
Loose Leaf Security Podcast
1) Covering your webcams
Liz and Geoffrey take a look at how attackers compromise webcams and discuss why it's worth physically covering them. Malware and alleged threats of malware are only some of the avenues attackers take...Show More
2) Password managers: how they should work and when they didn't
Liz and Geoffrey discuss password manager extensions in depth: everything from how they keep your passwords safe from malicious websites to how they sync your passwords between your devices to how the...Show More
3) Two-factor tidying
With a wide variety of possible two-factor authentication methods, it's difficult to keep track of which ones you're using - and which ones you could be using. Liz and Geoffrey talk about their person...Show More
4) Using a password manager effectively
In a deeper exploration of password manager browser extensions and features for sharing as well as a survey of alternatives to password managers, Liz and Geoffrey go back to the topic of Loose Leaf Se...Show More
5) Checks, mobile banking, cash transfer apps, and a bit more on credit cards
Liz and Geoffrey take a closer look at the security of checks and bank account numbers - a timely topic after a fraudster attempted to steal thousands of dollars from Liz with a counterfeit check - an...Show More
Checks, mobile banking, cash transfer apps, and a bit more on credit cards
50:00 | Feb 19th, 2019
6) Credit and debit card security
An important part of your personal digital security is making sure your credit and debit cards are secure. In this episode, Liz and Geoffrey take a look at how attackers clone credit and debit cards, ...Show More
7) Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data
In a special holiday episode, Liz and Geoffrey take a look at some recent security stories in more detail, from surveillance databases facilitating identity theft to unexpected facial recognition at c...Show More
8) Built-in dangers: physical ports, OS defaults, and remote access
From the fancy new USB-C or Thunderbolt ports on your laptop to the software and settings that came with your operating system, there are a lot of potential security concerns with recent computers. Li...Show More
9) Malware, antivirus, and safe downloads
Malware, viruses, worms, adware - whatever you call them, you don't want them on your computer. But how do you keep them away? We take a look at the surprisingly involved process of downloading softwa...Show More
10) Backups
Backups are an important part of keeping your devices secure - as mentioned last episode, backups not only help with lost devices but also let you easily and confidently wipe a compromised computer an...Show More