[subscription channel 711]Best Security podcasts — Latest news, interviews and information (updated August 4, 2015; image by Yuri Yu. Samoilov)
A brief daily summary of what is important in cyber security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the often insane world of information security. Bringing colorful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and technology that you need to help make decisions in your daily life and in your organization.
Defensive Security is a weekly information security podcast which reviews recent high profile security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Never on a schedule, but always up to date!
Um podcast que trata de temas que envolvam o Direito da Tecnologia e a Segurança da Informação. Visa fazer uma abordagem jurídica e técnica diferenciada das questões afetas à Tecnologia da Informação. O podcast conta com a participação de Guilherme Damasio Goulart, Mestre em Direito pela UFRGS, consultor em Segurança da Informação, professor universitário e advogado e também de Vinícius Serafim, Mestre em Ciência da Computação pela UFRGS, consultor em Segurança da Informação e professor universitário.
Podcast by Sophos Security
Risky Business primary podcast.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Winner of the 2009 and 2007 people's choice award for best Technology/Science podcast. Records live at http://live.twit.tv/ every Tuesday at 1:30pm PT/4:30pm ET.
The CyberJungle is the nation's first news talk show on security, privacy and the law.
Co-sponsored by Cigital and IEEE Security & Privacy.
Join Andy Willingham, Martin Fisher, and Steve Ragan as they discuss information security, news, and interview interesting folks. They focus on the operational and leadership aspects of information security using a distinctly southern viewpoint.
An in-depth look at computer security from the insides out. Assuming no computer science background we build you from the fundamentals up to being able to deal with current issues in computer security. We're two guys, one with a comprehensive computer security background and the other is here to keep him from jumping too far into the deep end.
Animé par 3 jeunes ingénieurs évoluant dans le domaine, ce podcast mensuel traite des différentes problématiques de la sécurité informatique. Toujours dans la bonne humeur, on échange sur l’actualité, réalise des dossiers sur des sujets techniques, partage les opinions de chacuns lors de débats… Alors, n’hésitez pas, et venez nous rejoindre au Comptoir Sécu !
The Standard Deviant Security Podcast is a bi-weekly show that takes an in-depth look at the people behind the cyber security stories you hear in the news. Each episode cuts through the noise and hype to deliver compelling and entertaining interviews with people that are challenging the status quo. Hosted by Tony Martin-Vegue -- www.thestandarddeviant.com
Notícias, Artigos e Inovação em Tecnologia e Segurança da Informação
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. Each issue is filled with interesting commentary, pointed critique, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. This is the audio version of the Crypto-Gram Newsletter, and is read by Dan Henage.
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
нерегулярный подкаст о жизни ресечеров по обе стороны океана
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Are you ready to ignite your information security career? Well, then buckle up, put on your tin foil hat and get ready for Hackers on Fire! Join your host, cybersecurity veteran Glen Roberts, as he interviews information security professionals about getting into infosec, recommendations for advancing within the cyber security profession and priceless, career-accelerating hacker advice. Information security career development podcast. If you like Black Hat, Defcon, Security Now, Security Weekly, Hak5, Hacker Public Radio and cyber security in general-you will also enjoy Hackers on Fire. You can also listen to the podcast and even download the mp3's at www.HackersOnFire.com.
In this series of podcasts, CERT provides both general principles and specific starting points for business leaders who want to launch an enterprise-wide security effort or make sure their existing security program is as good as it can be.
SecuraBit is an information security podcast that features some of the biggest names in the industry who come on to talk to us about what they're up to. We also engage in both light and heavy discussion on the latest news and goings on in the community. We aren't intended to be an authoritative source of information if you're writing a paper for some infoseec class inc ollege. Our goal is to bring the community closer together and to help people understand who the movers and shakers are in the industry, as well as to entertain and have fun! We are: Anthony Garther, Chris Gerling, Chris Mills, Jason Mueller, Andrew Borel, and more folks behind the scenes who help us be unique! Please visit our website at http://www.securabit.com and send questions/comments to email@example.com. You can also find us in IRC at irc.freenode.net #securabit and follow us on twitter at @securabit. Thanks!!
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
Подкаст о высоких технологиях и кибербезопасности
Covering Tenable's Unified Security Monitoring products including Nessus & Security Center. We also discuss the latest security news and vulnerabilities, in addition to interviewing some of the industry's finest.
This is where you can listen to the ideas and opinions of Michael Farnum and Jim Broome about information security, geek toys, security consulting, and other great topics.
No full episode this week thanks to Security Summer Camp, but Martin got to sit down and chat with good friend of the podcast Wendy Nather. We'll be back soon!
