Category Archives: Podcast

DSP itunes logo 300x300

Defensive Security Podcast Episode 118

http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information

https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/

http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/

http://www.forbes.com/sites/thomasbrewster/2015/05/20/guns-bombs-hacking-cars-and-planes-dangerous-tweets-for-a-security-researcher/

Defensive Security Podcast Episode 117

http://www.computerworld.com/article/2918406/cybercrime-hacking/cybercriminals-borrow-from-apt-playbook-in-attacking-pos-vendors.html

http://www.welivesecurity.com/2015/05/12/5-practical-tips-avoid-ransomware-email/

http://www.zdnet.com/article/what-causes-enterprise-data-breaches-the-terrible-complexity-and-fragility-of-our-it-systems/

http://www.computing.co.uk/ctg/news/2408602/venom-security-vulnerability-allows-hackers-to-infiltrate-networks-via-the-cloud

http://arstechnica.com/security/2015/05/penn-state-severs-engineering-network-after-incredibly-serious-intrusion/

DSP itunes logo 300x300

Defensive Security Podcast Episode 115

http://www.wsj.com/articles/five-simple-steps-to-protect-corporate-data-1429499477
http://www.politico.com/story/2015/04/sony-hackers-fake-emails-117200.html
http://www.japantimes.co.jp/news/2015/04/21/national/tepcos-frugality-rapped-after-48000-pcs-found-running-windows-xp/
http://www.darkreading.com/attacks-breaches/zero-day-malvertising-attack-went-undetected-for-two-months/d/d-id/1320092
http://www.csoonline.com/article/2913884/access-control/credit-card-terminals-have-used-same-password-since-1990s-claim-researchers.html#tk.rss_all

DSP itunes logo 300x300

Defensive Security Podcast Episode 113

http://arstechnica.com/tech-policy/2015/04/police-chief-paying-the-bitcoin-ransom-was-the-last-resort/
http://www.computerworld.com/article/2907088/russian-hackers-accessed-white-house-email.html
http://www.darkreading.com/endpoint/so-you-dont-believe-in-security-education-/a/d-id/1319793?
– my post regarding this: https://www.maliciouslink.com/applying-science-to-cyber-security/
http://www.reuters.com/article/2015/04/07/us-cybersecurity-americas-idUSKBN0MY06Z20150407

DSP itunes logo 300x300

Defensive Security Podcast Episode 112

 HTCIA conference: http://www.htciaconference.org
DSP itunes logo 300x300

Defensive Security Podcast Episode 111

High Tech Crime Investigation Association Conference: http://www.htciaconference.org

http://www.databreachtoday.com/pci-issues-penetration-test-guidance-a-8056

http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/

DSP itunes logo 300x300

Defensive Security Podcast Episode 110

DSP itunes logo 300x300

Defensive Security Podcast Episode 109

http://www.firstcoastnews.com/story/news/local/2015/03/09/cyber-thieves-target-orange-park-bank/24682713/
https://blogs.mcafee.com/mcafee-labs/targeted-attack-campaign-indian-organizations-continues-exploits-focused-national-events
http://mobile.esecurityplanet.com/network-security/pci-compliance-still-a-challenge-verizon.html
http://www.zdnet.com/article/feds-hot-on-the-trail-of-jpmorgan-hackers/
http://www.pnj.com/story/news/2015/03/16/sacred-heart-health-system-billing-information-hacked/24859975/