TrustedSec Security Podcast show

TrustedSec Security Podcast

Summary: A podcast dedicated to bringing the latest news on information security and the industry - from those that work in the industry.

Podcasts:

 3.0 - Why it matters where you put your luggage in Vegas | File Type: audio/mpeg | Duration: 41:19

3.0 - Why it matters where you put your luggage in Vegas

 2.16 - Its all over people! – Your wallet is unahackable but I have your password and more! | File Type: audio/mpeg | Duration: 52:26

2.16 - Its all over people! – Your wallet is unahackable but I have your password and more!

 2.15 – FTP is still a thing – DNS and Settings Content Files! | File Type: audio/mpeg | Duration: 57:08

2.15 – FTP is still a thing – DNS and Settings Content Files!

 2.14 – Zip Slip Slip and split it up to the hip hip hip! | File Type: audio/mpeg | Duration: 54:02

2.14 – Zip Slip Slip and split it up to the hip hip hip!

 2.13 (lucky 13) – Let’s talk about facebook! Plaintext Passwords and More! | File Type: audio/mpeg | Duration: 01:00:27

2.13 (lucky 13) – Let’s talk about facebook! Plaintext Passwords and More!

 2.12 - Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities | File Type: audio/mpeg | Duration: 41:57

2.12 - Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities

 2.10 - Is your keyboard listening? A different type of jailbreak, Grinch Bots Stealing Christmas? Chrome, and Red Team Architecture! | File Type: audio/mpeg | Duration: 01:03:13

2.10 - Is your keyboard listening? A different type of jailbreak, Grinch Bots Stealing Christmas? Chrome, and Red Team Architecture!

 2.9 - OWASP Top 10 2017, OSX Root login bypass, Uber Hacked, who are the shadow brokers, ROCA! | File Type: audio/mpeg | Duration: 01:14:01

2.9 - OWASP Top 10 2017, OSX Root login bypass, Uber Hacked, who are the shadow brokers, ROCA!

 2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods | File Type: audio/mpeg | Duration: 01:14:45

2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods

 2.7 - Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more! | File Type: audio/mpeg | Duration: 52:56

2.7 - Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more!

 2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more! | File Type: audio/mpeg | Duration: 01:18:13

2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more!

 2.5 – Krebs on Mirai, Rudy Cyber head, ransomware, and more! | File Type: audio/mpeg | Duration: 52:43

2.5 – Krebs on Mirai, Rudy Cyber head, ransomware, and more!

 2.4 – Law Firm Hacks, Voting Systems and Russia Hacking, 5 signs to better security, Wire, CobaltStrike and more! | File Type: audio/mpeg | Duration: 01:19:03

2.4 – Law Firm Hacks, Voting Systems and Russia Hacking, 5 signs to better security, Wire, CobaltStrike and more!

 2.3 – Flash Exploits, PowerShell Hacking, Investigating the Elections, Expedia Hacker, Android Malware, and Shutting down the Note 7. TT: Ruler, MailSniper | File Type: audio/mpeg | Duration: 01:15:42

2.3 – Flash Exploits, PowerShell Hacking, Investigating the Elections, Expedia Hacker, Android Malware, and Shutting down the Note 7. TT: Ruler, MailSniper

 2.2 – Shamoon creeps out again in Saudi, Android Malware steals Google accounts, FBI jurisdiction, and 2017 predictions | File Type: audio/mpeg | Duration: 02:29:30

2.2 – Shamoon creeps out again in Saudi, Android Malware steals Google accounts, FBI jurisdiction, and 2017 predictions

Comments

Login or signup comment.