Sign in
Education
Technology
Security Weekly Productions
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
Hacking the Brainstem, Mandy Logan - Paul's Security Weekly #587
Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is. Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly
01:06:4124/12/2018
What The Heck Are "Security Basics"? - Paul's Security Weekly #587
The question comes up quite often, what should organizations be doing to meet the basic security requirements? We often hear the terms "Security Basics", "Minimum Security Standards" or dear lord "Security Hygiene". But what does all this mean? Is it the same for everyone? People will point to different resources that attempt to define the security basics, but do they really work? Does compliance play into this picture? Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly
01:48:4123/12/2018
Detecting Attacker Behavior, LogRhythm - Paul's Security Weekly #587
Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques! To get involved with LogRhythm, go to: https://www.securityweekly.com/logrhythm Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly
25:2622/12/2018
Taylor Swift, KringleCon, & 3D Head - Paul's Security Weekly #586
How Taylor Swift used Facial Recognition to Thwart Stalkers, unlocking android phones with a 3D printed head, Ticketmaster fails to take responsibility for malware, and it's December of 2018, To Hell with it, Just patch your stuff already! Full Show Notes: https://wiki.securityweekly.com/Episode586 Follow us on Twitter: https://www.twitter.com/securityweekly
47:5617/12/2018
Don Murdoch, Regent University Cyber Range - Paul's Security Weekly #586
Don Murdoch is the Assistant Director at Regent University Cyber Range. Don discusses his book "Blue Team Handbook Incident Response Edition". Full Show Notes: https://wiki.securityweekly.com/Episode586 Follow us on Twitter: https://www.twitter.com/securityweekly
41:2315/12/2018
Ed Skoudis, Counter Hack Challenge - Paul's Security Weekly #586
Ed Skoudis, Founder of the Counter Hack Challenge and Kringle Con 2018, joins us on the show to talk about this years challenge and what's in store! "Welcome to Counter Hack Challenges, an organization devoted to creating educational, interactive challenges and competitions to help identify people with information security interest, potential, skills, and experience. We design and operate a variety of capture-the-flag and quiz-oriented challenges for the SANS Institute, Cyber Aces, US Cyber Challenge, and other organizations. Our featured products include NetWars, CyberCity, Holiday Hack Challenge, Cyber Aces Online, and several Cyber Quests." Join KringleCon: www.kringlecon.com Full Show Notes: https://wiki.securityweekly.com/Episode586 Follow us on Twitter: https://www.twitter.com/securityweekly
34:1014/12/2018
Marriott Breach, Lame Printer Hack, and Docker - Paul's Security Weekly #585
This week, how Docker containers can be exploited to mine for cryptocurrency, WordPress sites attacking other WordPress sites, why the Marriott Breach is a valuable IT lesson, malicious Chrome extensions, why hospitals are the next frontier of cybersecurity, and how someone is claiming to sell a Mass Printer Hijacking service! Full Show Notes: https://wiki.securityweekly.com/Episode585 Follow us on Twitter: https://www.twitter.com/securityweekly
40:4610/12/2018
Marcello Salvati, BHIS - Paul's Security Weekly #585
Marcello Salvati is a security consultant at BHIS, and is giving a technical segment on SilentTrinity. Marcello will solve the red team tradecraft problem of gaining dynamic access to the .net api without going through powershell. To learn more about Black Hills Information Security, go to: https://www.blackhillsinfosec.com/PSW Full Show Notes: https://wiki.securityweekly.com/Episode585 Follow us on Twitter: https://www.twitter.com/securityweekly
33:4709/12/2018
Lenny Zeltser, Minerva Labs - Paul's Security Weekly #585
Lenny Zeltser the VP of Products at Minerva, will be giving a technical segment on Evasion Tactics in Malware from the Inside Out. He will explain the tactics malware authors use to evade detection and analysis and find out how analysts examine these aspects of malicious code with a disassembler and a debugger. To learn more about Minerva Labs, go to: https://l.minerva-labs.com/security-weekly Full Show Notes: https://wiki.securityweekly.com/Episode585 Follow us on Twitter: https://www.twitter.com/securityweekly
01:06:3908/12/2018
Wietse Venema & Dan Farmer, SATAN - Paul's Security Weekly #584
Wietse Venema and Dan Farmer, the Developers of Security Administrator Tool for Analyzing Networks (SATAN), talk about their experience as developers, their journey to creating SATAN and their decision to keep SATAN a open source tool. Full Show Notes: https://wiki.securityweekly.com/Episode584 Follow us on Twitter: https://www.twitter.com/securityweekly
