Subscribe
Sign in
Home
Podcast
#TBOT Show
Above Webinar Clips
Above in the World
About
Above Phone Webinars | Clips
Latest
Top
Discussions
Why Memory Exploits Cause So Many Vulnerabilities
Most phone vulnerabilities stem from memory exploits.
May 6
•
Take Back Our Tech
6
1
3:16
Taking Control: How to Check If Your Phone Was Targeted
You can face these threats head-on.
May 1
•
Take Back Our Tech
20
2
2
1:54
Unlock Private Translation with Local AI!
Discover how to use local AI as your personal translator.
Apr 28
•
Take Back Our Tech
5
2
1
3:30
AI Is Only One-Third of the Problem
In this segment from a recent webinar, I explain that AI is just one piece of the puzzle.
Apr 23
•
Take Back Our Tech
17
3
2
3:33
How a Zero-Day Attack Targeted an Activist
This story of an activist in the UAE shows the sophistication of zero-day exploits.
Apr 20
•
Take Back Our Tech
14
4
4:16
Network Injection: The Attack You Never Clicked
One activist didn’t click anything—yet spyware was injected anyway.
Apr 16
•
Take Back Our Tech
16
3
5:08
The Hidden Pitfalls of Google Maps for Businesses
Did you know that competitors can manipulate business locations on Google Maps?
Apr 14
•
Take Back Our Tech
7
2
3
1:22
The One-Click Exploit: A Journalist’s Close Call
A Mexican journalist reporting on political scandal received a wave of fake texts: a Facebook warning, a TV headline, even a debt notice.
Apr 8
•
Take Back Our Tech
6
2
2:06
The Rise of Wi-Fi Positioning Systems
Beyond GPS, modern tech giants like Google and Apple have mapped billions of Wi-Fi access points worldwide.
Apr 6
•
Take Back Our Tech
11
4
4:24
What to Use Instead of Calls and Texts
Standard calls and texts aren’t private—records can be logged for years.
Apr 3
•
Take Back Our Tech
19
1
5
5:20
Understanding Telegram’s Privacy and Security
Telegram is trusted by millions, but how does it handle your data?
Mar 30
•
Take Back Our Tech
14
3
3:53
Enhance Your Security with Aegis Authenticator
Explore the world of time-based one-time passwords!
Mar 27
•
Take Back Our Tech
12
3
5:32
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts