PLAY PODCASTS
Security Now - 16k MP3

Security Now - 16k MP3

1,036 episodes — Page 13 of 21

SN437: New Year's News Catchup

This first podcast of 2014 catches us up on all of the news that transpired over the Christmas and New Years holidays... and there was a LOT of it! (Like it or not, the NSA news just keeps on coming!)

Jan 8, 2014

SN435: Listener Feedback #180

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

Dec 19, 2013

SN434: Listener Feedback #179

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

Dec 12, 2013

SN433: "BULLRUN": How the NSA breaks Internet encryption

After catching up with the week's more interesting Security News and my Miscellany (such as NASA working on an FTL Warp Drive!) Leo & I take a closer look at "BULLRUN", the NSA's code name for their encryption cracking initiative, to speculate upon just what the NSA might be doing... and capable of doing.

Dec 5, 2013

SN432: Coin, CryptoLocker, Patent Trolls & More

Following another week overfilled with interesting security-related news, Steve and Leo spend an hour and a half diving deeply into an updated (and likely very close to correct) understanding of the COIN payment card, news on the CryptoLocker front, a close look at a patent troll case that has so far done the wrong way, and much more.

Nov 28, 2013

SN431: What Is RADIUS?

After catching up on another whirlwind week of really interesting Internet security news, Leo and I provide a brief overview of "RADIUS" - the 22-year-old pervasive, but often unseen, protocol and system for providing wide area network user authentication and accounting.

Nov 21, 2013

SN430: Listener Feedback #178

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

Nov 14, 2013

SN429: "Monkey" Was 26th!

The past week was so jam-packed with so much fun and interesting security news that we had a hard time just fitting it all in. So this week's podcast is news, news, news!

Nov 7, 2013

SN428: Listener Feedback #177

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Oct 31, 2013

SN427: A Newsy Week!

So much happened during the past week that today's podcast will consist of a series of rather deep dives into the many interesting things we have to discuss.

Oct 24, 2013

SN426: SQRL: Anti-Phishing & Revocation

After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features.

Oct 17, 2013

SN425: SQRL and Q&A #176

Following up on last week's "SQRL - Secure QR Login" podcast, this week's Q&A focuses upon the many interesting questions my description of a new approach to secure website login sparked in the minds of the podcast's listeners. And, of course, we also catch up with the week's news.

Oct 10, 2013

SN424: SQRL: Secure QR Login

After catching up with the week's minimal security news, Tom and I take the wraps off of "SQRL" (pronounced "squirrel"), Steve's recent brainstorm to propose a truly practical replacement for always-troublesome website login usernames and passwords.

Oct 3, 2013

SN423: Fingerprint Biometrics

After catching up with the week's news, and following the news that Apple's new iPhone Touch ID system was spoofed within days of its release, Tom and I take a much closer look at the technology and application of Apple's Touch ID system, examining the reports of its early demise.

Sep 26, 2013

SN422: Listener Feedback #175

Tom and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Sep 19, 2013

SN421: The Perfect Accusation

After covering this month's Patch Tuesday events and catching up with the past week's security news, Leo & I examine the week's most troubling and controversial revelations: the NSA's reported ability to crack much of the Internet's encrypted traffic. We explain how different the apparent reality is from the headlines,

Sep 12, 2013

SN420: Bitmessage

After catching up with a lot of interesting security news, Leo and I examine the operation and technology of the new Bitmessage secure and anonymous Internet messaging system.

Sep 5, 2013

SN419: Listener Feedback #174

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Aug 29, 2013

SN418: Considering PGP

This week, Leo and I continue covering the consequences of the Snowden leaks and, with that in mind, we examine the Pretty Good Privacy (PGP) system for securely encrypting eMail and attachments.

Aug 22, 2013

SN417: Listener Feedback #173

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Aug 15, 2013

SN416: Black Hat 2013, Tor & More

With last week's Las Vegas Black Hat 2013 and DEFCON conferences just completed, Leo and I examine the most significant and worrisome revelations to emerge from that annual convocation, and also discuss and dissect the week's top security news.

Aug 8, 2013

SN415: Listener Feedback #172

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Aug 1, 2013

SN414: Inflection Points

This week we mix security news and updates with a discussion and analysis of the security industry's evolving reactions to the NSA/Snowden revelations. Leo and I examine several of the more significant news items and blogs relating to the issues of widespread Internet surveillance. Though it's not super technical, we believe you'll find it worth your time... and thought provoking.

Jul 25, 2013

SN413: How Much Tinfoil?

Though regularly scheduled to be a Q&A episode, Steve and Leo had SO MUCH to cover in the week's news that there was no time left for questions. We'll save those for episode #415 and this week enjoy a great discussion of the week's many events. We'll wrap up with a discussion of the wide range of "tinfoil" solutions available and their convenience versus security tradeoffs.

