Player FM - Internet Radio Done Right
Checked 4d ago
הוסף לפני one שנה
Contenuto fornito da Makani Mason. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Makani Mason o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !
Vai offline con l'app Player FM !
Super Simple Security Principles
Segna tutti come (non) riprodotti ...
Manage series 3553424
Contenuto fornito da Makani Mason. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Makani Mason o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Learn how to think not what to think.
…
continue reading
63 episodi
Segna tutti come (non) riprodotti ...
Manage series 3553424
Contenuto fornito da Makani Mason. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Makani Mason o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Learn how to think not what to think.
…
continue reading
63 episodi
כל הפרקים
×Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frustration and greatest strength? What is an allow list? Episode summary If you want to protect your computer, you need both an inbound and outbound firewall. Almost nobody uses an outbound firewall - despite it's awesomeness. The firewall limits the damage malware can do by blocking it from phoning home or spreading through your network. Sure, you'll need to pay attention when your firewall asks you questions. But that tiny hassle is worth the warm fuzzy you'll get knowing that only apps you trust can make outbound calls. Call to action Join the tiny but elite crowd of people using an outbound firewall. If you're on a Mac, get Little Snitch Mini . If you're on Windows or Linux, get Portmaster by Safing . Then report back on the forum how it goes. Links Portmaster by Safing Little Snitch Mini Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Helpful episodes to listen to first How to Access Your Router Home Network Attacks From Within Questions we answer in this episode What is a guest network? How can it protect my home network? Does everyone need to use it? What are the 3 categories of Internet of Things (IoT) devices? Episode summary A guest network is a second wifi network you can set up at home. It lets visitors use your internet without touching your main network. That means your personal devices are protected from any malware their devices might be carrying. If you often have people over, it’s a smart extra layer of protection. A guest network can also protect your devices against threats from your own devices if they get infected. Call to action Login to your router, and get a guest network setup today. Please refer to your router's manual for instructions. Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Helpful episodes to listen to first Don't Answer the Phone Bulletproof My Home Home Network Attacks From Within Questions we answer in this episode What is a firewall? Why do I need more than one firewall? Which device already has a firewall enabled? What kinds of devices have an increased need for a firewall? Episode summary Firewalls in buildings stop fire from spreading. Firewalls on computers do something similar: they stop malware from spreading. Your router has a firewall that blocks threats from the internet before they reach your home network. But what if the malware is already inside your network? For that, you need a firewall on each of your computers. These are especially vital for laptops, which often connect to public wifi. And here’s the secret weapon almost nobody talks about: outbound firewalls. They’re a unique and powerful extra layer of protection - and wildly underrated. Call to action Please verify that the firewall is turned on for each computer in your home. Links Change Firewall settings on Mac How to turn on Windows firewall Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Helpful episodes to listen to first Don't Answer the Phone Questions we answer in this episode What is a computer virus? How does a computer virus spread? How does patient (device) zero get infected? What protection do we NOT have against these attacks? Episode summary What happens if a device in your home gets infected with a computer virus? Just like a human virus, it wants to spread. But how does that first device get infected? There are plenty of ways, but one that is often underestimated is through Internet of Things (IoT) devices. Smart TVs, Alexa, and other "smart" appliances are prime targets for hackers. Ironically, some of the must vulnerable devices are the ones meant to protect you - like a home security system. And what's worse, your router probably won't stop the malware from spreading once it's inside your network. That's why need layered protection. In this series, we'll walk through at four them (maybe more). Call to action Make a list of all devices in your home that connect to the internet. Specifically look for devices besides phones and computers that might get overlooked. Keep this list handy as you continue listening to the rest of this series of episodes. Links Ring pays $5.8 million for privacy failures Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Questions we answer in this episode What are the seven most critical router security settings? What is WPS and when is it okay to use? What is a brute force password attack? Which unexpected setting helps against this attack? Episode summary Default passwords and settings make a hacker's job easy. It's time to take just a few minutes and strengthen your router's security. If you don't know how to access your router, please listen to Episode 54 Call to action Adjust these settings: 1 - use a strong, unique router admin password of at least 14 characters 2 - disable remote administration if you can or use a random username and strong, unique password for the cloud account 3 - enable automatic firmware updates 4 - use a strong, unique wifi password of at least 16 characters 5 - use a unique wifi name with no brand or personal information in it 6 - disable WPS (Wi-Fi Protected Setup) 7 - disable UPnP (Universal Plug and Play) Links Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Questions we answer in this episode Why do I need the manual for my router? What's the first step in accessing my router? How many passwords are there for my home network? What are the two methods for connecting to a router? Episode summary