Secthis.com Security Podcast

  • Author: Vários
  • Narrator: Vários
  • Publisher: Podcast
  • More information

Informações:

Synopsis

The Only Opinions That Matter Since 2006!

Episodes

  • Podcast 51- WPA, Utimaco, FISMA, MI6

    05/01/2009

    MI6 Camera -- Including Secrets -- Sold on eBay(IN)SECURE Magazine Issue 18FISMA 2008: A Better Solution (September 29, 2008)Cyber Security Awareness Month - Daily Topics, (Tue, Sep 30th)Just what color is a security hole?Sophos concludes $314 million Utimaco buyCookie HijackingWPA no longer secureHostsGene Naftulyev, CISSPDoug Landoll, CISSPErik Moon, CISSPMusicJonathan Coulton

  • Podcast 49 - Idiots, SCADA, ID Theft, Apple

    30/06/2008

    Disgruntled admin gets 63 months for massive data deletionIntellipedia?AT&T manager on laptop loss: 'It is pathetic'FTC wants to hit the spyware guys where it hurtsSoftware security hole shows utilities and other infrastructure vulnerableVerizon Business 2008 Data Breach Investigations ReportBank of America check card data compromisedRansomwareWe lost both Ben and Doug 30 min into the podcast - excuse the slight dead air.Intro music by Walt Ribeiro - RushHostsGene Naftulyev, CISSPAnatoly Elberg, CISSPDoug Landoll, CISSPBen Spader, CISSP

  • Podcast 48 - Google, Apple, RIAA, SCADA

    05/06/2008

    Richard Clarke: 'Government Failed You' on SecurityLargest Public Power Grid at Cyber Risk, Feds SayMinnesota Town Tells Google Maps: Keep out - We Mean It!Apple Patches 40 Security HolesInside the Attack that Crippled Revision3Intro music by Jessy MossHostsGene Naftulyev, CISSPAnatoly Elberg, CISSP

  • Podcast 47 - DoD, UK, Privacy, Hope, Trust

    27/05/2008

    FBI Worried as DoD Sold Counterfeit Networking GearUK to monitor and record every phone call, web page & emailBiometric Authentication System - An OverviewBlackBerry Giving Encryption Keys to Indian GovernmentLAST HOPEProtecting Users Against ThemselvesGoogle Health ServiceReflections on Trusting TrustHostsGene Naftulyev, CISSPDoug Drew, CISSP

  • Podcast 46 - RIAA, Google, ID Theft, EFF

    12/05/2008

    Military Computer Contractor Convicted on ID Theft ChargesBackground Checks: How Not to Hire an Information Security Officer Who's on ParoleThe 'Hard Disk Crusher' Doesn't Mess AroundProtecting Yourself From Suspicionless SearchesFlorida Judge Smacks Down RIAAGoogle is spearheading a volunteer workforceUnsafe at any speed the 7 dirty secrets of the security industrySteal the data of Facebook usersA new SQL Injection attack is making the roundsHostsGene Naftulyev, CISSPDoug Drew, CISSPDave Meier, CISSP

  • Podcast 45 - China, FBI, XP, Malware - FIXED

    28/04/2008

    Microsoft Opens the Gates to Hack Their Web ServicesPC World: Sites’ Personal Questions May Pose Security RiskFBI Looks at Chinese Role in Darfur Site Hack(IN)SECURE Magazine Issue 16WifiZoo v1.3 Released - Passive Info Gathering for WifiKaspersky Security Bulletin 2007: Malware evolution in 2007Windows XP SP3 Will Be Available for Download on April 29 (April 21, 2008) Schneier: Lots of security software is 'snake oil'Microsoft figures show some users may like adwareEnterprises Slow to Fight MalwareHostsGene Naftulyev, CISSPDoug Drew, CISSP

  • Podcast 44 - Russia, Blackberry, RIAA, PI, Spyware

    07/04/2008

    Techworld: BlackBerry Servers Ripe for the Hacking Creating bootable USB drives for capturing the contents of memorySoftware Radio Attacks and Zero-Power DefensesPIN Entry Device (PED) vulnerabilitieswww.notacon.orgTrend Micro Hit by Massive Web HackJudge Rules Against Accused Spyware DistributorMichigan says MediaSentry (RIAA) lacks necessary PI licenseHow To Think Like An Online Con Artist NATO Equates Cyber Attacks to Missile Attacks (March 7, 2008)Brief: Phone "swatter" gets 30 monthsRussian serfs paid $3 a day to break CAPTCHAsHostsGene Naftulyev, CISSPAnatoly Elberg, CISSPDoug Landoll, CISSP

  • Podcast 43 - Social Engineering, PCI, Events, DRAM

    07/03/2008

    Retrieving crypto data from DRAMPIN Entry Device (PED) vulnerabilitiesPCI And The Circle Of BlameTechworld: Criminals Automate Security TestingFTC Data: Telcos, Banks are Top Targets for ID TheftComputer Sweden: Swedish Officials’ Passwords Revealed by Hacker17-year-old Social Engineer (IN)SECURE Magazine Issue 15You got Owned!www.trisc.org DHS Getting Flak for IDS upgradeHostsGene Naftulyev, CISSPAnatoly Elberg, CISSPDoug Landoll, CISSPBen Spader, CISSP

  • Podcast 42 - PI License, Shmoocon Retrospect

    06/03/2008

    Forensics requires a PI licenseWelcome to Cyberwar Country, USAShmoocon Speakers Thanks to surbo from i-hacked.comThanks to Hak5 Computerworld: Mozilla Raises Firefox Security BarUse of Rogue DNS Servers on RiseHostsGene Naftulyev, CISSPAnatoly Elberg, CISSPDoug Landoll, CISSPChris Gerling, CISSP