59:2702/12/2018
"Dunkin" Donuts, Microsoft, & Marijuana - Paul's Security Weekly #584
Hackers breach Dunkin Donuts, how insiders are serious threats to security in an organization, the return of email flooding, Microsoft helps police shut down fake tech support in India, and how Las Vegas police are cracking down on Black Market marijuana sales! Full Show Notes: https://wiki.securityweekly.com/Episode584 Follow us on Twitter: https://www.twitter.com/securityweekly
01:17:3701/12/2018
Sven Morgenroth, Netsparker - Paul's Security Weekly #584
Sven will talk about PHP Object injection vulnerabilities and explain the dangers of PHP's unserialize function. He will show the format of serialized PHP Objects, explain PHP's magic methods and how to write an exploit for a PHP Object Injection vulnerability during his technical demo. Full Show Notes: https://wiki.securityweekly.com/Episode584 To learn more about Netsparker, go to: https://www.netsparker.com/securityweekly Follow us on Twitter: https://www.twitter.com/securityweekly
31:5301/12/2018
Spectre, ATMs, and Japan's Minister - Paul's Security Weekly #583
7 new Spectre/Meltdown attacks, Hacking ATM's for free cash is easier than Windows XP, AI can now fake fingerprints fooling ID scanners, and Japan's cybersecurity minister admits he's never used a computer! Full Show Notes: https://wiki.securityweekly.com/Episode583 Follow us on Twitter: https://www.twitter.com/securityweekly
01:15:3219/11/2018
John Moran, DFLabs - Paul's Security Weekly #583
John is a Senior Product Manager at DFLabs, where he performs a wide variety of tasks from product management to content development and partner management. John Moran talks about IncMan SOAR and how DFLabs Automation & Response platform helps automate, orchestrate, and measure CSIRTs and SOCs. To learn more about DFLabs, go to: www.dflabs.com/securityweekly Full Show Notes: https://wiki.securityweekly.com/Episode583 Follow us on Twitter: https://www.twitter.com/securityweekly
40:0118/11/2018
Jon Buhagiar, Sybex - Paul's Security Weekly #583
Jon Buhagiar is responsible for Network Operations at Pittsburgh Technical College for the past 19 years. Jon is currently a Network+ Review Course Instructor at Sybex, and he joins us to talk about Network Operations at Sybex. Full Show Notes: https://wiki.securityweekly.com/Episode583 Follow us on Twitter: https://www.twitter.com/securityweekly
49:0017/11/2018
Apache, Dirty Cow, & Edge - Paul's Security Weekly #582
Cisco accidentally released Dirty Cow exploit code, Apache Struts Vulnerabilities, Zero Day exploit published for VM Escape flaw, Spam spewing IoT botnet infects 100,000 routers, and some of these vibrating apps turn your phone into a sex toy! Full Show Notes: https://wiki.securityweekly.com/Episode582 Follow us on Twitter: https://www.twitter.com/securityweekly
42:3912/11/2018
Eyal Neemany, Javelin Networks - Paul's Security Weekly #582
Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. Eyal will be discussing securing remote administration, remote credentials, explains that Jump Servers aren’t as good, and show you have to connect to remote machines using AD. Full Show Notes: https://wiki.securityweekly.com/Episode582 Follow us on Twitter: https://www.twitter.com/securityweekly
51:1211/11/2018
Corin Imai, DomainTools - Paul's Security Weekly #582
Corin Imai is Sr. Security Advisor for DomainTools. Corin began her career working on desktop virtualization, networking, and cloud computing technologies before delving into security. This interview, they talk about DNS, phishing tools, and tease what DomainTools has in store for 2019. Full Show Notes: https://wiki.securityweekly.com/Episode582 Follow us on Twitter: https://www.twitter.com/securityweekly
28:2910/11/2018
AWS Lambda, Bleedingbit, and Cisco - Paul's Security Weekly #581
AWS Security Best Practices, Masscan and massive address lists, Bleedingbit vulnerabilities, and Cisco Zero-Day exploited in the wild, ! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode581 →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
01:14:1605/11/2018
Matt Toussain, BHIS - Paul's Security Weekly #581
Matt Toussain a Security Analyst at Black Hills Information Security, will be giving a tech segment on remote access tools (RAS). To learn more about BHIS, go to: https://www.blackhillsinfosec.com/PSW Full Show Notes: https://wiki.securityweekly.com/Episode581 →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
35:4604/11/2018
Aleksei Tiurin, Acunetix - Paul's Security Weekly #581
