) set of technologies to make that more difficult: “Stir” (“secure telephone identity revisited”) and “Shaken” (“signature-based handling of asserted information using tokens”). While not perfect, they should at least help identify shady callers. In today’s Tip of the Week, I’ll give you some other options for blocking spam calls, as well.
Lots of other (mostly bad) cybersecurity news to cover today: Someone scraped a ton of LinkedIn data from over 700M LinkedIn subscribers (about 92% of total users) and posted it for $5000; a very odd and specific WiFi SSID could break your iPhone; 30M Dell computers are vulnerable to a nasty BIOS attack; many users of the old WD My Book Live storage drives have had all their data erased; the REvil ransomware gang has attacked at least 200 companies with a new supply chain hack; Microsoft tries and fails miserably to fix a bad printer server bug (“PrintNightmare”), Russian hackers are constantly trying to brute force your bad passwords; and finally, the USA’s CISA is warning manufacturers of ThroughTek devices about an exploitable vulnerability in several webcams and IoT devices.

32,005 Listeners

4,339 Listeners

26,327 Listeners

2,010 Listeners

372 Listeners

418 Listeners

8,046 Listeners

1,603 Listeners

105 Listeners

3,282 Listeners

5,511 Listeners

15,271 Listeners

20 Listeners

401 Listeners

386 Listeners