Best malware podcasts we could find (Updated June 2018)
Related podcasts: Tech Business Business News Security Software Development Defcon Breach Data Network Hack Cyber Risk Virus Computer Management Hacking Information Culture Society  
Malware public [search 0]
show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
S
Security Now (MP3)
Weekly
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are. #infosec #security #hacking #privacy #Internet #hackers #breaches #threats #security #malware #trojan #virus #crypto
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
Primal Security Podcast is a show for people who want to hear about the latest security news and hear about the security industry.
 
C
CyDefe
Monthly
 
CYDEFE CYCast is a network security podcast that breaks down network security and cyber security news to help everyday users.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
Brian Boettcher and Michael Gough discuss all things in Incident Response, Malware, Threat Hunting, and securing systems from the hazards bad actors can use to ruin a Blue Team's day...
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
 
S
State of the Hack
Monthly
 
State of the Hack is FireEye’s monthly series, hosted by Christopher Glyer (@cglyer) and Nick Carr (@itsreallynick), that discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
D
DIY Cyber Guy
Monthly+
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
T
Tech Repair Talk
Weekly
 
CompTIA A+ certifiedWe will discuss your computer problems. I will attempt my best to help you resolve any issues that you have. Make sure to call-in with any computer issues that you have.
 
C
CyDefe
Monthly
 
CYDEFE CYCast is a network security podcast that breaks down network security and cyber security news to help everyday users.
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Winner of the 2009 and 2007 people's choice award for best Technology/Science podcast. Records live at https://twit.tv/live every Tuesday.
 
G
GOTHIC ROCK
Monthly
 
Gothic Rock Radio Show is a Gothic Rock, Post-Punk, Coldwave and Alternative Goth Rock Hosted by Oskar Terramortis (Necromanteion Radio Show / This is Gothic Rock Radio Show). Music submission: send a bandcamp download code to info(at)gothicmusicrecords(dot)com. NO electronic goth styles, no guitars no add. * To avoid malware / virus attacks ONLY Bandcamp codes allowed.
 
Conversations in Professional Tech with ITProPortal
 
Cybersecurity Managed features up to date insights and analysis by the Fortify 24x7 security professionals on the most important cybersecurity issues affecting your life today. Since the world of cyber security can be extremely complicated, Cybersecurity Managed explains highly technical subject matter in non-technical terms in order to educate local businesses and listeners. We cover a range topics that are of vital interest to the cybersecurity professional and will also appeal to the novi ...
 
S
Salted Hash
Weekly
 
Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly.
 
T
ThreatCast
Monthly+
 
The ThreatCast is a cyber security podcast focusing on general cyber security topics such as: current events in the world of cyber, hacks and attacks, malware, threat actors, and more. Likely to go off-topic as well.
 
T
Tech Pulse
Rare
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
 
Each week we'll publish a podcast talking about security issues faced by organizations who rely on their network infrastructure for successful buiness outcomes. Technology, GDPR, malware, bad actors, and your security posture are all up for discussion. If you have a topic you'd like us to cover, leave a comment at npound@juniper.net and we'll get it into our schedule.
 
T
TechNation360
Daily+
 
TechNation360 is the premiere national network of tech professionals. Join the nation by following TechNation360 on all major social networks.
 
E
Easy Cyber
Monthly
 
YouTube channel for EasyCyber.net
 
D
Defrag This
Monthly+
 
Defrag This is a podcast for IT pros that features meaningful trends, commentary on breaking news, and more. We're producing the series because there's a lot of information (and misinformation) out there and we'd like to help you and your fellow IT pros get in front of whatever problem might be around the bend - whether it's a nasty new piece of malware, a hardware failure, or a user screw-up.
 
AT&T ThreatTraq is a roundtable discussion of current cyber security trends, observations, and recommendations from AT&T Security's Malware team. The full video of each discussion is available from the AT&T Tech Channel at http://techchannel.att.com/attthreattraq
 
P
Privacy Now TV
Monthly+
 
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
C
CyberTangent
Monthly
 
Cyber Tangent is a Cybersecurity podcast which will focus on topics like Security Risk Management, Cyber Risk Analytics, Malware Hunting, and more.
 
S
Security So What!
Monthly+
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other.We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals.This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
 
At Trust & Safety in Numbers, we chat with people on all sides of the fraud fight: hackers, FBI agents, fraud analysts, rogue cyborgs… In an era when high-profile account takeovers and global malware attacks are as common as an unwanted group text, it’s an exciting time to be on the fraud front lines. Trust & Safety in Numbers is presented by Sift Science, a trust platform that helps your business fight fraud with machine learning.
 
