Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Tag: podcast
Security Vendor News
S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix [Podcast + Transcript]
by Paul Ducklin •
Latest episode – listen and read now! Use our advice to advise your own friends and family… let’s all do our bit to stand up to scammers!
Uncategorized
Smashing Security podcast #281: Debug ransomware and win $1,000,000, period-tracking apps, and AI gets emotional
by Graham Cluley •
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft’s facial recognition tech no longer wants to know how you’re feeling.
All this and …
Europe, Global Security News, North America
DE:CODED – Firewall speeds and VPN risks
by SE Labs Team •
“If they are not getting any money from you, then where are they getting the money from?” Show notes for series 2, episode 2 Is your firewall as fast as you think? What does XDR mean and how does it work? Do you need a personal VPN? We talk to Brian Mo…
Security Bloggers, Security Vendor News
Malicious Life Podcast: The Cypherpunks Who Invented Private Digital Money
by Malicious Life Podcast •
Years before credit card transactions gave banks and data-brokers free access to our private financial information, a man named David Chaum became the first person to really, materially grapple with the problem of privacy in money. His ideas i…
Europe, Global Security News, North America
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
by Tom Eston •
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prev…
Global IT News
Preparing for When the Cookies Crumble
by Suzanne Robicheau •
The marketing industry has come a long way in accepting the revolutionary changes occurring in consumer-targeted advertising. The next step in preparing for a cookieless future is pioneering new ways to access additional data in a privacy compliant manner. “If you haven’t already, you need to start getting very serious about all of this because
Uncategorized
Smashing Security podcast #280: Hot tub hijinx, and a sentient AI
by Graham Cluley •
Internet-connected jacuzzis find themselves in hot water, and a Google engineer claims that their AI has developed feelings.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security v…
Security Vendor News
S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast + Transcript]
by Paul Ducklin •
Latest epsiode – listen (or read) now!
Europe, Global Security News, North America
The Post-COVID Cloud Boom Report: A Deep Dive
by Molly Vernarecci •
In this episode of the Security on Cloud Podcast, we’re joined by Dr. Larry Ponemon, the Chairman and Founder of the Ponemon Institute who is also considered by many to be a pioneer in privacy auditing, to talk more in-depth about the findings of our l…
Security Bloggers, Security Vendor News
Malicious Life Podcast: Celebrating Five Years of Malicious Life
by Malicious Life Podcast •
A recording of a special Malicious Live Ask Us Anything event to celebrate the 5 year anniversary of the show: How did Malicious Life come to be? How do we choose the stories we tell? Who was Ran’s most memorable guest? And why does Nate keep …
Europe, Global Security News, North America
Podcast: Focusing on What Matters with System Integrity Assurance
by Jacqueline von Ogden •
DATA SECURITY PODCAST
In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on system integrity assurance and how a system integri…
Europe, Global Security News, North America
Announcing the new Trail of Bits podcast
by Trail of Bits •
Trail of Bits has launched a podcast. The first five-episode season is now available for download. The podcast and its RSS feed are available at trailofbits.audio, and you may subscribe on all major podcast outlets, including Apple iTunes, Spotify, Gaa…
Security Bloggers
Episode 239: Power shifts from Russia to China in the Cyber Underground
by Paul Roberts •
Naomi Yusupov, a Chinese Intelligence Analyst at the threat intelligence firm CyberSixGill talks to host Paul Roberts about that company’s new report: The Bear and the Dragon: Analyzing the Russian and Chinese Cybercriminal Communities.
The post Epis…
Europe, Global Security News, North America
Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection
by Tom Eston •
A new bipartisan privacy bill, the American Data Privacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system befor…
Security Bloggers, Security Vendor News
Malicious Life Podcast: Hackers vs. Spies – The Stratfor Leaks Part 2
by Malicious Life Podcast •
In June 2011, a Con Edison truck was parked outside of Hector Monsegur’s New York apartment every day for over a week. But Hector – better known as Sabu, the ringleader of the LulzSec hacking group – wasn’t fooled. He guessed, correctly, that …
Security Vendor News
S3 Ep87: Follina, AirTags, ID theft and the Law of Big Numbers [Podcast]
by Paul Ducklin •
Lastest epsiode – listen now!
Uncategorized
Smashing Security podcast #279: Encrypted notes, and a deadly case of AirTag spying
by Graham Cluley •
How did a saxophonist sneak sensitive information in and out of the Soviet Union? How might an Apple AirTag have led to murder? And isn’t the world of cryptocurrency and blockchain doing just great?
All this and more is discussed in the latest edi…
Europe, Global Security News, North America
Wicked Good Development: The Evolution of Supply Chain Attacks
by Kadi Grigg •
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Security Bloggers, Security Vendor News
Malicious Life Podcast: Hackers vs. Spies – The Stratfor Leaks Part 1
by Malicious Life Podcast •
George Friedman and Jeremy Hammond are two very different people: the former is a capitalist middleman, the latter an anarchist-communist hacker. A spy and a hacker; but in certain respects, they’re actually quite similar in what lines they ar…
Europe, Global Security News, North America
Wicked Good Development: Dev Nexus Reflections and Conversations Part 3
by Kadi Grigg •
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Europe, Global Security News, North America
Hacking Ham Radio: Why It’s Still Relevant and How to Get Started
by Tom Eston •
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and AP…
Uncategorized
Smashing Security podcast #278: Tim Hortons, avoiding sanctions, and good faith security research
by Graham Cluley •
Trouble brews with the Tim Hortons app, Mandiant gets in a tussle with a Russian ransomware gang, and should good faith security researchers be at risk of prosecution?
