Hacks Attack!

September 1st, 2006 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
 

LOS ANGELES, August 31, 2006 (PodTech News) — It seems a day doesn’t go by without another cyber attack from hackers, spammers, phishers or those seeking to steal your identity. But are we under attack more than ever before? PodTech’s Matt Kelly put that and other questions to Lauren Weinstein, co-founder of People for Internet Responsibility.

Reporter’s Notes: Security in the digital era is an important issue, and it supports a huge and growing industry. One of the latest threats to emerge is called ‘SMiShing,’ a phishing scam using SMS detected by McAfee’s Avert Labs. (Information Week has the story.)

And while Lauren Weinstein doesn’t think we’re under attack any more now than in the recent past, some security experts suggest otherwise. For instance, the SANS Internet Storm Center, Symantec, McAfee and several other security companies are warning of a new worm that wriggles into Windows PCs by way of a security flaw while Ipswitch’s latest Spamometer Survey says spamming and pfishing are on the rise.

There are also people who want to protect your from prying eyes and sloppy security, according to CNET.

Wired magazine also has a few links to check out on security at home and work.

For more on your privacy rights, visit privacyrights.org, and my thanks to Lauren Weinstein, co-founder of PFIR for joining me on the podcast. You can also check out Lauren’s blog for more on computers and public policy.

— Matt Kelly

Tags: , , , , ,
 
Posted in: Connected Social Media, PodTech News, Security, Technology