If you can install an app, and visit a website, you can learn to access your router. Reading the section in the router's manual should help. Yes, I realize many of us don't read manuals anymore, but that's what I suggest. You also need to know your router's admin username and password is. It's probably printed on the bottom of your router, but if not, here again, the manual is your friend. Finally, install the router's brand app if they have one, and you're ready to go! Call to action Connect to your router, change the admin password, and keep that password in a safe place. Links Common router passwords Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Questions we answer in this episode What is the awesome new tool we're building? How can you get free lifetime access to it? What problem does it solve? What is a computer network port? Episode summary Computer network ports are like phone extensions in a corporate office building. But instead of using an extension to reach a specific person, computer use ports to access specific services. Services like visting a webpage, sending an email, checking for new email. Hackers find their way into your home network by checking every extension to see if your router will answer any phone calls. We are building a tool to let you check first so you know if your router is secure. Call to action For a limited time, we are offering free lifetime access to the tool. Register now at https://bulletproofmyhome.com to save your spot. Links Get Free Lifetime Access Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Questions we answer in this episode What is the simple rule to keep your home network safe? Why is breaking that rule so common? How do I know if MY router is following the rule? What new tool are we building? Episode summary Your home network's guardian from internet based attacks is your router. To keep your home safe from these attacks, your router needs to follow one simple rule: Don't answer the phone! Unfortunately, convenience often tempts us to have our router break this rule. Some of the biggest temptations include: remote administration, the internet of things, universal plug and play, and port forwarding. Call to action Our call to action in this episode is to find your router's manual - either a physical or digital copy. We'll be using it soon to close any holes in your router's security. I suggest you identify your router's brand, and search for the official website for that brand. Then go to that official brand website, and look up the specific model of router you have and download the manual there. Links Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
Questions we answer in this episode What is a router? How many episodes will be in this series? Is Makani trying to turn me into a network engineer? What is the metaphor we will use for this series? Episode summary Every internet connected device is under constant threat of attack. Especially the router on your home network. In order to protect your devices, you don't need to become a network engineer. But you need to understand 3 things about computer networks: 1 - Our devices are super chatty. Think of it like them making frequent phone calls to each other. 2 - A computer network is a set of devices that can make calls to each other. 3 - Your home network router is what lets the devices at your house talk to devices far away on the internet. Call to action Take a moment now to locate the router in your home. Write down the brand and model number. You'll be using that information in a future episode in this series. Links Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
What are the phone protections the FCC mandated in 2024? What is a sim swap attack? What is a port-out attack? What is your second most important online account? How to lock your phone number FCC Adds Rules for Cell Service Providers FCC Explains Cell Phone Fraud
You may have heard the official announcement from the government. Nine major telecommunications companies in the United States have been hacked. Including Verizon, AT&T, and Lumen. Yup, you read that right. The bad guys? A group dubbed The Salt Typhoon, working for the People's Republic of China. Is it time to panic? No, but it is time to start using Signal, my favorite secure communications app. The Signal App Podcast Episode 20 about Signal Telecommunications companies hacked History of Our Phone System and Flaws…
The short answer: yes! Passkeys are the future of secure logins. Start with email -- the most critical account you own. It's the master key to your online identity. Before you get started with passkeys, listen to this episode, the final one in our series on passkeys. The purpose of this episode is to pave the way for you to have a smooth first passkey experience. We start by talking about 3 issues that passkeys still have: - you still need a password - passkeys can be confusing - passkeys can't be transferred Then we cover the importance of using an impossible-to-guess password along with your passkey. Finally, we review the benefits of using a passkey with your email account. Ep 7: Too Many Secrets Ep 8: Your Master Password Ep 9: Who We Trust: The 1Password Edition Ep 10: Preparations for 1Password Ep 12: The Master Key to Your Online Identity Ep 44: Listener Question: The Promise of Passkeys Ep 47: Picking a Password Manager for Passkeys…
Ready to start using passkeys? First, you’ll need a password manager. By default, your phone or laptop might offer to store your passkeys in your browser. But here’s the catch: if you do, your secret isn’t so secret anymore—Google or Microsoft could have access to it. The smarter move? Use a dedicated password manager. I recommend 1Password, ProtonPass, or Bitwarden. In this episode, we dive into why browser-based options fall short. Get started with 1Password Get started with ProtonPass Get started with Bitwarden Google Password Manager official information Microsoft Edge Password Manager official information Apple iCloud KeyChain official information…
What is the one key difference between a passkey and a password? How can I create an unforgeable digital signature? What are the 4 steps of logging in with a passkey? How is logging in with a passkey safer than with a password? Join us for free in the IHP Academy!
