William H. Webster, a former director of both the FBI and CIA, foiled a phone scammer who threatened him and his wife.
Over a number of weeks, Thomas, calling himself David Morgan, made a series of calls to the Websters, and they soon turned threatening: he described their house, and he said that if they didn’t hand over $6,000, he’d shoot them in the head or burn their house down, boasting that the FBI and CIA would never find him.
Can you imagine the look on that guy’s face when he learned who he threatened?
The CIA’s years-old Cherry Blossom surveillance hacks target lots of WiFi routers, but not Apple’s AirPort Basestations.
Apple may have patched most of the security flaws that Wikileaks revealed the CIA is exploiting, but not all of them. Apple has been scrambling trying to learn more about the remaining exploits and it looks like the help it needs is coming directly from Wikileaks. The organization said it plans to share everything it knows about the hacks with Apple, and it’s going to do the same for other tech companies the CIA targeted, too.
According to the Wikileaks Vault 7 information dump, the CIA has been hard at work developing hacks to get into the data on our iPhones. Most of the exploits listed in the report, however, are already patched and Apple is working on taking care of the remaining few.
Now that we’re thinking about privacy and the security of our computers and mobile devices again, we’re worried about encrypting email. Jeff Butts is here to set your mind at ease that email encryption is alive and well, and surprisingly easy to do on the Mac.
Bob LeVitus joins Bryan and Jeff to talk about his new book, Working Smarter for Mac Users. They talk about why Bob wrote it and the things Bryan learned from editing it. They also talk about the CIA iPhone hacks leaked to Wikileaks and the home automation hub they wish they could buy.