inThirty show

inThirty

Summary: Join intrepid host Justin Freid as he traverses the week's biggest tech news in a rapid-fire roundtable discussion before your very ears.

Join Now to Subscribe to this Podcast

Podcasts:

 Security 16 – Epic Hack | File Type: audio/mpeg | Duration: 29:38

On this episode we look at the epic hack suffered by Naoki Hiroshima, and if anything we can do to really protect yourself.  Turns out this was a very clever social engineering hack.  We talk about how to protect yourself from these types of attacks, however, there isn't really much you can do. Show Notes Naoki Hiroshima | Medium

 inThirty 127 – Google Sells Motorola | File Type: audio/mpeg | Duration: 29:05

127 weeks after we first started our podcast with the episode that Google buys Motorola, we have now come full circle.  In a very interesting episode, no one has any real feelings either way, but of course we love to discuss the whole deal for thirty minutes.   Editor’s Note [Chaim’s audio is low for… Continue reading inThirty 127 – Google Sells Motorola

 inThirty 127 – Google Sells Motorola | File Type: audio/mpeg | Duration: 29:05

127 weeks after we first started our podcast with the episode that Google buys Motorola, we have now come full circle.  In a very interesting episode, no one has any real feelings either way, but of course we love to discuss the whole deal for thirty minutes.   Editor's Note [Chaim's audio is low for whatever reason]

 Security 15 – BitCoin | File Type: audio/mpeg | Duration: 29:52

We finally tackle a topic a lot of people are interested in: BitCoin. In this episode we start very simply, and describe what it is, and how it works. Very simply, it is a psuedo-anonymous  currency, where anyone can see the ledger. Use this as a primer before you do anything. Show Notes: BitCoin WeUseCoin  Security Now | 287 Coin Base  Bit Coin Mining Machine | NewEgg Exchange Rate |Mt Gox

 inThirty 126 – Emergency Preparedness | File Type: audio/mpeg | Duration: 27:46

In this episode we talk about what can be done to be prepared for an emergency. Chaim is the town’s social media representative, and with him, we talk about different methods to communicate in light of an emergency. Note: Hangouts went down again, right as we started recording. Skype saved the day again.

 inThirty 126 – Emergency Preparedness | File Type: audio/mpeg | Duration: 27:46

In this episode we talk about what can be done to be prepared for an emergency. Chaim is the town's social media representative, and with him, we talk about different methods to communicate in light of an emergency. Note: Hangouts went down again, right as we started recording. Skype saved the day again.

 Security 14 – The Cost of a Security Breach | File Type: audio/mpeg | Duration: 29:24

Your Target experience was marred by the fact your credit card information got hacked. Who pays for this? How much does it really cost? On today's episode we talk about the monetary value of a data breach, and the huge cost it costs to secure the data. Both Chaim and Tom shares experience in using credit monitoring services.

 Googles Buys Nest – inThirty 125 | File Type: audio/mpeg | Duration: 29:33

We are joined by a special guest and a more special guest in the Curious Rat, Harry Marks, and the very understated, Michael Degusta. Justin and Chaim searched far and wide for the best hosts to argue if Google buying Nest was a good or bad thing. After painfully listening to all thirty minutes, I… Continue reading Googles Buys Nest – inThirty 125

 Googles Buys Nest – inThirty 125 | File Type: audio/mpeg | Duration: 29:33

We are joined by a special guest and a more special guest in the Curious Rat, Harry Marks, and the very understated, Michael Degusta. Justin and Chaim searched far and wide for the best hosts to argue if Google buying Nest was a good or bad thing. After painfully listening to all thirty minutes, I still don't know. What I do know is Harry is mad at Nest, and Chaim is happy for Google. Show Notes: Google Buys Nest for 3.2 Billion Dollars | Wired  

 Security 13 – Phish, Phishing, and Spear Phishing | File Type: audio/mpeg | Duration: 30:23

We go back to basics and discuss what to watch out for with internet scams.  This could sound like a whole bunch of common sense to most people, but please, share this with your friends and family who you think could fall for it.  Remind them, there is no Prince of Nigeria that knows who you are.  There is no Windows PC call center.  And if you run anti-virus, remember, you need to keep it up to date.

 CES 2014 – inThirty124 | File Type: audio/mpeg | Duration: 29:26

Just like any podcast, we are all armchair quarterbacks.  What better way to talk about CES than reading the reports that others read.  All three of us talk about what we’ve heard, from the good, the bad, and the ugly.  

 CES 2014 – inThirty124 | File Type: audio/mpeg | Duration: 29:26

Just like any podcast, we are all armchair quarterbacks.  What better way to talk about CES than reading the reports that others read.  All three of us talk about what we've heard, from the good, the bad, and the ugly.  

 New Year Tech Resolutions – inThirty 123 | File Type: audio/mpeg | Duration: 28:24

On our third annual new year resolutions show we did some actual research, and grabbed the show notes from last year. We discuss how well we did. For the upcoming year: For the coming year: Paul – Learn a language on Duolingo Chaim – More podcasts, more pro photography Justin – To separate social, personal,… Continue reading New Year Tech Resolutions – inThirty 123

 New Year Tech Resolutions – inThirty 123 | File Type: audio/mpeg | Duration: 28:24

On our third annual new year resolutions show we did some actual research, and grabbed the show notes from last year. We discuss how well we did. For the upcoming year: For the coming year: Paul - Learn a language on Duolingo Chaim - More podcasts, more pro photography Justin - To separate social, personal, and business lives ----- On episode 73 the following resolutions were said: Chaim said he would secure his digital life. Harry vowed he would write a novel. Justin promised he would move his reading and entertainment to ebooks and iTunes Match. We agreed that we all did achieve our goal. Even though Harry is not here, he did accomplish his resolution.  

 Security 12 – [Explicit] NSA Gets the iOS7 Treatment (Part 3 of Many) | File Type: audio/mpeg | Duration: 29:12

We had a great show for you, but once again, news that couldn't wait popped up. Once again we talk about what is going on with the NSA revelations. The big news is that iOS devices could potentially have malware that sends the data back to Utah. While only a physical attack, remote attacks 'are coming soon.' Next, your new laptop may have been intercepted by the NSA while in transit. Hardware modifications to send back data could have been installed. Finally, we don't know what is safe anymore.  We do know that most devices have some sort of back door. Show Notes: iPhone Access | Daily Dot Laptop Hijacking | The Verge NSA Back Doors | Der Spiegel  

Comments

Login or signup comment.