Security News public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
T
The CyberWire
รายวัน
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. His new show “Pod Save the World” will bring you behind the scenes into White House Situation Room meetings and secret negotiations through a series of conversations with people who were there.
 
H
Hacking Humans
Ogni settimana
 
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. We talk to social engineering experts, security pros, cognitive scientists, and those practiced in the arts of deception (perhaps even a magician or two). We also hear from people targeted by social engineering attacks and learn from their experiences.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security Intelligence is a podcast series by The Risk Advisory Group, a leading independent global risk consultancy. In each episode our intelligence specialists provide insight and analysis of current global security and political risks for corporate security, intelligence and crisis response professionals. Expect to hear expert perspectives on the risk to businesses from terrorism and political violence, civil and international conflict and political instability around the world. Risk Advi ...
 
7
7 Minute Security
Ugentligt
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
M
Mostly Security
Weekly
 
Jon and Eric have worked in the security space as developers, architects and leaders for more years than they care to count. From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
S
Security Weekly
रोज
 
Security Market Validation
 
The straight up security news in 10 minutes or less! Aaron Lyons, John Strand, Beau Bullock and Paul Asadoorian cover the latest breaches, tool released and vulnerabilities.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
F
FP's First Person
Weekly
 
Each week here at Foreign Policy, we interview one person for an intimate, narrative-driven conversation about something timely and important in the world. Our guests are people who have participated directly in events, either as protagonists or eyewitnesses. We get them to tell a story about their experience, not just offer their analysis. That approach is driven by the feeling here at Foreign Policy that to understand our world—to grasp the complexities and nuances of our time—we need to g ...
 
K
Komando On Demand
Weekly+
 
Ever wonder how technology has transformed your life? In this entertaining and informative podcast, Kim Komando provides insight on the ever-changing tech issues and topics that are relevant to you. This free podcast featuring interviews that Kim conducts with experts in their field. You'll gain an in-depth understanding of a wide variety of topics such as the Dark Web, the life of digital nomads, staying focused on the road, what it takes to keep the lights on and so much more. Subscribe be ...
 
Discussing the most pressing and complex international security issues of today with scholars from Georgetown University's Security Studies Program (SSP) of the Walsh School of Foreign Service. As part of the oldest and most respected master’s degree program in international affairs, SSP is dedicated to fostering a new generation of analysts, policymakers, and scholars fully knowledgeable about the range of international and national security problems and foreign policy issues of the 21st Ce ...
 
B
Beers with Talos Podcast
Μηνιαία+
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
 
O
Off The Hook
Monthly+
 
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @HackerRadioShow@Mastodon.social
 
R
Random but Memorable
Monthly+
 
Lighthearted security advice and banter from 1Password and guests.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
Chris Farnham and Katherine Mansted bring you expert analysis, insights and opinion on Australia and the region's national security challenges in this pod from Policy Forum. Produced with the support of the ANU National Security College.
 
We're a couple of geeks discussing whatever comes to mind. We may talk about systems administration, public speaking, conventions, security news,...it's hard to tell what we're going to rant about next.
 
Information Security is the name of the game. Don't let the hackers win!
 
The straight up security news in 10 minutes or less! Aaron Lyons, John Strand, Beau Bullock and Paul Asadoorian cover the latest breaches, tool released and vulnerabilities.
 
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Interact with Buck by emailing him at teambuck@iheartmedia.com
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
T
The Many Hats Club
Monthly+
 
An information security focused group of individuals from all walks of life
 
C
Cyber Security Today
Еженедельно+
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Got a startup? Learn how to secure it. Who are the hot security startups? We got that covered too! This show is for security startups, by security startups! Paul Asadoorian and Michael Santarcangelo will walk you through not only the hot security startups, but how security plays into all startups!
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Loading …
show series
 
Cybercrime Tool Prices Bump Up in Dark Web Markets, Pen testers find mystery black box connected to ships engines, Using Machine Learning to Detect IP Hijacking - Schneier on Security, and much more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode623…
 
A daily look at the relevant information security news from overnight. Episode 177 - 18 October 2019 The Dukes are back - https://www.bleepingcomputer.com/news/security/cozy-bear-russian-hackers-spotted-after-staying-undetected-for-years/ Samsung sucky bios - https://www.zdnet.com/article/samsung-admits-fingerprint-reader-flaw-promises-software ...…
 
In the news, we discuss how Okta is launching offerings for threat detection and remediation, Tenable extends Lumin to all platform customers, Signal Sciences announces integration with Pivotal Container Service, and how Thoma Bravo made a 3.9 Billion dollar offer to acquire Sophos! Visit https://www.securityweekly.com/esw for all the latest ep ...…
 
Josh and Kurt about a number of Microsoft security news items. They've changed how they are handling encrypted disks and are now forcing cloud logins on Windows users. Show Notes Microsoft KB 4516071 A Security Market for Lemons Kurt's file wiping advisory Lock Picking Lawyer vs Consumer Reports Sun Ray Linux Gamers: 20% of auto reported crashes…
 
Gerry and Brandon discuss trends in malspam, a permanent iOS vulnerability, and a significant webkit exploit campaign. As always they end with One Cool Thing. Show Notes Resources: Malspam Trends https://www.zdnet.com/article/most-malspam-contains-a-malicious-url-these-days-not-file-attachments/ iOS Permenant Vulnerability https://www.healthcar ...…
 
Security News: October 1, 2019 The post Security News: October 1, 2019 – HNN #236 appeared first on Security Weekly.By Security Weekly Productions.
 