SSH Scanning on Port 8080 https://isc.sans.edu/forums/diary/Your+SSH+Server+On+Port+8080+Is+No+Longer+Hidden+Or+Safe/19995/Donald Trump Website Defaced http://pastebin.com/QiBeec2LThunderstrike 2 Apple EFI Vulnerability http://www.wired.com/2015/08/researchers-create-first-firmware-worm-attacks-macs/Symentec Endpoint Protection Suite Vulnerabilities http://codewhitesec.blogspot.be/2015/07/symantec-endpoint-protection.html
In this episode Raf asks - Why haven’t we solved the same old software security bugs? James asks how a security team gets out of the way and still get better security? We discuss threat modeling, and channel a bit of John Steven Jeff talks about the OWASP ESAPI and standard security libraries and controls Jeff talks about “libraries with known vulnerabilities” and the role of open source components Raf brings up the ugly side of enterprise outsourcing - code development by committee We discuss static, dynamic and run-time security tools Raf asks Jeff what the RIGHT approach to creating a software program looks like Guest Jeff Williams ( @PlanetLevel ) - Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast. In 2002, Jeff co-founded and became CEO of Aspect Security, a successful and innovative consulting company focused on application security. Jeff is also a founder and major contributor to OWASP, where he served as the...
Threatstop Sponsors Internet Storm Center Stormcast http://www.threatstop.com/?src=sanspodcastWriting Better Security Policies https://isc.sans.edu/forums/diary/Your+Security+Policy+Is+So+Lame/19991/ http://www.sans.org/security-resources/policies/Fake Windows 10 Update http://blogs.cisco.com/security/talos/ctb-locker-win10Bitdefender Breach http://www.forbes.com/sites/thomasbrewster/2015/07/31/bitdefender-hacked/Vulnerabile Drug Infusion Pumps Should No Longer Be Used http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm456815.htmDell BIOS Not Write Protected After Hybernate https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2890 http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L
http://fortune.com/2015/07/29/crowdstrike-cybersecurity-george-kurtz/ http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/phishing-up-74-in-q2-2015-reveals-infoblox-dns-threat-index/ http://blog.trendmicro.com/trendlabs-security-intelligence/angler-exploit-kit-used-to-find-and-infect-pos-systems/ http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/
This week on Cyber Frontiers Christian is joined by Ashton and Jim to cover a variety of hot topics on the cyber frontier. Ashton first gives us a deep dive […]
BIND ISC Vulnerability Details https://www.isc.org/blogs/about-cve-2015-5477-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure/Using "R" From the Commandline https://isc.sans.edu/forums/diary/Tech+tip+Invoke+a+system+command+in+R/19979/Android DoS Vulnerability http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-vulnerability-that-renders-android-devices-silent/
Join security experts Chester Wisniewski and John Shier as they discuss and explain the week's computer security news. This week Chet and John talk about Pakistan banning Blackberry servers, Linux's role in the malware ecosystem, Windows 10 privacy SNAFUs, the latest zero day vulnerability in Android (Stage Fright) and the sentencing of those behind the DNS Changer malware.
This week we're checking in with Josh Drake of Zimperium. With exploitation of Stagefright via Josh's sweet, sweet exploit you'd think the mother of all worms is coming. Well, probably not. Later versions of Android are tricky to exploit, and the diversity of hardware in earlier versions means coming up with one exploit to rule them all isn't really feasible. We'll drill down into that with Josh in a little while. read more
Windows 10 ReleasedTracking Point Smart Rifle Vulnerability https://threatpost.com/researchers-manipulate-rifles-precision-targeting-system/114028Keyboard Privacy Extension for Chrome https://chrome.google.com/webstore/detail/keyboard-privacy https://paul.reviews/behavioral-profiling-the-password-you-cant-changeUnited Airlines Compromise https://www.washingtonpost.com/news/the-switch/wp/2015/07/29/why-would-chinese-hackers-would-want-to-go-after-an-airline/Bind Patches DoS Flaw https://kb.isc.org/article/AA-01272
Fiat/Chrysler hacking follow-up, the Android "StageFright" flaw, the security practices of experts vs. non-experts, Major DMCA news, the Anti-Phishing Working Group's Global Phishing Survey, the right way to silence the Windows 10 upgrade pesterings, and what is HORNET? We invite you to read our show notes. Download or subscribe to this show at twit.tv/sn. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Bandwidth for Security Now is provided by Cachefly.