All this and much more is discussed in the latest edition of the award-winning “S…
Security Vendor News
S3 Ep86: The crooks were in our network for HOW long?! [Podcast + Transcript]
by Paul Ducklin •
Latest episode – listen (or read) now!
Europe, Global Security News, North America
Podcast: MITRE ATT&CK Framework
by Jacqueline von Ogden •
DATA SECURITY PODCAST
In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on the MITRE ATT&CK Framework and how it can bette…
Europe, Global Security News, North America
Teaching and Learning Cybersecurity: Closing the Skills Gap, Part 1
by Heather Terry and Tom Kopchak •
Heather meets with Tom Kopchak to reflect on his recent experiences teaching cybersecurity and on what skills are needed to help bridge the cybersecurity skills gap. Also, make sure to check out some of our related posts and podcasts: Addressing the Cy…
Europe, Global Security News, North America
DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
by Tom Eston •
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the…
Security Vendor News
S3 Ep85: Now THAT’S what I call a Microsoft Office exploit! [Podcast]
by Paul Ducklin •
Latest episode – listen now!
Europe, North America
Being prepared for adversarial attacks
by Jeffrey Esposito •
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky…
Global IT News
Hashtag Trending June 2 – Elon rebuffs remote work; transport industry a long way away from carbon neutrality; smartphone cameras to rival pro cameras by 2024
by Samira Balsara •
Elon Musk dashes remote work, EV uptake is looking good, but needs more traction to reach carbon neutrality, and Sony says smartphone cameras will rival DSLRs by 2024. That’s all the tech news that’s trending right now, welcome to Hashtag Trending. It’s Thursday, June 2, and I’m your host, Samira Balsara. Elon Musk doesn’t like […]
The post Hashtag Trending June 2 – Elon rebuffs remote work; transport industry a long way away from carbon neutrality; smartphone cameras to rival pro cameras by 2024 first appeared on IT World Canada.
Uncategorized
Smashing Security podcast #277: Bad bots, cheeky ransoms, and good deepfakes
by Graham Cluley •
Ransom acts of kindness are top of our mind, as we also explore how bad bots are hogging more and more of the internet’s activity, and look at how deepfakes could be a good thing after all.
All this and much more is discussed in the latest edition o…
Global IT News
Cyber Security Today – Wed, June 1st
by Jim Love •
I’m Jim Love, CIO of IT World Canada sitting in for the vacationing Howard Solomon and this is Cyber Security Today for Wednesday, June 1st. This episode reports on a study from Kaspersky that shows some new mobile device threats, how at least one government may have to rethink the security aspects of digital ID […]
The post Cyber Security Today – Wed, June 1st first appeared on IT World Canada.
Europe, Global Security News, North America
Wicked Good Development: Dev Nexus Reflections and Conversations Part 2
by Kadi Grigg •
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Europe, Global Security News, North America
Wicked Good Development: Dev Nexus Reflections and Conversations Part 1
by Kadi Grigg •
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
The post Wicked Good Development…
Europe, Security Bloggers, Security Vendor News
Malicious Life Podcast: Catching A Cybercriminal
by Malicious Life Podcast •
AbdelKader Cornelius, a German Threat Researcher and an expert on the cybercrime ecosystem in German-speaking countries, shares a story about how he helped the German police put a sophisticated local cybercriminal behind bars by uncovering tin…
Europe, Global Security News, North America
The State of Application Security with Tanya Janca
by Tom Eston •
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this ep…
Security Vendor News
S3 Ep84: Government demand, Mozilla velocity, and Clearview fine [Podcast]
by Paul Ducklin •
Latest episode – listen now!
Uncategorized
Smashing Security podcast #276: Webcam extortion, Michael Fish, and food foul-ups
by Graham Cluley •
A browser extension bug let malicious websites spy on webcams, hackers threaten the global food supply chain, and Michael Fish (not that one…) hacked into his female classmates’ online accounts, hunting for nude photos and videos.
All this and muc…
Europe, Global Security News, North America
2.3 billion threats blocked: The state of the threat landscape Q1 2022
by Avi Hein •
Allot Secure blocked 618% more malicious URLs in the first quarter of 2022 than the previous year. What’s in store for the rest of the year? What did the past few months look like? This is explored in-depth in the recently released Allot Q1 2022 Cyber …
Security Bloggers, Security Vendor News
Malicious Life Podcast: What The LinkedIn Hack Taught Us About Storing Passwords
by Malicious Life Podcast •
In June 2012, an anonymous hacker posted a list of 6.5 Million encrypted passwords belonging to LinkedIn users on a Russian hacker forum. It was soon discovered that these passwords were hashed using an outdated and vulnerable hashing algorith…