Follina, AirTags, ID theft and the Law of Big Numbers [Podcast] – Naked Security

Plenty of articles on Naked Security!

Please bear in mind that we research, prepare, record, edit and publish our podcasts for people who * do * like to listen to audio content (as well as or instead of written stuff), not for people who do not.

We do sometimes provide transcripts if we think they will be particularly useful (eg to help non-native English speakers follow along when we know we’ve used weird words or discuss really major issues).

But the simple truth is that written and spoken English are as good as two different languages. We do not write articles as if they were speeches, and we do not record podcasts simply as “spoken writing”, and they are not meant to be interchangeable.

Those who like reading are already well-served here; the podcasts are just extra content for people who like podcasts as well. If you do not like podcasts to the point that you will not listen to this one, then it seems unlikely you will suddenly start liking it just because we (by which I mean me – and it is really hard work!) Write it down word-for-word.

As you will see, we always link to the articles we discuss (and we almost always stick to items we have already dealt with in writing). So if you miss reading, there are three links in this article alone that should cheer you up!

.

Source

Plenty of articles on Naked Security!

Please bear in mind that we research, prepare, record, edit and publish our podcasts for people who * do * like to listen to audio content (as well as or instead of written stuff), not for people who do not.

We do sometimes provide transcripts if we think they will be particularly useful (eg to help non-native English speakers follow along when we know we’ve used weird words or discuss really major issues).

But the simple truth is that written and spoken English are as good as two different languages. We do not write articles as if they were speeches, and we do not record podcasts simply as “spoken writing”, and they are not meant to be interchangeable.

Those who like reading are already well-served here; the podcasts are just extra content for people who like podcasts as well. If you do not like podcasts to the point that you will not listen to this one, then it seems unlikely you will suddenly start liking it just because we (by which I mean me – and it is really hard work!) Write it down word-for-word.

As you will see, we always link to the articles we discuss (and we almost always stick to items we have already dealt with in writing). So if you miss reading, there are three links in this article alone that should cheer you up!

.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

Threat Intelligence Services Are Universally Valued by IT Staff

Almost all IT professionals believe that threat intelligence services and feeds will help their company get ready for and repulse malware attacks. Only...

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

The group has targeted 50 businesses from English speaking countries since April 2022. ...

APAC companies are failing to build successful digital models: Forrester

Approximately 61% of APAC organizations have failed to build robust and successful digital business business models, primarily due to unsound practices of enterprise architecture...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!