What is a public key? What is a private key? How do they work together? What are the 4 steps of creating a passkey? How do they compare to the steps in creating a password? Join us for free in the IHP Academy!
There is a master key to your online identity. Listen now to learn what it is and one way you can safeguard it. You can sign up for notifications of new podcast episodes by clicking here . Join us for free in the IHP Academy!
What is a protection partner and how can having one help you? It's a free strategy that anyone can use. It will give you an extra layer of security against many types of threats, but especially scams. Listen now to learn the details. You can sign up for notifications of new podcast episodes by clicking here . Join us for free in the IHP Academy!…
What are passkeys? How are they different from passwords? Why are passwords so flawed? What are 3 big problems with passwords? Could passkeys be the solution we've been waiting for to make the internet safer? links: Learn more about passkeys Join us for free in the IHP Academy!
What is Makani’s favorite way to send money to friends and family, and why? Which disturbing Venmo privacy setting has been causing problems for years? What major PayPal policy change is coming next summer? links: Get Weekly 1-Minute Security Tips Zelle Pay Make your Venmo transactions private Opt out of PayPal selling your data I Know What You Did on Venmo research - this is a PDF download Famous People on Venmo Official PayPal policy change notice PayPal can fine you for misinformation? Join us for free in the IHP Academy!…
How do an estimated 91% of cyberattacks start? What critical feature is email missing that every modern messaging app has? How can we use an allowlist and a blocklist together? What experiment does Makani want your help with? links: Adding a Friend System to Email Join us for free in the IHP Academy!…
S
Super Simple Security Principles

What free tool can help you block harmful websites on any device without slowing it down? Wait, free? What's the catch? What bonus protection does the WARP service provide? What does it mean to rip pages out of your internet phonebook? links: https://one.one.one.one/ Instructions for installing & filtering Join us for free in the IHP Academy!…
What is an allowlist? What is a blocklist? How can they keep me safe?
How is a cookie banner like a road sign? What does it mean to "read the signs"? How can you use cookie banners to build good security habits?
Why is the IHP Academy getting rebranded? What does it mean to become bulletproof? What are the 4 areas you need to protect? What are 5 categories of threats? What is the one key strategy to staying safe? Join us for free in the IHP Academy! https://ihpacademy.com/join .
What are cookies? Do I have to accept them? Do cookies ever go away after I accept them? Unless it is actually physical cookies I can eat, I really don’t want them so what do I do to avoid them? links: Privacy Badger Brave Browser uBlock Origin Episode 31 about hotel key card cookies Episode 33 about browser extensions Join us for free in the IHP Academy! https://ihpacademy.com/join…
How does typing in your password make you vulnerable to phishing? When do you authenticate someone in the physical world? What question should you be asking yourself more often?
What is Backblaze? How long has Makani been using Backblaze? What feature is Backblaze missing? What is software opportunity cost? Get Backblaze Join us for free in the IHP Academy!
S
Super Simple Security Principles

What are the 3 big reasons people don't backup their data? What is the sad story that first interested Makani in backups? Does the cloud keep my data safe? What kind of malware shut down thousands of car dealerships because they didn't have backups? Do you need to start doing backups? Join us for free in the IHP Academy!…
What's safer - Apple or Windows? How does one famous Windows software developer answer this question? What is Gatekeeper? What is Patch Tuesday? What security feature does Windows have that Makani wishes Apple did too? Keep Windows updated What is Gatekeeper? What is SmartScreen? Malware statistics Join us for free in the IHP Academy!…
What's the most important step to take if an account gets hacked? - Spoiler alert: it's not changing your password. What youtube channel with it's 15 million subscribers had all it's thousands of videos deleted? What lessons can we learn from their story? What is authentication? Where do we see it in the physical world? How does it work online? Linus Tech Tips takeover Join us for free in the IHP Academy!…
Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.