Loading...
Loading...
0 / 10 episodes
No episodes yet
Tap + Later on any episode to add it here.
We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over. Show Notes - https://www.grc.com/sn/SN-1074-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com hoxhunt.com/securitynow zscaler.com/security
Introducing Parenting Expert Emily Oster: The #1 Parenting Mistake That Causes Unnecessary Stress (Use THIS Data-Backed Framework to Debunk the Biggest Parenting Myths!) from On Purpose with Jay Shetty. Follow the show: On Purpose with Jay Shetty Parenting today feels like navigating endless advice while quietly wondering if you’re doing any of it right. Jay sits down with bestselling author and economist Emily Oster to unpack one of the most overwhelming journeys many people will ever face: becoming a parent. In a world filled with endless advice, social media pressure, and conflicting research, parenting can start to feel like a test you’re constantly failing. Emily offers a refreshing, data-driven perspective that helps parents cut through the noise, separating real evidence from the myths that fuel unnecessary anxiety. From pregnancy and fertility to sleep training and screen time, this conversation reveals what truly matters and what parents can finally let go of. Together, Jay and Emily challenge many of the parenting beliefs we’ve accepted without question. They explore why modern parents feel so overwhelmed by information and expectations, when the data actually shows there are many “right” ways to raise a child. Emily breaks down how correlation is often mistaken for causation in parenting advice and how that misunderstanding quietly drives guilt, fear, and comparison. Whether it’s breastfeeding versus formula, screen time, sleep training, or developmental milestones, Emily encourages parents to move away from perfection and toward confident, thoughtful decision-making. In this episode you'll learn: How to Stop Overthinking Parenting Decisions How to Decide What Parenting Advice to Ignore How to Choose the Sleep Strategy That Works for Your Family How to Raise Kids with a Growth Mindset How to Plan Parenting Decisions Before Problems Arise How to Let Go of the Pressure to Parent Perfectly Parenting can feel overwhelming, especially in a world filled with endless advice, opinions, and expectations. The truth is, raising a child isn’t about getting every small decision perfectly right, it’s about showing up with love, care, and intention, day after day. Emily’s book, Expecting Better: Why the Conventional Pregnancy Wisdom Is Wrong--and What You Really Need to Know, offers guidance through pregnancy and motherhood. Grab a copy now. With Love and Gratitude, Jay Shetty JAY’S DAILY WISDOM DELIVERED STRAIGHT TO YOUR INBOX Join 900,000+ readers discovering how small daily shifts create big life change with my free newsletter. Subscribe here. Check out our Apple subscription to unlock bonus content of On Purpose! https://lnk.to/JayShettyPodcast What We Discuss: 00:00 Intro 01:39 Why Does Parenting Feel Harder Today? 04:06 What the Data Really Says About Parenting 05:24 Don’t Trust This Fertility Advice! 07:56 What Affects Sperm Health 09:51 Lifestyle Habits That Affect Fertility 12:26 Are Antidepressants Safe During Pregnancy? 15:02 Which Pregnancy Rules Actually Matter (And Which Don’t) 18:25 When Is the Best Age to Have Kids? 21:56 Common Pregnancy Myths Debunked 31:19 How Dads Can Support After Birth 34:09 What’s Actually Best for the Baby? 36:51 More Parenting and Pregnancy Myths 44:20 How to Deal With Mom Guilt 47:55 How to Raise Confident Kids 54:28 Parenting Decisions That Cause Stress 56:27 The Truth About Sleep Training 01:02:03 Does Crying It Out Harm Attachment? 01:04:12 How Much Screen Time Is Too Much? 01:09:40 The Truth About Childhood Vaccines 01:12:02 Are Kids Being Overmedicated? 01:14:35 The Many Paths to Parenthood 01:16:49 This or That: Parenting Edition 01:24:31 Emily on Final Five Episode Resources: Website | https://parentdata.org/ Facebook | https://www.facebook.com/emily.oster.509/ Instagram | https://www.instagram.com/profemilyoster LinkedIn | https://www.linkedin.com/company/parentdata TikTok | https://www.tiktok.com/@profemilyoster X | https://x.com/ProfEmilyOster See omnystudio.com/listener for privacy information. DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].