Aleksei Tiurin is the Senior Security Researcher for Acunetix. Aleksei is giving a technical segment on insecure deserialization in Java/JVM and explains what polymorphism is. Aleksei Tiurin is a security researcher and pentester with over 8 years of experience in penetration testing and with a particular focus on ERP and banking systems and Windows-networks. To learn more about Acunetix, go to: https://www.acunetix.com/securityweekly Full Show Notes: https://wiki.securityweekly.com/Episode581 →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
39:4903/11/2018
AI Fear, FDA, Tesla, and D-Link - Paul's Security Weekly #580
Fear of AI attacks, the FDA releases cybersecurity guidance, watch hackers steal a Tesla, serious D-Link router security flaw may never be patched, and California addresses default passwords! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode580 Follow us on Twitter: https://www.twitter.com/securityweekly
01:05:5729/10/2018
Yossi Sassi, Javelin Networks - Paul's Security Weekly #580
Yossi Sassi is the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com. Yossi joins us for a tech segment to talk about using windows powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence. To learn more about Javelin Networks, Go To: www.javelin-networks.com Full Show Notes: https://wiki.securityweekly.com/Episode580 Follow us on Twitter: https://www.twitter.com/securityweekly
57:3328/10/2018
Veronica Schmitt, DFIRLABS - Paul's Security Weekly #580
Veronica Schmitt is the Sr. Digital Forensic Scientist for DFIRLABS. Veronica explains what SRUM is in WIndows 10. She explains how SRUM can be a valuable tool in Digital Forensics. Full Show Notes: https://wiki.securityweekly.com/Episode580 Follow us on Twitter: https://www.twitter.com/securityweekly
55:0127/10/2018
Shodan, Apache, ICS, and Controllers - Paul's Security Weekly #579
How to use the Shodan search engine to secure an enterprise's internet presence, Apache access vulnerability could affect thousands of applications, vulnerable controllers could allow attackers to manipulate marine diesel engines, & ICS Security Plagued with Basic, and avoidable mistakes! Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
49:1822/10/2018
John Walsh, CyberArk - Paul's Security Weekly #579
John Walsh the DevOps Evangelist for CyberArk joins us on the show. John talks about the articles he wrote for CyberArk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk. Sponsor Landing Page: https://www.conjur.org/asw Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
39:3921/10/2018
Mark Dufresne, Endgame - Paul's Security Weekly #579
Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is. Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly
45:5120/10/2018
DerbyCon, Russians, and Next Story - Paul's Security Weekly #578
New Apple and Microsoft security flaws at Black Hat Europe, CCTV makers leaves at least 9 million cameras public, upset Google+ users are sueing Google, US weapons systems apparently can be easily hacked, not all multifactor authentication is created equal, and Kanye's '000000' password makes iPhone security great again! Full Show Notes: https://wiki.securityweekly.com/Episode578 Follow us on Twitter: https://www.twitter.com/securityweekly
39:3315/10/2018
Omer Yair, Javelin - Paul's Security Weekly #578
Omer is End-Point team lead at Javelin Networks. The team focuses on methods to covertly manipulate OS internals. Before Javelin Networks, he was a malware researcher at IBM Trusteer for two years focusing on financial malware families and lectured about his research on Virus Bulletin and Zero Nights conferences. Full Show Notes: https://wiki.securityweekly.com/Episode578 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
28:0914/10/2018
Lee Neely, Lawrence Livermore National Lab - Paul's Security Weekly #578
Lee Neely is a senior IT and security professional at LLNL with over 25 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. Full Show Notes: https://wiki.securityweekly.com/Episode578 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
53:0613/10/2018
Linux Bugs, macOS Zero-Day, & Twitter Exposed - Paul's Security Weekly #577
In the security news, Russian Hackers use Malware that can survive OS reinstalls, Facebook’s 2-Factor authentication With a phone number isn’t only for security, it’s used for ads ,FBI warns companies about hackers increasingly abusing RDP connections, NSA employee who brought hacking tools home sentenced to 66 months in prison, new Linux Kernel Bug affects Red Hat, CentOS, and Debian Distributions, and Baddies just need one email account with clout to unleash phishing hell, and more! Full Show Notes: https://wiki.securityweekly.com/Episode577 Visit https://www.securityweekly.com/psw for all the latest episodes!