This week, 335 Million Malicious apps were installed on Google Play in September, a new bug found in NSAs Ghidra tool, a Medical Practice closed permanently after a Ransomware attack, researchers find a new hack to read content of password protected PDF files, and a billboard in Michigan was hacked to play Porn for drivers along I-75! In the ex ...…
 
Attacks Against NVMS-9000 DVR Web Vulnerability https://isc.sans.edu/forums/diary/Scanning+Activity+for+NVMS9000+Digital+Video+Recorder/25434/ Pixel 4 Face Unlock Works with Eyes Shut https://www.bbc.com/news/technology-50085630 Samsung Galaxy S10 Fingerprint Unlock Bug https://www.bbc.com/news/technology-50080586 Alexa/Google Home Phishing htt ...…
 
Attacks Against NVMS-9000 DVR Web Vulnerability https://isc.sans.edu/forums/diary/Scanning+Activity+for+NVMS9000+Digital+Video+Recorder/25434/ Pixel 4 Face Unlock Works with Eyes Shut https://www.bbc.com/news/technology-50085630 Samsung Galaxy S10 Fingerprint Unlock Bug https://www.bbc.com/news/technology-50080586 Alexa/Google Home Phishing htt ...…
 
Apple Farms and Drones. Spy Chip Followup. Much Sudo About Nothing. Bluetooth Beaconing Enable Theft also Enables Mansplaining (what?!?) and some Reductor Malware details. Yellow lights are scientifically proven to be too short and Paul Graham proposes a language. 0:00 - Intro - Apple Farms and Drones 10:06 - Spy Chip Followup 11:25 - Much Sudo ...…
 
This week, we welcome Daniel DeCloss, President and CEO of PlexTrac, to talk about what makes an excellent pentest report! In our second segment, we talk Security News, how hackers can hijack your local airport, Baltimore to buy $20M in cyber insurance months after the attack, a dangerous Kubernetes bug that allows authentication bypass-DoS, an ...…
 
DeCloss is the President and CEO of PlexTrac. The segment will focus on the importance of a high-quality report and what red and blue teamers should recognize goes into a good report. Often times, there’s no feedback loop after report delivery and collaboration can be limited post-engagement. That will lead into a demo of PlexTrac to highlight ...…
 
This week, we welcome Daniel DeCloss, President and CEO of PlexTrac, to talk about what makes an excellent pentest report! In our second segment, we talk Security News, how hackers can hijack your local airport, Baltimore to buy $20M in cyber insurance months after the attack, a dangerous Kubernetes bug that allows authentication bypass-DoS, an ...…
 
We air three pre-recorded interviews from Hacker Halted with Cathy Ullman, Joe Gray, and Jenny Radcliffe! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode157
 
DeCloss is the President and CEO of PlexTrac. The segment will focus on the importance of a high-quality report and what red and blue teamers should recognize goes into a good report. Often times, there’s no feedback loop after report delivery and collaboration can be limited post-engagement. That will lead into a demo of PlexTrac to highlight ...…
 
Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. Shaun M ...…
 
Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. Shaun M ...…
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
Speaker Nancy Pelosi said "The Russians have been trying to get a foothold in the Middle East unsuccessfully, and now the President has given them an opportunity." Plus the left is trying to redo gender norms in our society. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisers…
 
A former U.S. intelligence officer explains what happens to locals who helped the United States when troops leave a conflict zone. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Foreign Policy.
 
As it becomes more difficult and expensive to infiltrate environments via malware, cybercriminals may start turning in the future to a more viable and less costly alternative: Insider threats.By Mike Mimoso, Chris Brook.
 
This week, In our first segment, we talk Enterprise News, discussing how Okta is launching offerings for threat detection and remediation, Tenable extends Lumin to all platform customers, Signal Sciences announces integration with Pivotal Container Service, and how Thoma Bravo made a 3.9 Billion dollar offer to acquire Sophos! In our second seg ...…
 
This week, In our first segment, we talk Enterprise News, discussing how Okta is launching offerings for threat detection and remediation, Tenable extends Lumin to all platform customers, Signal Sciences announces integration with Pivotal Container Service, and how Thoma Bravo made a 3.9 Billion dollar offer to acquire Sophos! In our second seg ...…
 
Today's podcast covers a Canada Post password alert, a new sextortion campaign, Samsung phone fingerprint trouble, malware in sound files and exposed resumesBy ITWC.
 
