It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey in the U.K. recently teamed up and found evidence of an emerging market for stolen and spoofed […]
Supply chain hacks like ME Docs and ASUS aren't inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group's DICE Architectures Working Group* about how strong device identities for IoT endpoints can stop...
Countless Congressional hearings, 48 state data privacy laws and GDPR and mega breaches like the discovery of data on 500 million Facebook users just keep happening. Why? In this episode of the podcast, Paul is joined by experts from the firm BitSight and BigID to discuss why we can't seem to stop the breaches.
Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill, talks to us about the discovery of an experienced threat actor selling access to a compromised Chinese rail control system on the dark web.
Researchers demonstrate medical image altering exploit, Michigan hit with another large ransomware attack, and Samsung Galaxy s10 fooled by 3D printed fingerprint on episode 255 of our daily cybersecurity podcast.
Many banking apps exhibit fundamental security flaws, IT professionals struggle with insider threats, and NVIDIA issues 3rd security patch of the year on episode 254 of our daily cybersecurity podcast.
Android and Apache Server vulnerabilities get patched, APT32 hiding malware in images, and survey says many IT professionals are still not familiar with cryptojacking on episode 253 of our daily cybersecurity podcast.
Alpha-numeric passwords have been with us almost since the dawn of the computing age. But our guest this week, Phil Dunkelberger the CEO of Nok Nok Labs, says they've overstayed their welcome, and that the next few years may see them disappear altogether. We talk about what will replace them and how.
New ransomware deletes duplicate files, another municipality falls victim to ransomware, and malware infects point-of-sale systems of 2 million diners on episode 252 of our daily cybersecurity podcast.
US Senate proposes Cybersecurity Protection Act, malware-laced Christchurch Shooter Manifesto, ransomware demands Amazon gift cards, and Android trojan targets over 125 band and crypte apps on episode 250 of our daily cybersecurity podcast.
Ransomware costs Norsk Hydro millions, one cryptocurrency exchange suffers breach while confusion surrounds another, and Microsoft seizes 99 APT35 domains on episode 249 of our daily cybersecurity podcast.
In this week’s episode, number 139: California became the latest state to bring forward right to repair legislation. We speak with Kyle Wiens of iFixit about the state of right to repair legislation in the states. Also: researchers at North Carolina State University are sounding the alarm about leaked API and crypto keys on platforms like...
Asus software updates were used to install backdoors and Google has patched a bug in Chrome that was being actively exploited by tech support scammers on episode 247 of our daily cybersecurity podcast.
Personal information leaked by US organizations, UK Police hit with ransomware, motel guests live-streamed unaware, and another WordPress plugin actively exploited on episode 246 of our daily cybersecurity podcast.
On episode 243 of our daily cybersecurity podcast we interview Chris Hadnagy, founder and CEO of Social-Engineer, LLC. Chris talks about what social engineering is, what it means in the age of social media, and who should be aware of it.
In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O'Rourke of Texas was an early member.
On episode 241 of our daily cybersecurity podcast we are joined by Steve Black, Professor of Law at Texas Tech University School of Law. Steve discusses cyber law, the impact of technological developments on laws, and more.
Intel multiple vulnerabilities in it's Windows 10 graphics drivers, new POS malware being marketed, and critical flaw in Swiss and Australian e-voting system on episode 239 of our daily cybersecurity podcast.
Forget about Congress's latest attempt to regulate IoT security. CTIAs new certification is the toothiest standard going. In this Spotlight Podcast, we talk with Sameer Dixit of Spirent * on the sidelines of RSA about why.
In this week's episode (#137): Hewlett Packard Enterprise (HPE) Chief Information Security Officer Elizabeth Joyce joins us to talk about HPE's collaboration with Girl Scouts of America to bolster teenagers cyber security chops and encourage more young women to explore cyber security as a profession. Also: we talk with Vijay Ramanathan about the...