42:5901/10/2018
Offensive Operating Against SysMon, Carlos Perez - Paul's Security Weekly #577
Carlos Perez delivers the Technical Segment on How to Operate Offensively Against Sysmon. He talks about how SysMon allows him to create rules, and track specific types of tradecraft, around process creation and process termination. He dives into network connection, driver loading, image loading, creation of remote threats, and more! Full Show Notes: https://wiki.securityweekly.com/Episode577 Visit https://www.securityweekly.com/psw for all the latest episodes!
29:2230/09/2018
Mike Nichols, Keith McCammon, & Shawn Smith - Paul's Security Weekly #577
Mike Nichols is the VP of Product Management at Endgame, and he manages the Endgame endpoint protection platform. Keith McCammon is the Chief Security Officer and Co-Founder of Red Canary, and he runs Red Canary’s Security Operation Center. Shawn Smith is the IT Security Manager at Panhandle Educators Federal Credit Union. They discuss the problems Shawn had that led him to choose Red Canary and Endgame as his solution, skill shortages in vendors, what he did to convince his management to approve of this solution, and what his process for testing the effectiveness of these solutions was. Full Show Notes: https://wiki.securityweekly.com/Episode577 Visit https://www.securityweekly.com/psw for all the latest episodes!
41:5829/09/2018
GovPayNow.com, AmazonBasics, and FBI - Paul's Security Weekly #576
Senate can't protect senators staff from Cyber Attacks, Equifax fined by ICO over data breach that hit Britons, US Military given the power to hack back and defend forward,and AmazonBasics Microwave works with Alexa! Full Show Notes: https://wiki.securityweekly.com/Episode576 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
57:1625/09/2018
Threat Hunting in the Cloud, Apollo Clark - Paul's Security Weekly #576
Apollo Clark goes through inventory management, access management, config management, patch management, automated remediation, logging and monitoring, and deployment tools. Full Show Notes: https://wiki.securityweekly.com/Episode576 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
30:1623/09/2018
Mike Ahmadi, DigiCert - Paul's Security Weekly #576
Mike Ahmadi oversees IoT security solutions and technical implementations for DigiCert customers across various verticals that include industrial, transportation, smart city, consumer devices and healthcare. Full Show Notes: https://wiki.securityweekly.com/Episode576 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
49:1822/09/2018
Microsoft, Elon Musk, Kernel and Powershell - Paul's Security Weekly #575
Microsoft accidentally lets encrypted Windows 10 out the the world, Kernel exploit discovered in macOS, PowerShell obfuscation ups the anty on anti virus, Google outlines incident response process, BombGar buys BeyondTrust, and Neil DeGrasse Tyson speaks on Elon Musk saying: Let the man Get High! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode575 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
01:17:0617/09/2018
Bypassing PAM, Eyal Neemany - Paul's Security Weekly #575
Eyal Neemany describes how to bypass Linux Pluggable Authentication Modules provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD system. Eyal Neemany is the Senior Security Researcher for Javelin Networks. →Full Show Notes: https://wiki.securityweekly.com/Episode575 →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
40:2316/09/2018
Brian Coulson, LogRhythm - Paul's Security Weekly #575
Brian Coulson is a Senior Security Research Engineer in the Threat Research Group of LogRhythm Labs in Boulder, CO. His primary focus is the Threat Detection Modules such as UEBA, and NTBA. →Full Show Notes: https://wiki.securityweekly.com/Episode575 →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
39:5715/09/2018
Supermicro, Apache Struts, & HTTPS - Paul's Security Weekly #574
In the security news, Spanish driver tests positive for every drug test, vulnerabilities found in the remote management interface of Supermicro servers, Apache Struts 2 flaw in the wild, HTTPS crypto-shame, and how to manipulate Apple's podcast charts! Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