  • Podcast 41 - China, Privacy, EU

    21/02/2008

    EU Official: IP Is PersonalBush Order Expands Network MonitoringSwitzerland Tells Antipiracy Group Tactics Violate LawMaritime Security & Domain Awareness ConferenceMilitary Open Source Software Conference - Initiatives, Risks, Opportunities & ChallengesLargest Can-Spam Penalty Levied By FedsPrivacy Laws Make ProgressComputerworld: US Gov’t Seek 10 Percent Hike in IT Security SpendingIBM, Google, Microsoft, Others Join OpenID BoardTrueCrypt 5.0 Released!!!Ex-Boeing engineer charged with theft of Space Shuttle secrets for China - DOJ Small Romanian Town Gets Rich Through eBay Scams HostsGene Naftulyev, CISSPAnatoly Elberg, CISSP

  • Podcast 38 - Shmoocon Promo, CA, Sears, WiFi

    08/01/2008

    Shmoocon Ticket GiveawaySANS certificationsNumbers: ITIL, COBIT and More; Who Uses What?Sears: Come see the softer side of spywareCA’s Web Site Hacked by Malware AuthorsWiFi piggybackingPacking.org gone but check out handgunlaw.usState Hacking/Computer Security LawsHostsGene Naftulyev, CISSPAnatoly Elberg, CISSPBen Spader, CISSPJeff Pettorino, CISSPDoug Landoll, CISSP

  • Podcast 37 - Shmoocon, TJX, China, Netflix

    06/12/2007

    Shmoocon Tickets going fast! IT Departments Biggest Source of Data Leaks, Says ResearchUK Government Accuses Chinese of IT EspionageMI5 Warns UK Businesses of China-Sponsored Cyber Attacks (December 2 & 3, 2007)Government-sponsored Cyberattacks on the Rise, McAfee Says10 Extremely Useful Websites to Stop Big Brother From Snooping on You(IN)SECURE Magazine Issue 14 Technitium FREE MAC Address Changer v4.7 - Released for DownloadResearchers reverse Netflix anonymizationQuickTime exploited by media-handling flawData Breaches Cost More Than EverTJX offers a $40.9 millionCard issuers do not get to form a class in a suitTJX's Settlement with Visa Casts Light on Murky World of PCI PenaltiesHostsGene Naftulyev, CISSPAnatoly Elberg, CISSP

  • Podcast 35 - PGP, Mafia, Botnet, Passwords

    17/11/2007

    Microsoft switching SharePoint to claims-based authenticationPGP Whole Disk Encryption - Barely Acknowledged Intentional BypassHard Drive Imports to be Banned?The Russian Mafia Doesn't Like Spam EitherFirewall Secures Battlefield CommunicationsDetails of Hijacked 24/7 Ad Server EmergeStorm Botnet Divides, Preps for Sale to SpammersCafe Latte Attack Steals Data from Wi-Fi PCsDefault Manufacturer Passwords for a Ton of DevicesComcast Admits Delaying, Not Blocking, P2P TrafficJim Tiller for (ISC)2 board of Directors - if you are a CISSP please "Vote for Jim"HostsGene Naftulyev, CISSPAnatoly Elberg, CISSPBen Spader, CISSP

  • Podcast 34 - Fingerprints, NSA. Web2, Spending

    17/11/2007

    Financial Institutions Spending on Security, GovernanceUK Authorities Can Demand Decryption Keys (October 1 & 3, 2007)Hackers at Microsoft?! Now Wait a Minute ...FCC declines to investigate NSA-telco linkEFF sues the DOJ for withholding records of telecom surveillance immunityShould Schools Fingerprint Your Kids?Analyst Warns That Web 2.0 Threatens Corporate SecurityFor My Next Trick... Hacking WEB2.0Jim Tiller for (ISC)2 board of Directors - if you are a CISSP please "Vote for Jim"Doug's Book - Performing an Information Security Risk Assessment (Hardcover)Intro Six Mile Bridge 2001HostsGene Naftulyev, CISSPErik Moon, CISSPDoug Landoll, CISSP

  • Podcast 33 - ArcSight, Privacy, Toys, Onion, Credit, Blow

    04/10/2007

    iPhone Turned into Pocket-Sized Hacking PlatformRuling Eases Government’s Efforts for Cell Phone TrackingHackers Post Techniques for Reversing iPhone UpgradeGun Safe Zone on you tube Whistleblower lawsSuit: Employee Fired for Reporting BreachOpt-out from pre-approved credit applicationsOctober is the fourth annual National Cyber Security Awareness MonthYour Digg username is probably "too secure" for American ExpressBluetooth HeadsetGo Ahead (Bomb New York)Jim Tiller for (ISC)2 board of Directors - if you are a CISSP please "Vote for Jim"HostsGene Naftulyev, CISSPAnatoly Elberg, CISSPBen Spader, CISSP

  • Podcast 32 - China

    20/09/2007

    Jim Tiller for (ISC)2 board of Directors - if you are a CISSP please "Vote for Jim"Pentagon Hacked by Chinese MilitaryChina accused of cyberattacks on New ZealandFrance Complaining of China Hacks TooBrief: China claims hackers stole its secrets tooGroup releases free iPhone unlock hackNames, Contact Info on TD Ameritrade Customers CompromisedTJX Data Criminal Gets Five Years in PrisonJack Thompson Decides He's In GTA IVWindows worm targets Skype usersAnd why I don't drink French Vodka! French Diplomat Softens Tone on Iran Nuke ProgramNote: Episode 31 had sound issues but I will try to salvage as much as I can and post it.HostsGene Naftulyev, CISSPAnatoly Elberg, CISSPErik Moon, CISSPJim Tiller, CISSP