Browsing Category: Podcasts

cesar_cerrudo

Cesar Cerrudo on Owning Your CEO

Categories: Podcasts, Privacy

Dennis Fisher talks with Cesar Cerrudo of IOActive Labs about his research project that used Fortune 500 executives’ corporate email addresses as the starting point to gather data about their online activities. Cerrudo found that he was able to map executives’ activities across a wide range of e-commerce, social networking and other sites with just an email address.

Read more...

dellsecureworks

Joe Stewart on APTs and Cyber Espionage

Categories: Malware, Podcasts

Dennis Fisher talks with Joe Stewart of the Dell SecureWorks Counter Threat Unit about his team’s new research on the landscape of APT malware families, who is behind the use of these tools and how poorly prepared most organizations are for attacks by these crews.

Read more...

Firm Sees More DDoS Attacks Aimed at Telecom Systems

Firm Sees More DDoS Attacks Aimed at Telecom Systems

Attackers are now using DDoS services that offer attacks on telecommunication systems as part of larger attack schemes. These attacks, known as TDoS attacks, can be a relatively cheap option for cybercriminals looking into diversifying their attack vectors.

Read more...

Jose Nazario

Jose Nazario on Botnet Takedowns, Cybercrime and Whether We Can Ever Win

Dennis Fisher talks with botnet researcher Jose Nazario about whether botnet takedowns are worth the effort, the evolution of attack techniques and whether we can ever get the upper hand on attackers.

Read more...

flame_hidden

How The Flame Malware Stayed Hidden For So Long

The past week has brought to light more revelations about the mysterious Flame (or sKyWIper) worm that was first identified at the end of May. Among them: the eye-popping admission from Microsoft that the malware’s authors found a way to use that company’s Windows Update feature to distribute the malware.

Read more...

moxie

Moxie Marlinspike on TACK, Convergence and Trust Agility

Dennis Fisher talks with Moxie Marlinspike about his new IETF proposal, TACK, which lays out a way for sites to assert the authenticity of their public keys. They also discuss the Convergence system for replacing the CA infrastructure and the ways in which browser vendors can help enable better trust agility for users.

Read more...

ryan_costin

Ryan Naraine and Costin Raiu on Flashback and Mac Security

Categories: Apple, Malware, Podcasts

Dennis Fisher talks with Ryan Naraine and Costin Raiu about the Flashback Mac botnet, why Apple is reluctant to let third parties update software on Macs and the future outlook for the security of Macs.

Read more...

soghoiansas

Arms Race In Zero Days Spells Trouble For Privacy, Public Safety

Editor’s Note: This is the second of a two-part podcast with independent security researcher Chris Soghoian. In the first part of our podcast with independent security researcher Chris Soghoian, we talked about the way that the proliferation of “free” applications have forced consumers into the position of increasingly trading privacy for access to cool new Web sites and tools.

Read more...

soghoiansas

How The Free Market Fails Privacy-Conscious Consumers

Editor’s Note: This is the first of a two-part podcast with security researcher Chris Soghoian. It’s a truism that the pace of technological change outstrips society’s ability to grasp the impact of that change. For the most part, the consequences of this are benign and the remedies straight-forward –think: “mobile phones ringing in the movie theater.”

Read more...

danguido

Dan Guido on Attacker Math and Exploit Intelligence

Dennis Fisher talks with Dan Guido, security researcher and CEO of Trail of Bits, about the new company’s plan to help enterprises defend against targeted attacks, the way that attackers think and the value of exploits versus vulnerabilities. They also discuss a new initiative to help share security knowledge more broadly in the community.

Read more...