44:0710/09/2018
Beacon Analysis, Chris Brenton - Paul's Security Weekly #574
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process. ***Powerpoint Slides in Full Show Notes*** Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
35:3209/09/2018
Wim Remes, Wire Security bvba - Paul's Security Weekly #574
Wim Remes from Wire Security bvba comes on the show to talk about pentesting, SDLC, the state of security, life of a (virtual) CISO, and certifications. Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
49:2608/09/2018
Texas, T-Mobile, and Jack Daniel - Paul's Security Weekly #573
In the Security News this week, Zero-Day Windows exploits, How to hide sensitive files in encrypted containers, Misfortune Cookie vulnerability returns, and bank robbers faked Cosmos backend to steal 13.5$ million. Full Show Notes: https://wiki.securityweekly.com/Episode573 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
55:5803/09/2018
No-Script Automation Tool, John Moran - Paul's Security Weekly #573
John is a Senior Product Manager at DFLabs, where he performs a wide variety of tasks from product management to content development and partner management. Prior to joining DFLabs John worked for a global security services provider, performing a wide variety of incident response consulting services. Full Show Notes: https://wiki.securityweekly.com/Episode573 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
30:0402/09/2018
Jayson Street, SphereNY - Paul's Security Weekly #573
Jayson E. Street is an author of the "Dissecting the hack: Series". Also the DEF CON Groups Global Ambassador. Plus the VP of InfoSec for SphereNY. He has also spoken at DEF CON, DerbyCon, GRRCon and at several other 'CONs and colleges on a variety of Information Security subjects. Full Show Notes: https://wiki.securityweekly.com/Episode573 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
52:2501/09/2018
Burp Suite 2.0, DNC, and NotPetya - Paul's Security Weekly #572
The Untold story of NotPetya, New Apache Struts RCE Flaw, How door cameras are creating dilemmas for police, Google gets sued for tracking you even when your location history is off, and Artificial Whiskey is coming, and one company is betting you'll drink up. Full Show Notes: https://wiki.securityweekly.com/Episode572 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
01:13:0027/08/2018
PHP Type Juggling Vulnerabilities, Netsparker - Paul's Security Weekly #572
Sven Morgenroth is a security researcher at Netsparker. He found filter bypasses for Chrome's XSS auditor and several web application firewalls. He comes on the show to discuss PHP Type Juggling Vulnerabilities. Full Show Notes: https://wiki.securityweekly.com/Episode572 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
27:3126/08/2018
Tod Beardsley, Rapid7 - Paul's Security Weekly #572
Tod Beardsley is the Director of Research at Rapid7. Paul talks to Tod about his recent projects Sonar and Heisenberg. They also discuss Tod's Under the Hoodie pentest report. Full Show Notes: https://wiki.securityweekly.com/Episode572 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
57:3425/08/2018
Cigars and Security - Paul's Security Weekly #571
Paul and Matt Alderman had the chance at DEF CON to sit down and talk about Cigars and Security. In our very first episode, Paul asks Matt questions on how he got started in Security, who some of his biggest influencers were, and how he feels about the Security world today. Matt asks Paul questions about Cigars, their origin, and what the difference is between different tobaccos grown all around the world. Full Show Notes: https://wiki.securityweekly.com/Episode571 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
49:2521/08/2018
Spoofing GPS with a hackRF, Larry Pesce - Paul's Security Weekly #571
Our very own Larry Pesce delivers the Technical Segment this week on Spoofing GPS with a hackRF. Full Show Notes: https://wiki.securityweekly.com/Episode571 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
57:5420/08/2018