All Episodes

October 2, 2024 8 mins
Today : E033-2024 Cyberium Podcast - T-Mobile and the Cybersecurity Challenge- Lessons from the FCC's Record Fine and the Future of Data Protection in Telecommunications  https://technocratico.it/2024/10/t-mobile-e-la-sfida-della-cybersicurezza-lezioni-dalla-sanzione-record-della-fcc-e-il-futuro-della-protezione-dati-nelle-telecomunicazioni/

 
In each episode, we dive into articles published on technocratico.it by Raffaele Di Marzio or explore his reflections brought to life through AI analysis and techniques, powered by Gemini Pro, which present in-depth discussions in English, explaining the topics in a simple and concise manner. Our mission is to reveal, in a straightforward yet precise way, how technology influences every aspect of our personal and professional lives. Whether you're a tech industry professional seeking expert insights or a curious listener wanting to understand how digital security impacts your daily life, Cyberium is your gateway to comprehending the holistic influence of technology, offering a unique perspective thanks to the integration of cutting-edge AI analysis.

Tune in to gain valuable perspectives and stay ahead in the rapidly evolving tech landscape. 

All reproductions rights are reserved by Cyberium Media Miami Productions and Technocratico.it

Content creator : Raffaele DI MARZIO https://www.linkedin.com/in/raffaeledimarzio/

For inquiries, you can reach us at podcast@cyberium.media.
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:02):
Welcome to Siberian. Here, technology and cybersecurity are made simple
for everyone. Whether you're a tech geek or just curious
about the digital world, we've got you covered. Each episode,
we dive into the latest topics from technocratico dot it
and break them down so you can stay informed and protected.

Speaker 2 (00:23):
This is a.

Speaker 1 (00:23):
Siberian Media Miami production. Let's get into it.

Speaker 3 (00:28):
The scab and gulcious Flame make us a blood bad
fame to love it to fucking holess see ourselves.

Speaker 4 (00:42):
And remember this right, So today we're gonna dive into
this whole thing with T Mobile and the FCC. Yeah.

Speaker 2 (00:55):
Yeah, it's a big one.

Speaker 4 (00:56):
People send us a ton of articles about it, so
let's into it.

Speaker 2 (01:01):
Yeah.

Speaker 5 (01:01):
I think you know, the thing that really makes this
interesting is this isn't just like a T Mobile specific thing.
This is like an industry wide issue that I think
this is gonna maybe change some things for everybody. You know.

Speaker 4 (01:13):
So you're saying, this isn't just T Mobile messing.

Speaker 2 (01:15):
Up, it's bigger, way bigger.

Speaker 6 (01:18):
So T Mobile they had multiple data breaches.

Speaker 5 (01:21):
Right between twenty twenty one and twenty twenty three, and
we're talking millions of customers, Okay, and It wasn't just
like oh they got your email.

Speaker 6 (01:30):
It was like names, addresses, birth dates.

Speaker 2 (01:35):
They even got driver's license info out there.

Speaker 6 (01:37):
Yeah, so like, you know, everything an identity thief would
need to like really mess up your life is out there.

Speaker 4 (01:44):
So this is like this is bad, right, And I'm
guessing that's why the FCC find them all that money.

Speaker 2 (01:49):
Yeah, thirty one point five million dollars. Wow, that's a
lot of money.

Speaker 4 (01:53):
It's gotta be like pocket changed to them though.

Speaker 2 (01:55):
You would think so. But here's the thing.

Speaker 6 (01:57):
It's not really about the money.

Speaker 5 (01:59):
It's about what the FCC is making them do now
because of it. Okay, So it's like, imagine, instead of
just getting detention, you have to rewrite the school rules.

Speaker 6 (02:10):
Right, Like that's oh wow, that's kind of what's happening here.

Speaker 4 (02:13):
Okay, So what what are they making them do?

Speaker 5 (02:15):
Well?

Speaker 6 (02:16):
For one, they're making T Mobile use this thing called
zero trust architecture.

Speaker 4 (02:22):
Zero trust. That sounds that sounds kind of harsh, doesn't
it cool, Like not even a little bit of trust.

Speaker 2 (02:26):
Yeah.

Speaker 5 (02:27):
So see, the way it used to be was companies
they just kind of assumed everything inside their network was safe.