Loading …
show series
 
Recorded 6/12/18 - Special episode for two reasons! To start, we are recording one-take live from CiscoTV Studio B at Cisco Live in Orlando, FL. - which leads to the second reason, there is video of this episode in the show notes blog post! Join us as we cover the VPNFilter update Talos released June 6th and we recap the inaugural Cisco Talos T ...…
 
This week on DIY Cyber Guy, my guest is cybersecurity and privacy expert Dr. Chris Pierson. We look at a recent Amazon Dot vulnerability that sent out 16-second recordings of conversations in people’s homes. Also, hackers figure out how to easily use an expired hotel room key to actually make a master key - we will tell you how to check to make ...…
 
Facebook: The security story that keeps on giving. News hit recently that the social network was sharing user info with a host of hardware and software partners without users knowing. We drive into that today, hitting: - How Facebook gave away your data - What data and who’s data was involved - Who got the data and why - Facebook’s response - S ...…
 
In this CyberTangent episode, we are joined by Vicky Ames, Director of Information Security at Marriott International. Our podcast host is Landon Johnson. Today's topic is "The R in GRC." Let's jump in! Learn more about Nehemiah Security at nehemiahsecurity.com/
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week we examine a rather "mega" patch Tuesday, a nifty hack of Win10's Cortana, Microsoft's official "when do we patch" guidelines, the continuing tweaking of web browser behavior for our sanity, a widespread Windows 10 rootkit, the resurgence of the Satori IoT botnet, clipboard monitoring malware, a forthcoming change in Chrome's extensio ...…
 
This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer Science, gaining experience vs. book learning, and more on this episode of Secure Digital Life! Full Show Notes: https://wiki.securityweekly.com/SDL_Epis ...…
 
https://www.csoonline.com/article/3276584/ransomware/what-does-a-ransomware-attack-cost-beware-the-hidden-expenses.html https://www.bankinfosecurity.com/mental-health-provider-pays-ransom-to-recover-data-a-11040 https://www.itbusinessedge.com/blogs/data-security/did-we-see-our-first-data-breach-of-the-gdpr-era.html…
 
https://www.csoonline.com/article/3276584/ransomware/what-does-a-ransomware-attack-cost-beware-the-hidden-expenses.html https://www.bankinfosecurity.com/mental-health-provider-pays-ransom-to-recover-data-a-11040 https://www.itbusinessedge.com/blogs/data-security/did-we-see-our-first-data-breach-of-the-gdpr-era.html…
 
https://www.csoonline.com/article/3276584/ransomware/what-does-a-ransomware-attack-cost-beware-the-hidden-expenses.html https://www.bankinfosecurity.com/mental-health-provider-pays-ransom-to-recover-data-a-11040 https://www.itbusinessedge.com/blogs/data-security/did-we-see-our-first-data-breach-of-the-gdpr-era.html…
 
This week, Doug and Russ talk about Digital Forensics! What is Forensics anyway? Typically, it refers to the acquisition, preservation, and interpretation of evidence. That means it could be just about anything from gun casings to fingernail clippings, etc. All that and more, on this episode of Secure Digital Life! Full Show Notes: https://wiki ...…
 
You may not realize it, but ecommerce fraud has consequences for national security. Melissa Griffith, PhD candidate in political science at UC Berkeley, explains what happens when businesses and governments fight global cyber threats, and when they fail.
 
Sometimes security is handled well. Other times, it’s handled weakly. Most of today’s list concerns the latter, including: - The Zipperdown vulnerability - Puppy Pictures Preempt Privacy - The returning spectre of Spectre - eFail - What does Apple know about you? Don't forget to check out our show notes: SecureMac.com/Checklist And get in touch ...…
 
Threatpost's Lindsey O'Donnell talks with Zack Allen, ZeroFOX’s manager of threat operations, about the broader social media threats landscape and the growing issue of malicious content being spread across networks like Twitter, Facebook and LinkedIn.By chris@threatpost.com (Mike Mimoso, Chris Brook).
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
 
This week, Doug runs the show solo and talks about SNAT and PAT! Secure Network Address Translation is a Network Address Translation technique that enables private network security by providing a public IP address to remote users and systems. Port Address Translation is a function that allows multiple users within a private network to make use ...…
 
This week, Doug and Russ talk about Digital Forensics! What is Forensics anyway? Typically, it refers to the acquisition, preservation, and interpretation of evidence. That means it could be just about anything from gun casings to fingernail clippings, etc. Full Show Notes: https://wiki.securityweekly.com/SDL_Episode68 Visit our website: http:/ ...…
 
In May we were joined by Andrew Thompson (@QW5kcmV3) of FireEye’s Adversary Pursuit team. We explore the evolution and current state of cloud services OAuth abuse, how we do technical intelligence & attribution, and some war stories from the past few weeks of responding to intrusions that matter. “Shining a Light on OAuth Abuse”: we explore the ...…
 
In this CyberTangent episode, we are joined by Grant Elliott, CEO of Ostendio ostendio.com/ Our podcast host is Landon Johnson. Today's topic is "A Deep Dive into Insider Threats." Let's jump in! Learn more about Nehemiah Security at nehemiahsecurity.com/
 
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
 
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news, including a slew of IoT device privacy incidents, a critical Adobe Flash vulnerability, and scary new data on the breadth and impact of the VPNFilter malware.By chris@threatpost.com (Mike Mimoso, Chris Brook).
 