The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity. Apple's 26.4 age queries catches many by surprise. LinkedIn's 2.7 MB of privacy-invading javascript. Microsoft starts forcing Win11 24H2 to 25H2. Cisco loses source code to the Trivy supply-chain mess. Proton introduces privacy-first voice and video "Meet." GitHub to fix lagging security of its Actions feature. Cloudflare reaffirms the privacy of its 1.1.1.1 DNS. Cloudflare uses AI to re-code better secure Wordpress. The FCC drops a ban on all new consumer-grade routers. Show Notes - https://www.grc.com/sn/SN-1073-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: meter.com/securitynow zscaler.com/security material.security bitwarden.com/twit hoxhunt.com/securitynow
An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster. Will California require Linux to verify its user's age. Apple's iOS 26.4 requires UK users to prove their age. Russia chooses to use home grown 5G mobile encryption. Ukraine knew the webcam was installed by Russian spies. Google moves quantum computing "Q Day" to 2029. At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements. More information about nasty ClickFix campaigns. More than one in seven Reddit postings are an AI-bot. The story behind the LiteLLM disaster that was averted. Show Notes - https://www.grc.com/sn/SN-1072-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit adaptivesecurity.com guardsquare.com meter.com/securitynow
When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years. H&R Block's tax software does something SO WRONG. The Intoxalock breathalyzer calibration cyber attack. Firefox now offers a 100% free built-in VPN. TikTok and Meta's tracking pixels are so much more. Russians beg for the return of Telegram, WhatsApps and others. Never connect your crypto-wallet to an unknown service. What would a week be without a Cisco CVSS of 10.0. Ubiquiti patches a 10.0 critical flaw. Listener feedback and... What's "Bucketsquatting" and what can be done to prevent it Show Notes - https://www.grc.com/sn/SN-1071-Notes.pdf Hosts: Steve Gibson and Mikah Sargent Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow guardsquare.com outsystems.com/twit zscaler.com/security
Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge. The Security Now "Caption That Photo" contest. A mega social media company says "no" to strong encryption. WhatsApp to give parents more control, Consumer bandwidth proxying is becoming a big deal. Meta buys the Moltbook duo. The EU gives up and settles upon the status quo. When a ransomware negotiation is not what it seems. CISA compels federal agencies to submit their logs. Is that a VPN in your pocket or something more malicious. Be careful what you download, thinking it's AI. A super-clever and super-simple A/V scanner bypass. Will AI write code for me? Another listener discovers the Joy of AI. Steve's CISA Internet scanning experience Show Notes - https://www.grc.com/sn/SN-1070-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit joindeleteme.com/twit promo code TWIT material.security canary.tools/twit - use code: TWIT adaptivesecurity.com meter.com/securitynow
Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy. Anthropic & Mozilla improve Firefox's security. Apple & Google begin testing cross-platform RCS encryption. Ubuntu's SUDO starts echoing asterisks. Inviting a web proxy into your home. Apple devices cleared by Germany for NATO's use. A serious remote takeover of OpenClaw. TokTok won't encrypt messaging for visibility. Microsoft bans the term "Microslop" on Discord. Lot's of great listener feedback. LLMs could make Orwell's 1984 seem optimistic. Show Notes - https://www.grc.com/sn/SN-1069-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit zscaler.com/security guardsquare.com hoxhunt.com/securitynow
Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida. The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design, deployment and policy that have placed far too much trust on the conduct of those on the inside, behind our borders. Whether deliberate, inadvertent, or externally penetrating, the greatest challenge we now face is that of designing and deploying our internal security with strict adherence to the principles of least privilege and zero trust. Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: threatlocker.com/twit
A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses. The lowdown on last week's "no turn" picture of the week. Is an AI-driven hacking campaign a big deal now. Clause used in multiple Mexican government attacks. Apple continues to be confronted with age restrictions. COPPA needs an exception to allow age collection. Meta swamps law enforcement with AI-slop CSAM reports. Roskomnadzor has been busy blocking VPNs. Guess how many. The UK tries to report their self-scanning success. Remember that hacker who extorted the psychotherapy patients. Scattered Lapsus$ Hunters is actively recruiting women. Cisco lands another breathtakingly rare 10.0 CVSS. VulnCheck's report on 2025 vulnerabilities and exploits. Steve discovers a fabulous $72 Hardware Security Module. A listener shares an interesting AI service discovery. The very potent "ClickFix" exploit evolves Show Notes - https://www.grc.com/sn/SN-1067-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: meter.com/securitynow guardsquare.com threatlocker.com/twit adaptivesecurity.com outsystems.com/twit
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security fixes for Firefox on Windows 7 & 8. Russia blocks the official Linux kernel site they need. Will the U.S."freedom.gov" site post EU blocked content. LLM's will offer secure passwords. Do Not Use Them. As predicted, the "ClickFix" attack strategy takes over. A listener believes his computer is compromised. How could three popular password managers get things wrong. Show Notes - https://www.grc.com/sn/SN-1066-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: guardsquare.com bitwarden.com/twit zscaler.com/security hoxhunt.com/securitynow material.security
How secure are your Chrome extensions and certificate signings really? This episode pulls back the curtain on a massive spyware discovery and exposes the convoluted hoops developers must jump through to prove their identity in 2026. Websites can place high demands upon limited CPU resources. Microsoft appears to back away from its security commitment. What's Windows 11 26H1 and where do I get it. Chrome 145 brings Device Bound Session Credentials. More countries are moving to ban underage social media use. The return of Roskomnadzor. Discord to require proof of adulthood for adult content. Might you still be using WinRAR 7.12 -- I was. Paragon's Graphite can definitely spy on all instant messaging. 30 malicious Chrome Extensions. 287 Chrome extensions from spying on 37.4 million users. The first malicious Outlook add-in steals 4000 user's credentials. Some AI "vibe" coding thoughts. What I just went through to obtain a new code signing certificate Show Notes - https://www.grc.com/sn/SN-1065-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT meter.com/securitynow zscaler.com/security hoxhunt.com/securitynow