Speaker 4 (02:34):
Yeah, but zero.

Speaker 5 (02:35):
Trust is like you treat every single device, every user,
even your own employees.

Speaker 2 (02:40):
Wow, like they could be a threat.

Speaker 6 (02:42):
Okay, so you're constantly verifying everything, so.

Speaker 4 (02:45):
It's less like trust but verify and more like always.

Speaker 2 (02:48):
Be suspicious exactly. Yeah. It's like, you know, you have
a key to get.

Speaker 6 (02:52):
Into your house, right, yeah, but what if you needed
a separate key card to get.

Speaker 2 (02:56):
Into your bedroom. Okay, you know, like that extra layer.

Speaker 4 (02:58):
It's like layers of secure exactly. Yeah, got it. Okay,
so even if someone gets one key, they can't get everything.

Speaker 2 (03:04):
Okay, that makes sense. But what about passwords? I mean
like those are still important? Right?

Speaker 4 (03:09):
Oh yeah definitely. And this is where it gets really interesting.

Speaker 6 (03:11):
If you're trying to log into something and it like
texts you a code.

Speaker 4 (03:16):
Yeah, like all the times, like come on, I just
want to order my food exactly, Like why are you
making this so difficult?

Speaker 2 (03:21):
Right? But that that's called multi factor authentication or MFA.

Speaker 6 (03:24):
MFA Yeah, and that's about to be your new best
friend because the SEC is making t Mobile put it everywhere.

Speaker 4 (03:30):
So it's like a bodyguard for all my data pretty much,
so even if someone gets my password, they still.

Speaker 2 (03:35):
Can't get in exactly. Yeah, that's way more secure.

Speaker 4 (03:38):
That actually makes me feel a little bit better. Yeah,
this is kind of like a pain, but I guess
if it keeps my info.

Speaker 2 (03:43):
Safe, well, think about it. It's not just about like
checking your phone bill. This data is used for everything.

Speaker 5 (03:49):
Oh yeah, true, like targeted ads, credit checks, even like
security clearances and stuff.

Speaker 4 (03:54):
Wait, seriously, like that's kind of scary, right, it's a
big deal. Okay, So one hundred and ninety six million
dollars that's like it's a lot. Yeah, even for like
AT and T and Verizon Iman.

Speaker 2 (04:04):
Yeah, it's a big deal.

Speaker 4 (04:05):
So what they do? What's that about?

Speaker 6 (04:07):
So they were selling user location data without people's permission?

Speaker 4 (04:12):
Seriously.

Speaker 6 (04:13):
Yeah, so like remember those spam calls they like somehow.

Speaker 2 (04:17):
Know where you are.

Speaker 4 (04:18):
Yeah, it's like creepy.

Speaker 2 (04:20):
Yeah, that's exactly what's happening.

Speaker 4 (04:22):
So they were selling that info.

Speaker 2 (04:23):
Yep.

Speaker 5 (04:24):
And it's not just spam calls, okay, Like this data
can be used for all kinds of stuff.

Speaker 2 (04:29):
Oh no, and some of it not good.

Speaker 4 (04:31):
Okay, So is this is this like everyone? Then it's
not just T Mobile.

Speaker 5 (04:37):
It seems like yeah, it's like this whole industry, right, yeah,
like they have so much of our information and they're
not like taking care of it.

Speaker 4 (04:46):
Well that's kind of like, I don't know, it's weird
because we need them, yeah, to like you know, be
online and stuff. Right, then they're like selling our info
out from under us. It's just it's weird.

Speaker 2 (04:56):
It is weird.

Speaker 6 (04:56):
It's like this trade off, like, yeah, we want all
this convene, but then what are we giving up?

Speaker 4 (05:03):
Yeah, exactly, That's that's a good question.

Speaker 6 (05:05):
And that's why this whole T mobile thing is important.

Speaker 2 (05:07):
It's like it's making people think about it.

Speaker 4 (05:09):
Okay, well what about us though.

Speaker 2 (05:11):
Like what are we supposed to do about all this?

Speaker 4 (05:13):
You mean, yeah, should we all just like throw our
phones away and like move to the woods or something.

Speaker 6 (05:18):
Well that sounds kind of nice actually, I know, right,
but probably not realistic.