6/7/18 : CSS Side Channels; S3 Buckets; DDoS Convictions; Internet Weather | AT&T ThreatTraq (Security for Security Pros)
 
There’s a whole lotta leakin’ goin’ on! On this edition of The Checklist by SecureMac: - The Not Sure Securus Story - Mobile Providers Selling Your Location - LocationSmart Giving Away Location Data - The Unsafe Story of TeenSafe - A Comcast Security SNAFU Don't forget to check out our show notes: SecureMac.com/Checklist And get in touch with u ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
This week we discuss yesterday's further good privacy news from Apple, the continuation of VPNFilter, an extremely clever web browser cross-site information leakage side-channel attack, Microsoft Research's fork of OpenVPN for security in a post-quantum world, Microsoft drops the ball on a 0-day remote code execution vulnerability in JScript, V ...…
 
JOIN US FOR EPISODE-004, OUR GUESTS WILL BE: Pieter Heyn and Kresten Krab with Humio will discuss with us Cloud based Log Management and/or On-Prem Log Management Newsworthy Items - The FBI asks us to reboot our routers Malware of the month - None, so send us something interesting... Site-worthy - websites of the trade to share Tool-worthy - so ...…
 
This week, Doug runs the show solo and talks about SNAT and PAT! Secure Network Address Translation is a Network Address Translation technique that enables private network security by providing a public IP address to remote users and systems. Port Address Translation is a function that allows multiple users within a private network to make use ...…
 
Host Steve Ragan talks shop with Phil Grimes, a security consultant with an interesting collection of Red Team engagement stories.
 
A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for.
 
The smart city industry is projected to be a 400 billion dollar market by 2020, as municipals look at applications for transportation, waste management, and law enforcement. But with that growth comes privacy issues and security risks, Tenable CTO Renaud Deraison told Threatpost’s Lindsey O’Donnell. Deraison outlines some of the biggest securit ...…
 
5/31/18 Speculative Execution; Pre-installed Malware; VPNFilter; Internet Weather | AT&T ThreatTraq (Security for Security Pros)
 
It’s like Garanimals up in here: We’re mixing and matching! On this edition of The Checklist by SecureMac: The Twitter Password List The Apparent Fall of Cambridge Analytica Another Facebook Folly An Update on Equifax The Disappearing/Reappearing Signals Don't forget to check out our show notes: SecureMac.com/Checklist And get in touch with us: ...…
 
Ransomware. It is the virus that actually makes money for the attacker. At first, it was randomly deployed, just like the nuisance viruses of the past, indiscriminately finding victims through phishing and spoofed websites. But the game is changing, as the Georgia cities of Atlanta and Savanna found out the hard way. Special Guest, Cybersecurit ...…
 
Feat: LA PROCESION DE LO INFINITO - STILL PATIENT - THEN COMES SILENCE - THE BEAUTY OF GEMINA - NICK CAVE - LOCK HOWL - MERCIFUL NUNS - DREAMTIME - EVEREVE - GOLDEN APES - TERMINAL GODS - DOUBLE ECHO - ARIEL MANIKI AND THE BLACK HALOS - THE SPIRITUAL BAT - FRIO Y VACIO - THE KENTUCKY VAMPIRES - THE COMPLETERS - IKON - PINK TURNS BLUE - SHADOWHO ...…
 
This week, Doug and Russ talk about GDPR! General Data Protection Regulation went into effect as a law in the EU on May 25, 2018. Doug and Russ talk about what GDPR affects, specific requirements, and more on this episode of Secure Digital Life! Full Show Notes: https://wiki.securityweekly.com/SDL_Episode66 →Visit our website: http://securedigi ...…
 
In this CyberTangent episode, we are joined by Kevin McLaughlin, an expert with over 35 years of Law Enforcement, Corporate & Cyber Security experiences. Our podcast host is Landon Johnson. Today's topic is "The Problem with Vulnerability Patching." Let's jump in! Learn more about Nehemiah Security at nehemiahsecurity.com/…
 
This week we discuss Oracle's planned end of serialization, Ghostery's GDPR faux paus, the emergence of a clever new banking Trojan, Amazon Echo and the case of the Fuzzy Match, more welcome movement from Mozilla, yet another steganographic hideout, an actual real-world appearance of HTTP Error 418 (I'm a Teapot!), the hype over Z-Wave's Z-Shav ...…
 
Google login Twitter login Classic login