Jul 18, 2013

SN412: SSL & Perfect Forward Secrecy

After catching up with a bunch of interesting security news of the week and my Sci-Fi and SpinRite development updates, Leo and I explore the already existing SSL/TLS technology known as "Perfect Forward Secrecy," which becomes useful in a world where encrypted traffic is being captured and archived.

Jul 11, 2013

SN411: Listener Feedback #171

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Jul 4, 2013

SN410: Interesting & Useful Intel History

After catching up with another post-PRISM week of security industry news, Leo and I wind up and release our propeller beanies for a deep dive into the early history of Intel processor memory management - which, it turns out, has direct application to Steve's current work on SpinRite v6.1.

Jun 27, 2013

SN409: Listener Feedback #170

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Jun 20, 2013

SN408: The State of Surveillance (How the NSA's PRISM program works.)

Leo and I remind our listeners that we just had another Microsoft Patch Tuesday. Then I detail and carefully lay down a solid foundation of theory of the operation of the NSA's PRISM program. This explains EVERYTHING about what the NSA is doing, and how. I even explain how and why the program got its name.Podcast Document Resources: 1, 2, 3, 4, 5

Jun 13, 2013

SN407: Listener Feedback #169

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Jun 6, 2013

SN406: Chatting Off the Record With OTR

After covering the week's security news, Leo and I examine an interesting security protocol known as "Off The Record"(OTR) which has been specifically designed to protect conversational privacy, both as it happens and also in the future.

May 30, 2013

SN405: Listener Feedback #168

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

May 23, 2013

SN404: How Facebook Monetizes

After catching up with the past week's updates and security news, Iyaz and I share information presented by the Electronic Frontier Foundation (EFF) which describes how Facebook manages the privacy interactions with their third-party data warehouses and advertisers.

May 16, 2013

SN403: Listener Feedback #167

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

May 9, 2013

SN402: BitTorrent Sync

After catching up with the week's security news, Leo and I examine everything that's currently known about the recently released "BitTorrent Sync" peer-to-peer file sharing and folder synchronizing application. (Everything seen so far looks 100% correct and VERY useful.)

May 2, 2013

SN401: Listener Feedback #166

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Apr 25, 2013

SN400: VPN Solutions

After catching up with a wild week of security events, Leo and I revisit a topic from the earliest episodes of the Security Now podcast: Virtual Private Networks (VPNs). This coincides with the introduction of a new sponsor on the TWIT network, proXPN, a VPN provider that truly looks like the right choice.

Apr 18, 2013

SN399: Listener Feedback #165

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Apr 11, 2013

SN398: Distributed Hash Tables

After catching up with a busy week in the security space, Leo and I cover an intriguing topic in fundamental distributed Internet technology, Distributed Hash Tables, which is the somewhat awkward name for distributed database technology.

Apr 4, 2013

SN397: Listener Feedback #164

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Mar 28, 2013

SN396: The Telnet-pocalypse

This week was so chockful of things to discuss that we had no time to explore the fascinating technology and operation of Distributed Hash Tables. That discussion will be "tabled" for two weeks. This week, we look more closely into the somewhat troubling issues of SSL/TLS server security as revealed by SSLLabs.com, discuss the SWAT team arriving at Brian Krebs's home, examine the consequences of the revelation that 420 million routers are accepting trivial logins on their Telnet ports, and more!

Mar 21, 2013

SN395: Listener Feedback #163

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Mar 14, 2013

SN394: Tor v2 with Hidden Services

After catching up with this week's Java vulnerabilities and emergency updates, Leo and I examine the recent evolution of the public and free "Tor" Internet anonymizing network. We look at the network's updated operation and its new ability to offer "hidden services" in addition to hiding the identity and location of the services' users.

Mar 7, 2013

SN393: Listener Feedback #162

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Feb 28, 2013

SN392: The Internet Underworld

We first converse with today's special guest, Brian Krebs, who for many years wrote for the Washington Post and is now publishing his own "Krebs on Security" blog. Our topic is "The Internet Underground." After that, we catch up with a somewhat busy and interesting week in Internet security.

Feb 21, 2013

SN391: Listener Feedback #161

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Feb 14, 2013

SN390: "Mega" Security Overview

After covering "UPnP a week later" and catching up with some interesting security industry happenings, Leo and I take a look into the controversy surrounding the security (or lack thereof) of Kim Dotcom's new "Mega" cloud storage offering.

Feb 7, 2013

SN389: Listener Feedback #160 & UPnP Exposure Disaster

Leo and I discuss the week's major security events—and the disastrous news of 81 million exposed vulnerable routers!—discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Jan 31, 2013

SN388: Memory Hard Problems

After catching up with a bunch of fun and interesting news of the week, Leo and I examine the future of anti-hacking password scrambling and storage with the introduction of "Memory Hard Problems," which are provably highly resistant to massive hardware acceleration.

Jan 24, 2013

SN387: Listener Feedback #159

Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes. We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.

Jan 17, 2013