Speaker 5 (05:24):
Yeah, but there are things you can do, Okay, Like
what so, first.

Speaker 6 (05:31):
Of all, MFA multi factor authentication, turn it.

Speaker 4 (05:36):
On everywhere everywhere everywhere?

Speaker 6 (05:39):
Yeah, like your email, social media, banking apps.

Speaker 2 (05:43):
All of it.

Speaker 4 (05:43):
That sounds kind of knowing all those coaches.

Speaker 5 (05:45):
You know, I know, it's like you wouldn't leave your
front door unlocked, right, true, same idea.

Speaker 4 (05:50):
Okay, that makes sense. What else?

Speaker 6 (05:52):
And then like just be careful what you share online.
Like do you really need that app to have your
whole contact list?

Speaker 4 (05:59):
Probably?

Speaker 2 (06:00):
Yeah, just think about it.

Speaker 4 (06:01):
So it's like every time I click something, I gotta
be careful.

Speaker 2 (06:04):
Yeah, be mindful.

Speaker 4 (06:05):
You know. It's like all that stuff adds up right.

Speaker 2 (06:08):
To like this whole profile of you.

Speaker 4 (06:10):
It's kind of creepy when you think about it, right, Like, no,
wonder those ads are so good exactly, Like how did
they know I want that?

Speaker 6 (06:17):
Yeah, it's like they're reading your mind, it is.

Speaker 4 (06:20):
Okay, so we've got to be careful, be mindful anything else.

Speaker 6 (06:25):
I think the big thing is like just knowing this
is happening. Okay, the more we know, the more we
can demand better.

Speaker 4 (06:33):
From these companies.

Speaker 6 (06:34):
Yeah, Like it's our data, it is we should have
a say in it.

Speaker 4 (06:37):
Right exactly. So like if these huge companies can't even
keep our info safe, what are we supposed to do?

Speaker 3 (06:45):
Well?

Speaker 4 (06:45):
Yeah, it's tough for it feels kind of hopeless.

Speaker 6 (06:48):
It's like they have all the power, right, but here's
the thing. Okay, they need our data, that's true.

Speaker 2 (06:53):
I gets like that's how they make money. Yeah, so
that gives us some power too, you know.

Speaker 4 (06:58):
So what like we like, boycott them, start a petition
or something.

Speaker 7 (07:03):
I mean, hey, if you want to go for it, right,
But even just small things can help, like read the
privacy policies. Oh come on, nobody reads those I know,
I know, but they tell you what they're doing with
your info.

Speaker 4 (07:14):
True.

Speaker 5 (07:15):
And you know when you download an app and it
wants access to like your camera or your contacts.

Speaker 4 (07:20):
Yeah, it's like why do you need that?

Speaker 2 (07:21):
Right? Ask yourself? Do they really need that?

Speaker 4 (07:24):
Yeah? Good point?

Speaker 2 (07:25):
And if not, don't give it to them.

Speaker 4 (07:26):
So it's about like taking back some control exactly, instead
of just clicking agree without thinking.

Speaker 2 (07:33):
Right, be aware?

Speaker 4 (07:34):
Yeah, okay, I get it.

Speaker 2 (07:36):
It's your information. You have a right to know.

Speaker 4 (07:38):
That's true. Well I learned a lot today me too.
Kind of scary but also good to know.

Speaker 2 (07:44):
Right, knowledge is power exactly.

Speaker 4 (07:47):
All right. Well that's all the time we have for today.

Speaker 2 (07:49):
Yeah, thanks for having me.

Speaker 4 (07:50):
This was great. Thanks for you know, breaking it all
down for us, I think, and everyone listening. Thanks for
joining us on this deep dive. And remember be careful
out there can stand for.

Speaker 3 (08:00):
Armed substrata alongs full results.

Speaker 4 (08:06):
Who are you going to cross? All reproduction rights are
reserved by Siberian Media, Miami Production and Technocratico dot it.

Speaker 3 (08:18):
For inquiries, you can reach us at podcast at Siberium
dot media.
Advertise With Us

Popular Podcasts

24/7 News: The Latest
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

The Clay Travis and Buck Sexton Show

The Clay Travis and Buck Sexton Show

The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.