Insights Into Things
Insights Into Things is a podcast network bringing unique perspectives and deep dives into some of the every day things we deal with on a regular basis. From the trials and tribulations teenagers face, to mysteries and frustrations of today‘s technology, to perspectives on historical events and how they affect us today right down to the latest in pop culture and entertainment news. Insights Into Things offers shows that provide perspective, knowledge and insights into things that matter to you. Insights Into Things, insightful podcasts by informative hosts
Episodes

8 hours ago
8 hours ago
In this week's episode of Insights Into Technology, the team dives into a busy news cycle filled with data security stumbles and cross-continental policy drama.
First up: The FTC has warned major U.S. tech companies not to comply with international censorship or encryption-weakening laws—like those in the UK and EU—if it risks violating American user rights. The FTC’s message? Obey foreign laws at the expense of U.S. privacy, and you might face legal heat at home. Companies like Apple, Meta, and Microsoft are now caught in a legal tug-of-war that could reshape how global platforms handle compliance.
Next, macOS users fall prey to a new social engineering campaign using fake tech-support ads that trick users into installing the SHAMOS infostealer. The malware bypasses Gatekeeper, steals sensitive data, and burrows deep into the system for persistence—posing a rising threat for Mac-heavy enterprise environments.
We also examine a whistleblower report accusing a federal agency (DOGE) of uploading Social Security data for 300 million Americans to an insecure cloud server—without oversight or proper security. While no breach has been confirmed, the mere exposure highlights a critical failure in government data governance and cloud risk management.

8 hours ago
8 hours ago
In this week's episode of Insights Into Technology, the team dives into a busy news cycle filled with data security stumbles and cross-continental policy drama.
First up: The FTC has warned major U.S. tech companies not to comply with international censorship or encryption-weakening laws—like those in the UK and EU—if it risks violating American user rights. The FTC’s message? Obey foreign laws at the expense of U.S. privacy, and you might face legal heat at home. Companies like Apple, Meta, and Microsoft are now caught in a legal tug-of-war that could reshape how global platforms handle compliance.
Next, macOS users fall prey to a new social engineering campaign using fake tech-support ads that trick users into installing the SHAMOS infostealer. The malware bypasses Gatekeeper, steals sensitive data, and burrows deep into the system for persistence—posing a rising threat for Mac-heavy enterprise environments.
We also examine a whistleblower report accusing a federal agency (DOGE) of uploading Social Security data for 300 million Americans to an insecure cloud server—without oversight or proper security. While no breach has been confirmed, the mere exposure highlights a critical failure in government data governance and cloud risk management.

Saturday Jun 21, 2025
Insights Into Technology: Episode 30 "The Signal and the Noise" (AUDIO)
Saturday Jun 21, 2025
Saturday Jun 21, 2025
Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.
Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

Saturday Jun 21, 2025
Insights Into Technology: Episode 30 "The Signal and the Noise" (VIDEO)
Saturday Jun 21, 2025
Saturday Jun 21, 2025
Explore the latest cybersecurity trends in this episode of 'Insights into Technology.' From the Washington Post’s rapid response to a foreign government cyberattack targeting journalists, to the vulnerabilities of SMS-based two-factor authentication, we dissect the growing threats in the digital landscape.
Delve into Denmark’s bold move towards digital sovereignty by shifting to open-source software and uncover how real-world zero trust implementations are shaping cybersecurity measures. Plus, understand the risks associated with outdated consumer hardware in critical infrastructure as the persistent evolution of cyber threats threatens outdated devices. Get updated on these timely tech issues and grasp the impact on global security dynamics.

Sunday Jun 15, 2025
Sunday Jun 15, 2025
In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

Sunday Jun 15, 2025
Sunday Jun 15, 2025
In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

Monday May 26, 2025
Monday May 26, 2025
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.
Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.
Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

Monday May 26, 2025
Monday May 26, 2025
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities.
Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce.
Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

Saturday May 17, 2025
Saturday May 17, 2025
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy.
Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.

Saturday May 17, 2025
Saturday May 17, 2025
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy.
Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.