By firstname.lastname@example.org (Leo Laporte)
By email@example.com (Leo Laporte)
Angler's Best Friends https://isc.sans.edu/forums/diary/Anglers+best+friends/19959/Android MMS Media Library Exploit http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/Windows 10 Support for Intel Real Sense https://software.intel.com/en-us/blogs/2015/03/19/realsense-sdk-and-camera-setup-on-windows-10Valve Software Password Reset Vulnerability https://threatpost.com/valve-patches-password-reset-vulnerability-in-steam/113976
http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/ http://www.mcafee.com/us/resources/reports/rp-aspen-holding-line-cyberthreats.pdf http://arstechnica.com/tech-policy/2015/07/obama-administration-decides-not-to-blame-china-publicly-for-opm-hack/ http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/
Is Patching in 2 Days Possible?https://isc.sans.edu/forums/diary/Patching+in+2+days+tell+him+hes+dreaming/19957/NHTSA Orders Fiat/Chrysler Recall of Vulnerable Vehicleshttp://www-odi.nhtsa.dot.gov/owners/SearchCurrentMonthRecall#New Version of Google Chrome http://googlechromereleases.blogspot.co.uk/2015/07/stable-channel-update_21.html?m=1Malicous Images Can Affect Cars http://www.bbc.com/news/technology-33622298
Join Sophos experts John Shier and Paul Ducklin in the latest episode of our thought-provoking security podcast. In this week's quarter-hour: cybercrime (and punishment), crimeware, the infamous Angler exploit kit, and how the Fourth Amendment applies to social networks.
Four 0-Days Affecting Internet Explorer Mobile Released https://isc.sans.edu/forums/diary/Some+more+0days+from+ZDI/19953/Virtual Machine Side Channel Attacks Leak Crypto Keyshttp://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/Drupal / Wordpress Updates https://wordpress.org/news/2015/07/wordpress-4-2-3/ https://www.drupal.org/node/2537860Userhelper / libuser Allow Privilege Escalation http://www.openwall.com/lists/oss-security/2015/07/23/16AV Comperatives Release Mac Anti Virus Test Results http://www.av-comparatives.org/mac-security-reviews/
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices—specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat—has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call “going dark” and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request. Keys Under Doormats paper Show 81: Interview with Steve Bellovin Show 90: Interview with Matthew Green Thoughts on Encryption and Going Dark: Counterpart The rise of the new Crypto War The post Show 112: Steve Bellovin and Matt Green discuss “Crypto Wars II” appeared first on Cigital...
In this week's feature interview we're chatting with Dave Jorm, our resident North Korea watcher. Some of you might remember Dave, he was on the show a couple of years ago talking about his OSINT satellite data analysis of North Korea and more recently he popped by to talk about software defined networking security. read more
Bartalex malspam pushing Pony/Dyre https://isc.sans.edu/forums/diary/Bartalex+malspam+pushing+PonyDyre/19947/Lottery IT Security Director Riggs Lottery http://www.desmoinesregister.com/story/news/crime-and-courts/2015/07/20/hot-lotto-verdict/30411901/Pump and Dump Spammers Linked to JP Morgan Breach Arrested http://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-charges-against-three-defendants-multimillion-dollar http://www.usatoday.com/story/money/2015/07/21/jpmorgan-chase-hack-arrests-israel-florida/30469203/DEV522: Defending Web Applications http://www.sans.org/course/defending-web-applications-security-essentials
Wireless Car Hacking http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/Fake Tech Support Scammers hit UK iOS Users http://www.actionfraud.police.uk/news/fake-apple-ios-crash-report-city-of-london-police-takedown-numbers-associated-with-the-recent-ios-scam-jul15Privilege Escalation in OS X https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html
This week on Cyber Frontiers Jim and Christian take some time to discuss what has quickly become a favorite past time – data breaches! With the LastPass breach and OPM […]
Steve loses his T1, the official SQRL logo, Auto hacking matures from "connect" to "Internet", Microsoft's emergency out-of-cycle update, Progress in attacking RC4, and more of your questions with Steve's answers! We invite you to read our show notes. Download or subscribe to this show at twit.tv/sn. You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Bandwidth for Security Now is provided by Cachefly.
By firstname.lastname@example.org (Leo Laporte)
By email@example.com (Leo Laporte)
Life is Short. For some it may get shorter? Archuleta is out at OPM: Who didn't see that one coming? If you look for breaches, you might find them. Darkode Shutdown: Former FireEye Intern Accused Of Creating $65,000 Android Malware - Forbes BREAKING: UCLA Health breach hits data of 4.5M - Modern Healthcare