SSCC 151 - Measuring vulns, Apple and Wi-Fi privacy, Android ransomware and more [PODCAST]

Filed Under: Adobe, Adobe Flash, Android, Apple, Data loss, Featured, Internet Explorer, iOS, Malware, Microsoft, OS X, Phishing, Podcast, Ransomware, Security threats, Vulnerability, Windows

Sophos Security Chet Chat - Episode 151 - June 11, 2014

News, opinion, advice and research!

Here's our latest security podcast, featuring Sophos experts and Naked Security writers Chester Wisniewski and Paul Ducklin.

(Audio player above not working for you? Download to listen offline, or listen on Soundcloud.)

Stories covered in this episode of the Chet Chat

Get this and other Sophos podcasts

Download this episode as an MP3... Sophos podcasts on Soundcloud... RSS feed of Sophos podcasts...

, , , , , , , , , , , ,

You might like

2 Responses to SSCC 151 - Measuring vulns, Apple and Wi-Fi privacy, Android ransomware and more [PODCAST]

  1. marlene · 481 days ago

    how can i tell if next door neighbor stole my wifi?

    • jimcsecurity · 479 days ago

      Hi Marlene,

      If you suspect that your neighbor stole your Wi Fi I would strongly suggest changing the encryption key (sometimes called the pre-shared key) of your broadband router (the device you connect to using wireless on your PC or mobile device).

      If your monthly usage has recently increased significantly but you are not using it more often this would strongly suggest someone in your area is using your Wi fi without your knowledge.

      If in any doubt please contact your internet service provider (the company you pay your monthly broadband bill to). They would be the best people to contact if you suspect your Wi fi is being used by someone else. They may also suggest strengthening the type of wireless encryption e.g. using WPA instead of WEP or WPA 2 instead of WPA. If possible I would recommend WPA 2.

      They would also be able to provide the specific steps of how to change your Wi Fi encryption key to prevent further unauthorized use.

      I hope this helps. Thank you.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog