Episodes
Between Good and Evil: The Truth About the Dark Web
Uncover the reality of the Dark Web in our latest episode. Beyond the myth, we explore its structure, uses, and inherent risks.
Your Office Through a Hacker’s Eyes: Physical Security Vulnerabilities You Need to Know
Discover unseen cybersecurity risks in your office space as we explore the importance of physical security in digital defense.
Shadow IT and Remote Work: How to Take Back Control from Unauthorized Tech
Explore the Fearless Paranoia Podcast episode on Shadow IT, discussing risks of unauthorized devices in remote work & strategies to mitigate them.
The SolarWinds Hack: 4 Supply Chain Attack Survival Tips You Need to Know
Discover the rising threat of supply chain attacks and ways to protect yourself in today’s digital landscape.
Small Business Cybersecurity Testing: What You Need to Know to Ensure Your Survival
In this episode, we explore cybersecurity testing methods for businesses: vulnerability assessments, penetration testing, & red team tests. Stay secure out there!
The Dark Side of Generative AI: 11 Ominous Dangers You Need to Know
In this episode, we explore the dark side of AI: eroding trust, eliminating privacy, and threatening objective reality as we know it.
13 Amazing Ways the Benefits of AI are Revolutionizing Life as We Know It
In this episode, we explore the benefits of AI: revolutionizing industries, improving lives, and enhancing human capabilities.
What is ChatGPT? Understanding the New Face of AI
Discover the power and potential of Generative AI and Large Language Models. Check out this episode to learn about these amazing/terrifying technologies.
Two Terrifying Zero-Day Exploits Guaranteed to Keep You Up at Night
Zero-day exploits are the silent killers of the cybersecurity world, and these two are no different. Can you possibly protect yourself?
Why T-Mobile’s Hack is So Terrifying: A Primer on SIM Swapping Hacks
When T-Mobile was hacked, did you consider that the hackers would take that data right back to T-Mobile? You should have.
How to Stop and Overcome a Business Email Compromise Attack
One of the most common and most dangerous types of cyberattacks is a Business Email Compromise. We discuss what a BEC is, and what makes it so devastating.
Multi-Factor Authentication – the Imperfect Tool You Really Need to Use
TEXT
How to Secure Your Data Using API Best Practices
Failing to properly secure your data using API best practices is like having the best home security system on the market, but leaving the back door open. Here’s how to avoid that mistake.
Why APIs are a Powerful Ally and Your Achilles Heel, All in One
37 million customer records were recently stolen from T-Moblie by exploiting an API. So what are APIs, and why are they such a popular tool for hackers?
Encryption 101: 4 Useful Concepts You Need to Know
Another one of those cybersecurity concepts that is talked about a lot but difficult to fully understand is Encryption. By understanding a few basic concepts, you can make sense of it all.
A Little (Expert) Advice: How to Secure Your Privacy in a Digital World
br>
Keeping your private information secret just feels hard to accomplish these days. Fortunately, there are steps you can take – right now – that can protect your privacy and secure your online identity.
A Little (Expert) Advice: How to Protect Your Personal Data
Technology moves pretty fast these days. It can be difficult to know what to do to best protect your personal data from theft or loss. Here are some tips, straight from the expert.
The LastPass Breach: 3 Steps You Need to Take Immediately
There are a lot of opinions floating around about the most recent LastPass breach. But before you read those, do these three things right now, and thank us later.
What is Zero Trust Cybersecurity (and Can I Afford It)?
One of the hottest buzz-phrases in cybersecurity these days is “zero trust.” In this episode, we talk about the three elements of zero trust cybersecurity, and how to implement a zero trust model without breaking the bank.
Why Cyber Resilience is the Way to Measure Cybersecurity
Your cybersecurity systems may be top-notch, with an amazing firewall and great protections from cyberattacks. But the true measure of your cybersecurity effectiveness is your resilience – your ability to recover from an attack. In this episode, we discuss why.
What Is a DDoS Attack?
One of the most common type of cyberattacks used today is the DDoS attack – a Distributed Denial of Service. So what is a DDoS attack, and what can you do to protect yourself from one?
Protecting Your Business by Implementing Least Privilege
Eufy made a name for itself as a video baby monitor company that provided peace of mind – in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow.
Eufy’s Privacy Blunder – Don’t Promise What You Don’t Provide
Eufy made a name for itself as a video baby monitor company that provided peace of mind – in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow.
8 Lessons From the Uber Hack
In September 2022, Uber suffered a massive, unique security breach. The hacker actually told the world how it was done. Here are 8 lessons businesses need to learn from this event.
The Open SSL Vulnerability – What Is It and What Can Be Done?
Open SSL is the basis for a lot of secure communication on the internet, and it’s got a major vulnerability. We talk about what Open SSL does, and how you can protect yourself from this and other similar problems.
Automated Vulnerability Scanning – It’s Critical to Know Your Weaknesses
One of the big shifts in cybercrime over the past 20 years has been from manual to automated processes. Automatically scanning for vulnerabilities now happens every minute. What will they find?
Disaster Recovery Plan – Is Your Business Prepared?
Disasters happen. Without a sufficient recovery plan in place – one that is written for your business, updated regularly, and tested and rehearsed – the only thing protecting your business, your employees, and your customers is luck.
Do You Need an Endpoint Detection System?
They’re required by insurance companies, governments, and other companies. So what is an Endpoint Detection System, and does your business need one?
It Came From Where? Nation States and Cyberattack Attribution
Knowing who is responsible for a cyberattack can be crucial in determining whether the damages will be covered by insurance. So how do you ever really know?
When is a Cyber War a Real War?
The Wanna Cry and Not Petya malware attacks were nation state-sponsored attacks, with a lot of collateral damage and victims. Are you protected for when it happens again?
Negotiate with Hackers? Never! (Or Best Offer)
Ransomware and other forms of cyber extortion can put your business in a tough spot. Isn’t negotiating with criminals wrong? Here are things to consider before you have to make that decision.
Understanding Cyber Insurance – 6 Things You Need to Know
Cyber Insurance is becoming an absolute necessity for small businesses, but is also largely unregulated, inconsistent, and packed with special terms and clauses. Here’s what you need to know.
Ransomware 101: How Ransomware Works
By the time you see the ransom note on your computer screen, a lot has already happened. In this episode we discuss how Ransomware typically gets into a computer system, how deep it gets, and how much information the Ransomware operators learn before they make contact.
Ransomware 101: What is Ransomware?
In our first episode of the Fearless Paranoia podcast, we discuss the basics of Ransomware – what is it and why is it so effective and pervasive in our modern world?
©2022 Fearless Paranoia