In our second segment, we talk Tactics for Understanding Security Vendor Products! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode157
 
Phishing E-Mail Spoofing SPF Protected Domain https://isc.sans.edu/forums/diary/Phishing+email+spoofing+SPFenabled+domain/25426/ Purchased Domain Arrives with Paypal Accounts Linked to it https://www.theregister.co.uk/2019/10/17/paypal_account_domain/ Typosquatting Attacks Affect 2020 Presidential Election https://www.digitalshadows.com/blog-an ...…
 
Phishing E-Mail Spoofing SPF Protected Domain https://isc.sans.edu/forums/diary/Phishing+email+spoofing+SPFenabled+domain/25426/ Purchased Domain Arrives with Paypal Accounts Linked to it https://www.theregister.co.uk/2019/10/17/paypal_account_domain/ Typosquatting Attacks Affect 2020 Presidential Election https://www.digitalshadows.com/blog-an ...…
 
Hundreds of parents in Canada are preparing to take legal action against the producers of Fortnite. Why? Their kids are addicted. Kim talks to director of "Netizens," a documentary about women and online harassment. She shares three stories from the film. And gone are the days just hoping for the right shot. Photographer and visual engineer Ste ...…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? For information regarding your data privacy, visit acast.com/privacy
 
The operators of a site called Girls Do Porn have been indicted on charges of sex trafficking. Meanwhile, 22 women have sued the company, saying they were coerced into doing porn. How did the company get away with it for so long? For information regarding your data privacy, visit acast.com/privacy
 
Speaker Nancy Pelosi and other democrats walked out of a meeting with the President. Trump strikes back against Pelosi and other democratic leaders. Plus even more outrage about the crisis in Syria. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisersBy Premiere Networks.
 
A daily look at the relevant information security news from overnight. Episode 176 - 17 October 2019 Malware WAV - https://www.bleepingcomputer.com/news/security/attackers-hide-backdoors-and-cryptominers-in-wav-audio-files/ Android PoC - https://www.zdnet.com/article/security-researcher-publishes-proof-of-concept-code-for-recent-android-zero-da ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/) A simple way to visualize your entire security program and all the tools that support it. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spa ...…
 
In this segment, we'll share the results of our Security Weekly 25 Index Survey, which we completed earlier this year. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode147
 
It's our quarterly security money segment and we'll review the Security Weekly 25 index. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode147
 
Dave describes a ponzi scheme that bought up legitimate investment firms. Joe shares research into deep fakes. The catch of the day includes an invitation to join the illuminati. Ray [REDACTED] returns with followup from his prior visit, along with new information to share. Links to stories: https://13wham.com/news/local/feds-in-rochester-to-de ...…
 
Oracle CPU https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Jackson-Databind Vulnerablity https://github.com/FasterXML/jackson-databind/issues/2387 VMWare Cloud Foundation and VMware Harbor Container Registry Patch https://www.vmware.com/security/advisories/VMSA-2019-0016.html Wordpress Update https://wordpress.org/n ...…
 
Oracle CPU https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Jackson-Databind Vulnerablity https://github.com/FasterXML/jackson-databind/issues/2387 VMWare Cloud Foundation and VMware Harbor Container Registry Patch https://www.vmware.com/security/advisories/VMSA-2019-0016.html Wordpress Update https://wordpress.org/n ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
(2019-01-06): pirates, social engineering, awareness (00:01:27) Started working in anti piracy intelligence off the coast of Somalia, which is a bit abnormal for a straight out of university, blonde middle class girl. We were joined by Lisa Forte one evening a long time ago, where she shared her awesome expereince and background everything from ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
This week, it's our quarterly security money segment! In the first segment, we'll review the Security Weekly 25 index! In our second segment, we'll share the results of our Security Weekly 25 Index Survey, which we completed earlier this year! Show Notes: https://wiki.securityweekly.com/BSWEpisode147 Visit https://www.securityweekly.com/bsw for ...…
 
This week, it's our quarterly security money segment! In the first segment, we'll review the Security Weekly 25 index! In our second segment, we'll share the results of our Security Weekly 25 Index Survey, which we completed earlier this year! Show Notes: https://wiki.securityweekly.com/BSWEpisode147 Visit https://www.securityweekly.com/bsw for ...…
 
The democratic debate brought out the crazy and most of the candidates on the stage went after now front runner Elizabeth Warren. Plus more on the impeachment inquiry and what Nancy Pelosi is up to now. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisersBy Premiere Networks.
 
It's our quarterly security money segment and we'll review the Security Weekly 25 index. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode147
 
Google login Twitter login Classic login